SI-CV: Snapshot Isolation with Co-located Versions

نویسندگان

  • Robert Gottstein
  • Ilia Petrov
  • Alejandro P. Buchmann
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SIAS-V in Action: Snapshot Isolation

Multi-Version Database Management Systems (MV-DBMS) are wide-spread and can effectively address the characteristics of new storage technologies such as Flash, yet they are mainly optimized for traditional storage. A modification of a tuple in a MV-DBMS results in a new version of that item and the invalidation of the old version. Under Snapshot Isolation (SI) the invalidation is performed as an...

متن کامل

SIAS-V in Action: Snapshot Isolation Append Storage - Vectors on Flash

Multi-Version Database Management Systems (MV-DBMS) are wide-spread and can effectively address the characteristics of new storage technologies such as Flash, yet they are mainly optimized for traditional storage. A modification of a tuple in a MV-DBMS results in a new version of that item and the invalidation of the old version. Under Snapshot Isolation (SI) the invalidation is performed as an...

متن کامل

Towards serializable replication with snapshot isolation

Replicated database systems necessarily deal with multiple versions of data items active concurrently across nodes in a replication group. As a consequence, there is a natural fit between replication and snapshot isolation (SI), which uses multiple versions of data within a single site to provide nonblocking read operations. However, snapshot isolation does not guarantee serializable execution ...

متن کامل

Tracing Snapshot Isolation in Transactions (Extended Abstract)

Effect traces provide a simple methodology of reasoning about program semantics while abstracting away from low-level details. They describe the semantics of a transaction in terms of reads and writes to locations in shared memory. In this work, we propose a definition for traces of transactions under snapshot isolation. Snapshot traces simplify the reasoning about STM with snapshot isolation s...

متن کامل

Guard Independence and Constraint-Preserving Snapshot Isolation

A method for detecting potential violations of integrity constraints of concurrent transactions running under snapshot isolation (SI) is presented. In contrast to methods for ensuring full serializability under snapshot isolation, violations of integrity constraints may be detected by examining certain read-write interaction of only two transactions at a time. The method, called constraint-pres...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011