SI-CV: Snapshot Isolation with Co-located Versions
نویسندگان
چکیده
منابع مشابه
SIAS-V in Action: Snapshot Isolation
Multi-Version Database Management Systems (MV-DBMS) are wide-spread and can effectively address the characteristics of new storage technologies such as Flash, yet they are mainly optimized for traditional storage. A modification of a tuple in a MV-DBMS results in a new version of that item and the invalidation of the old version. Under Snapshot Isolation (SI) the invalidation is performed as an...
متن کاملSIAS-V in Action: Snapshot Isolation Append Storage - Vectors on Flash
Multi-Version Database Management Systems (MV-DBMS) are wide-spread and can effectively address the characteristics of new storage technologies such as Flash, yet they are mainly optimized for traditional storage. A modification of a tuple in a MV-DBMS results in a new version of that item and the invalidation of the old version. Under Snapshot Isolation (SI) the invalidation is performed as an...
متن کاملTowards serializable replication with snapshot isolation
Replicated database systems necessarily deal with multiple versions of data items active concurrently across nodes in a replication group. As a consequence, there is a natural fit between replication and snapshot isolation (SI), which uses multiple versions of data within a single site to provide nonblocking read operations. However, snapshot isolation does not guarantee serializable execution ...
متن کاملTracing Snapshot Isolation in Transactions (Extended Abstract)
Effect traces provide a simple methodology of reasoning about program semantics while abstracting away from low-level details. They describe the semantics of a transaction in terms of reads and writes to locations in shared memory. In this work, we propose a definition for traces of transactions under snapshot isolation. Snapshot traces simplify the reasoning about STM with snapshot isolation s...
متن کاملGuard Independence and Constraint-Preserving Snapshot Isolation
A method for detecting potential violations of integrity constraints of concurrent transactions running under snapshot isolation (SI) is presented. In contrast to methods for ensuring full serializability under snapshot isolation, violations of integrity constraints may be detected by examining certain read-write interaction of only two transactions at a time. The method, called constraint-pres...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011