Traditional concurrency control theory views transactions in terms of read and write operations on database items. Thus, the effects of accessing non-database entities, such as the system clock or the log, on a transaction's behavior are not explicitly considered. In this paper, we are motivated by a desire to include accesses to such extra-data items within the purview of transaction and database correctness. We provide a formal treatment of concurrency control when transactions are allowed access to extra-data by discussing the inter-transaction dependencies that are induced when transactions access extra-data. We also develop a spectrum of correctness criteria that apply when such transactions are considered and outline mechanisms to enf...
Many activities are comprised of temporally dependent events that must be executed in a specific chr...
The concurrency control lock (e.g. file lock, table lock) has long been used as a canonical example ...
Concurrency control has been thoroughly studied in the context of traditional database applications ...
Traditional concurrency control theory views transactions in terms of read and write operations on d...
Although the general concepts provided by the standard concurrency control theory (e. g. [BHG87]) re...
Concurrency control mechanisms including the wait, time-stamp and rollback mechanisms have been brie...
Attaining high performance of transaction processing and preserving consistency of database are two ...
This part of the book consists of two chapters. The topics of those chapters, recovery and concurren...
Transaction Processing (TP) plays a primary role in the design and implementation of IT applications...
The analysis of the data accessing mechanism is of importance to the analytical performance evaluati...
We present a new model for describing and reasoning about transaction-processing algorithms. The mod...
Cataloged from PDF version of article.Protocols developed so far for concurrency control in real-tim...
A transaction is a logical unit of work that includes one or more database access operations such as...
Concurrency control is the activity of coordinating concurrent accesses to a database in a multiuser...
Traditionally, database theory has focused on concepts such as atomicity and serializability, assert...
Many activities are comprised of temporally dependent events that must be executed in a specific chr...
The concurrency control lock (e.g. file lock, table lock) has long been used as a canonical example ...
Concurrency control has been thoroughly studied in the context of traditional database applications ...
Traditional concurrency control theory views transactions in terms of read and write operations on d...
Although the general concepts provided by the standard concurrency control theory (e. g. [BHG87]) re...
Concurrency control mechanisms including the wait, time-stamp and rollback mechanisms have been brie...
Attaining high performance of transaction processing and preserving consistency of database are two ...
This part of the book consists of two chapters. The topics of those chapters, recovery and concurren...
Transaction Processing (TP) plays a primary role in the design and implementation of IT applications...
The analysis of the data accessing mechanism is of importance to the analytical performance evaluati...
We present a new model for describing and reasoning about transaction-processing algorithms. The mod...
Cataloged from PDF version of article.Protocols developed so far for concurrency control in real-tim...
A transaction is a logical unit of work that includes one or more database access operations such as...
Concurrency control is the activity of coordinating concurrent accesses to a database in a multiuser...
Traditionally, database theory has focused on concepts such as atomicity and serializability, assert...
Many activities are comprised of temporally dependent events that must be executed in a specific chr...
The concurrency control lock (e.g. file lock, table lock) has long been used as a canonical example ...
Concurrency control has been thoroughly studied in the context of traditional database applications ...