In this work, we devise and evaluate control strategies for combining two potentially powerful buffer management techniques in object bases: (1) buffer pool segmentation with segment-specific replacement criteria and (2) dual buffering consisting of copying objects from pages into object buffers. We distinguish two dimensions for exerting control on the buffer pool: (1) the copying time determines when objects are copied from their memory-resident home page and (2) the relocation time determines the occasion on which a (copied) object is transferred back into its home page. Along both dimensions, we distinguish an eager and a lazy strategy. Our extensive experimental results indicate that a lazy object copying combined with an eager relocat...
Real-Time, active database systems (RTADBs) have attracted the attention of researchers in recent ti...
We propose a formal model of concurrency control in object bases. An object base is like a database ...
Many operating systems allow user programs to specify the protection level (inaccessible, read-only,...
In this paper we will classify and evaluate different approaches to optimizing the access to main me...
The traditional page-grained buffer manager in database systems has a low hit ratio when only a few ...
Parallelism is a viable solution to constructing high performance object-oriented database systems. ...
The automatic reclamation of storage for unreferenced objects is very important in object databases....
We investigate methods to improve the performance of algorithms for automatic storage reclamation of...
A distributed object database stores objects persistently at servers. Applications run on client mac...
In this paper, we propose two copying garbage collection methods. These two methods copy data struct...
I argue against trying to solve the problem of clustering objects into disk pages. Instead, I propos...
The cost of accessing main memory is increasing. Machine designers have tried to mitigate the conseq...
A fundamental problem in automating object database storage reclamation is determining how often to ...
When a working set fits into memory, the overhead im-posed by the buffer pool renders traditional da...
Reorganization of objects in an object databases is an important component of several operations lik...
Real-Time, active database systems (RTADBs) have attracted the attention of researchers in recent ti...
We propose a formal model of concurrency control in object bases. An object base is like a database ...
Many operating systems allow user programs to specify the protection level (inaccessible, read-only,...
In this paper we will classify and evaluate different approaches to optimizing the access to main me...
The traditional page-grained buffer manager in database systems has a low hit ratio when only a few ...
Parallelism is a viable solution to constructing high performance object-oriented database systems. ...
The automatic reclamation of storage for unreferenced objects is very important in object databases....
We investigate methods to improve the performance of algorithms for automatic storage reclamation of...
A distributed object database stores objects persistently at servers. Applications run on client mac...
In this paper, we propose two copying garbage collection methods. These two methods copy data struct...
I argue against trying to solve the problem of clustering objects into disk pages. Instead, I propos...
The cost of accessing main memory is increasing. Machine designers have tried to mitigate the conseq...
A fundamental problem in automating object database storage reclamation is determining how often to ...
When a working set fits into memory, the overhead im-posed by the buffer pool renders traditional da...
Reorganization of objects in an object databases is an important component of several operations lik...
Real-Time, active database systems (RTADBs) have attracted the attention of researchers in recent ti...
We propose a formal model of concurrency control in object bases. An object base is like a database ...
Many operating systems allow user programs to specify the protection level (inaccessible, read-only,...