The problem of choosing the appropriate Hranularit ~ (size) of lockable objects is introduced and the tradeoff between concurrency and overhead is discusseS. A locking protocol which allows simultaneous locking at various granularities by different transactions is presented. It is based on the introduction of additional lock modes besides the conventional share mode an5 exclusive mode. A proof is given of the equivalence of this protocol to a conventional one. Next the issue of consistency in a shared environment is analyze~. This discussion is motivated by the realization that some existing data base systems use automatic lock protocols which insure protection only from certain types of inconsistencies (for instance those arising from tran...
A dynamic granularity locking protocol for tree-structured databases is presented. It is a variant o...
Although the general concepts provided by the standard concurrency control theory (e. g. [BHG87]) re...
. Two-phase locking is a standard method for managing concurrent transactions in database systems. I...
AbstractIn this paper, we extend the traditional relationships between locks, i.e., shared and non-s...
An important characteristic of concurrency control mechanisms is the level of concurrency that they ...
The optimal choices of granularity (size of a physical lock) and the degree of multiprogramming (max...
Three different types of consistencies, viz., semiweak, weak, and strong, of a read-only transaction...
To implement the atomicity in accessing the irregular data structure, developers often use the coars...
The maintenance of materialized aggregate join views is a well-studied problem. However, to date the...
Various techniques have been proposed to ensure the safe, concurrent execution of a set of database ...
The paper studies the impact of several lock manager designs on the overhead imposed to a persistent...
While the dominant approach to persistent storage in practice is to use a relational DBMS, there are...
Concurrent object-oriented programming languages coordinate conflicting memory accesses through lock...
The concurrency control lock (e.g. file lock, table lock) has long been used as a canonical example ...
AbstractWe present a new model for describing and reasoning about transaction-processing algorithms....
A dynamic granularity locking protocol for tree-structured databases is presented. It is a variant o...
Although the general concepts provided by the standard concurrency control theory (e. g. [BHG87]) re...
. Two-phase locking is a standard method for managing concurrent transactions in database systems. I...
AbstractIn this paper, we extend the traditional relationships between locks, i.e., shared and non-s...
An important characteristic of concurrency control mechanisms is the level of concurrency that they ...
The optimal choices of granularity (size of a physical lock) and the degree of multiprogramming (max...
Three different types of consistencies, viz., semiweak, weak, and strong, of a read-only transaction...
To implement the atomicity in accessing the irregular data structure, developers often use the coars...
The maintenance of materialized aggregate join views is a well-studied problem. However, to date the...
Various techniques have been proposed to ensure the safe, concurrent execution of a set of database ...
The paper studies the impact of several lock manager designs on the overhead imposed to a persistent...
While the dominant approach to persistent storage in practice is to use a relational DBMS, there are...
Concurrent object-oriented programming languages coordinate conflicting memory accesses through lock...
The concurrency control lock (e.g. file lock, table lock) has long been used as a canonical example ...
AbstractWe present a new model for describing and reasoning about transaction-processing algorithms....
A dynamic granularity locking protocol for tree-structured databases is presented. It is a variant o...
Although the general concepts provided by the standard concurrency control theory (e. g. [BHG87]) re...
. Two-phase locking is a standard method for managing concurrent transactions in database systems. I...