A New Hybrid Predicate-Assertion-Index-Locking (PAX) Algorithm to Prevent Transactional Phantoms

نویسندگان

  • Patrick O'Neil
  • Alan Fekete
  • Elizabeth O'Neil
  • Dimitrios Liarokapis
چکیده

We discuss three forms of phantom prevention locking that have been proposed in the literature: (1) predicate locking [EGLT76], (2) precision locking [JBB81], and (3) index locking (specifically, KVL/IM locking [MOHAN90, MOHAN92, MOHAN96]). The predicate locking method was dropped from consideration in System R because of perceived problems [CHETAL81]. The precision locking technique was proposed as an alternative, but was thought to require excessive resource use in some application regimes. Only index locking methods are now being used by major commercial database systems. The current paper introduces a novel and workable extension of KVL/IM locking, to provide increased concurrency in certain application regimes by an alternative phantom prevention method that "asserts" read predicates and updates in memory, a technique based on precision locking which we call predicate assertion, or "PA". PA is more precise than index locking in many cases, reducing the number of false conflicts between transactions, and improves on index locking CPU overhead in certain application regimes where complex queries outnumber update statements. Using PA as a runtime alternative to index locking gives us a hybrid Predicate-Assertion-Index-locking scheme, which we abbreviate "PAX". A graceful method of quickly converting from KVL locking to predicate assertion and back during runtime is explained, along with a low-cost statistical method by which a runtime system can recognize regimes where conversion is appropriate.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key Range Locking Strategies for Improved Concurrency

“Phan~oma” are records inserted into a concurrently aelected set of records specified by a predicate such that Ihe selection does not eee a transaction conaietent result. The usual locking slrategy is lo lock only czisling records. However, records that satisfy the eeleclion predicate muat be locked even when they are nol present in the database to prevent their insertion. One way to cope with ...

متن کامل

Hybrid Phantom Applications to Nuclear Medicine

Annually, many people are irradiated for diagnostic and therapeutic purposes. Assessment of radiation dose and its related risks to patients are important issues in radiation protection dosimetry. The complex mathematical calculations of the absorbed and effective doses are now done with computers. The calculations are performed with the help of anthropomorphic computational models of human bod...

متن کامل

Transactional Locking II

The transactional memory programming paradigm is gaining momentum as the approach of choice for replacing locks in concurrent programming. This paper introduces the transactional locking II (TL2) algorithm, a software transactional memory (STM) algorithm based on a combination of commit-time locking and a novel global version-clock based validation technique. TL2 improves on state-of-the-art ST...

متن کامل

Reduced Hardware NOREC: An Opaque Obstruction-Free and Privatizing HyTM

This paper presents a reduced-hardware (RH) version of the promising NORec Hybrid TM algorithm. Instead of an all-software slow path, in RH transactions, part of the slow-path is executed using a short hardware transaction. The purpose of this hardware component is not to speed up the slow-path (though this is a side effect). Rather, using it we are able to eliminate virtually all of the instru...

متن کامل

Sustainable Supplier Selection by a New Hybrid Support Vector-model based on the Cuckoo Optimization Algorithm

For assessing and selecting sustainable suppliers, this study considers a triple-bottom-line approach, including profit, people and planet, and regards business operations, environmental effects along with social responsibilities of the suppliers. Diverse metrics are acquainted with measure execution in these three issues. This study builds up a new hybrid intelligent model, namely COA-LS-SVM, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000