A New Hybrid Predicate-Assertion-Index-Locking (PAX) Algorithm to Prevent Transactional Phantoms
نویسندگان
چکیده
We discuss three forms of phantom prevention locking that have been proposed in the literature: (1) predicate locking [EGLT76], (2) precision locking [JBB81], and (3) index locking (specifically, KVL/IM locking [MOHAN90, MOHAN92, MOHAN96]). The predicate locking method was dropped from consideration in System R because of perceived problems [CHETAL81]. The precision locking technique was proposed as an alternative, but was thought to require excessive resource use in some application regimes. Only index locking methods are now being used by major commercial database systems. The current paper introduces a novel and workable extension of KVL/IM locking, to provide increased concurrency in certain application regimes by an alternative phantom prevention method that "asserts" read predicates and updates in memory, a technique based on precision locking which we call predicate assertion, or "PA". PA is more precise than index locking in many cases, reducing the number of false conflicts between transactions, and improves on index locking CPU overhead in certain application regimes where complex queries outnumber update statements. Using PA as a runtime alternative to index locking gives us a hybrid Predicate-Assertion-Index-locking scheme, which we abbreviate "PAX". A graceful method of quickly converting from KVL locking to predicate assertion and back during runtime is explained, along with a low-cost statistical method by which a runtime system can recognize regimes where conversion is appropriate.
منابع مشابه
Key Range Locking Strategies for Improved Concurrency
“Phan~oma” are records inserted into a concurrently aelected set of records specified by a predicate such that Ihe selection does not eee a transaction conaietent result. The usual locking slrategy is lo lock only czisling records. However, records that satisfy the eeleclion predicate muat be locked even when they are nol present in the database to prevent their insertion. One way to cope with ...
متن کاملHybrid Phantom Applications to Nuclear Medicine
Annually, many people are irradiated for diagnostic and therapeutic purposes. Assessment of radiation dose and its related risks to patients are important issues in radiation protection dosimetry. The complex mathematical calculations of the absorbed and effective doses are now done with computers. The calculations are performed with the help of anthropomorphic computational models of human bod...
متن کاملTransactional Locking II
The transactional memory programming paradigm is gaining momentum as the approach of choice for replacing locks in concurrent programming. This paper introduces the transactional locking II (TL2) algorithm, a software transactional memory (STM) algorithm based on a combination of commit-time locking and a novel global version-clock based validation technique. TL2 improves on state-of-the-art ST...
متن کاملReduced Hardware NOREC: An Opaque Obstruction-Free and Privatizing HyTM
This paper presents a reduced-hardware (RH) version of the promising NORec Hybrid TM algorithm. Instead of an all-software slow path, in RH transactions, part of the slow-path is executed using a short hardware transaction. The purpose of this hardware component is not to speed up the slow-path (though this is a side effect). Rather, using it we are able to eliminate virtually all of the instru...
متن کاملSustainable Supplier Selection by a New Hybrid Support Vector-model based on the Cuckoo Optimization Algorithm
For assessing and selecting sustainable suppliers, this study considers a triple-bottom-line approach, including profit, people and planet, and regards business operations, environmental effects along with social responsibilities of the suppliers. Diverse metrics are acquainted with measure execution in these three issues. This study builds up a new hybrid intelligent model, namely COA-LS-SVM, ...
متن کامل