1997
DOI: 10.1007/s007780050032
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of locking behavior in three real database systems

Abstract: Concurrency control is essential to the correct functioning of a database due to the need for correct, reproducible results. For this reason, and because concurrency control is a well-formulated problem, there has developed an enormous body of literature studying the performance of concurrency control algorithms. Most of this literature uses either analytic modeling or random number-driven simulation, and explicitly or implicitly makes certain assumptions about the behavior of transactions and the patterns by … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

1998
1998
2012
2012

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 32 publications
0
10
0
Order By: Relevance
“…There is a significant degree of contention between cursor locks and exclusive locks, according to Singhal and Smith [1997], which results in a slowdown of query processing and wasted system resources (e.g., allocated buffer space). A large number of versioning methods have been proposed to address this issue, as reviewed in Bober and Carey [1992] and Mohan et al [1992b].…”
Section: Methods To Improve Locking Performancementioning
confidence: 99%
See 3 more Smart Citations
“…There is a significant degree of contention between cursor locks and exclusive locks, according to Singhal and Smith [1997], which results in a slowdown of query processing and wasted system resources (e.g., allocated buffer space). A large number of versioning methods have been proposed to address this issue, as reviewed in Bober and Carey [1992] and Mohan et al [1992b].…”
Section: Methods To Improve Locking Performancementioning
confidence: 99%
“…When the updating of an object is a possibility, txns can prevent deadlocks by acquiring update locks, since they are compatible only with shared locks, not with each other and exclusive locks [Date 1983;Gray and Reuter 1992]. The analysis of DB2 traces for several workloads reveals that approximately 90% of exclusive locks are obtained directly [Singhal and Smith 1997]. This can be used as a justification for not considering lock promotion and update locks.…”
Section: Standard Locking and Its Performancementioning
confidence: 99%
See 2 more Smart Citations
“…This is typically a combination of transaction processing and longrunning queries. The trace referred to as Telecom in [82] and Phone in [62] is the first 30 minutes of the trace we call TelecomB1. Table 1 summarizes the characteristics of the various traces that are used in this paper.…”
Section: Workload Descriptionmentioning
confidence: 99%