1989
DOI: 10.1145/75372.75374
|View full text |Cite
|
Sign up to set email alerts
|

Diversity in database reference behavior

Abstract: Over the past fifteen years, empirical studies of the reference behavior of a number of database systems have produced seemingly contradictory results. The presence or absence of locality of reference and sequentiality have both been reported (or denied) in various papers. As such, the performance analyst or database implementor is left with little concrete guidance in the form of expected reference behavior of a database system under a realistic workload.We present empirical evidence that all of the previous … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

1995
1995
2003
2003

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…See for instance [9,18,32,33,34,48,54,57,64,74,73,76,82]. However, these studies are rather limited in scope, often relying on data collected at only one or two installations.…”
Section: Related Workmentioning
confidence: 99%
“…See for instance [9,18,32,33,34,48,54,57,64,74,73,76,82]. However, these studies are rather limited in scope, often relying on data collected at only one or two installations.…”
Section: Related Workmentioning
confidence: 99%
“…As the fraction of the load to each of the files changes (due to change in application mix), the LRU analysis can also be used to predict the buffer hit probabilities for the new workload compositions, assuming the access skew characterization for each file remains unchanged (Kearns and Defazio, 1989). Figure 10 shows the changes in 7.…”
Section: Prediction Of Buffer Hit Probability Of Composite Workloadsmentioning
confidence: 99%
“…In addition, within both short transactions and long queries some of the pages are rereferenced, and are called locality sets (Chou and Dewitt, 1985). Viewed as a whole, the combination of transaction and query accesses generates all possib]Le access patterns (RodriguezRosell, 1976;Smith, 1978;Hawthorn and Stonebraker, 1979;Effelsberg and Loomis, 1984;Chou and Dewitt, 1985;Verkamo, 1985;Sacco and Schkolnick, 1986;Kearns and Defazio, 1989). Traditional buffer management policies (e.g., strict LRU policy that does not exploit the knowledge of access components such as sequential vs random accesses) may not provide good buffer hit probability (Smith, 1978;Effelsberg and Haerder, 1984;Teng and Gumaer, 1984;Chou and Dewitt, 1985;Sacco and Schkolnick, 1986;IBM, 1993).…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations