2009
DOI: 10.14778/1687627.1687681
|View full text |Cite
|
Sign up to set email alerts
|

Quantifying isolation anomalies

Abstract: Choosing a weak isolation level such as Read Committed is understood as a trade-off, where less isolation means that higher performance is gained but there is an increased possibility that data integrity will be lost. Previously, one side of this trade-off has been carefully studied quantitativelythere are well-known metrics for performance such as transactions per minute, standardized benchmarks that measure these in a controlled way, and analytic models that can predict how performance is influenced by syste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0
1

Year Published

2011
2011
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(13 citation statements)
references
References 18 publications
0
12
0
1
Order By: Relevance
“…To avoid snapshot isolation anomalies, we address blind writes and analyze the read log to determine if an anomaly could take place. Fekete et al [3] documented anomalies that must be avoided to turn a snap shot isolation schedule into a serialized schedule. We incorporate these requirements to support serializable execution.…”
Section: Dispatcher Data Structuresmentioning
confidence: 99%
“…To avoid snapshot isolation anomalies, we address blind writes and analyze the read log to determine if an anomaly could take place. Fekete et al [3] documented anomalies that must be avoided to turn a snap shot isolation schedule into a serialized schedule. We incorporate these requirements to support serializable execution.…”
Section: Dispatcher Data Structuresmentioning
confidence: 99%
“…In contrast, the consistency properties we consider in this paper are the data-centric ones and are stronger and harder to verify. Fekete et al [11] investigate how often integrity violations are produced by varying degrees of isolation in database systems, but those violations are easy to verify.…”
Section: Related Workmentioning
confidence: 99%
“…In [15], the authors quantify violations of integrity constraints when a database system runs under read-committed or snapshotisolation. They analyze a microbenchmark that is composed of two related tables.…”
Section: Related Workmentioning
confidence: 99%
“…Fekete et al [15] provide quantitative information about the violations of integrity constraints when a centralized database system runs under various isolation levels. Wada et al investigated in [30] consistency properties for some cloud datastores, but they limited their study to a subset of client-centric consistency definitions such as monotonic-reads and read-your-writes.…”
Section: Introductionmentioning
confidence: 99%