Proceedings of the ACM Symposium on Principles of Distributed Computing 2017
DOI: 10.1145/3087801.3087802
|View full text |Cite
|
Sign up to set email alerts
|

Seeing is Believing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(15 citation statements)
references
References 28 publications
0
15
0
Order By: Relevance
“…This paper formalizes Crooks' state-based client-centric isolation model (ci) in tla + in order to check conformance to isolation levels using model checking. The running examples of Crooks et al [6] are reproduced and validated in tla + . An example of a transaction implementation using two phase locking (2pl) and two phase commit (2pc) is formalized in tla + .…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…This paper formalizes Crooks' state-based client-centric isolation model (ci) in tla + in order to check conformance to isolation levels using model checking. The running examples of Crooks et al [6] are reproduced and validated in tla + . An example of a transaction implementation using two phase locking (2pl) and two phase commit (2pc) is formalized in tla + .…”
Section: Discussionmentioning
confidence: 99%
“…If a cycle can be found in the graph of these dependencies, an isolation anomaly is present. Crooks et al [6] model a state-based and client-centric approach to isolation and prove that it is equivalent to Adya's formalization.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…It is unclear how the approach of Lesani et al would scale to a larger setting where a key-value store is just one component of a distributed system. Several approaches exist for reasoning about weaker consistency models of distributed databases and their clients, including declarative approaches, e.g., Adya et al [2000]; Ahamad et al [1995]; Burckhardt et al [2012]; Cerone et al [2015Cerone et al [ , 2017; Cooper et al [2008]; Gotsman et al [2016] as well as operational approaches, e.g., Crooks et al [2017]; Kaki et al [2018]; Schewe and Zhang [2018]; Xiong et al [2019]. Common for all these works is that they reason about high-level models of distributed replicated databases and protocols with tools tailored for reasoning about databases, specific combinations of consistency models, and specific consistency guarantees.…”
Section: Hocap-style Specification For the Write Operationmentioning
confidence: 99%
“…Specifically, Szekeres and Zhang [20] provide a system model and a formalism called result visibility to describe consistency guarantees, including real-time guarantees. Crooks et al [5], focusing on databases, provide a state-based formalization of isolation guarantees. Burckhardt, in his book on Eventual Consistency [4], provides a formalism to describe consistency models and protocols, with a focus on weaker guarantees.…”
Section: Related Workmentioning
confidence: 99%