22nd International Conference on Data Engineering (ICDE'06) 2006
DOI: 10.1109/icde.2006.140
|View full text |Cite
|
Sign up to set email alerts
|

SIREN: A Memory-Conserving, Snapshot-Consistent Checkpoint Algorithm for in-Memory Databases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0
1

Year Published

2009
2009
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(23 citation statements)
references
References 9 publications
0
22
0
1
Order By: Relevance
“…However, use of an atomic object size smaller than a disk sector adds significant overheads, especially for double-backup schemes. Techniques to improve I/O by organizing objects into logical pages are orthogonal to our description [18]. We assume they have been applied in order to make the atomic object size equal to a disk sector.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…However, use of an atomic object size smaller than a disk sector adds significant overheads, especially for double-backup schemes. Techniques to improve I/O by organizing objects into logical pages are orthogonal to our description [18]. We assume they have been applied in order to make the atomic object size equal to a disk sector.…”
Section: Methodsmentioning
confidence: 99%
“…We use a double-backup structure on disk as in Atomic-Copy-Dirty-Objects. A similar method was used in SIREN, where the authors found that it may be beneficial to copy at the tuple level rather than the page level [18]. In our experiments, all copies are performed at the level of atomic objects whose size may be configured (Section 4.1).…”
Section: Consistent Checkpointing Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…MMDBMSs use optimizations to structure and organize data. Because of the volatile characteristics of the main memory, reliability on MMDBMS has been one of the main concerns in the area and a lot of work has been done concerning the recovery, logging and checkpointing of such systems [5]. The interest on MMDBMS has increased [6] and many commercial MMDBMSs have been developed.…”
Section: Related Workmentioning
confidence: 99%