CONSTRAINED SHARED LOCKS FOR INCREASING CONCURRENCY IN DATABASES

被引:2
作者
AGRAWAL, D
ELABBADI, A
机构
[1] Department of Computer Science, University of California, Santa Barbara, CA
关键词
D O I
10.1006/jcss.1995.1052
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we extend the traditional relationships between locks, i.e., shared and non-shared, to permit sharing in a constrained manner. The new relationship between locks enables us to develop a family of locking protocols, the least permissive of which is two phase locking while the most permissive accepts all order-preserving conflict serializable histories. The latter protocol also accepts all conflict serializable histories without reordering read and write operations. Instances of the family of protocols can cope with a variety of database recovery problems. (C) 1995 Academic Press, Inc.
引用
收藏
页码:53 / 63
页数:11
相关论文
共 31 条
[1]  
BADAL DZ, 1979, NOV IEEE P COMPSAC C, P588
[2]  
BADRINATH BR, IN PRESS ACM T DATAB
[3]   A MODEL FOR CONCURRENCY IN NESTED TRANSACTIONS SYSTEMS [J].
BEERI, C ;
BERNSTEIN, PA ;
GOODMAN, N .
JOURNAL OF THE ACM, 1989, 36 (02) :230-269
[4]   FORMAL ASPECTS OF SERIALIZABILITY IN DATABASE CONCURRENCY CONTROL [J].
BERNSTEIN, PA ;
SHIPMAN, DW ;
WONG, WS .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1979, 5 (03) :203-216
[5]  
BERNSTEIN PA, 1981, ACM COMPUT SURV, V13, P185
[6]  
Bernstein Philip A., 1987, CONCURRENCY CONTROL
[7]  
CASANOVA MA, 1981, LECTURE NOTES COMPUT, V116
[8]   NOTIONS OF CONSISTENCY AND PREDICATE LOCKS IN A DATABASE SYSTEM [J].
ESWARAN, KP ;
GRAY, JN ;
LORIE, RA ;
TRAIGER, IL .
COMMUNICATIONS OF THE ACM, 1976, 19 (11) :624-633
[9]  
Gray Jim, 1978, LECT NOTES COMPUTER, V60, P393
[10]   DELETING COMPLETED TRANSACTIONS [J].
HADZILACOS, T ;
YANNAKAKIS, M .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1989, 38 (02) :360-379