Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleNovember 2007
An adaptive packed-memory array
ACM Transactions on Database Systems (TODS), Volume 32, Issue 4Pages 26–eshttps://doi.org/10.1145/1292609.1292616The packed-memory array (PMA) is a data structure that maintains a dynamic set of N elements in sorted order in a Θ(N)-sized array. The idea is to intersperse Θ(N) empty spaces or gaps among the elements so that only a small number of elements need to ...
- articleSeptember 2006
Improving instruction cache performance in OLTP
ACM Transactions on Database Systems (TODS), Volume 31, Issue 3Pages 887–920https://doi.org/10.1145/1166074.1166079Instruction-cache misses account for up to 40% of execution time in online transaction processing (OLTP) database workloads. In contrast to data cache misses, instruction misses cannot be overlapped with out-of-order execution. Chip design limitations ...
- articleMarch 2006
Consensus on transaction commit
ACM Transactions on Database Systems (TODS), Volume 31, Issue 1Pages 133–160https://doi.org/10.1145/1132863.1132867The distributed transaction commit problem requires reaching agreement on whether a transaction is committed or aborted. The classic Two-Phase Commit protocol blocks if the coordinator fails. Fault-tolerant consensus algorithms also reach agreement, but ...
- articleSeptember 2005
LH*RS---a highly-available scalable distributed data structure
ACM Transactions on Database Systems (TODS), Volume 30, Issue 3Pages 769–811https://doi.org/10.1145/1093382.1093386LH*RS is a high-availability scalable distributed data structure (SDDS). An LH*RS file is hash partitioned over the distributed RAM of a multicomputer, for example, a network of PCs, and supports the unavailability of any k ≥ 1 of its server nodes. The ...
- articleDecember 1998
Inverted files versus signature files for text indexing
ACM Transactions on Database Systems (TODS), Volume 23, Issue 4Pages 453–490https://doi.org/10.1145/296854.277632Two well-known indexing methods are inverted files and signature files. We have undertaken a detailed comparison of these two approaches in the context of text indexing, paying particular attention to query evaluation speed and space requirements. We ...
-
- articleSeptember 1996
Declustering of key-based partitioned signature files
ACM Transactions on Database Systems (TODS), Volume 21, Issue 3Pages 295–338https://doi.org/10.1145/232753.232755Access methods based on signature files can largely benefit from possibilities offered by parallel environments. To this end, an effective declustering strategy that would distribute signatures over a set of parallel independent disks has to be combined ...
- articleJune 1995
Fast algorithms for universal quantification in large databases
ACM Transactions on Database Systems (TODS), Volume 20, Issue 2Pages 187–236https://doi.org/10.1145/210197.210202Universal quantification is not supported directly in most database systems despite the fact that it adds significant power to a system's query processing and inference capabilities, in particular for the analysis of many-to-many relationships and of set-...
- articleSeptember 1994
Synthesis of extended transaction models using ACTA
ACM Transactions on Database Systems (TODS), Volume 19, Issue 3Pages 450–491https://doi.org/10.1145/185827.185843ACTA is a comprehensive transaction framework that facilitates the formal description of properties of extended transaction models. Specifically, using ACTA, one can specify and reason about (1) the effects of transactions on objects and (2) the ...
- articleSeptember 1993
Transitive closure algorithms based on graph traversal
ACM Transactions on Database Systems (TODS), Volume 18, Issue 3Pages 512–576https://doi.org/10.1145/155271.155273Several graph-based algorithms have been proposed in the literature to compute the transitive closure of a directed graph. We develop two new algorithms (Basic_TC and Gobal_DFTC) and compare the performance of their implementations in a disk-based ...
- articleJune 1993
Empirical performance evaluation of concurrency and coherency control protocols for database sharing systems
ACM Transactions on Database Systems (TODS), Volume 18, Issue 2Pages 333–377https://doi.org/10.1145/151634.151639Database Sharing (DB-sharing) refers to a general approach for building a distributed high performance transaction system. The nodes of a DB-sharing system are locally coupled via a high-speed interconnect and share a common database at the disk level. ...
- articleJune 1993
Open commit protocols tolerating commission failures
ACM Transactions on Database Systems (TODS), Volume 18, Issue 2Pages 289–332https://doi.org/10.1145/151634.151638To ensure atomicity of transactions in distributed systems so-called 2-phase commit (2PC) protocols have been proposed. The basic assumption of these protocols is that the processing nodes involved in transactions are “sane,” i.e., they only fail with ...
- articleMarch 1993
Performance analysis of file organizations that use multibucket data leaves with partial expansions
ACM Transactions on Database Systems (TODS), Volume 18, Issue 1Pages 157–180https://doi.org/10.1145/151284.151289We present an exact performance analysis, under random insertions, of file organizations that use multibucket data leaves and perform partial expansions before splitting. We evaluate the expected disk space utilization of the file and show how the ...
- articleMarch 1993
Optimal disk allocation for partial match queries
ACM Transactions on Database Systems (TODS), Volume 18, Issue 1Pages 132–156https://doi.org/10.1145/151284.151288The problem of disk allocation addresses the issue of how to distribute a file on several disks in order to maximize concurrent disk accesses in response to a partial match query. In this paper a coding-theoretic analysis of this problem is presented, ...
- articleSeptember 1992
Performance evaluation of cautious waiting
ACM Transactions on Database Systems (TODS), Volume 17, Issue 3Pages 477–512https://doi.org/10.1145/132271.132275We study a deadlock-free locking-based concurrency control algorithm, called cautious waiting, which allows for a limited form of waiting. The algorithm is very simple to implement. We present an analytical solution to its performance evaluation based on ...
- articleSeptember 1991
On robust transaction routing and load sharing
ACM Transactions on Database Systems (TODS), Volume 16, Issue 3Pages 476–512https://doi.org/10.1145/111197.111210In this paper we examine the issue of robust transaction routing in a locally distributed database environment where transaction characteristics such as reference locality imply that certain processing systems can be identified as being more suitable ...
- articleMay 1991
A dynamic hash method with signature
ACM Transactions on Database Systems (TODS), Volume 16, Issue 2Pages 309–337https://doi.org/10.1145/114325.103714We present a dynamic external hash method that allows retrieval of a record by only one access to mass storage while maintaining a high load factor. The hash function is based on generalized spiral storage. Both primary and overflow records are allocated ...
- articleMarch 1991
Principles and realization strategies of multilevel transaction management
ACM Transactions on Database Systems (TODS), Volume 16, Issue 1Pages 132–180https://doi.org/10.1145/103140.103145One of the demands of database system transaction management is to achieve a high degree of concurrency by taking into consideration the semantics of high-level operations. On the other hand, the implementation of such operations must pay attention to ...
- articleJune 1990
Dynamic voting algorithms for maintaining the consistency of a replicated database
ACM Transactions on Database Systems (TODS), Volume 15, Issue 2Pages 230–280https://doi.org/10.1145/78922.78926There are several replica control algorithms for managing replicated files in the face of network partitioning due to site or communication link failures. Pessimistic algorithms ensure consistency at the price of reduced availability; they permit at most ...
- articleMarch 1990
Apologizing versus asking permission: optimistic concurrency control for abstract data types
ACM Transactions on Database Systems (TODS), Volume 15, Issue 1Pages 96–124https://doi.org/10.1145/77643.77647An optimistic concurrency control technique is one that allows transactions to execute without synchronization, relying on commit-time validation to ensure serializability. Several new optimistic concurrency control techniques for objects in ...