In this paper, we construct a simulation model for OODBS and carry out several performance evaluation studies on these two Class-Hierarchy Locking protocols and the Non Class-Hierarchy Locking (NCL) protocol. The NCL protocol is a variation of the conventional two phase locking protocol being ...
Semantic-based locking technique in object-oriented databases - Jun () Citation Context ...cols, DBMSs definitely finish transactions in the read phase and possibly rollback some of them in the validation phase if they do not pass conflict validations. In contrast, semantic-based protocols =-=...
Gang Luo et al., “Locking Protocols for Materialized Aggregate Join Views,” pp. 1-11 (Jun. 2003). B.R. Badrinath et al, “Semantics-Based Concurrency Control: Beyond Cummutativity,” TODS pp. 163-199 (1992). J. Gray et al., “Granularity of Locks and Degrees of Consistency in...
One popular form of DBMS is a relational DBMS (abbreviated RDBMS), which is a DBMS that operates on a relational database. A relational database is a collection of data items organized as a set of formally described tables from which data can be accessed or reassembled in a variety of ...
protocolsquery languagesXML/ XPath-based locking protocolXML databaseconcurrency controlquery language/ C6160 Database management systems (DBMS) C6130D Document processing techniquesProviding efficient access to XML documents becomes crucial in XML database systems. More and more concurrency control ...
This paper describes a technique for use when multiple instances of a data base management system (DBMS), each with its own cache (buffer pool), can directly read and modify any data stored on a set of shared disks. Global locking and coherency control protocols are necessary in this ...
8 It was shown elsewhere =-=[7] tha-=-t the occurrence of deadlocks of cycle length greater than two is very unlikely and can be ignored in analyzing concurrency control protocols. and the delay at each blocking state (1/��B ) was fou...C. Devor and C. R. Carlson. ...