2011
DOI: 10.1145/2076021.2048131
|View full text |Cite
|
Sign up to set email alerts
|

A simple abstraction for complex concurrent indexes

Abstract: Indexes are ubiquitous. Examples include associative arrays, dictionaries, maps and hashes used in applications such as databases, file systems and dynamic languages. Abstractly, a sequential index can be viewed as a partial function from keys to values. Values can be queried by their keys, and the index can be mutated by adding or removing mappings. Whilst appealingly simple, this abstract specification is insufficient for reasoning about indexes that are accessed concurrently.We present an abstract specifica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 13 publications
(18 citation statements)
references
References 19 publications
0
18
0
Order By: Relevance
“…is present in a term) is stored (Line 3). Note that this search can be implemented by utilising B-Trees [10,29] for indexing the keys. For each of the candidate ID values in the range (Line 4), we retrieve the encrypted triple for such ID by searching for this ID in the EncTriples Index (Line 5).…”
Section: Optimising Query Execution Over Encrypted Rdfmentioning
confidence: 99%
“…is present in a term) is stored (Line 3). Note that this search can be implemented by utilising B-Trees [10,29] for indexing the keys. For each of the candidate ID values in the range (Line 4), we retrieve the encrypted triple for such ID by searching for this ID in the EncTriples Index (Line 5).…”
Section: Optimising Query Execution Over Encrypted Rdfmentioning
confidence: 99%
“…For example, the definition of the in rem (h, k, v) i predicate will include a REM capability for k with permission (g, i), so that any thread may remove the key from the tree, as well as all INS capabilities for k with permission (d, i), so that no thread may insert values for the key into the tree. The full definitions of the predicates may be found in the technical report [5].…”
mentioning
confidence: 99%
“…This idea has been successfully applied to the specification and verification of indexing structures [4]. The work presented here cannot substitute capabilities.…”
Section: Discussionmentioning
confidence: 99%
“…5 to prove that, at the end of the execution, l i s t 1 contains the sequence [1,4,3], and l i s t 2 contains [1,2,3]. Behind the scenes however, the data structure performs lazy copying: all operations are implemented with reference manipulations as long as this does not influence the clients' disjointness illusion.…”
Section: =New L I S T ; I N I T E M P T Y ( L I S T 1 ) ;mentioning
confidence: 99%