Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing 2016
DOI: 10.1145/2933057.2933096
|View full text |Cite
|
Sign up to set email alerts
|

Analysing Snapshot Isolation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
38
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 27 publications
(38 citation statements)
references
References 29 publications
0
38
0
Order By: Relevance
“…Initially, x = y = 0 The above is also known as the write skew anomaly in the database literature [14]. Such outcomes are analogous to those allowed by weak memory models, such as x86-TSO [29,34] and C11 [9], for non-transactional programs.…”
Section: Introductionmentioning
confidence: 92%
See 4 more Smart Citations
“…Initially, x = y = 0 The above is also known as the write skew anomaly in the database literature [14]. Such outcomes are analogous to those allowed by weak memory models, such as x86-TSO [29,34] and C11 [9], for non-transactional programs.…”
Section: Introductionmentioning
confidence: 92%
“…Informally, the WR corresponds to our rf T ; the WW corresponds to our mo T ; and the RW corresponds to our rb T . Adya's dependency graphs have been used to develop declarative specifications of the PSI consistency model [14]. In Sect.…”
Section: Rwmentioning
confidence: 99%
See 3 more Smart Citations