Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation 2015
DOI: 10.1145/2737924.2737970
|View full text |Cite
|
Sign up to set email alerts
|

Composing concurrency control

Abstract: Concurrency control poses significant challenges when composing computations over multiple data-structures (objects) with different concurrency-control implementations. We formalize the usually desired requirements (serializability, abort-safety, deadlock-safety, and opacity) as well as stronger versions of these properties that enable composition. We show how to compose protocols satisfying these properties so that the resulting combined protocol also satisfies these properties. Our approach generalizes well-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…Among recent systems, Hekaton [6] supports pessimistic locking on top of its MVCC protocol. Ziv et al [49] formalize the theory of composing computations over multiple data structures using different CC schemes. Cao et al [3] use OCC and pessimistic CC to handle low and high conflict accesses, respectively.…”
Section: Related Workmentioning
confidence: 99%
“…Among recent systems, Hekaton [6] supports pessimistic locking on top of its MVCC protocol. Ziv et al [49] formalize the theory of composing computations over multiple data structures using different CC schemes. Cao et al [3] use OCC and pessimistic CC to handle low and high conflict accesses, respectively.…”
Section: Related Workmentioning
confidence: 99%
“…Quite a few authors have previously combined optimistic and pessimistic concurrency control mechanisms in the context of Database Systems. Ziv et al combined locking with Software TM (STM) in different parts of the program, obtaining better performance than just using a lock‐based or an STM‐based solution. They found that, by using one of the two choices exclusively throughout the application, execution is often sub‐optimal.…”
Section: Related Workmentioning
confidence: 99%