“…In addition, within both short transactions and long queries some of the pages are rereferenced, and are called locality sets (Chou and Dewitt, 1985). Viewed as a whole, the combination of transaction and query accesses generates all possib]Le access patterns (RodriguezRosell, 1976;Smith, 1978;Hawthorn and Stonebraker, 1979;Effelsberg and Loomis, 1984;Chou and Dewitt, 1985;Verkamo, 1985;Sacco and Schkolnick, 1986;Kearns and Defazio, 1989). Traditional buffer management policies (e.g., strict LRU policy that does not exploit the knowledge of access components such as sequential vs random accesses) may not provide good buffer hit probability (Smith, 1978;Effelsberg and Haerder, 1984;Teng and Gumaer, 1984;Chou and Dewitt, 1985;Sacco and Schkolnick, 1986;IBM, 1993).…”