2017 IEEE 33rd International Conference on Data Engineering (ICDE) 2017
DOI: 10.1109/icde.2017.130
|View full text |Cite
|
Sign up to set email alerts
|

Posterior Snapshot Isolation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…Concurrent Control algorithms. There are many concurrent control algorithms, include two-phase locking (2PL) [21], timestamp ordering (T/O) [8], OCC [5,12,13,33,37,48], MVCC [9]. Locking-based approaches make a particular design on the lock types (e.g., read/write/predicate locks) as well as locking mechanism to disallow single-variable data anomalies [11,19,22,27,28].…”
Section: Related Workmentioning
confidence: 99%
“…Concurrent Control algorithms. There are many concurrent control algorithms, include two-phase locking (2PL) [21], timestamp ordering (T/O) [8], OCC [5,12,13,33,37,48], MVCC [9]. Locking-based approaches make a particular design on the lock types (e.g., read/write/predicate locks) as well as locking mechanism to disallow single-variable data anomalies [11,19,22,27,28].…”
Section: Related Workmentioning
confidence: 99%
“…Snapshot isolation is proposed to avoid read lock [17]. Snapshot isolation reads the entity value from the log, but it still relies on the locking protocol to prevent write skew [18].The latest discussion on the concurrency control is trying to make the snapshot isolation is able to prevent write skew concurrency anomaly and makes the interleaved transactions become serializable [19][20][21]. The discussion on making the interleaved transactions in the read committed isolation become serializable is started in [22].…”
Section: Isolation Levelmentioning
confidence: 99%
“…In a preliminary version of this paper [12], we introduced CV and PostSI. In this extended version, we show that serializability can also be enforced efficiently by utilizing visibility.…”
Section: Introductionmentioning
confidence: 99%