1983
DOI: 10.1145/289.291
|View full text |Cite
|
Sign up to set email alerts
|

Principles of transaction-oriented database recovery

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
342
0
9

Year Published

1998
1998
2013
2013

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 913 publications
(351 citation statements)
references
References 17 publications
0
342
0
9
Order By: Relevance
“…In principle, recovery demands needed to guarantee ACID behavior for transaction processing [11] may interfere with the optimization objectives P1 -P3. To achieve write avoidance and clustered writes to the maximum possible extent, the buffer manager should not be burdened with conflicting update propagation requirements.…”
Section: Independence Of Transaction Managementmentioning
confidence: 99%
See 2 more Smart Citations
“…In principle, recovery demands needed to guarantee ACID behavior for transaction processing [11] may interfere with the optimization objectives P1 -P3. To achieve write avoidance and clustered writes to the maximum possible extent, the buffer manager should not be burdened with conflicting update propagation requirements.…”
Section: Independence Of Transaction Managementmentioning
confidence: 99%
“…To achieve write avoidance and clustered writes to the maximum possible extent, the buffer manager should not be burdened with conflicting update propagation requirements. Fortunately, our CFDC approach implies a NoForce/Steal policy for the logging&recovery component providing maximum degrees of freedom [11]. NoForce means that pages modified by a transaction do not have to be forced to disk at its commit, but only the redo logs.…”
Section: Independence Of Transaction Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…Traditional systems apply ACID (Atomicity, Consistency, Isolation, Durability) transactions [16], requiring that all four properties are met. Replication ("R") can synchronously be bound to transactions.…”
Section: Relationship To the Concept Of Transactionsmentioning
confidence: 99%
“…The model also assumes that the system follows the STEALINO FORCE protocol [6]. As a result, it keeps both Undo and Redo type log records.…”
Section: Assumptionsmentioning
confidence: 99%