{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T02:23:27Z","timestamp":1773887007085,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T00:00:00Z","timestamp":1726012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,11]]},"DOI":"10.1145\/3650212.3680318","type":"proceedings-article","created":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:44:25Z","timestamp":1726055065000},"page":"755-767","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["DBStorm: Generating Various Effective Workloads for Testing Isolation Levels"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4719-9825","authenticated-orcid":false,"given":"Keqiang","family":"Li","sequence":"first","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2807-2057","authenticated-orcid":false,"given":"Siyang","family":"Weng","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9612-5024","authenticated-orcid":false,"given":"Lyu","family":"Ni","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5128-8882","authenticated-orcid":false,"given":"Chengcheng","family":"Yang","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4610-4369","authenticated-orcid":false,"given":"Rong","family":"Zhang","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8426-9450","authenticated-orcid":false,"given":"Xuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4665-7302","authenticated-orcid":false,"given":"Aoying","family":"Zhou","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2024,9,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. Carnegie Mellon Database Application Catalog. https:\/\/github.com\/cmu-db\/cmdbac Accessed: 2023-12-1"},{"key":"e_1_3_2_1_2_1","unstructured":"2023. InnoDB Transaction Isolation Levels. https:\/\/dev.mysql.com\/doc\/refman\/8.0\/en\/innodb-transaction-isolation-levels.html Accessed: 2023-12-1"},{"key":"e_1_3_2_1_3_1","unstructured":"2023. Jepsen. https:\/\/github.com\/jepsen-io\/jepsen Accessed: 2023-12-1"},{"key":"e_1_3_2_1_4_1","unstructured":"2023. NuoDB. https:\/\/nuodb.com\/ Accessed: 2023-12-1"},{"key":"e_1_3_2_1_5_1","unstructured":"2023. Oracle Database. https:\/\/www.oracle.com\/hk\/database\/technologies\/ Accessed: 2023-12-1"},{"key":"e_1_3_2_1_6_1","unstructured":"2023. SingleStore. https:\/\/www.singlestore.com\/ Accessed: 2023-12-1"},{"key":"e_1_3_2_1_7_1","unstructured":"2023. SQLite. https:\/\/www.sqlite.org\/index.html. Accessed: 2023-12-1"},{"key":"e_1_3_2_1_8_1","unstructured":"2023. SQLsmith. https:\/\/github.com\/anse1\/sqlsmith Accessed: 2023-12-1"},{"key":"e_1_3_2_1_9_1","unstructured":"2023. TPC-C Benchmark. http:\/\/www.tpc.org\/tpcc\/ Accessed: 2023-12-1"},{"key":"e_1_3_2_1_10_1","unstructured":"2023. TPC-E Benchmark. http:\/\/www.tpc.org\/tpce\/ Accessed: 2023-12-1"},{"key":"e_1_3_2_1_11_1","unstructured":"2023. yugabyteDB. https:\/\/www.yugabyte.com\/ Accessed: 2023-12-1"},{"key":"e_1_3_2_1_12_1","unstructured":"2024. Technical Report of DBStorm. https:\/\/github.com\/DBHammer\/DBStorm-material\/blob\/main\/tech-report.pdf Accessed: 2024-7-13"},{"key":"e_1_3_2_1_13_1","volume-title":"Weak consistency: a generalized theory and optimistic implementations for distributed transactions. Ph. D. Dissertation","author":"Adya Atul","unstructured":"Atul Adya and Barbara H Liskov. 1999. Weak consistency: a generalized theory and optimistic implementations for distributed transactions. Ph. D. Dissertation. Massachusetts Institute of Technology. https:\/\/dl.acm.org\/doi\/10.5555\/888672"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Mohammad Alomari Michael Cahill Alan Fekete and Uwe Rohm. 2008. The cost of serializability on platforms that use snapshot isolation. In ICDE. 576\u2013585. https:\/\/dl.acm.org\/doi\/10.1109\/ICDE.2008.4497466","DOI":"10.1109\/ICDE.2008.4497466"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"G\u00fcne\u015f Alu\u00e7 Olaf Hartig M Tamer \u00d6zsu and Khuzaima Daudjee. 2014. Diversified stress testing of RDF data management systems. In ISWC. 197\u2013212. https:\/\/dl.acm.org\/doi\/10.1007\/978-3-319-11964-9_13","DOI":"10.1007\/978-3-319-11964-9_13"},{"key":"e_1_3_2_1_16_1","first-page":"268","article-title":"Elle: Inferring isolation anomalies from experimental observations","volume":"14","author":"Alvaro Peter","year":"2020","unstructured":"Peter Alvaro and Kyle Kingsbury. 2020. Elle: Inferring isolation anomalies from experimental observations. In VLDB. 14, 268\u2013280. https:\/\/dl.acm.org\/doi\/10.14778\/3430915.3430918","journal-title":"VLDB."},{"key":"e_1_3_2_1_17_1","volume-title":"Introduction to software testing","author":"Ammann Paul","unstructured":"Paul Ammann and Jeff Offutt. 2016. Introduction to software testing. Cambridge University Press. https:\/\/dl.acm.org\/doi\/10.5555\/1355340"},{"key":"e_1_3_2_1_18_1","volume-title":"Statistical methods in medical research","author":"Armitage Peter","unstructured":"Peter Armitage, Geoffrey Berry, and John Nigel Scott Matthews. 2008. Statistical methods in medical research. John Wiley & Sons."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Jinsheng Ba and Manuel Rigger. 2023. Testing database engines via query plan guidance. In ICSE. 2060\u20132071. https:\/\/dl.acm.org\/doi\/10.1109\/ICSE48619.2023.00174","DOI":"10.1109\/ICSE48619.2023.00174"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5720"},{"key":"e_1_3_2_1_21_1","unstructured":"Hardik Bati Leo Giakoumakis Steve Herbert and Aleksandras Surna. 2007. A genetic approach for random testing of database systems. In VLDB. 1243\u20131251. https:\/\/dl.acm.org\/doi\/10.5555\/1325851.1325993"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/568271.223785"},{"key":"e_1_3_2_1_23_1","volume-title":"Abadi","author":"Bhattacherjee Souvik","year":"2021","unstructured":"Souvik Bhattacherjee, Gang Liao, Michael Hicks, and Daniel J. Abadi. 2021. BullFrog: Online schema evolution via lazy evaluation. In SIGMOD. 194\u2013206. https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3452842"},{"key":"e_1_3_2_1_24_1","first-page":"1","article-title":"MonkeyDB: effectively testing correctness under weak isolation levels","volume":"5","author":"Biswas Ranadeep","year":"2021","unstructured":"Ranadeep Biswas, Diptanshu Kakwani, Jyothi Vedurada, Constantin Enea, and Akash Lal. 2021. MonkeyDB: effectively testing correctness under weak isolation levels. In PACMPL. 5, 1\u201327. https:\/\/dl.acm.org\/doi\/10.1145\/3485546","journal-title":"PACMPL."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.patrec.2018.05.002","article-title":"On the exact computation of the graph edit distance","author":"Blumenthal David B","year":"2020","unstructured":"David B Blumenthal and Johann Gamper. 2020. On the exact computation of the graph edit distance. In Pattern Recognition Letters. 134, Elsevier, 46\u201357. https:\/\/dl.acm.org\/doi\/10.1016\/j.patrec.2018.05.002","journal-title":"Pattern Recognition Letters. 134, Elsevier"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","unstructured":"Lixiang Chen Ruihao Chen Chengcheng Yang Yuxing Han Rong Zhang Xuan Zhou Peiquan Jin and Weining Qian. 2023. Workload-aware log-structured merge key-value store for NVM-SSD hybrid storage. In ICDE. 2207\u20132219. https:\/\/doi.org\/10.1109\/ICDE55515.2023.00171 10.1109\/ICDE55515.2023.00171","DOI":"10.1109\/ICDE55515.2023.00171"},{"key":"e_1_3_2_1_27_1","unstructured":"Computer and Business Equipment Manufacturers Association. 1986. American National Standard for Information Systems-Database Language SQL. In NY American National Standards Institute. 27\u201328."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Brian F Cooper Adam Silberstein Erwin Tam Raghu Ramakrishnan and Russell Sears. 2010. Benchmarking cloud serving systems with YCSB. In SoCC. 143\u2013154. https:\/\/dl.acm.org\/doi\/10.1145\/1807128.1807152","DOI":"10.1145\/1807128.1807152"},{"key":"e_1_3_2_1_29_1","volume-title":"Introduction to logic","author":"Copi Irving M","unstructured":"Irving M Copi, Carl Cohen, and Victor Rodych. 2018. Introduction to logic. Routledge. https:\/\/dl.acm.org\/doi\/book\/10.5555\/2385432"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2491245","article-title":"Spanner: Google\u2019s globally distributed database","volume":"31","author":"Corbett James C","year":"2013","unstructured":"James C Corbett, Jeffrey Dean, Michael Epstein, Andrew Fikes, Christopher Frost, Jeffrey John Furman, Sanjay Ghemawat, Andrey Gubarev, Christopher Heiser, and Peter Hochschild. 2013. Spanner: Google\u2019s globally distributed database. In TOCS. 31, 1\u201322. https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2491245","journal-title":"TOCS."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Natacha Crooks Youer Pu Lorenzo Alvisi and Allen Clement. 2017. Seeing is believing: A client-centric specification of database isolation. In PODC. 73\u201382. https:\/\/dl.acm.org\/doi\/10.1145\/3087801.3087802","DOI":"10.1145\/3087801.3087802"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Ziyu Cui Wensheng Dou Qianwang Dai Jiansen Song Wei Wang Jun Wei and Dan Ye. 2022. Differentially testing database transactions for fun and profit. In ASE. 1\u201312. https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3551349.3556924","DOI":"10.1145\/3551349.3556924"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Yuetang Deng Phyllis Frankl and Zhongqiang Chen. 2003. Testing database transaction concurrency. In ASE. 184\u2013193. https:\/\/dl.acm.org\/doi\/10.1109\/ASE.2003.1240306","DOI":"10.1109\/ASE.2003.1240306"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2014.6818330"},{"key":"e_1_3_2_1_35_1","first-page":"277","article-title":"OLTP-bench: An extensible testbed for benchmarking relational databases","volume":"7","author":"Difallah Djellel Eddine","year":"2013","unstructured":"Djellel Eddine Difallah, Andrew Pavlo, Carlo Curino, and Philippe Cudre-Mauroux. 2013. OLTP-bench: An extensible testbed for benchmarking relational databases. In VLDB. 7, 277\u2013288. https:\/\/dl.acm.org\/doi\/10.14778\/2732240.2732246","journal-title":"VLDB."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"W Dou Z Cui Q Dai J Song D Wang Y Gao W Wang J Wei L Chen and H Wang. 2023. Detecting isolation bugs via transaction oracle construction. In ICSE. 1123\u20131135. https:\/\/dl.acm.org\/doi\/10.1109\/ICSE48619.2023.00101","DOI":"10.1109\/ICSE48619.2023.00101"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1071610.1071615"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41019-022-00181-9"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Ziyue Hua Wei Lin Luyao Ren Zongyang Li Lu Zhang Wenpin Jiao and Tao Xie. 2023. GDsmith: Detecting bugs in cypher graph database engines. In ISSTA. 163\u2013174. https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598046","DOI":"10.1145\/3597926.3598046"},{"key":"e_1_3_2_1_40_1","first-page":"3072","article-title":"TiDB: a raft-based HTAP database","volume":"13","author":"Huang Dongxu","year":"2020","unstructured":"Dongxu Huang, Qi Liu, Qiu Cui, Zhuhe Fang, Xiaoyu Ma, Fei Xu, Li Shen, Liu Tang, Yuxing Zhou, and Menglong Huang. 2020. TiDB: a raft-based HTAP database. In VLDB. 13, 3072\u20133084. https:\/\/dl.acm.org\/doi\/10.14778\/3415478.3415535","journal-title":"VLDB."},{"key":"e_1_3_2_1_41_1","unstructured":"Zu-Ming Jiang Si Liu Manuel Rigger and Zhendong Su. 2023. Detecting transactional bugs in database engines via graph-based oracle construction. In OSDI. 397\u2013417. isbn:978-1-939133-34-2 https:\/\/www.usenix.org\/conference\/osdi23\/presentation\/jiang"},{"key":"e_1_3_2_1_42_1","first-page":"57","article-title":"Apollo: Automatic detection and diagnosis of performance regressions in database systems","volume":"13","author":"Jung Jinho","year":"2019","unstructured":"Jinho Jung, Hong Hu, Joy Arulraj, Taesoo Kim, and Woonhak Kang. 2019. Apollo: Automatic detection and diagnosis of performance regressions in database systems. In VLDB. 13, 57\u201370. https:\/\/dl.acm.org\/doi\/10.14778\/3357377.3357382","journal-title":"VLDB."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Matteo Kamm Manuel Rigger Chengyu Zhang and Zhendong Su. 2023. Testing graph database engines via query partitioning. In ISSTA. 140\u2013149. https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3597926.3598044","DOI":"10.1145\/3597926.3598044"},{"key":"e_1_3_2_1_44_1","first-page":"1740","article-title":"Real-time analytical processing with SQL server","volume":"8","author":"Larson Per-\u00c5ke","year":"2015","unstructured":"Per-\u00c5ke Larson, Adrian Birka, Eric N Hanson, Weiyun Huang, Michal Nowakiewicz, and Vassilis Papadimos. 2015. Real-time analytical processing with SQL server. In VLDB. 8, 1740\u20131751. https:\/\/dl.acm.org\/doi\/10.14778\/2824032.2824071","journal-title":"VLDB."},{"key":"e_1_3_2_1_45_1","first-page":"2263","article-title":"Cloud-native database systems at Alibaba: Opportunities and challenges","volume":"12","author":"Li Feifei","year":"2019","unstructured":"Feifei Li. 2019. Cloud-native database systems at Alibaba: Opportunities and challenges. In VLDB. 12, 2263\u20132272. https:\/\/dl.acm.org\/doi\/abs\/10.14778\/3352063.3352141","journal-title":"VLDB."},{"key":"e_1_3_2_1_46_1","first-page":"3028","article-title":"Opengauss: An autonomous database system","volume":"14","author":"Li Guoliang","year":"2021","unstructured":"Guoliang Li, Xuanhe Zhou, Ji Sun, Xiang Yu, Yue Han, Lianyuan Jin, Wenbo Li, Tianqing Wang, and Shifu Li. 2021. Opengauss: An autonomous database system. In VLDB. 14, 3028\u20133042. https:\/\/dl.acm.org\/doi\/abs\/10.14778\/3476311.3476380","journal-title":"VLDB."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE55515.2023.00061"},{"key":"e_1_3_2_1_48_1","unstructured":"Yujia Li Chenjie Gu Thomas Dullien Oriol Vinyals and Pushmeet Kohli. 2019. Graph matching networks for learning the similarity of graph structured objects. In ICML. 3835\u20133845. http:\/\/proceedings.mlr.press\/v97\/li19d.html"},{"key":"e_1_3_2_1_49_1","unstructured":"Yu Liang Song Liu and Hong Hu. 2022. Detecting logical bugs of DBMS with coverage-based guidance. In USENIX Security 22. 4309\u20134326. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/liang"},{"key":"e_1_3_2_1_50_1","volume-title":"Leopard: A general test suite for isolation level verification. In CIDR. https:\/\/www.cidrdb.org\/cidr2024\/papers\/p44-liu.pdf","author":"Liu Peiyuan","year":"2024","unstructured":"Peiyuan Liu, Siyang Weng, Keqiang Li, Lyu Ni, Chengcheng Yang, Rong Zhang, Weining Qian, and Dian Qiao. 2024. Leopard: A general test suite for isolation level verification. In CIDR. https:\/\/www.cidrdb.org\/cidr2024\/papers\/p44-liu.pdf"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Xinyu Liu Qi Zhou Joy Arulraj and Alessandro Orso. 2022. Automatic detection of performance bugs in database systems using equivalent queries. In ICSE. 225\u2013236. https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3510003.3510093","DOI":"10.1145\/3510003.3510093"},{"key":"e_1_3_2_1_52_1","first-page":"2047","article-title":"Aria: a fast and practical deterministic OLTP database","volume":"13","author":"Lu Yi","year":"2020","unstructured":"Yi Lu, Xiangyao Yu, Lei Cao, and Samuel Madden. 2020. Aria: a fast and practical deterministic OLTP database. In VLDB. 13, 2047\u20132060. https:\/\/dl.acm.org\/doi\/10.14778\/3407790.3407808","journal-title":"VLDB."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.7.8.1855-1860"},{"key":"e_1_3_2_1_54_1","first-page":"1850","article-title":"Serializable Snapshot Isolation in PostgreSQL","volume":"5","author":"Ports Dan R. K.","year":"2012","unstructured":"Dan R. K. Ports and Kevin Grittner. 2012. Serializable Snapshot Isolation in PostgreSQL. In VLDB. 5, 1850\u20131861. https:\/\/dl.acm.org\/doi\/10.14778\/2367502.2367523","journal-title":"VLDB."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Dong Qiu Bixin Li and Zhendong Su. 2013. An empirical analysis of the co-evolution of schema and code in database applications. In SIGSOFT. 125\u2013135. https:\/\/dl.acm.org\/doi\/abs\/10.1145\/2491411.2491431","DOI":"10.1145\/2491411.2491431"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","unstructured":"Luyi Qu Yuming Li Rong Zhang Ting Chen Ke Shu Weining Qian and Aoying Zhou. 2022. Application-oriented workload generation for transactional database performance evaluation. In ICDE. 420\u2013432. https:\/\/doi.org\/10.1109\/ICDE53745.2022.00036 10.1109\/ICDE53745.2022.00036","DOI":"10.1109\/ICDE53745.2022.00036"},{"key":"e_1_3_2_1_57_1","first-page":"1","article-title":"CLOTHO: directed test generation for weakly consistent database systems","volume":"3","author":"Rahmani Kia","year":"2019","unstructured":"Kia Rahmani, Kartik Nagar, Benjamin Delaware, and Suresh Jagannathan. 2019. CLOTHO: directed test generation for weakly consistent database systems. In PACMPL. 3, 1\u201328. https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3360543","journal-title":"PACMPL."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897356.2897362"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Kun Ren Jose M Faleiro and Daniel J Abadi. 2016. Design principles for scaling multi-core OLTP under high contention. In SIGMOD. 1583\u20131598. https:\/\/dl.acm.org\/doi\/abs\/10.1145\/2882903.2882958","DOI":"10.1145\/2882903.2882958"},{"key":"e_1_3_2_1_60_1","unstructured":"Manuel Rigger and Zhendong Su. 2020. Testing database engines via pivoted query synthesis. In OSDI. 667\u2013682. https:\/\/dl.acm.org\/doi\/abs\/10.1145\/2882903.2882958"},{"key":"e_1_3_2_1_61_1","volume-title":"Mathematical Statistics","author":"Shao Jun","unstructured":"Jun Shao. 2003. Mathematical Statistics. In Springer Texts in Statistics."},{"key":"e_1_3_2_1_62_1","volume-title":"Thomas Peh, and Christof Bornh\u00f6vd.","author":"Sikka Vishal","year":"2012","unstructured":"Vishal Sikka, Franz F\u00e4rber, Wolfgang Lehner, Sang Kyun Cha, Thomas Peh, and Christof Bornh\u00f6vd. 2012. Efficient transaction processing in SAP HANA database: the end of a column store myth. In SIGMOD. 731\u2013742. https:\/\/dl.acm.org\/doi\/abs\/10.1145\/2213836.2213946"},{"key":"e_1_3_2_1_63_1","unstructured":"Donald R. Slutz. 1998. Massive Stochastic Testing of SQL. In VLDB. 618\u2013622. https:\/\/dl.acm.org\/doi\/10.5555\/645924.671199"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Adriana Szekeres and Irene Zhang. 2018. Making consistency more consistent: A unified model for coherence consistency and isolation. In PaPoC. 1\u20138. https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3194261.3194268","DOI":"10.1145\/3194261.3194268"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Rebecca Taft Irfan Sharif Andrei Matei Nathan VanBenschoten Jordan Lewis Tobias Grieger Kai Niemi Andy Woods Anne Birzin and Raphael Poss. 2020. CockroachDB: The resilient geo-distributed SQL database. In SIGMOD. 1493\u20131509. https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3318464.3386134","DOI":"10.1145\/3318464.3386134"},{"key":"e_1_3_2_1_66_1","volume-title":"Cobra: Making transactional key-value stores verifiably serializable. In OSDI. 63\u201380. https:\/\/dl.acm.org\/doi\/abs\/10.5555\/3488766.3488770","author":"Tan Cheng","year":"2020","unstructured":"Cheng Tan, Changgeng Zhao, Shuai Mu, and Michael Walfish. 2020. Cobra: Making transactional key-value stores verifiably serializable. In OSDI. 63\u201380. https:\/\/dl.acm.org\/doi\/abs\/10.5555\/3488766.3488770"},{"key":"e_1_3_2_1_67_1","first-page":"1","article-title":"Detecting logic bugs of join optimizations in DBMS","volume":"1","author":"Tang Xiu","year":"2023","unstructured":"Xiu Tang, Sai Wu, Dongxiang Zhang, Feifei Li, and Gang Chen. 2023. Detecting logic bugs of join optimizations in DBMS. In SIGMOD. 1, 1\u201326. https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3588909","journal-title":"SIGMOD."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"crossref","unstructured":"Alexandre Verbitski Anurag Gupta Debanjan Saha Murali Brahmadesam Kamal Gupta Raman Mittal Sailesh Krishnamurthy Sandor Maurice Tengiz Kharatishvili and Xiaofeng Bao. 2017. Amazon aurora: Design considerations for high throughput cloud-native relational databases. In SIGMOD. 1041\u20131052. https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3035918.3056101","DOI":"10.1145\/3035918.3056101"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"crossref","unstructured":"Mingzhe Wang Zhiyong Wu Xinyi Xu Jie Liang Chijin Zhou Huafeng Zhang and Yu Jiang. 2021. Industry practice of coverage-guided enterprise-level DBMS fuzzing. In ICSE. 328\u2013337. https:\/\/dl.acm.org\/doi\/abs\/10.1109\/ICSE-SEIP52600.2021.00042","DOI":"10.1109\/ICSE-SEIP52600.2021.00042"},{"key":"e_1_3_2_1_70_1","first-page":"49","article-title":"Mostly-optimistic concurrency control for highly contended dynamic workloads on a thousand cores","volume":"10","author":"Wang Tianzheng","year":"2016","unstructured":"Tianzheng Wang and Hideaki Kimura. 2016. Mostly-optimistic concurrency control for highly contended dynamic workloads on a thousand cores. In VLDB. 10, 49\u201360. https:\/\/dl.acm.org\/doi\/abs\/10.14778\/3015274.3015276","journal-title":"VLDB."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"crossref","unstructured":"Gerhard Weikum and Gottfried Vossen. 2001. Transactional information systems: theory algorithms and the practice of concurrency control and recovery. https:\/\/dl.acm.org\/doi\/10.1145\/604264.604275","DOI":"10.1016\/B978-155860508-4\/50005-3"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE55515.2023.00019"},{"key":"e_1_3_2_1_73_1","first-page":"3385","article-title":"OceanBase: a 707 million tpmC distributed relational database system","volume":"15","author":"Yang Zhenkun","year":"2022","unstructured":"Zhenkun Yang, Chuanhui Yang, Fusheng Han, Mingqiang Zhuang, Bing Yang, Zhifeng Yang, Xiaojun Cheng, Yuzhong Zhao, Wenhui Shi, and Huafeng Xi. 2022. OceanBase: a 707 million tpmC distributed relational database system. In VLDB. 15, 3385\u20133397. https:\/\/dl.acm.org\/doi\/abs\/10.14778\/3554821.3554830","journal-title":"VLDB."},{"key":"e_1_3_2_1_74_1","volume-title":"Tictoc: Time traveling optimistic concurrency control. In SIGMOD. 1629\u20131642. https:\/\/dl.acm.org\/doi\/abs\/10.1145\/2882903.2882935","author":"Yu Xiangyao","year":"2016","unstructured":"Xiangyao Yu, Andrew Pavlo, Daniel Sanchez, and Srinivas Devadas. 2016. Tictoc: Time traveling optimistic concurrency control. In SIGMOD. 1629\u20131642. https:\/\/dl.acm.org\/doi\/abs\/10.1145\/2882903.2882935"},{"key":"e_1_3_2_1_75_1","first-page":"25","article-title":"Comparing stars: On approximating graph edit distance","volume":"2","author":"Zeng Zhiping","year":"2009","unstructured":"Zhiping Zeng, Anthony KH Tung, Jianyong Wang, Jianhua Feng, and Lizhu Zhou. 2009. Comparing stars: On approximating graph edit distance. In VLDB. 2, 25\u201336. https:\/\/dl.acm.org\/doi\/abs\/10.14778\/1687627.1687631","journal-title":"VLDB."},{"key":"e_1_3_2_1_76_1","unstructured":"Mai Zheng Joseph Tucek Dachuan Huang Feng Qin Mark Lillibridge Elizabeth S. Yang Bill W. Zhao and Shashank Singh. 2014. Torturing databases for fun and profit. In OSDI. 449\u2013464. https:\/\/dl.acm.org\/doi\/10.5555\/2685048.2685083"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"crossref","unstructured":"Yingying Zheng Wensheng Dou Yicheng Wang Zheng Qin Lei Tang Yu Gao Dong Wang Wei Wang and Jun Wei. 2022. Finding bugs in Gremlin-based graph database systems via randomized differential testing. In ISSTA. 302\u2013313. https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3533767.3534409","DOI":"10.1145\/3533767.3534409"},{"key":"e_1_3_2_1_78_1","volume-title":"SQUIRREL: Testing database management systems with language validity and coverage feedback. In CCS. 955\u2013970. https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3372297.3417260","author":"Zhong Rui","year":"2020","unstructured":"Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, and Dinghao Wu. 2020. SQUIRREL: Testing database management systems with language validity and coverage feedback. In CCS. 955\u2013970. https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3372297.3417260"}],"event":{"name":"ISSTA '24: 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Vienna Austria","acronym":"ISSTA '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"]},"container-title":["Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650212.3680318","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650212.3680318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:50:07Z","timestamp":1750287007000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650212.3680318"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,11]]},"references-count":78,"alternative-id":["10.1145\/3650212.3680318","10.1145\/3650212"],"URL":"https:\/\/doi.org\/10.1145\/3650212.3680318","relation":{},"subject":[],"published":{"date-parts":[[2024,9,11]]},"assertion":[{"value":"2024-09-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}