{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T16:00:54Z","timestamp":1765123254852,"version":"3.41.0"},"reference-count":41,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[1985,12,1]],"date-time":"1985-12-01T00:00:00Z","timestamp":502243200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Database Syst."],"published-print":{"date-parts":[[1985,12]]},"abstract":"<jats:p>In spite of the wide variety of concurrency control and recovery mechanisms proposed during the past decade, the behavior and the performance of various concurrency control and recovery mechanisms remain largely not well understood. In addition, although concurrency control and recovery mechanisms are intimately related, the interaction between them has not been adequately explored. In this paper, we take a unified view of the problems associated with concurrency control and recovery for transaction-oriented multiuser centralized database management systems, and we present several integrated mechanisms. We then develop analytical models to study the behavior and compare the performance of these integrated mechanisms, and we present the results of our performance evaluation.<\/jats:p>","DOI":"10.1145\/4879.4958","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T11:29:00Z","timestamp":1027769340000},"page":"529-564","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["Integrated concurrency control and recovery mechanisms: design and performance evaluation"],"prefix":"10.1145","volume":"10","author":[{"given":"Rakesh","family":"Agrawal","sequence":"first","affiliation":[{"name":"AT&amp;T Bell Laboratories, Murray Hill, NJ"}]},{"given":"David J.","family":"Dewitt","sequence":"additional","affiliation":[{"name":"Univ. of Wisconsin, Madison"}]}],"member":"320","published-online":{"date-parts":[[1985,12]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/984523.984524"},{"key":"e_1_2_1_3_2","first-page":"62","volume-title":"Proc. 8th Int. Conf. Very Large Data Bases","author":"BERNSTEIN P. A.","year":"1982","unstructured":"BERNSTEIN , P. A. , AND GOODMAN , N. A sophisticate's introduction to distributed database concurrency control . In Proc. 8th Int. Conf. Very Large Data Bases , Sept. 1982 , 62 - 76 . BERNSTEIN, P. A., AND GOODMAN, N. A sophisticate's introduction to distributed database concurrency control. In Proc. 8th Int. Conf. Very Large Data Bases, Sept. 1982, 62-76."},{"key":"e_1_2_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/356842.356846"},{"key":"e_1_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/360762.360766"},{"key":"e_1_2_1_8_2","volume-title":"Proc. lOth Int. Conf. Very Large Data Bases (Aug.","author":"CAREY M. J.","year":"1984","unstructured":"CAREY , M. J. , AND STONEBRAKER , M.R. The performance of concurrency control algorithms for database management systems . Proc. lOth Int. Conf. Very Large Data Bases (Aug. 1984 ), i07-i18. CAREY, M. J., AND STONEBRAKER, M.R. The performance of concurrency control algorithms for database management systems. Proc. lOth Int. Conf. Very Large Data Bases (Aug. 1984), i07-i18."},{"key":"e_1_2_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1975.218955"},{"key":"e_1_2_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/356586.356588"},{"key":"e_1_2_1_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/360363.360369"},{"key":"e_1_2_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/322123.322131"},{"key":"e_1_2_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/359511.359531"},{"key":"e_1_2_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/588058.588084"},{"key":"e_1_2_1_16_2","series-title":"Lecture Notes in Computer Science 60, Advanced Course on Operating Systems","volume-title":"Notes on database operating systems","author":"GRAY J.N.","year":"1978","unstructured":"GRAY , J.N. Notes on database operating systems . In R. Bayer, R. M. Graham and G. Seegmuller (Eds.) Lecture Notes in Computer Science 60, Advanced Course on Operating Systems , Springer Verlag , New York , 1978 . GRAY, J.N. Notes on database operating systems. In R. Bayer, R. M. Graham and G. Seegmuller (Eds.) Lecture Notes in Computer Science 60, Advanced Course on Operating Systems, Springer Verlag, New York, 1978."},{"key":"e_1_2_1_17_2","volume-title":"DeWitt","author":"GRAY J.N.","year":"1982","unstructured":"GRAY , J.N. Personal communication to D. J . DeWitt , April 1982 . GRAY, J.N. Personal communication to D. J. DeWitt, April 1982."},{"key":"e_1_2_1_18_2","first-page":"144","volume-title":"Proc. 7th Int. Con{. Very Large Data Bases (Sept.","author":"GRAY J.N.","year":"1981","unstructured":"GRAY , J.N. The transaction concept: Virtues and limitations . In Proc. 7th Int. Con{. Very Large Data Bases (Sept. 1981 ), 144 - 154 . GRAY, J.N. The transaction concept: Virtues and limitations. In Proc. 7th Int. Con{. Very Large Data Bases (Sept. 1981), 144-154."},{"key":"e_1_2_1_19_2","volume-title":"Calif.","author":"GRAY J. N.","year":"1981","unstructured":"GRAY , J. N. , HOMAN , P. , KORTH , H. , AND OBERMARCK , R. A straw man analysis of the probability of waiting and deadlock in a database system. Rep. ~uvv, l~lw rtesearch Lab., San Jose , Calif. , Feb. 1981 . GRAY, J. N., HOMAN, P., KORTH, H., AND OBERMARCK, R. A straw man analysis of the probability of waiting and deadlock in a database system. Rep. ~uvv, l~lw rtesearch Lab., San Jose, Calif., Feb. 1981."},{"key":"e_1_2_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/356842.356847"},{"key":"e_1_2_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/356603.356607"},{"key":"e_1_2_1_22_2","volume-title":"San Jose, Calif.","author":"IBM","year":"1977","unstructured":"IBM . Reference Manual for IBM 3350 Direct Access Storage, GA 26-1638-2, File $370-07 , IBM General Products Division , San Jose, Calif. , April 1977 . IBM. Reference Manual for IBM 3350 Direct Access Storage, GA26-1638-2, File $370-07, IBM General Products Division, San Jose, Calif., April 1977."},{"key":"e_1_2_1_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/582095.582116"},{"key":"e_1_2_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/356842.356845"},{"key":"e_1_2_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/319566.319567"},{"key":"e_1_2_1_26_2","volume-title":"Xerox PARC","author":"LAMPSON B.","year":"1979","unstructured":"LAMPSON , B. , AND STURGIS , H. Crash recovery in a distributed data storage system. Computer Science Lab ., Xerox PARC , 1979 . LAMPSON, B., AND STURGIS, H. Crash recovery in a distributed data storage system. Computer Science Lab., Xerox PARC, 1979."},{"key":"e_1_2_1_27_2","volume-title":"Mass.","author":"NOLTE Z.","year":"1983","unstructured":"LmN, W. T. K., AND NOLTE , Z. Basic timestamp, multiple version timestamp, and two phase locking. Computer Corp. America, Cambridge , Mass. , Jan. 1983 . LmN, W. T. K., AND NOLTE, Z. Basic timestamp, multiple version timestamp, and two phase locking. Computer Corp. America, Cambridge, Mass., Jan. 1983."},{"key":"e_1_2_1_28_2","first-page":"131","volume-title":"Proc. 6th Berkeley Workshop on Distributed Data Management and Computer Networks (Feb.","author":"LZN W. T.","year":"1982","unstructured":"LZN , W. T. K., AND NOLTE , J. Performance of two phase locking . In Proc. 6th Berkeley Workshop on Distributed Data Management and Computer Networks (Feb. 1982 ), 131 - 160 . LZN, W. T. K., AND NOLTE, J. Performance of two phase locking. In Proc. 6th Berkeley Workshop on Distributed Data Management and Computer Networks (Feb. 1982), 131-160."},{"key":"e_1_2_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/320521.320540"},{"key":"e_1_2_1_30_2","unstructured":"PEINL P. AND REUTER A. Empirical comparison of database concurrency control schemes Universitfit Kaiserslautern West germany 1983.  PEINL P. AND REUTER A. Empirical comparison of database concurrency control schemes Universitfit Kaiserslautern West germany 1983."},{"key":"e_1_2_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/359015.359021"},{"key":"e_1_2_1_32_2","volume-title":"ech. Rep.-205","author":"REED D. P.","year":"1978","unstructured":"REED , D. P. Naming and synchronization in a decentralized computer system.Lab. for computer Science MIT\/LCS\/ T ech. Rep.-205 , Massachusetts Institute of Technology, Cambridge , Mass ., Sept. 1978 . REED,D. P. Naming and synchronization in a decentralized computer system.Lab. for computer Science MIT\/LCS\/Tech. Rep.-205, Massachusetts Institute of Technology, Cambridge, Mass., Sept. 1978."},{"key":"e_1_2_1_33_2","volume-title":"Universitat Kaiserslautern","author":"REUTER A. A","year":"1983","unstructured":"REUTER , A. A , nnAlyt;e rnadpl of t rAn. ~A~fion int.grfgrgnrg in dAfAh~.~g ay~t~mQ IR gg-g.2 , Universitat Kaiserslautern , West Germany , 1983 . REUTER, A. A, nnAlyt;e rnadpl of t rAn.~A~fion int.grfgrgnrg in dAfAh~.~g ay~t~mQ IR gg-g.2, Universitat Kaiserslautern, West Germany, 1983."},{"key":"e_1_2_1_34_2","volume-title":"Universit~it Kaiserslautern","author":"REUTER A.","year":"1982","unstructured":"REUTER , A. Performance analysis of recovery techniques. IB 63-82 , Universit~it Kaiserslautern , West Germany , 1982 . REUTER, A. Performance analysis of recovery techniques. IB 63-82, Universit~it Kaiserslautern, West Germany, 1982."},{"key":"e_1_2_1_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361061"},{"key":"e_1_2_1_37_2","volume-title":"Carnegie-Mellon University","author":"ROBINSON J.T.","year":"1982","unstructured":"ROBINSON , J.T. Design of concurrency controls for transaction processing systems. Rep. CMU- CS-82-114, Computer Science Dep ., Carnegie-Mellon University , Pittsburgh , April 1982 . ROBINSON, J.T. Design of concurrency controls for transaction processing systems. Rep. CMU- CS-82-114, Computer Science Dep., Carnegie-Mellon University, Pittsburgh, April 1982."},{"key":"e_1_2_1_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/320251.320260"},{"key":"e_1_2_1_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/320473.320484"},{"key":"e_1_2_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/800191.805599"},{"key":"e_1_2_1_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/582318.582352"},{"key":"e_1_2_1_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/500080.500091"},{"volume-title":"10th Int. Conf. Very Large Data Bases (Aug. 119-128","author":"TAY Y. C.","key":"e_1_2_1_44_2","unstructured":"TAY , Y. C. , GRAY .QUT R!, R . Choice and performance in locking for database In Proc . 10th Int. Conf. Very Large Data Bases (Aug. 119-128 . TAY, Y. C.,GRAY .QUTR!, R. Choice and performance in locking for database In Proc. 10th Int. Conf. Very Large Data Bases (Aug. 119-128."},{"key":"e_1_2_1_45_2","volume-title":"Calif.","author":"TRAIGER I. L.","year":"1979","unstructured":"TRAIGER , I. L. , GRAY , J. N. , GALTIERI , C. , AND LINDSAY , B.G. Transactions and consistency in distributed database systems. Rep. RJ2555, IBM Research Lab., San Jose , Calif. , June 1979 . TRAIGER, I. L., GRAY, J. N., GALTIERI, C., AND LINDSAY, B.G. Transactions and consistency in distributed database systems. Rep. RJ2555, IBM Research Lab., San Jose, Calif., June 1979."},{"key":"e_1_2_1_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/356725.356730"},{"key":"e_1_2_1_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/359461.359475"}],"container-title":["ACM Transactions on Database Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/4879.4958","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/4879.4958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:15:16Z","timestamp":1750281316000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/4879.4958"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1985,12]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1985,12]]}},"alternative-id":["10.1145\/4879.4958"],"URL":"https:\/\/doi.org\/10.1145\/4879.4958","relation":{},"ISSN":["0362-5915","1557-4644"],"issn-type":[{"type":"print","value":"0362-5915"},{"type":"electronic","value":"1557-4644"}],"subject":[],"published":{"date-parts":[[1985,12]]},"assertion":[{"value":"1985-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}