{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T19:01:36Z","timestamp":1758394896592},"reference-count":13,"publisher":"Association for Computing Machinery (ACM)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2009,8]]},"abstract":"<jats:p>\n            To adapt database technology to new environments like cloud platforms or multi-core hardware, or to try anew to provide an extensible database platform, it is useful to separate transaction services from data management elements that need close physical proximity to data. With \"generic\" transactional services of concurrency control and recovery in a separate\n            <jats:italic>transactional<\/jats:italic>\n            component (TC), indexing, cache and disk management, now in a\n            <jats:italic>data<\/jats:italic>\n            component (DC), can be simplified and tailored more easily to the platform or to a data type extension with a special purpose index. This decomposition requires that details of the DC's management of data be hidden from the TC. Thus, locking and logging need to be \"logical\", which poses a number of problems. One problem is the handling of locking for ranges of keys. Locks need to be taken at the TC prior to the records and their keys being known to the TC. We describe generic two approaches for dealing with this. (1) Make a \"speculative\" visit\" to the DC to learn key values. (2) Lock a \"covering resource\" first, then learn and lock key values and ultimately release the covering resource lock. The \"table\" is the only logical (and hence known to the TC) covering resourse in the traditional locking hierarchy, but using it limits concurrency. Concurrency is improved with the introduction of new partition resources. We show how partitions as covering resources combine high concurrency with low locking overhead. Using partitions is sufficiently effective to consider adapting it for a traditional database kernel.\n          <\/jats:p>","DOI":"10.14778\/1687627.1687658","type":"journal-article","created":{"date-parts":[[2014,6,24]],"date-time":"2014-06-24T12:17:57Z","timestamp":1403612277000},"page":"265-276","source":"Crossref","is-referenced-by-count":24,"title":["Locking key ranges with unbundled transaction services"],"prefix":"10.14778","volume":"2","author":[{"given":"David","family":"Lomet","sequence":"first","affiliation":[{"name":"Microsoft Research, Redmond, WA"}]},{"given":"Mohamed F.","family":"Mokbel","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN"}]}],"member":"320","published-online":{"date-parts":[[2009,8]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Concurrency Control and Recovery in Database Systems","author":"Bernstein P. A.","year":"1987","unstructured":"P. A. Bernstein , V. Hadzilacos , and N. Goodman . Concurrency Control and Recovery in Database Systems . Addison-Wesley , 1987 . P. A. Bernstein, V. Hadzilacos, and N. Goodman. Concurrency Control and Recovery in Database Systems. Addison-Wesley, 1987."},{"key":"e_1_2_1_2_1","volume-title":"Morgan Kaufmann","author":"Bernstein P. A.","year":"1997","unstructured":"P. A. Bernstein and E. Newcomer . Principles of Transaction Processing: For the Systems Professional . Morgan Kaufmann , 1997 . P. A. Bernstein and E. Newcomer. Principles of Transaction Processing: For the Systems Professional. Morgan Kaufmann, 1997."},{"key":"e_1_2_1_3_1","volume-title":"Understanding DB2: Learning Visually with Examples","author":"Chong R. F.","year":"2007","unstructured":"R. F. Chong , X. Wang , M. Dang , and D. R. Snow . Understanding DB2: Learning Visually with Examples . IBM Press , 2007 . R. F. Chong, X. Wang, M. Dang, and D. R. Snow. Understanding DB2: Learning Visually with Examples. IBM Press, 2007."},{"key":"e_1_2_1_4_1","volume-title":"Inside Microsoft SQL Server 2005: The Storage Engine","author":"Delaney K.","year":"2006","unstructured":"K. Delaney . Inside Microsoft SQL Server 2005: The Storage Engine . Microsoft Press , 2006 . K. Delaney. Inside Microsoft SQL Server 2005: The Storage Engine. Microsoft Press, 2006."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/360363.360369"},{"key":"e_1_2_1_6_1","volume-title":"Database Systems: The Complete Book","author":"Garcia-Molina H.","year":"2002","unstructured":"H. Garcia-Molina , J. D. Ullman , and J. Widom . Database Systems: The Complete Book . Prentice Hall , 2002 . H. Garcia-Molina, J. D. Ullman, and J. Widom. Database Systems: The Complete Book. Prentice Hall, 2002."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/356842.356847"},{"key":"e_1_2_1_8_1","volume-title":"Morgan Kaufmann","author":"Gray J.","year":"1993","unstructured":"J. Gray and A. Reuter . Transaction Processing: Concepts and Techniques . Morgan Kaufmann , 1993 . J. Gray and A. Reuter. Transaction Processing: Concepts and Techniques. Morgan Kaufmann, 1993."},{"key":"e_1_2_1_9_1","volume-title":"Oracle Essentials: Oracle Database 10g. O'Reilly","author":"Greenwald R.","year":"2004","unstructured":"R. Greenwald , R. Stackowiak , and J. Stern . Oracle Essentials: Oracle Database 10g. O'Reilly , 2004 . R. Greenwald, R. Stackowiak, and J. Stern. Oracle Essentials: Oracle Database 10g. O'Reilly, 2004."},{"key":"e_1_2_1_10_1","first-page":"655","volume-title":"VLDB","author":"Lomet D. B.","year":"1993","unstructured":"D. B. Lomet . Key Range Locking Strategies for Improved Concurrency . In VLDB , pages 655 -- 664 , 1993 . D. B. Lomet. Key Range Locking Strategies for Improved Concurrency. In VLDB, pages 655--664, 1993."},{"key":"e_1_2_1_11_1","volume-title":"CIDR","author":"Lomet D. B.","year":"2009","unstructured":"D. B. Lomet , A. Fekete , G. Weikum , and M. Zwiling . Unbundling Transaction Services in the Cloud . In CIDR , 2009 . D. B. Lomet, A. Fekete, G. Weikum, and M. Zwiling. Unbundling Transaction Services in the Cloud. In CIDR, 2009."},{"key":"e_1_2_1_12_1","volume-title":"VLDB","author":"Mohan C.","year":"1990","unstructured":"C. Mohan . ARIES\/KVL : A Key-Value Locking Method for Concurrency Control of Multiaction Transactions Operating on B-Tree Indexes . In VLDB , 1990 . C. Mohan. ARIES\/KVL: A Key-Value Locking Method for Concurrency Control of Multiaction Transactions Operating on B-Tree Indexes. In VLDB, 1990."},{"key":"e_1_2_1_13_1","volume-title":"Database Management Systems","author":"Ramakrishnan R.","year":"2003","unstructured":"R. Ramakrishnan and J. Gehrke . Database Management Systems . McGraw-Hill , 2003 . R. Ramakrishnan and J. Gehrke. Database Management Systems. McGraw-Hill, 2003."}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/1687627.1687658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T11:26:25Z","timestamp":1672226785000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/1687627.1687658"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,8]]}},"alternative-id":["10.14778\/1687627.1687658"],"URL":"https:\/\/doi.org\/10.14778\/1687627.1687658","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2009,8]]}}}