{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T17:56:30Z","timestamp":1757613390449,"version":"3.44.0"},"reference-count":45,"publisher":"Association for Computing Machinery (ACM)","issue":"9","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2025,5]]},"abstract":"<jats:p>We propose a theory that can determine the lowest isolation level that can be allocated to each transaction program in an application in a mixed-isolation-level setting, to guarantee that all executions will be serializable and thus preserve all integrity constraints, even those that are not explicitly declared. This extends prior work applied to completely known transactions, to deal with the realistic situation where transactions are generated by running programs with parameters that are not known in advance. Using our theory, we propose an optimization method that allows for high throughput while ensuring that all executions are serializable. Our method is based on searching for application code modifications that are semantics-preserving while improving the isolation level allocation. We illustrate our approach to the SmallBank benchmark.<\/jats:p>","DOI":"10.14778\/3746405.3746412","type":"journal-article","created":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T17:06:20Z","timestamp":1756919180000},"page":"2846-2858","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Using Read Promotion and Mixed Isolation Levels for Performant Yet Serializable Execution of Transaction Programs"],"prefix":"10.14778","volume":"18","author":[{"given":"Brecht","family":"Vandevoort","sequence":"first","affiliation":[{"name":"UHasselt, Data Science Institute"}]},{"given":"Alan","family":"Fekete","sequence":"additional","affiliation":[{"name":"University of Sydney"}]},{"given":"Bas","family":"Ketsman","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Brussel"}]},{"given":"Frank","family":"Neven","sequence":"additional","affiliation":[{"name":"UHasselt, Data Science Institute"}]},{"given":"Stijn","family":"Vansummeren","sequence":"additional","affiliation":[{"name":"UHasselt, Data Science Institute"}]}],"member":"320","published-online":{"date-parts":[[2025,9,3]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/888672"},{"key":"e_1_2_1_2_1","volume-title":"O'Neil","author":"Adya Atul","year":"2000","unstructured":"Atul Adya, Barbara Liskov, and Patrick E. O'Neil. 2000. Generalized Isolation Level Definitions. In ICDE. 67\u201378."},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Mohammad Alomari Michael Cahill Alan Fekete and Uwe Rohm. 2008. The Cost of Serializability on Platforms That Use Snapshot Isolation. In ICDE. 576\u2013585.","DOI":"10.1109\/ICDE.2008.4497466"},{"key":"e_1_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Mohammad Alomari and Alan Fekete. 2015. Serializable use of Read Committed isolation level. In AICCSA. 1\u20138.","DOI":"10.1109\/AICCSA.2015.7507103"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.IS.2013.10.002"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732232.2732237"},{"key":"e_1_2_1_7_1","volume-title":"O'Neil","author":"Berenson Hal","year":"1995","unstructured":"Hal Berenson, Philip A. Bernstein, Jim Gray, Jim Melton, Elizabeth J. O'Neil, and Patrick E. O'Neil. 1995. A Critique of ANSI SQL Isolation Levels. In SIGMOD. 1\u201310."},{"key":"e_1_2_1_8_1","first-page":"1","article-title":"Robustness against Consistency Models with Atomic Visibility","volume":"7","author":"Bernardi Giovanni","year":"2016","unstructured":"Giovanni Bernardi and Alexey Gotsman. 2016. Robustness against Consistency Models with Atomic Visibility. In CONCUR. 7:1\u20137:15.","journal-title":"CONCUR."},{"key":"e_1_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Philip A. Bernstein Sudipto Das Bailu Ding and Markus Pilman. 2015. Optimizing Optimistic Concurrency Control for Tree-Structured Log-Structured Databases. In SIGMOD. 1295\u20131309.","DOI":"10.1145\/2723372.2737788"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/319996.319998"},{"volume-title":"Concurrency Control and Recovery in Database Systems","author":"Bernstein Philip A.","key":"e_1_2_1_11_1","unstructured":"Philip A. Bernstein, Vassos Hadzilacos, and Nathan Goodman. 1987. Concurrency Control and Recovery in Database Systems. Addison-Wesley."},{"key":"e_1_2_1_12_1","unstructured":"Philip A. Bernstein Colin W. Reid and Sudipto Das. 2011. Hyder - A Transactional Record Manager for Shared Flash. In CIDR. 9\u201320."},{"key":"e_1_2_1_13_1","volume-title":"Fekete","author":"Cahill Michael J.","year":"2008","unstructured":"Michael J. Cahill, Uwe R\u00f6hm, and Alan D. Fekete. 2008. Serializable isolation for snapshot databases. In SIGMOD. 729\u2013738."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620585.1620587"},{"key":"e_1_2_1_15_1","unstructured":"Andrea Cerone Giovanni Bernardi and Alexey Gotsman. 2015. A Framework for Transactional Consistency Models with Atomic Visibility. In CONCUR. 58\u201371."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152396"},{"key":"e_1_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Natacha Crooks Youer Pu Lorenzo Alvisi and Allen Clement. 2017. Seeing is Believing: A Client-Centric Specification of Database Isolation. In PODC. 73\u201382.","DOI":"10.1145\/3087801.3087802"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2463710"},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Bailu Ding Lucja Kot Alan J. Demers and Johannes Gehrke. 2015. Centiman: elastic high performance optimistic concurrency control by watermarking. In SoCC. 262\u2013275.","DOI":"10.1145\/2806777.2806837"},{"key":"e_1_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Alan Fekete. 2005. Allocating isolation levels to transactions. In PODS. 206\u2013215.","DOI":"10.1145\/1065167.1065193"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1071610.1071615"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407860"},{"key":"e_1_2_1_23_1","volume-title":"Proceeding of the IFIP Working Conference on Modelling in Data Base Management Systems","author":"Gray Jim","year":"1976","unstructured":"Jim Gray, Raymond A. Lorie, Gianfranco R. Putzolu, and Irving L. Traiger. 1976. Granularity of Locks and Degrees of Consistency in a Shared Data Base. In Modelling in Data Base Management Systems, Proceeding of the IFIP Working Conference on Modelling in Data Base Management Systems, Freudenstadt, Germany, January 5\u20138, 1976, G. M. Nijssen (Ed.). North-Holland, 365\u2013394."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.14778\/3303753.3303763"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14778\/3377369.3377373"},{"key":"e_1_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Evan P. C. Jones Daniel J. Abadi and Samuel Madden. 2010. Low overhead concurrency control for partitioned main memory databases. In SIGMOD. 603\u2013614.","DOI":"10.1145\/1807167.1807233"},{"key":"e_1_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Bas Ketsman Christoph Koch Frank Neven and Brecht Vandevoort. 2020. Deciding Robustness for Lower SQL Isolation Levels. In PODS. 315\u2013330.","DOI":"10.1145\/3375395.3387655"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3582302.3582304"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3561049"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882905"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.14778\/2095686.2095689"},{"key":"e_1_2_1_32_1","volume-title":"Andersen","author":"Lim Hyeontaek","year":"2017","unstructured":"Hyeontaek Lim, Michael Kaminsky, and David G. Andersen. 2017. Cicada: Dependably Fast Multi-Core In-Memory Transactions. In SIGMOD. 21\u201335."},{"key":"e_1_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Thomas Neumann Tobias M\u00fchlbauer and Alfons Kemper. 2015. Fast Serializable Multi-Version Concurrency Control for Main-Memory Database Systems. In SIGMOD. 677\u2013689.","DOI":"10.1145\/2723372.2749436"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/322154.322158"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.14778\/2367502.2367523"},{"key":"e_1_2_1_36_1","volume-title":"Felix Martin Schuhknecht, and Jens Dittrich","author":"Sharma Ankur","year":"2018","unstructured":"Ankur Sharma, Felix Martin Schuhknecht, and Jens Dittrich. 2018. Accelerating Analytical Processing in MVCC using Fine-Granular High-Frequency Virtual Snapshotting. In SIGMOD. 245\u2013258."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/211414.211427"},{"key":"e_1_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Brecht Vandevoort Alan Fekete Bas Ketsman Frank Neven and Stijn Vansummeren. 2025. Using Read Promotion and Mixed Isolation Levels for Performant Yet Serializable Execution of Transaction Programs (full version). (2025). http:\/\/arxiv.org\/abs\/2501.18377.","DOI":"10.14778\/3746405.3746412"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.14778\/3476249.3476268"},{"key":"e_1_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Brecht Vandevoort Bas Ketsman Christoph Koch and Frank Neven. 2022. Robustness Against Read Committed: A Free Transactional Lunch. In PODS. 1\u201314.","DOI":"10.1145\/3517804.3524162"},{"key":"e_1_2_1_41_1","first-page":"1","article-title":"Robustness Against Read Committed for Transaction Templates with Functional Constraints","volume":"16","author":"Vandevoort Brecht","year":"2022","unstructured":"Brecht Vandevoort, Bas Ketsman, Christoph Koch, and Frank Neven. 2022. Robustness Against Read Committed for Transaction Templates with Functional Constraints. In ICDT. 16:1\u201316:17.","journal-title":"ICDT."},{"key":"e_1_2_1_42_1","unstructured":"Brecht Vandevoort Bas Ketsman Christoph Koch and Frank Neven. 2023. Detecting Robustness against MVRC for Transaction Programs with Predicate Reads. In EDBT. 565\u2013577."},{"key":"e_1_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Brecht Vandevoort Bas Ketsman and Frank Neven. 2023. Allocating Isolation Levels to Transactions in a Multiversion Setting. In PODS. 69\u201378.","DOI":"10.1145\/3584372.3588672"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3651592"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.14778\/2735508.2735511"}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/3746405.3746412","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T19:53:16Z","timestamp":1757015596000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/3746405.3746412"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":45,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["10.14778\/3746405.3746412"],"URL":"https:\/\/doi.org\/10.14778\/3746405.3746412","relation":{},"ISSN":["2150-8097"],"issn-type":[{"type":"print","value":"2150-8097"}],"subject":[],"published":{"date-parts":[[2025,5]]},"assertion":[{"value":"2025-09-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}