Abstract
No abstract available.
Cited By
- Reddy P and Kitsuregawa M (2004). Speculative Locking Protocols to Improve Performance for Distributed Database Systems, IEEE Transactions on Knowledge and Data Engineering, 16:2, (154-169), Online publication date: 1-Feb-2004.
- Thomasian A (1997). A Performance Comparison of Locking Methods with Limited Wait Depth, IEEE Transactions on Knowledge and Data Engineering, 9:3, (421-434), Online publication date: 1-May-1997.
- McKenney P (1996). Selecting locking primitives for parallel programming, Communications of the ACM, 39:10, (75-82), Online publication date: 1-Oct-1996.
- Yannakakis M (2019). Perspectives on database theory, ACM SIGACT News, 27:3, (25-49), Online publication date: 1-Sep-1996.
- Mitzel D, Estrin D, Shenker S and Zhang L A study of reservation dynamics in integrated services packet networks Proceedings of the Fifteenth annual joint conference of the IEEE computer and communications societies conference on The conference on computer communications - Volume 2, (871-879)
- Shasha D, Llirbat F, Simon E and Valduriez P (1995). Transaction chopping, ACM Transactions on Database Systems (TODS), 20:3, (325-363), Online publication date: 1-Sep-1995.
- Chaudhri V, Hadzilacos V, Mylopoulos J and Sevcik K Quantitative evaluation of a transaction facility for knowledge base management system Proceedings of the third international conference on Information and knowledge management, (122-131)
- Thomasian A (1993). Two-phase locking performance and its thrashing behavior, ACM Transactions on Database Systems (TODS), 18:4, (579-625), Online publication date: 1-Dec-1993.
- Drenick P and Smith E (1993). Stochastic query optimization in distributed databases, ACM Transactions on Database Systems (TODS), 18:2, (262-288), Online publication date: 1-Jun-1993.
- Agrawal D, El Abbadi A and Jeffers R An approach to eliminate transaction blocking in locking protocols Proceedings of the eleventh ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems, (223-235)
- Thomasian A (2019). Performance analysis of locking policies with limited wait depth, ACM SIGMETRICS Performance Evaluation Review, 20:1, (115-127), Online publication date: 1-Jun-1992.
- Thomasian A Performance analysis of locking policies with limited wait depth Proceedings of the 1992 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, (115-127)
- Franaszek P, Robinson J and Thomasian A (1992). Concurrency control for high contention environments, ACM Transactions on Database Systems (TODS), 17:2, (304-345), Online publication date: 1-Jun-1992.
- Thomasian A and Ryu I (2019). Performance Analysis of Two-Phase Locking, IEEE Transactions on Software Engineering, 17:5, (386-402), Online publication date: 1-May-1991.
- Taheri H and Askins B Simulating the performance of a multiprocessor operating system Proceedings of the 24th annual symposium on Simulation, (81-90)
- Wang W, Hsu M and Pinsky E Modeling hot spots in database systems (extended abstract) Proceedings of the tenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems, (82-91)
- Taheri H and Askins B (2019). Simulating the performance of a multiprocessor operating system, ACM SIGSIM Simulation Digest, 21:3, (81-90), Online publication date: 1-Apr-1991.
- Thomasian A and Ryu I (2019). A Recursive Solution Method to Analyze the Performance of Static Locking Systems, IEEE Transactions on Software Engineering, 15:10, (1147-1156), Online publication date: 1-Oct-1989.
Index Terms
- Locking performance in centralized databases
Recommendations
Locking performance in centralized databases
An analytic model is used to study the performance of dynamic locking. The analysis uses only the steady-state average values of the variables. The solution to the model is given by a cubic, which has exactly one valid root for the range of parametric ...
Performance Evaluation of Centralized Databases with Static Locking
The performance of transaction processing systems is determined by the contention for hardware as well as software resources (database locks), due to the concurrency control mechanism of the database being accessed by transactions. We consider a ...