skip to main content
10.1145/308386.308442acmconferencesArticle/Chapter ViewAbstractPublication PagespodsConference Proceedingsconference-collections
Article
Free Access

Concurrent set manipulation without locking

Authors Info & Claims
Published:01 March 1988Publication History

ABSTRACT

Set manipulation consists of the actions insert, delete, and member on keys. We propose a concurrent set manipulation algorithm that uses no locking at all and requires no aborts, relying instead on atomic read-modify-write operations on single (data) locations. The algorithm satisfies order-preserving serializability through conditions that are strictly looser than existing algorithms

References

  1. BG81.- P A Bernstem and N Goodman, "Concurrency Control m Dtstrlbuted Database Systems," Compuung Surveys 13, " (June 1981), pp 185-221]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. BS77.- R Bayer and M Schkolmck, "Concurrency of operauons on B-trees," Acta Informattca, vol 9, pp 1- 21, 1977]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. El80.- C S Elhs, "Concurrent Search and Inserts in 2-3 trees," Acta Informatlca, vol 14, no 1, pp 63-86, 1980]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. El82.- C S Elhs, "Extendible Hashing for Concurrent Operatmns and D~strlbuted Data," ACM-SIGMOD, pp 106-115, 1982]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. El85.- C S Elhs, "Concurrency control and hnear hashing," fourth annual ACM SIGACF/SIGMOD symposium on Prmclples of Database Systems, Portland, Oregon, pp 1- 7, 1985]]Google ScholarGoogle Scholar
  6. FC84.- R Ford and J Calhoun, "Concurrency Control Mechamsms and the Senahzablhty of Concurrent Tree Algorithms," Proceeclmgs of the ACM Symposmm on the Prmclples of Database Systems, 1984]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. GGKMRS83.- A Gottheb, R Gnshman, C K Kruskal, K P McAuhffe, L Rudolph, and M Snlr, The NYU Ultracomputer - Destgmng a MIMD, Shared memory Parallel Computer IEEE Trans on Computers C-32 (1983), 175-189]]Google ScholarGoogle Scholar
  8. GS85.- N Goodman and D Shasha, "Semantically-based concurrency control for search structures," Proc of the fourth annual ACM SIGACT/SIGMOD symposmm on prmctples of database systems, March 1985, pp 8-19]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. HY86.- M Hsu and W P Yang, "Concurrent Operattons m Extendtble Hashing" Proceedsngs of the Twelfth Very Large Data Bases Conference, Kyoto, Japan, August 25-28, 1986 pp 241-247]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. KL80.- H T Kung and P L Lehman, "Concurrent Mampulatton of Binary Search Trees," ACM Trans Database Syst, vol 5, no 3, pp 339 -353, 1980]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. KP83.- H T Kung and C H Papadtmstrtou, "An Opttmahty Theory of Concurrency Control for Databases," Acta Informatlca, vol 19, no 1 (1983), pp 1-11]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. KS83.- Z Kedem and A Stlberschatz, "Locking Protocols From Exclustve to Shared Locks," Journal of the ACM, Vol 30, No 4, Oct 1983, pp 787-804]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. KW82.- Y S Kwong and D Wood, "Method for concurrency m B-trees," IEEE Transacttons on Software Engineering, vol SE-8, no 3, pp 211-223, 1982]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. LS86.- V Lanm and D Shasha, "A symmetrtc concurrent B tree algorithm," Proc of the Fall Joint Computer Conference of 1986, October 1986, pp 380-389]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. LY81.- P L Lehman and S B Yao "Efficient locking for concurrent operations on B-trees," ACM Trans on Database Systems, vol 6, no 4, December 1981, pp 650-670]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. ML82.- U Manber and R E Ladner, "Concurrency control m a dynamic search structure," ACM Proceedings on Database Systems, pp 268-282, 1982]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. MR85.- Y Mond and Y Raz, "Concurrency control in B+ trees using Preparatory Operations," llth International Conference on Very Large Data Bases, August 1985, pp 331-334]]Google ScholarGoogle Scholar
  18. Pa79.- C H Papadlmltrlou, "Sertahzablhty of Concurrent Database Updates," JACM, vo 26, no 4, pp 631-653 October, 1979]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Sag85.- Y Saglv, "Concurrent Operations on 8*-trees with Overtaking," Proc of the fourth annual ACM SIGACT/SIGMOD symposium on principles of database systems, March 1985, pp 28-37]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Sam76.B Samadi, "B-trees in a System with Muluple Users," Informanon Processing Letters, Voi 5, pp 107-112, October 1976]]Google ScholarGoogle ScholarCross RefCross Ref
  21. Sch78.G Schlageter, "Process Synchromzatton m Database Systems," ACM Transactions on Database Systems 3,3 (Sept 1978) p 248]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Sh84.- D Shasha, "Concurrent Algorithms for Search Structures," Ph D Thesis, Harvard Umverslty, TR-12- 84, June, 1984]]Google ScholarGoogle Scholar
  23. SLS87.D Shasha, V Lamn, and J Schmtdt, "An Analytical Model for the Performance of Concurrent B Tree Algorithms," New York Umverstty, UltraComputer Note #124, June 1987]]Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    PODS '88: Proceedings of the seventh ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
    March 1988
    352 pages
    ISBN:0897912632
    DOI:10.1145/308386

    Copyright © 1988 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 1 March 1988

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • Article

    Acceptance Rates

    Overall Acceptance Rate642of2,707submissions,24%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader