Pub Date : 1998-02-23DOI: 10.1109/ICDE.1998.655807
K. Chakrabarti, S. Mehrotra
Over the last decade (1988-98), the R tree has emerged as one of the most robust multidimensional access methods. However, before the R tree can be integrated as an access method to a commercial strength database management system, efficient techniques to provide transactional access to data via R trees need to be developed. Concurrent access to data through a multidimensional data structure introduces the problem of protecting ranges specified in the retrieval from phantom insertions and deletions (the phantom problem). Existing approaches to phantom protection in B trees (namely, key range locking) cannot be applied to multidimensional data structures since they rely on a total order over the key space on which the B tree is designed. The paper presents a dynamic granular locking approach to phantom protection in R trees. To the best of our knowledge, the paper provides the first solution to the phantom problem in multidimensional access methods based on granular locking.
{"title":"Dynamic granular locking approach to phantom protection in R-trees","authors":"K. Chakrabarti, S. Mehrotra","doi":"10.1109/ICDE.1998.655807","DOIUrl":"https://doi.org/10.1109/ICDE.1998.655807","url":null,"abstract":"Over the last decade (1988-98), the R tree has emerged as one of the most robust multidimensional access methods. However, before the R tree can be integrated as an access method to a commercial strength database management system, efficient techniques to provide transactional access to data via R trees need to be developed. Concurrent access to data through a multidimensional data structure introduces the problem of protecting ranges specified in the retrieval from phantom insertions and deletions (the phantom problem). Existing approaches to phantom protection in B trees (namely, key range locking) cannot be applied to multidimensional data structures since they rely on a total order over the key space on which the B tree is designed. The paper presents a dynamic granular locking approach to phantom protection in R trees. To the best of our knowledge, the paper provides the first solution to the phantom problem in multidimensional access methods based on granular locking.","PeriodicalId":264926,"journal":{"name":"Proceedings 14th International Conference on Data Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1998-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132871503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1998-02-23DOI: 10.1109/ICDE.1998.655825
Sharma Chakravarthy, R. Le
The utility and functionality of active capability (event-condition-action or ECA rules) has been well established in the context of databases. Today, most of the commercial relational database management systems (RDBMSs) offer some form of ECA rule capability. In addition, there are several research prototypes that have extended the ECA rule capability to object-oriented database management systems (OODBMSs). Sentinel, developed at the University of Florida is one such prototype that supports an expressive composite event specification language (Snoop), efficient event detection (using generated wrappers), conditions and actions (as a combination of OQL and C++), multiple and cascaded rule processing (using a rule scheduler and nested transactions), a visualization tool, and an editor for dynamic creation and management of rules. In order for the active capability to be useful for a large class of advanced applications, it is necessary to go beyond what has been proposed/developed in the literature. Specifically, the extensions needed beyond the current state-of-the-art active capability are: (i) support active capability for non-database applications as well, (ii) support active capability for distributed environments; that is, allow ECA across applications, and (iii) support active capability for heterogeneous sources of events (whether they are databases or not). The authors address how they are planning on addressing some of the above extensions using a combination of existing components (COTS) and new functionality/services that are culled from their experience in designing and implementing Sentinel.
{"title":"ECA rule support for distributed heterogeneous environments","authors":"Sharma Chakravarthy, R. Le","doi":"10.1109/ICDE.1998.655825","DOIUrl":"https://doi.org/10.1109/ICDE.1998.655825","url":null,"abstract":"The utility and functionality of active capability (event-condition-action or ECA rules) has been well established in the context of databases. Today, most of the commercial relational database management systems (RDBMSs) offer some form of ECA rule capability. In addition, there are several research prototypes that have extended the ECA rule capability to object-oriented database management systems (OODBMSs). Sentinel, developed at the University of Florida is one such prototype that supports an expressive composite event specification language (Snoop), efficient event detection (using generated wrappers), conditions and actions (as a combination of OQL and C++), multiple and cascaded rule processing (using a rule scheduler and nested transactions), a visualization tool, and an editor for dynamic creation and management of rules. In order for the active capability to be useful for a large class of advanced applications, it is necessary to go beyond what has been proposed/developed in the literature. Specifically, the extensions needed beyond the current state-of-the-art active capability are: (i) support active capability for non-database applications as well, (ii) support active capability for distributed environments; that is, allow ECA across applications, and (iii) support active capability for heterogeneous sources of events (whether they are databases or not). The authors address how they are planning on addressing some of the above extensions using a combination of existing components (COTS) and new functionality/services that are culled from their experience in designing and implementing Sentinel.","PeriodicalId":264926,"journal":{"name":"Proceedings 14th International Conference on Data Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1998-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133684044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1997-12-01DOI: 10.1109/ICDE.1998.655791
A. Gupta, Venky Harinarayan, A. Rajaraman
Virtual database (VDB) technology makes external data behave as an extension of an enterprise's relational database (RDBMS) system. VDB technology enables the rapid deployment of applications with at least one of the following characteristics: large numbers of data sources; data sources that are autonomous (i.e. there is no centralized control); or data sources that can have a mixture of structured and unstructured data. The World Wide Web and most intranets have all of these characteristics and can thus benefit from VDB technology.
{"title":"Virtual database technology","authors":"A. Gupta, Venky Harinarayan, A. Rajaraman","doi":"10.1109/ICDE.1998.655791","DOIUrl":"https://doi.org/10.1109/ICDE.1998.655791","url":null,"abstract":"Virtual database (VDB) technology makes external data behave as an extension of an enterprise's relational database (RDBMS) system. VDB technology enables the rapid deployment of applications with at least one of the following characteristics: large numbers of data sources; data sources that are autonomous (i.e. there is no centralized control); or data sources that can have a mixture of structured and unstructured data. The World Wide Web and most intranets have all of these characteristics and can thus benefit from VDB technology.","PeriodicalId":264926,"journal":{"name":"Proceedings 14th International Conference on Data Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1997-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127369244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}