The notions of consistency and predicate locks in a database system
Communications of the ACM
SAX2
Transaction Processing: Concepts and Techniques
Transaction Processing: Concepts and Techniques
XMLTM: efficient transaction management for XML documents
Proceedings of the eleventh international conference on Information and knowledge management
DataGuides: Enabling Query Formulation and Optimization in Semistructured Databases
VLDB '97 Proceedings of the 23rd International Conference on Very Large Data Bases
VLDB '90 Proceedings of the 16th International Conference on Very Large Data Bases
Path Locks for XML Document Collaboration
WISE '02 Proceedings of the 3rd International Conference on Web Information Systems Engineering
Notes on Data Base Operating Systems
Operating Systems, An Advanced Course
Anatomy of a native XML base management system
The VLDB Journal — The International Journal on Very Large Data Bases
A Transaction Model for XML Databases
World Wide Web
Evaluating lock-based protocols for cooperation on XML documents
ACM SIGMOD Record
ORDPATHs: insert-friendly XML node labels
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Node labeling schemes for dynamic XML documents reconsidered
Data & Knowledge Engineering
XMark: a benchmark for XML data management
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
XDGL: XPath-based concurrency control protocol for XML data
BNCOD'05 Proceedings of the 22nd British National conference on Databases: enterprise, Skills and Innovation
Tailor-made lock protocols and their DBMS integration
SETMDM '08 Proceedings of the 2008 EDBT workshop on Software engineering for tailor-made data management
Implementing and Optimizing Fine-Granular Lock Management for XML Document Trees
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
The Real Performance Drivers behind XML Lock Protocols
DEXA '09 Proceedings of the 20th International Conference on Database and Expert Systems Applications
Tailor-made data management for embedded systems: A case study on Berkeley DB
Data & Knowledge Engineering
Algorithmic Verification with Multiple and Nested Parameters
ICFEM '09 Proceedings of the 11th International Conference on Formal Engineering Methods: Formal Methods and Software Engineering
Essential Performance Drivers in Native XML DBMSs
SOFSEM '10 Proceedings of the 36th Conference on Current Trends in Theory and Practice of Computer Science
Automated multiparameterised verification by cut-offs
ICFEM'10 Proceedings of the 12th international conference on Formal engineering methods and software engineering
Hi-index | 0.00 |
Processing XML documents in multi-user database management environments requires a suitable storage model, support of typical XML document processing (XDP) interfaces, and concurrency control mechanisms tailored to the XML data model. In this paper, we sketch our prototype native XML database system called XML Transaction Coordinator (XTC) and specify the operations for accessing and modifying stored documents. The key contribution is the design and optimization of fine-grained lock protocols supporting collaborative processing of XML documents. For this reason, we introduce four XML lock protocols of growing sophistication and complexity, which are based on a tree-structured DOM storage model. The lock modes of these protocols, called taDOM* lock protocols, are tailor-made for the operations of the DOM API. Because of the protocols' complexity, their correctness is not obvious; hence, we present the ideas to prove the lock protocol correctness guaranteeing the specified data processing behavior of the given XDP operations. Finally, using XTC as our testbed system, we run extensive performance measurements to empirically evaluate our lock protocols and to compare their performance behavior against all known fine-grained competitor protocols under the same benchmark in an identical system setting. It turns out that tailor-made optimization pays off and that the taDOM* protocols are the clear winners in our lock protocol contest.