AN EFFICIENT LOG-BASED CRASH RECOVERY SCHEME FOR NESTED TRANSACTIONS

被引:0
|
作者
SHIN, DC [1 ]
MOON, SC [1 ]
机构
[1] KOREA INST SCI & TECHNOL, CTR AI RES, SEOUL 130650, SOUTH KOREA
来源
MICROPROCESSING AND MICROPROGRAMMING | 1991年 / 31卷 / 1-5期
关键词
D O I
10.1016/S0165-6074(08)80052-X
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, an efficient recovery scheme for nested transactions using double log sequence numbers(LSNs) is proposed. Unlike previous recovery schemes, due to double LSNs, our recovery scheme is able to avoid unnecessary redos and subsequent undos. Furthermore, our scheme can cope with successive crashes which might occur during recovery. In addition, our scheme provides operation logging as well as value logging, which is required in order to allow semantically-rich lock modes. The recovery scheme based on the selective redo/undo consists of three passes: analysis, redo, and undo.
引用
收藏
页码:99 / 104
页数:6
相关论文
共 50 条
  • [41] UiLog: Improving Log-Based Fault Diagnosis by Log Analysis
    Zou, De-Qing
    Qin, Hao
    Jin, Hai
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2016, 31 (05) : 1038 - 1052
  • [42] Robust Log-Based Anomaly Detection on Unstable Log Data
    Zhang, Xu
    Xu, Yong
    Lin, Qingwei
    Qiao, Bo
    Zhang, Hongyu
    Dang, Yingnong
    Xie, Chunyu
    Yang, Xinsheng
    Cheng, Qian
    Li, Ze
    Chen, Junjie
    He, Xiaoting
    Yao, Randolph
    Lou, Jian-Guang
    Chintalapati, Murali
    Shen, Furao
    Zhang, Dongmei
    ESEC/FSE'2019: PROCEEDINGS OF THE 2019 27TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2019, : 807 - 817
  • [43] UiLog: Improving Log-Based Fault Diagnosis by Log Analysis
    De-Qing Zou
    Hao Qin
    Hai Jin
    Journal of Computer Science and Technology, 2016, 31 : 1038 - 1052
  • [44] A CONCURRENCY-CONTROL SCHEME FOR NESTED TRANSACTIONS
    SHIN, DC
    MOON, SC
    MICROPROCESSING AND MICROPROGRAMMING, 1989, 25 (1-5): : 233 - 238
  • [45] A key recovery attack on discrete log-based schemes using a prime order subgroup
    Lim, CH
    Lee, PJ
    ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 249 - 263
  • [46] Implementation and overhead analysis of a log-based intrusion recovery module on Linux file system
    Lee, JK
    Kim, HS
    2004 JOINT CONFERENCE OF THE 10TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS AND THE 5TH INTERNATIONAL SYMPOSIUM ON MULTI-DIMENSIONAL MOBILE COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 548 - 552
  • [47] A Two-Phase Log-based Fault Recovery Mechanism in Master/Worker based Computing Environment
    Chen, Ting
    Wang, Yongjian
    Huang, Yuanqiang
    Luo, Cheng
    Qian, Depei
    Luan, Zhongzhi
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 290 - 297
  • [48] Enhancing Automata Learning by Log-Based Metrics
    van den Bos, Petra
    Smetsers, Rick
    Vaandrager, Frits
    INTEGRATED FORMAL METHODS (IFM 2016), 2016, 9681 : 295 - 310
  • [49] The Research of Log-Based Network Monitoring System
    Zhang, Li
    ADVANCES IN INTELLIGENT SYSTEMS, 2012, 138 : 315 - 320
  • [50] Process replication with log-based amnesia support
    de Juan-Marin, Ruben
    Irun-Briz, Luis
    Munoz-Escoi, Francesc D.
    ISPDC 2007: SIXTH INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED COMPUTING, PROCEEDINGS, 2007, : 367 - +