Database system implementation:
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Upper Saddle River, NJ
Prentice Hall
2000
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XV, 653 S. Ill., graph. Darst. |
ISBN: | 0130402648 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV012649116 | ||
003 | DE-604 | ||
005 | 20050715 | ||
007 | t | ||
008 | 990707s2000 ad|| |||| 00||| eng d | ||
020 | |a 0130402648 |9 0-13-040264-8 | ||
035 | |a (OCoLC)246213558 | ||
035 | |a (DE-599)BVBBV012649116 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-739 |a DE-29T |a DE-634 |a DE-188 | ||
050 | 0 | |a QA76.9.D3 | |
082 | 0 | |a 005.74 | |
084 | |a ST 270 |0 (DE-625)143638: |2 rvk | ||
100 | 1 | |a Garcia-Molina, Hector |e Verfasser |4 aut | |
245 | 1 | 0 | |a Database system implementation |c by Hector Garcia-Molina ; Jeffrey Ullman ; Jennifer Widom |
264 | 1 | |a Upper Saddle River, NJ |b Prentice Hall |c 2000 | |
300 | |a XV, 653 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Implementierung - Datenbanksystem | |
650 | 0 | 7 | |a Datenbanksystem |0 (DE-588)4113276-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Implementierung |g Informatik |0 (DE-588)4026663-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenbanksystem |0 (DE-588)4113276-2 |D s |
689 | 0 | 1 | |a Implementierung |g Informatik |0 (DE-588)4026663-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Ullman, Jeffrey D. |d 1942- |e Verfasser |0 (DE-588)123598230 |4 aut | |
700 | 1 | |a Widom, Jennifer |e Verfasser |4 aut | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008593666&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-008593666 |
Datensatz im Suchindex
_version_ | 1804127305932472320 |
---|---|
adam_text | Titel: Database system implementation
Autor: Garcia-Molina, Hector
Jahr: 2000
Table of Contents
1 Introduction to DBMS Implementation I
1.1 Introducing: The Megatron 2000 Database System................2
1.1.1 Megatron 2000 Implementation Details ....................2
1.1.2 How Megatron 2000 Executes Queries......................4
1.1.3 What s Wrong With Megatron 2000?........................5
1.2 Overview of a Database Management System......................6
1.2.1 Data-Definition Language Commands......................6
1.2.2 Overview of Query Processing................................8
1.2.3 Main-Memory Buffers and the Buffer Manager............8
1.2.4 Transaction Processing........................................9
1.2.5 The Query Processor..........................................10
1.3 Outline of This Book..................................................11
1.3.1 Prerequisites..................................................11
1.3.2 Storage-Management Overview..............................12
1.3.3 Query-Processing Overview..................................13
1.3.4 Transaction-Processing Overview............................13
1.3.5 Information Integration Overview............................13
1.4 Review of Database Models and Languages........................14
1.4.1 Relational Model Review ....................................14
1.4.2 SQL Review ..................................................15
1.4.3 Relational and Object-Oriented Data ......................18
1.5 Summary of Chapter 1................................................19
1.6 References for Chapter 1..............................................20
2 Data Storage 21
2.1 The Memory Hierarchy ..............................................22
2.1.1 Cache.............................22
2.1.2 Main Memory.........................23
2.1.3 Virtual Memory ..............................................24
2.1.4 Secondary Storage............................................25
2.1.5 Tertiary Storage..............................................27
2.1.6 Volatile and Nonvolatile Storage............................28
2.1.7 Exercises for Section 2.1......................................29
v
TABLE OF CO A TEX
2.2 Disks.............................
2.2.1 Mechanics of Disks......................
2.2.2 The Disk Controller.....................
2.2.3 Disk Storage Characteristics.................
2.2.4 Disk Access Characteristics.................
2.2.5 Writing Blocks........................
2.2.G Modifying Blocks.......................
2.2.7 Exercises for Section 2.2...................
2.3 Using Secondary Storage Effectively................
2.3.1 The I/O Model of Computation ..............
2.3.2 Sorting Data in Secondary Storage.............
2.3.3 Merge-Sort..........................
2.3.4 Two-Phase, Multiway Merge-Sort..............
2.3.5 Extension of Multiway Merging to Larger Relations . . .
2.3.G Exercises for Section 2.3...................
2.4 Improving the Access Time of Secondary Storage.........
2.4.1 Organizing Data by Cylinders................
2.4.2 Using Multiple Disks.....................
2.1.3 Mirroring Disks........................
2.4.4 Disk Scheduling and the Elevator Algorithm .......
2.4.5 Prefetching and Large-Scale Buffering...........
2.4.G Summary of Strategies and Tradeoffs............
2.4.7 Exercises for Section 2.4...................
2.5 Disk Failures.............................
2.5.1 Intermittent Failures.....................
2.5.2 Checksums..........................
2.5.3 Stable Storage........................
2.5.4 Error-Handling Capabilities of Stable Storage.......
2.5.5 Exercises for Section 2.5...................
2.G Recovery from Disk Crashes.....................
2.G.1 The Failure Model for Disks.................
2.G.2 Mirroring as a Redundancy Technique...........
2.G.3 Parity Blocks.........................
2.G.4 An Improvement: RAID 5..................
2.G.5 Coping With Multiple Disk Crashes............
2.G.G Exercises for Section 2.G...................
2.7 Summary of Chapter 2........................
2.8 References for Chapter 2.......................
Representing Data Elements
3.1 Data Elements and Fields.....................
3.1.1 Representing Relational Database Elements........
3.1.2 Representing Objects ..................
3.1.3 Representing Data Elements ................
3.2 Records..........
TS
30
30
32
32
34
38
39
39
40
41
42
43
44
47
48
49
51
52
53
54
58
59
G1
G3
G3
G4
G5
6G
G7
67
67
68
G9
73
73
77
80
82
83
83
84
85
8G
90
TABLE OF CONTENTS vii
3.2.1 Building Fixed-Length Records..............................91
3.2.2 Record Headers................................................93
3.2.3 Packing Fixed-Length Records into Blocks..................94
3.2.4 Exercises for Section 3.2......................................95
3.3 Representing Block and Record Addresses............. 96
3.3.1 Client-Server Systems.................... 97
3.3.2 Logical and Structured Addresses.............. 98
3.3.3 Pointer Swizzling....................... 99
3.3.4 Returning Blocks to Disk..................104
3.3.5 Pinned Records and Blocks.................105
3.3.6 Exercises for Section 3.3...................105
3.4 Variable-Length Data and Records.................108
3.4.1 Records With Variable-Length Fields ...........108
3.4.2 Records With Repeating Fields...............109
3.4.3 Variable-Format Records ..................Ill
3.4.4 Records That Do Not Fit in a Block............112
3.4.5 BLOBS............................114
3.4.6 Exercises for Section 3.4...................115
3.5 Record Modifications.........................116
3.5.1 Insertion............................116
3.5.2 Deletion............................118
3.5.3 Update............................119
3.5.4 Exercises for Section 3.5...................119
3.6 Summary of Chapter 3........................120
3.7 References for Chapter 3.......................122
4 Index Structures 123
4.1 Indexes on Sequential Files .....................124
4.1.1 Sequential Files........................124
4.1.2 Dense Indexes.........................125
4.1.3 Sparse Indexes........................128
4.1.4 Multiple Levels of Index...................129
4.1.5 Indexes With Duplicate Search Keys............131
4.1.6 Managing Indexes During Data Modifications.......133
4.1.7 Exercises for Section 4.1...................140
4.2 Secondary Indexes..........................142
4.2.1 Design of Secondary Indexes ................142
4.2.2 Applications of Secondary Indexes.............144
4.2.3 Indirection in Secondary Indexes..............145
4.2.4 Document Retrieval and Inverted Indexes.........148
4.2.5 Exercises for Section 4.2...................151
4.3 B-TYees................................154
4.3.1 The Structure of B-trees...................154
4.3.2 Applications of B-trees....................157
4.3.3 Lookup in B-Trees......................159
viii
TABLE OF CONTESTS
^ .....1G0
4.3.4 Range Queries................
4.3.5 Insertion Into B-Trees....................
4.3.G Deletion From B-Trees....................
4.3.7 Efficiency of B-Trecs.....................
4.3.8 Exercises for Section 4.3...................
4.4 Hash Tables..............................
4.4.1 Secondary-Storage Hash Tables...............
4.4.2 Insertion Into a Hash Table.................
4.4.3 Hash-Table Deletion.....................
4.4.4 Efficiency of Hash Table Indexes..............173
4.4.5 Extensible Hash Tables...................174
4.4.6 Insertion Into Extensible Hash Tables...........175
4.4.7 Linear Hash Tables......................1
4.4.8 Insertion Into Linear Hash Tables .............ISO
4.4.9 Exercises for Section 4.4...................182
4.5 Summary of Chapter 4........................184
4.G References for Chapter 4.......................185
5 Multidimensional Indexes 187
5.1 Applications Needing Multiple Dimensions.............188
5.1.1 Geographic Information Systems..............188
5.1.2 Data Cubes..........................189
5.1.3 Multidimensional Queries in SQL..............190
5.1.4 Executing Range Queries Using Conventional Indexes . . 192
5.1.5 Executing Nearest-Neighbor Queries Using Conventional
Indexes............................193
5.1.G Other Limitations of Conventional Indexes ........195
5.1.7 Overview of Multidimensional Index Structures......195
5.1.8 Exercises for Section 5.1...................19G
5.2 Hash-Like Structures for Multidimensional Data .........197
5.2.1 Grid Files...........................198
5.2.2 Lookup in a Grid File....................198
5.2.3 Insertion Into Grid Files...................199
5.2.4 Performance of Grid Files..................201
5.2.5 Partitioned Hash Functions.................204
5.2.G Comparison of Grid Files and Partitioned Hashing .... 205
5.2.7 Exercises for Section 5.2...................20G
5.3 Tree-Like Structures for Multidimensional Data..........209
5.3.1 Multiple-Key Indexes ....................209
5.3.2 Performance of Multiple-Key Indexes............211
5.3.3 kd-Trees..................................212
5.3.4 Operations on fcd-Trees................ 213
5.3.5 Adapting Trees to Secondary Storage..........21G
5.3.G Quad Trees......................217
5.3.7 R-Trees...........!!!!!!!!!!!......219
TABLE OF CONTENTS ix
5.3.8 Operations on R-trees....................219
5.3.9 Exercises for Section 5.3...................222
5.4 Bitmap Indexes............................225
5.4.1 Motivation for Bitmap Indexes...............225
5.4.2 Compressed Bitmaps.....................227
5.4.3 Operating on Run-Length-Encoded Bit-Vectors......229
5.4.4 Managing Bitmap Indexes..................230
5.4.5 Exercises for Section 5.4...................232
5.5 Summary of Chapter 5........................233
5.G References for Chapter 5.......................234
6 Query Execution 237
0.1 An Algebra for Queries .......................240
0.1.1 Union, Intersection, and Difference.............241
0.1.2 The Selection Operator...................242
0.1.3 The Projection Operator ..................244
0.1.4 The Product of Relations..................245
0.1.5 Joins..............................240
0.1.0 Duplicate Elimination....................248
0.1.7 Grouping and Aggregation .................248
0.1.8 The Sorting Operator....................251
0.1.9 Expression Trees.......................252
0.1.10 Exercises for Section 0.1...................254
0.2 Introduction to Physical-Query-Plan Operators..........257
0.2.1 Scanning Tables .......................257
0.2.2 Sorting While Scanning Tables...............258
0.2.3 The Model of Computation for Physical Operators .... 258
0.2.4 Parameters for Measuring Costs ..............259
0.2.5 I/O Cost for Scan Operators................200
0.2.0 Iterators for Implementation of Physical Operators .... 201
0.3 One-Pass Algorithms for Database Operations ..........204
0.3.1 One-Pass Algorithms for Tuple-at-a-Time Operations . . 200
0.3.2 One-Pass Algorithms for Unary, Full-Relation Operations 207
0.3.3 One-Pass Algorithms for Binary Operations........270
0.3.4 Exercises for Section 0.3...................273
6.4 Nested-Loop Joins..........................274
6.4.1 Tuple-Based Nested-Loop Join...............275
6.4.2 An Iterator for Tuple-Based Nested-Loop Join ......275
6.4.3 A Block-Based Nested-Loop Join Algorithm........275
6.4.4 Analysis of Nested-Loop Join................278
6.4.5 Summary of Algorithms so Far...............278
6.4.6 Exercises for Section 6.4...................278
6.5 Two-Pass Algorithms Based on Sorting ..............279
6.5.1 Duplicate Elimination Using Sorting............280
0.5.2 Grouping and Aggregation Using Sorting.........282
X
TABLE OF CONTENTS
6.5.3 A Sort-Based Union Algorithm...............
6.5.4 Sort-Based Algorithms for Intersection and Difference . . 284
6.5.5 A Simple Sort-Based Join Algorithm............286
6.5.6 Analysis of Simple Sort-Join ................287
6.5.7 A More Efficient Sort-Based Join..............288
6.5.8 Summary of Sort-Based Algorithms ............289
6.5.9 Exercises for Section 6.5...................289
6.6 Two-Pass Algorithms Based on Hashing..............291
6.6.1 Partitioning Relations by Hashing.............292
6.6.2 A Hash-Based Algorithm for Duplicate Elimination ... 293
6.6.3 A Hash-Based Algorithm for Grouping and Aggregation . 293
6.6.4 Hash-Based Algorithms for Union, Intersection, and Dif-
ference .............................294
6.6.5 The Hash-Join Algorithm..................294
6.6.6 Saving Some Disk I/O s...................295
6.6.7 Summary of Hash-Based Algorithms............297
6.6.8 Exercises for Section 6.6...................298
6.7 Index-Based Algorithms.......................299
6.7.1 Clustering and Nonclustering Indexes...........299
6.7.2 Index-Based Selection....................300
6.7.3 Joining by Using an Index..................303
6.7.4 Joins Using a Sorted Index.................304
6.7.5 Exercises for Section 6.7...................306
6.8 Buffer Management..........................307
6.8.1 Buffer Management Architecture..............307
6.8.2 Buffer Management Strategies ...............308
6.8.3 The Relationship Between Physical Operator Selection
and Buffer Management...................310
6.8.4 Exercises for Section 6.8...................312
6.9 Algorithms Using More Than Two Passes.............313
6.9.1 Multipass Sort-Based Algorithms..............313
6.9.2 Performance of Multipass, Sort-Based Algorithms .... 314
6.9.3 Multipass Hash-Based Algorithms.............315
6.9.4 Performance of Multipass Hash-Based Algorithms .... 315
6.9.5 Exercises for Section 6.9...................316
6.10 Parallel Algorithms for Relational Operations...........317
6.10.1 Models of Parallelism ....................317
6.10.2 Tuple-at-a-Time Operations in Parallel...........320
6.10.3 Parallel Algorithms for Full-Relation Operations.....321
6.10.4 Performance of Parallel Algorithms.............322
6.10.5 Exercises for Section 6.10.................324
6.11 Summary of Chapter 6................................325
6.12 References for Chapter 6................. * 327
TABLE OF CONTENTS xi
7 The Query Compiler 329
7.1 Parsing ................................330
7.1.1 Syntax Analysis and Parse Trees..............330
7.1.2 A Grammar for a Simple Subset of SQL..........331
7.1.3 The Preprocessor.......................336
7.1.4 Exercises for Section 7.1...................337
7.2 Algebraic Laws for Improving Query Plans ............337
7.2.1 Commutative and Associative Laws ............338
7.2.2 Laws Involving Selection...................340
7.2.3 Pushing Selections......................343
7.2.4 Laws Involving Projection..................345
7.2.5 Laws About Joins and Products..............348
7.2.6 Laws Involving Duplicate Elimination...........348
7.2.7 Laws Involving Grouping and Aggregation.........349
7.2.8 Exercises for Section 7.2...................351
7.3 From Parse Trees to Logical Query Plans .............354
7.3.1 Conversion to Relational Algebra..............354
7.3.2 Removing Subqueries From Conditions...........355
7.3.3 Improving the Logical Query Plan.............362
7.3.4 Grouping Associative/Commutative Operators......364
7.3.5 Exercises for Section 7.3...................365
7.4 Estimating the Cost of Operations.................366
7.4.1 Estimating Sizes of Intermediate Relations ........367
7.4.2 Estimating the Size of a Projection.............368
7.4.3 Estimating the Size of a Selection..............369
7.4.4 Estimating the Size of a Join................371
7.4.5 Natural Joins With Multiple Join Attributes .......374
7.4.6 Joins of Many Relations...................375
7.4.7 Estimating Sizes for Other Operations...........378
7.4.8 Exercises for Section 7.4...................379
7.5 Introduction to Cost-Based Plan Selection.............380
7.5.1 Obtaining Estimates for Size Parameters..........381
7.5.2 Incremental Computation of Statistics...........384
7.5.3 Heuristics for Reducing the Cost of Logical Query Plans . 385
7.5.4 Approaches to Enumerating Physical Plans........388
7.5.5 Exercises for Section 7.5...................391
7.6 Choosing an Order for Joins.....................393
7.6.1 Significance of Left and Right Join Arguments......393
7.6.2 Join Trees...........................394
7.6.3 Left-Deep Join Trees.....................395
7.6.4 Dynamic Programming to Select a Join Order and Grouping398
7.6.5 Dynamic Programming With More Detailed Cost Functions402
7.6.6 A Greedy Algorithm for Selecting a Join Order......403
7.6.7 Exercises for Section 7.6...................404
7.7 Completing the Physical-Query-PIan Selection ..........406
TABLE OF CONTENTS
7.7.1 Choosing a Selection Method................^
7.7.2 Choosing a Join Method...................
7.7.3 Pipelining Versus Materialization.............
7.7.4 Pipelining Unary Operations................
7.7.5 Pipelining Binary Operations................
7.7.6 Notation for Physical Query Plans.............
7.7.7 Ordering of Physical Operations..............417
7.7.8 Exercises for Section 7.7...................4^
7.8 Summary of Chapter 7........................
7.9 References for Chapter ........................
Coping With System Failures 4^3
8-1 Issues and Models for Resilient Operation.............424
8.1.1 Failure Modes.........................4^4
8.1.2 More About Transactions..................42^
8.1.3 Correct Execution of Transactions.............427
8.1.4 The Primitive Operations of Transactions.........429
8.1.5 Exercises for Section 8.1...................4^2
8.2 Undo Logging.............................4^2
8.2.1 Log Records..........................4^3
8.2.2 The Undo-Logging Rules ..................434
8.2.3 Recovery Using Undo Logging ...............436
8.2.4 Checkpointing ........................439
8.2.5 Nonquiescent Checkpointing.................440
8.2.6 Exercises for Section 8.2...................444
8.3 Redo Logging.............................445
8.3.1 The Redo-Logging Rule...................446
8.3.2 Recovery With Redo Logging................447
8.3.3 Checkpointing a Redo Log..................448
8.3.4 Recovery With a Checkpointed Redo Log.........450
8.3.5 Exercises for Section 8.3...................451
8.4 Undo/Redo Logging.........................451
8.4.1 The Undo/Redo Rules....................452
8.4.2 Recovery With Undo/Redo Logging............453
8.4.3 Checkpointing an Undo/Redo Log.............454
8.4.4 Exercises for Section 8.4...................456
8.5 Protecting Against Media Failures.................457
8.5.1 The Archive..........................458
8.5.2 Nonquiescent Archiving...................459
8.5.3 Recovery Using an Archive and Log............461
8.5.4 Exercises for Section 8.5...................462
8.6 Summary of Chapter 8...........................
8.7 References for Chapter 8.......................4^4
TABLE OF CONTENTS xiii
9 Concurrency Control 467
9.1 Serial and Serializable Schedules..................468
9.1.1 Schedules...........................468
9.1.2 Serial Schedules........................469
9.1.3 Serializable Schedules ....................470
9.1.4 The Effect of Transaction Semantics............471
9.1.5 A Notation for Transactions and Schedules........473
9.1.6 Exercises for Section 9.1...................474
9.2 Conflict-Serializability........................475
9.2.1 Conflicts............................475
9.2.2 Precedence Graphs and a Test for Conflict-Serializability 476
9.2.3 Why the Precedence-Graph Test Works..........479
9.2.4 Exercises for Section 9.2...................481
9.3 Enforcing Serializability by Locks..................483
9.3.1 Locks.............................483
9.3.2 The Locking Scheduler....................485
9.3.3 Two-Phase Locking .....................486
9.3.4 Why Two-Phase Locking Works ..............487
9.3.5 Exercises for Section 9.3...................488
9.4 Locking Systems With Several Lock Modes............490
9.4.1 Shared and Exclusive Locks.................491
9.4.2 Compatibility Matrices ...................493
9.4.3 Upgrading Locks.......................494
9.4.4 Update Locks.........................495
9.4.5 Increment Locks.......................497
9.4.6 Exercises for Section 9.4...................499
9.5 An Architecture for a Locking Scheduler..............502
9.5.1 A Scheduler That Inserts Lock Actions ..........502
9.5.2 The Lock Table........................504
9.5.3 Exercises for Section 9.5...................507
9.6 Managing Hierarchies of Database Elements............508
9.6.1 Locks With Multiple Granularity..............508
9.6.2 Warning Locks........................509
9.6.3 Phantoms and Handling Insertions Correctly.......512
9.6.4 Exercises for Section 9.6...................514
9.7 The Tree Protocol..........................514
9.7.1 Motivation for Tree-Based Locking.............514
9.7.2 Rules for Access to Tree-Structured Data.........515
9.7.3 Why the Tree Protocol Works................516
9.7.4 Exercises for Section 9.7...................520
9.8 Concurrency Control by Timestamps................521
9.8.1 Timestamps..........................521
9.8.2 Physically Unrealizable Behaviors .............522
9.8.3 Problems With Dirty Data.................523
9.8.4 The Rules for Timestamp-Based Scheduling........525
xiv
TABLE OF CONTEXTS
9.8.5 Multiversion Timestamps..................^
9.8.6 Timestamps and Locking..................j?
9.8.7 Exercises for Section ......................
9 9 Concurrency Control by Validation.............¦
9.9.1 Architecture of a Validation-Based Scheduler.......odl
9 9.2 The Validation Rules.....................9!!?
9.9.3 Comparison of Three Concurrency-Control Mechanisms . a3a
9.9.4 Exercises for Section 9.9...................
9.10 Summary of Chapter .........................^
9.11 References for Chapter ........................ ad J
10 More About Transaction Management * 41
10.1 Transactions that Read Uncommitted Data............* 41
10.1.1 The Dirty-Data Problem..................-
10.1.2 Cascading Rollback .....................* 44
10.1.3 Managing Rollbacks....................¦ 545
10.1.4 Group Commit........................^ 46
10.1.5 Logical Logging........................548
10.1.6 Exercises for Section 10.1..................551
10-2 View Serializability..........................552
10.2.1 View Equivalence.......................552
10.2.2 Polygraphs and the Test for Vicw-Serializability .....553
10.2.3 Testing for Vicw-Serializability...............55G
10.2.4 Exercises for Section 10.2..................557
10.3 Resolving Deadlocks.........................558
10.3.1 Deadlock Detection by Timeout ..............558
10.3.2 The Waits-For Graph....................559
10.3.3 Deadlock Prevention by Ordering Elements........561
10.3.4 Detecting Deadlocks by Timestamps............563
10.3.5 Comparison of Deadlock-Management Methods......506
10.3.6 Exercises for Section 10.3..................566
10.4 Distributed Databases........................568
10.4.1 Distribution of Data.....................568
10.4.2 Distributed Transactions...................570
10.4.3 Data Replication.......................570
10.4.4 Distributed Query Optimization..............571
10.4.5 Exercises for Section 10.4..................572
10.5 Distributed Commit.........................572
10.5.1 Supporting Distributed Atomicity.............573
10.5.2 Two-Phase Commit.....................573
10.5.3 Recovery of Distributed Transactions............576
10.5.4 Exercises for Section 10.5..................578
10.6 Distributed Locking.......................579
10.6.1 Centralized Lock Systems..................579
10.6.2 A Cost Model for Distributed Locking Algorithms .... 579
TABLE OF CONTENTS xv
10.6.3 Locking Replicated Elements................581
10.6.4 Primary-Copy Locking....................581
10.6.5 Global Locks From Local Locks...............582
10.6.6 Exercises for Section 10.6..................584
10.7 Long-Duration Transactions.....................584
10.7.1 Problems of Long Transactions...............585
10.7.2 Sagas.............................587
10.7.3 Compensating Transactions.................588
10.7.4 Why Compensating Transactions Work..........590
10.7.5 Exercises for Section 10.7..................590
10.8 Summary of Chapter 10.......................591
10.9 References for Chapter 10......................593
11 Information Integration 595
11.1 Modes of Information Integration..................595
11.1.1 Problems of Information Integration............596
11.1.2 Federated Database Systems................597
11.1.3 Data Warehouses.......................599
11.1.4 Mediators...........................601
11.1.5 Exercises for Section 11.1..................604
11.2 Wrappers in Mediator-Based Systems ...............605
11.2.1 Templates for Query Patterns................606
11.2.2 Wrapper Generators.....................607
11.2.3 Filters.............................608
11.2.4 Other Operations at the Wrapper .............610
11.2.5 Exercises for Section 11.2..................611
11.3 On-Line Analytic Processing ....................612
11.3.1 OLAP Applications .....................613
11.3.2 A Multidimensional View of OLAP Data.........614
11.3.3 Star Schemas.........................615
11.3.4 Slicing and Dicing......................618
11.3.5 Exercises for Section 11.3..................620
11.4 Data Cubes..............................621
11.4.1 The Cube Operator.....................622
11.4.2 Cube Implementation by Materialized Views.......625
11.4.3 The Lattice of Views.....................628
11.4.4 Exercises for Section 11.4..................630
11.5 Data Mining .............................632
11.5.1 Data-Mining Applications..................632
11.5.2 Association-Rule Mining...................635
11.5.3 The A-Priori Algorithm...................636
11.6 Summary of Chapter 11.......................639
11.7 References for Chapter 11......................640
Index 643
|
any_adam_object | 1 |
author | Garcia-Molina, Hector Ullman, Jeffrey D. 1942- Widom, Jennifer |
author_GND | (DE-588)123598230 |
author_facet | Garcia-Molina, Hector Ullman, Jeffrey D. 1942- Widom, Jennifer |
author_role | aut aut aut |
author_sort | Garcia-Molina, Hector |
author_variant | h g m hgm j d u jd jdu j w jw |
building | Verbundindex |
bvnumber | BV012649116 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.D3 |
callnumber-search | QA76.9.D3 |
callnumber-sort | QA 276.9 D3 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 270 |
ctrlnum | (OCoLC)246213558 (DE-599)BVBBV012649116 |
dewey-full | 005.74 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.74 |
dewey-search | 005.74 |
dewey-sort | 15.74 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01595nam a2200397 c 4500</leader><controlfield tag="001">BV012649116</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20050715 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">990707s2000 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0130402648</subfield><subfield code="9">0-13-040264-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)246213558</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV012649116</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.D3</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.74</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 270</subfield><subfield code="0">(DE-625)143638:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Garcia-Molina, Hector</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Database system implementation</subfield><subfield code="c">by Hector Garcia-Molina ; Jeffrey Ullman ; Jennifer Widom</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, NJ</subfield><subfield code="b">Prentice Hall</subfield><subfield code="c">2000</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 653 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Implementierung - Datenbanksystem</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenbanksystem</subfield><subfield code="0">(DE-588)4113276-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Implementierung</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4026663-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenbanksystem</subfield><subfield code="0">(DE-588)4113276-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Implementierung</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4026663-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ullman, Jeffrey D.</subfield><subfield code="d">1942-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)123598230</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Widom, Jennifer</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008593666&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-008593666</subfield></datafield></record></collection> |
id | DE-604.BV012649116 |
illustrated | Illustrated |
indexdate | 2024-07-09T18:31:15Z |
institution | BVB |
isbn | 0130402648 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-008593666 |
oclc_num | 246213558 |
open_access_boolean | |
owner | DE-739 DE-29T DE-634 DE-188 |
owner_facet | DE-739 DE-29T DE-634 DE-188 |
physical | XV, 653 S. Ill., graph. Darst. |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | Prentice Hall |
record_format | marc |
spelling | Garcia-Molina, Hector Verfasser aut Database system implementation by Hector Garcia-Molina ; Jeffrey Ullman ; Jennifer Widom Upper Saddle River, NJ Prentice Hall 2000 XV, 653 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Implementierung - Datenbanksystem Datenbanksystem (DE-588)4113276-2 gnd rswk-swf Implementierung Informatik (DE-588)4026663-1 gnd rswk-swf Datenbanksystem (DE-588)4113276-2 s Implementierung Informatik (DE-588)4026663-1 s DE-604 Ullman, Jeffrey D. 1942- Verfasser (DE-588)123598230 aut Widom, Jennifer Verfasser aut HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008593666&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Garcia-Molina, Hector Ullman, Jeffrey D. 1942- Widom, Jennifer Database system implementation Implementierung - Datenbanksystem Datenbanksystem (DE-588)4113276-2 gnd Implementierung Informatik (DE-588)4026663-1 gnd |
subject_GND | (DE-588)4113276-2 (DE-588)4026663-1 |
title | Database system implementation |
title_auth | Database system implementation |
title_exact_search | Database system implementation |
title_full | Database system implementation by Hector Garcia-Molina ; Jeffrey Ullman ; Jennifer Widom |
title_fullStr | Database system implementation by Hector Garcia-Molina ; Jeffrey Ullman ; Jennifer Widom |
title_full_unstemmed | Database system implementation by Hector Garcia-Molina ; Jeffrey Ullman ; Jennifer Widom |
title_short | Database system implementation |
title_sort | database system implementation |
topic | Implementierung - Datenbanksystem Datenbanksystem (DE-588)4113276-2 gnd Implementierung Informatik (DE-588)4026663-1 gnd |
topic_facet | Implementierung - Datenbanksystem Datenbanksystem Implementierung Informatik |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008593666&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT garciamolinahector databasesystemimplementation AT ullmanjeffreyd databasesystemimplementation AT widomjennifer databasesystemimplementation |