Database Systems (TODS)


Search Issue
enter search term and/or author name


ACM Transactions on Database Systems (TODS), Volume 6 Issue 2, June 1981

On optimistic methods for concurrency control
H. T. Kung, John T. Robinson
Pages: 213-226
DOI: 10.1145/319566.319567
Most current approaches to concurrency control in database systems rely on locking of data objects as a control mechanism. In this paper, two families of nonlocking concurrency controls are presented. The methods used are...

Processor allocation strategies for multiprocessor database machines
Haran Boral, David J. DeWitt
Pages: 227-254
DOI: 10.1145/319566.319570
In this paper four alternative strategies for assigning processors to queries in multiprocessor database machines are described and evaluated. The results demonstrate that SIMD database machines are indeed a poor design when their performance is...

Transformation of data traversals and operations in application programs to account for semantic changes of databases
Stanley Y. W. Su, Herman Lam, Der Her Lo
Pages: 255-294
DOI: 10.1145/319566.319573
This paper addresses the problem of application program conversion to account for changes in database semantics that result in changes in the schema and database contents. With the observation that the existing data models can be viewed as...

Design of an external schema facility to define and process recursive structures
Eric K. Clemons
Pages: 295-311
DOI: 10.1145/319566.319576
The role of the external schema is to support user views of data and thus to provide programmers with easier data access. This author believes that an external schema facility is best based on hierarchies, both simple and recursive. After a...

A database encryption system with subkeys
George I. Davida, David L. Wells, John B. Kam
Pages: 312-328
DOI: 10.1145/319566.319580
A new cryptosystem that is suitable for database encryption is presented. The system has the important property of having subkeys that allow the encryption and decryption of fields within a record. The system is based on the Chinese Remainder...

An improved third normal form for relational databases
Tok-Wang Ling, Frank W. Tompa, Tiko Kameda
Pages: 329-346
DOI: 10.1145/319566.319583
In this paper, we show that some Codd third normal form relations may contain “superfluous” attributes because the definitions of transitive dependency and prime attribute are inadequate when applied to sets of relations. To correct...

Comments on SDD-1 concurrency control mechanisms
Gordon McLean, Jr.
Pages: 347-350
DOI: 10.1145/319566.319585