ACM SIGMOD RecordPub Date : 2023-06-08DOI: https://dl.acm.org/doi/10.1145/3604437.3604446
Brecht Vandevoort, Bas Ketsman, Christoph Koch, Frank Neven
{"title":"When is it safe to run a transactional workload under Read Committed?","authors":"Brecht Vandevoort, Bas Ketsman, Christoph Koch, Frank Neven","doi":"https://dl.acm.org/doi/10.1145/3604437.3604446","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3604437.3604446","url":null,"abstract":"<p>The popular isolation level multiversion Read Committed (RC) exchanges some of the strong guarantees of serializability for increased transaction throughput. Nevertheless, transaction workloads can sometimes be executed under RC while still guaranteeing serializability at a reduced cost. Such workloads are said to be robust against RC. This paper provides a high level overview of deciding robustness against RC. In particular, we discuss how a sound and complete test can be obtained through the formalization of transaction templates. We then increase the modeling power of transaction templates by extending them with functional constraints which are useful for capturing data dependencies like foreign keys. We show that the incorporation of functional constraints can identify more workloads as robust than would otherwise be the case. Even though the robustness problem becomes undecidable in its most general form, we establish that various restrictions on functional constraints lead to decidable and even tractable results that can be used to model and test for robustness against RC for practical scenarios.</p>","PeriodicalId":501169,"journal":{"name":"ACM SIGMOD Record","volume":"250 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138510380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM SIGMOD RecordPub Date : 2023-06-08DOI: https://dl.acm.org/doi/10.1145/3604437.3604461
Graham Cormode
{"title":"Technical Perspective on 'R2T: Instance-optimal Truncation for Differentially Private Query Evaluation with Foreign Keys","authors":"Graham Cormode","doi":"https://dl.acm.org/doi/10.1145/3604437.3604461","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3604437.3604461","url":null,"abstract":"<p>Increased use of data to inform decision making has brought with it a rising awareness of the importance of privacy, and the need for appropriate mitigations to be put in place to protect the interests of individuals whose data is being processed. From the demographic statistics that are produced by national censuses, to the complex predictive models built by \"big tech\" companies, data is the fuel that powers these applications. A majority of such uses rely on data that is derived from the properties and actions of individual people. This data is therefore considered sensitive, and in need of protections to prevent inappropriate use or disclosure. Some protections come from enforcing policies, access control, and contractual agreements. But in addition, we also seek technical interventions: definitions and algorithms that can be applied by computer systems in order to protect the private information while still enabling the intended use.</p>","PeriodicalId":501169,"journal":{"name":"ACM SIGMOD Record","volume":"254 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138510365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM SIGMOD RecordPub Date : 2023-06-08DOI: https://dl.acm.org/doi/10.1145/3604437.3604456
Shangqi Lu, Wim Martens, Matthias Niewerth, Yufei Tao
{"title":"An Optimal Algorithm for Partial Order Multiway Search","authors":"Shangqi Lu, Wim Martens, Matthias Niewerth, Yufei Tao","doi":"https://dl.acm.org/doi/10.1145/3604437.3604456","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3604437.3604456","url":null,"abstract":"<p>Partial order multiway search (POMS) is an important problem that finds use in crowdsourcing, distributed file systems, software testing, etc. In this problem, a game is played between an algorithm A and an oracle, based on a directed acyclic graph G known to both parties. First, the oracle picks a vertex t in G called the target; then, A aims to figure out which vertex is t by probing reachability. In each probe, A selects a set Q of vertices in G whose size is bounded by a pre-agreed value k, and the oracle then reveals, for each vertex q 2 Q, whether q can reach the target in G. The objective of A is to minimize the number of probes. This article presents an algorithm to solve POMS in O(log1+k n + d k log1+d n) probes, where n is the number of vertices in G, and d is the largest out-degree of the vertices in G. The probing complexity is asymptotically optimal.</p>","PeriodicalId":501169,"journal":{"name":"ACM SIGMOD Record","volume":"253 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138510370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM SIGMOD RecordPub Date : 2023-06-08DOI: https://dl.acm.org/doi/10.1145/3604437.3604445
Alan D. Fekete
{"title":"Technical Perspective: When is it safe to run a transactional workload under Read Committed?","authors":"Alan D. Fekete","doi":"https://dl.acm.org/doi/10.1145/3604437.3604445","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3604437.3604445","url":null,"abstract":"<p>A data management platform provides many capabilities to assist the data owner, application coder, or end-user. For example, it should support an expressive query language, schema definition, and sophisticated access control. Another way many platforms add value is through a transaction mechanism, which allows the application programmer to indicate that a stretch of code, including multiple accesses to data, represents a single real-world activity and so all these steps should happen as if a single step, despite really being interleaved with other programs, or perhaps cancelled after partial execution. If the platform perfectly hides interleaving of different activities, the execution is called serializable, and this is a great aid to protecting data quality. Any integrity constraint over the data (whether explicitly declared in schema or not) which is preserved by each transaction running alone, is also valid at the end of any serializable execution of several transactions.</p>","PeriodicalId":501169,"journal":{"name":"ACM SIGMOD Record","volume":"250 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138510381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM SIGMOD RecordPub Date : 2023-06-08DOI: https://dl.acm.org/doi/10.1145/3604437.3604459
Andreas Kipf
{"title":"Technical Perspective: Revisiting Runtime Dynamic Optimization for Join Queries in Big Data Management Systems","authors":"Andreas Kipf","doi":"https://dl.acm.org/doi/10.1145/3604437.3604459","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3604437.3604459","url":null,"abstract":"<p>Query optimization is the process of finding an efficient query execution plan for a given SQL query. The runtime difference between a good and a bad plan can be tremendous. For example, in the case of TPC-H query 5, a query with 5 joins, the difference between the best and the worst plan is more than 10,000×. Therefore, it is vital to avoid bad plans. The dominating factor which differentiates a good from a bad plan is their join order and whether this join order avoids large intermediate results.</p>","PeriodicalId":501169,"journal":{"name":"ACM SIGMOD Record","volume":"253 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138510367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM SIGMOD RecordPub Date : 2023-06-08DOI: https://dl.acm.org/doi/10.1145/3604437.3604457
Dan Suciu
{"title":"Technical Perspective: Accurate Summary-based Cardinality Estimation Through the Lens of Cardinality Estimation Graphs","authors":"Dan Suciu","doi":"https://dl.acm.org/doi/10.1145/3604437.3604457","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3604437.3604457","url":null,"abstract":"<p>Query engines are really good at choosing an efficient query plan. Users don't need to worry about how they write their query, since the optimizer makes all the right choices for executing the query, while taking into account all aspects of data, such as its size, the characteristics of the storage device, the distribution pattern, the availability of indexes, and so on. The query optimizer always makes the best choice, no matter how complex the query is, or how contrived it was written. Or, this is what we expect today from a modern query optimizer. Unfortunately, reality is not as nice.</p>","PeriodicalId":501169,"journal":{"name":"ACM SIGMOD Record","volume":"253 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138510369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM SIGMOD RecordPub Date : 2023-06-08DOI: https://dl.acm.org/doi/10.1145/3604437.3604448
Qing Wang, Youyou Lu, Jiwu Shu
{"title":"Building Write-Optimized Tree Indexes on Disaggregated Memory","authors":"Qing Wang, Youyou Lu, Jiwu Shu","doi":"https://dl.acm.org/doi/10.1145/3604437.3604448","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3604437.3604448","url":null,"abstract":"<p>Memory disaggregation architecture physically separates CPU and memory into independent components, which are connected via high-speed RDMA networks, greatly improving resource utilization of database systems. However, such an architecture poses unique challenges to data indexing due to limited RDMA semantics and near-zero computation power at memory side. Existing indexes supporting disaggregated memory either suffer from low write performance, or require hardware modification.</p>","PeriodicalId":501169,"journal":{"name":"ACM SIGMOD Record","volume":"251 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138510378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ad Hoc Transactions: What They Are and Why We Should Care","authors":"Chuzhe Tang, Zhaoguo Wang, Xiaodong Zhang, Qianmian Yu, Binyu Zang, Haibing Guan, Haibo Chen","doi":"https://dl.acm.org/doi/10.1145/3604437.3604440","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3604437.3604440","url":null,"abstract":"<p>Many transactions in web applications are constructed ad hoc in the application code. For example, developers might explicitly use locking primitives or validation procedures to coordinate critical code fragments. We refer to database operations coordinated by application code as ad hoc transactions. Until now, little is known about them. This paper presents the first comprehensive study on ad hoc transactions. By studying 91 ad hoc transactions among 8 popular open-source web applications, we find that (i) every studied application uses ad hoc transactions (up to 16 per application), 71 of which play critical roles; (ii) compared with database transactions, concurrency control of ad hoc transactions is much more flexible; (iii) ad hoc transactions are error-prone-53 of them have correctness issues, and 33 of them are confirmed by developers; and (iv) ad hoc transactions have the potential to improve performance in contentious workloads by utilizing application semantics such as access patterns. Finally, implications of ad hoc transactions to the database research community are discussed.</p>","PeriodicalId":501169,"journal":{"name":"ACM SIGMOD Record","volume":"249 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138510386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM SIGMOD RecordPub Date : 2023-01-25DOI: https://dl.acm.org/doi/10.1145/3582302.3582318
Chenggang Wu
{"title":"Chenggang Wu Speaks Out on his ACM SIGMOD Jim Gray Dissertation Award, Rejection, Believing in Your Work, and More","authors":"Chenggang Wu","doi":"https://dl.acm.org/doi/10.1145/3582302.3582318","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3582302.3582318","url":null,"abstract":"<p>Welcome to this installment of ACM SIGMOD Record's series of interviews with distinguished members of the database community. I'm Marianne Winslett, and today we are on Zoom with Chenggang Wu, co-founder and CTO of Aqueduct. Chenggang received the 2022 ACM SIGMOD Jim Gray Dissertation Award for his thesis entitled The Design of Any-scale Serverless Infrastructure with Rich Consistency Guarantees. His PhD is from UC Berkeley. So, Chenggang, welcome!</p>","PeriodicalId":501169,"journal":{"name":"ACM SIGMOD Record","volume":"2 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138510319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM SIGMOD RecordPub Date : 2023-01-25DOI: https://dl.acm.org/doi/10.1145/3582302.3582304
Bas Ketsman, Christoph Koch, Frank Neven, Brecht Vandevoort
{"title":"Concurrency control for database theorists","authors":"Bas Ketsman, Christoph Koch, Frank Neven, Brecht Vandevoort","doi":"https://dl.acm.org/doi/10.1145/3582302.3582304","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3582302.3582304","url":null,"abstract":"<p>The aim of this paper is to serve as a lightweight introduction to concurrency control for database theorists through a uniform presentation of the work on robustness against Multiversion Read Committed and Snapshot Isolation.</p>","PeriodicalId":501169,"journal":{"name":"ACM SIGMOD Record","volume":"1 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138510362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}