1306Index
phantom phenomenon and,
827, 858–861, 877–879,
877n5, 885, 887
predicate reads and, 858–861
real-time transaction systems
and, 894
recovery systems and, 916
replication and, 1123–1125
rollback and, 841–844,
849–850, 853, 868–871
serializability and, 836,
840–843, 846–848, 856,
861–871, 875–887
snapshot isolation and,
872–879, 882, 916,
1131–1132
timestamp-based protocols
and, 861–866, 882
trends in, 808
user interactions and,
881–883
validation and, 866–869, 882,
916
concurrency-control manager, 21
concurrency-control schemes,
809
concurrent transactions,
1224–1227
confidence, 540, 547
conflict equivalence, 815, 815n2
conflict serializability, 813–816
conformance levels, 196–197
conjunctive selection, 699–700,
747, 762
connection pooling, 436
consensus protocols
blockchain databases and,
1254, 1256–1257,
1263–1267
Byzantine, 1254, 1256,
1266–1267, 1276
distributed databases and,
1106–1107, 1150–1161,
1266, 1267
message-based, 1266
multiple consensus protocol,
1151
Paxos, 1152–1155, 1160–1161,
1267
proof-of-stake, 1256, 1266
proof-of-work, 1256,
1264–1266
Raft, 1148, 1155–1158, 1267
replication and, 1016
Zab, 1152
consistency
Big Data and, 481–482
CAP theorem and, 1134
concurrency control and,
880–885
cursor stability and, 881
deadlock and, 838–839
defined, 20
degree-two, 880–881
eventual, 1016, 1139
external, 1131
file system consistency check,
610
hashing and, 1013
logical operations and,
936–937
replication and, 1015–1016,
1121–1123, 1133–1146
requirement of, 802
trading off for availability,
1134–1135
of transactions, 20, 800, 802,
807–808, 821–823
user interactions and,
881–883
weak levels of, 880–883
constraints
check, 151, 170, 315
completeness, 275
consistency, 13–14
deadlines, 894
decomposition and, 336
dependency preservation and,
315–316
entity-relationship (E-R)
model and, 253–256,
275–276
foreign key, 45–46
integrity (seeintegrity
constraints)
keys and, 258
mapping cardinalities and,
253–256
not null, 69
primary key, 44
on specialization, 275–276
transactions and, 800
Unified Modeling Language
and, 289
containers, 992–994
contains operation, 101
continuous queries, 503, 731
continuous-stream data, 731
conversations, 883
conversions, 155–156, 469, 843
cookies, 410–415, 411n2,
439–440
coordinators, 1099, 1104,
1106–1107, 1146–1150
Corda, 1269
cores, 962–963, 970, 976,
980–983
core switch, 977
correlated evaluation, 775
correlated subqueries, 101
correlation name, 81, 101
correlation variables, 81, 775
cost-based optimizers, 766
Couchbase, 1024
count function, 91–92, 94, 96,
723, 766, 781
count values, 220n11
covering indices, 663
crabbing protocol, 885–886
crashes.See alsorecovery
systems
actions following, 923–925
algorithms for, 922–925
ARIES and, 941–947
checkpoints and, 920–922
failure classification and, 908
magnetic disks and, 565
storage and, 607, 609–610
transactions and, 800
crawling the web, 383
create assertion, 153
create cluster, 601
create distinct type, 160
create domain, 159–160
create function, 200, 203, 204,
215
create index, 164–165, 664
create or replace, 199n4
create procedure, 200, 205
create recursive view, 218