摘要:
Embodiments of the present invention include a method for performing a data uniqueness check in a set of sorted data blocks comprising accessing data to be inserted into the set of sorted data blocks, determining a proper data block of the set of sorted data blocks for which the data to be inserted should be located based on a first sorting key. The method further includes examining the proper data block for an existing data entry and if the proper data block is empty, the method further includes inserting the data to be inserted into the proper data block of the set of sorted data blocks.
摘要:
Embodiments of the present invention include a method for performing a data uniqueness check in a set of sorted data blocks comprising accessing data to be inserted into the set of sorted data blocks, determining a proper data block of the set of sorted data blocks for which the data to be inserted should be located based on a first sorting key. The method further includes examining the proper data block for an existing data entry and if the proper data block is empty, the method further includes inserting the data to be inserted into the proper data block of the set of sorted data blocks.
摘要:
A method and mechanism is disclosed for implementing transaction logging in a database system. In-memory undo records are maintained to log undo information for the database system. Redo records are batch processed, with multiple redo records for a transaction stored on disk at commit time.
摘要:
Disclosed is a mechanism, system, interface, and process to determine one or more life intervals when given a key. In addition, one or more life intervals can be determined for each key within a range of keys. This type of process is useful for auditing purposes or if it is desire to implement a query upon past versions when a key or range of keys is specified for the data for which past versions is desired. This facilitates algorithms, mechanisms, and processes to implement a query upon past versions.
摘要:
A method and apparatus for selective removal of user data changes is provided. In one embodiment, the methodology is implemented by a logical recovery mechanism. Upon receiving a request to selectively remove user data changes stored in a database, the mechanism creates an empty set of transactions to be populated for selective removal, identifies one or more transactions and places them in the causal set of transactions. The mechanism further identifies other transactions that logically depend on any transaction already in the causal set of transactions. Finally, either while the causal set of transactions is being identified or after the identification is completed, the mechanism also determines user data changes made by the causal set of transactions. One or more compensating transactions may be generated by the logical recovery mechanism, which when executed, reverse the user data changes.
摘要:
Techniques are disclosed for creating and using a filter index in order to identify registered queries whose result sets are likely to have been changed by changes made to tables. The filter index entries are based on filter conditions. The filter conditions are created based on predicates contained in the registered queries. The filter conditions may include exclusive predicates and join predicates. Join predicates that join a table T1 with a table T2 may be instantiated by replacing references to table T2 with values extracted from table T2. Various techniques are described for recognizing situations in which a query can be included in, or excluded from, the set of likely-changed queries, without fully evaluating the filter conditions that correspond to the queries.
摘要:
Techniques are provided for sharing of flashback cursors by adding a time domain property to flashback cursors. This time domain property defines the range of flashback times for which the flashback cursor is valid. According to one embodiment, this “validity range” is closed at the lower bound and open at the upper bound. A subsequent flashback query can share an existing flashback cursor if the flashback time of the subsequent flashback query falls within the validity range of the existing flashback cursor. In one embodiment, the validity range of a flashback cursor is established based on times associated with indexes used to process the flashback query for which the flashback cursor was made. Consequently, an existing flashback cursor is less likely to be used by a subsequent flashback query when it would be inefficient to do so.
摘要:
Disclosed is a mechanism, system, interface, and process to determine one or more life intervals when given a key. In addition, one or more life intervals can be determined for each key within a range of keys. This type of process is useful for auditing purposes or if it is desire to implement a query upon past versions when a key or range of keys is specified for the data for which past versions is desired. This facilitates algorithms, mechanisms, and processes to implement a query upon past versions.
摘要:
Techniques are disclosed for creating and using a filter index in order to identify registered queries whose result sets are likely to have been changed by changes made to tables. The filter index entries are based on filter conditions. The filter conditions are created based on predicates contained in the registered queries. The filter conditions may include exclusive predicates and join predicates. Join predicates that join a table T1 with a table T2 may be instantiated by replacing references to table T2 with values extracted from table T2. Various techniques are described for recognizing situations in which a query can be included in, or excluded from, the set of likely-changed queries, without fully evaluating the filter conditions that correspond to the queries.
摘要:
Disclosed is a mechanism, system, interface, and process to determine one or more life intervals when given a key. In addition, one or more life intervals can be determined for each key within a range of keys. This type of process is useful for auditing purposes or if it is desire to implement a query upon past versions when a key or range of keys is specified for the data for which past versions is desired. This facilitates algorithms, mechanisms, and processes to implement a query upon past versions.