Modern B-Tree Techniques
Citations
281 citations
Cites background from "Modern B-Tree Techniques"
...We consider only the case of unique keys, which is often an acceptable assumption in practice [15]....
[...]
190 citations
121 citations
Cites methods from "Modern B-Tree Techniques"
...sitionsthatare•lledby elements. A node is full if the next insert results in exceeding d u. By default we setd l =0:6 andd u =0:8 to achieve average data storage utilization of 0:7, similar to B+Tree [13], which in our experience always produces good results and did not need to be tuned.In contrast, B+Tree nodes typically have d l =0:5 andd u =1.Section 5 presents a theoretical analysis of how the den...
[...]
...node. „e data size of B+Tree is the sum of the sizes of all leaf nodes. At initialization, the GappedArraysindatanodesaresettohave70%spaceutilization, comparable to B+Tree leaf node space utilization [13]. 6.1.1 Datasets. We run all experiments using 8-byte keys from some dataset and randomly generated •xed-size payloads. We evaluate ALEX on 4 datasets, whose characteristics and CDFs are shown in Tabl...
[...]
90 citations
Cites background from "Modern B-Tree Techniques"
...Examples include indexes with constant time access such as hash-based indexes or logarithmic time structures such as B-Trees [22], Tries [19], Prefix B-Trees [9], and Skiplists [45]....
[...]
...Notable proposals are Database Cracking [31, 32, 33, 48], Adaptive Merging [22, 25], and Adaptive Indexing [23, 24, 26, 34], which balance the read performance versus the overhead of creating an index....
[...]
75 citations
Cites background from "Modern B-Tree Techniques"
...Traditionally, index structures used fine-grained locking and lock coupling to provide concurrent accesses to index structures [7, 8]....
[...]
References
7,336 citations
"Modern B-Tree Techniques" refers methods in this paper
...For example, more and more efficient strategies for construction and bulk loading of R-tree indexes have been forthcoming over a long time [23, 62] compared to simply sorting for efficient construction of a B-tree index, which also applies to B-tree indexes adapted to multiple dimensions [6, 109]....
[...]
4,843 citations
4,349 citations
"Modern B-Tree Techniques" refers background in this paper
..., the topics of the present section and the following sections, differentiate traditional database management systems from key-value stores now employed in various web services and their implementations [21, 29] Implicit in this section is that B-tree structures can support not only read-only searches but also — concurrently — updates including insertions, deletions, and modifications of existing records, both of key and nonkey fields....
[...]
...Nonetheless, many of the techniques are readily applicable or at least transferable to other possible application domains of B-trees, in particular to information retrieval [83], file systems [71], and “No SQL” databases and key-value stores recently popularized for web services and cloud computing [21, 29]....
[...]
3,522 citations
"Modern B-Tree Techniques" refers background in this paper
...The present survey goes beyond the “classic” B-tree references [7, 8, 27, 59] in multiple ways....
[...]
...In other words, changing 20 bytes in a page of 8 KB required writing 16 KB to the recovery log, plus appropriate record headers, which are fairly large for log records [59]....
[...]
...Gray and Reuter asserted that “B-trees are by far the most important access path structure in database and file systems” [59]....
[...]
...Thus, the latter design is more effective at preventing deadlocks [59] even if it introduces an asymmetry in the lock matrix....
[...]
...On the other hand, an enormous amount of research and development has improved every aspect of Btrees including data contents such as multi-dimensional data, access algorithms such as multi-dimensional queries, data organization within each node such as compression and cache optimization, concurrency control such as separation of latching and locking, recovery such as multi-level recovery, etc. Gray and Reuter believed in 1993 that “B-trees are by far the most important access path structure in database and file systems.”...
[...]
3,259 citations
"Modern B-Tree Techniques" refers background in this paper
..., the topics of the present section and the following sections, differentiate traditional database management systems from key-value stores now employed in various web services and their implementations [21, 29] Implicit in this section is that B-tree structures can support not only read-only searches but also — concurrently — updates including insertions, deletions, and modifications of existing records, both of key and nonkey fields....
[...]
...Nonetheless, many of the techniques are readily applicable or at least transferable to other possible application domains of B-trees, in particular to information retrieval [83], file systems [71], and “No SQL” databases and key-value stores recently popularized for web services and cloud computing [21, 29]....
[...]