Shadowing-based crash recovery schemes for real-time database systems

Lih-Chyun Shu, Huey Min Sun, Tei Wei Kuo

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)


Predictable performance in the event of failures is of paramount importance in most safety critical real-time database systems. Our research addresses new crash recovery techniques that accommodate pre-run-time timing analysis and utilize design-time information about transactions' data access patterns to improve performance at run time and system restart time. The schemes we will propose are based on a form of shadowing. In contrast to the shadow version algorithm as described previously our schemes reduce overheads at run time, shorten the blocking duration necessary in the transactions' atomic commitment stage, eliminate dynamic storage allocation and reclamation, and permit very fast and bounded-time recovery after a crash by simply retrieving the master record and system version directory from nonvolatile storage. The data structures and algorithms used by our recovery schemes differ when different concurrency control protocols are used. We analyze their characteristics and their impacts on the performance of real-time database systems. Quantitative evaluation of our technique indicates the schemes are much more efficient than traditional log-based techniques.

Original languageEnglish
Title of host publicationProceedings of the 11th Euromicro Conference on Real-Time Systems, ECRTS 1999
Number of pages8
Publication statusPublished - 1999 Dec 1
Event11th Euromicro Conference on Real-Time Systems, ECRTS 1999 - York, United Kingdom
Duration: 1999 Jun 91999 Jun 11

Publication series

NameProceedings - Euromicro Conference on Real-Time Systems
ISSN (Print)1068-3070


Other11th Euromicro Conference on Real-Time Systems, ECRTS 1999
Country/TerritoryUnited Kingdom

All Science Journal Classification (ASJC) codes

  • Software
  • Hardware and Architecture


Dive into the research topics of 'Shadowing-based crash recovery schemes for real-time database systems'. Together they form a unique fingerprint.

Cite this