{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T05:58:51Z","timestamp":1672293531500},"reference-count":11,"publisher":"Association for Computing Machinery (ACM)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2022,8]]},"abstract":"Database applications frequently use weaker isolation levels, such as Read Committed, for better performance, which may lead to bugs that do not happen under Serializable. Although a number of works have proposed methods to identify such isolation-related bugs, the difficulty of analyzing reported bugs is often underestimated, since these bugs often involve multiple complicated transactions interleaved in a specific order and they often require users' feedback to improve the accuracy of bug analysis.<\/jats:p>\n This paper presents IsoBugView, a tool to visualize isolation bugs and incorporate users' feedback: to address the challenge that a complicated bug may include much information and thus is hard to present, IsoBugView displays a high-level overview of the bug first and displays further information of individual pieces if the developer needs further investigation. To incorporate users' feedback, IsoBugView embeds hook functions into the backend analysis tool to preprocess a dependency graph and postprocess a found cycle and further allows a user to apply predefined hook functions in its graphic user interface. Our experience shows that IsoBugView has greatly improved our productivity of analyzing isolation bugs.<\/jats:p>","DOI":"10.14778\/3554821.3554885","type":"journal-article","created":{"date-parts":[[2022,9,29]],"date-time":"2022-09-29T22:28:39Z","timestamp":1664490519000},"page":"3726-3729","source":"Crossref","is-referenced-by-count":0,"title":["IsoBugView"],"prefix":"10.14778","volume":"15","author":[{"given":"Drew","family":"Ripberger","sequence":"first","affiliation":[{"name":"The Ohio State University"}]},{"given":"Yifan","family":"Gan","sequence":"additional","affiliation":[{"name":"The Ohio State University"}]},{"given":"Xueyuan","family":"Ren","sequence":"additional","affiliation":[{"name":"The Ohio State University"}]},{"given":"Spyros","family":"Blanas","sequence":"additional","affiliation":[{"name":"The Ohio State University"}]},{"given":"Yang","family":"Wang","sequence":"additional","affiliation":[{"name":"The Ohio State University"}]}],"member":"320","published-online":{"date-parts":[[2022,9,29]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2000.839388"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3087801.3087802"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1071610.1071615"},{"key":"e_1_2_1_4_1","unstructured":"Yifan Gan. 2021. Exploring Transaction Anomalies under Weak Isolation Levels for General Database Applications (Dissertation). https:\/\/github.com\/SayuRanger\/dissertation\/blob\/main\/Phd_Thesis_Yifan_Gan.pdf. (2021). Yifan Gan. 2021. Exploring Transaction Anomalies under Weak Isolation Levels for General Database Applications (Dissertation). https:\/\/github.com\/SayuRanger\/dissertation\/blob\/main\/Phd_Thesis_Yifan_Gan.pdf. (2021)."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407860"},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the 33rd International Conference on Very Large Data Bases","author":"Jorwekar Sudhir","unstructured":"Sudhir Jorwekar , Alan Fekete , Krithi Ramamritham , and S. Sudarshan . 2007. Automating the Detection of Snapshot Isolation Anomalies . In Proceedings of the 33rd International Conference on Very Large Data Bases ( Vienna, Austria) (VLDB '07). VLDB Endowment, 1263--1274. http:\/\/dl.acm.org\/citation.cfm?id=1325851.1325995 Sudhir Jorwekar, Alan Fekete, Krithi Ramamritham, and S. Sudarshan. 2007. Automating the Detection of Snapshot Isolation Anomalies. In Proceedings of the 33rd International Conference on Very Large Data Bases (Vienna, Austria) (VLDB '07). VLDB Endowment, 1263--1274. http:\/\/dl.acm.org\/citation.cfm?id=1325851.1325995"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14778\/3430915.3430918"},{"key":"e_1_2_1_8_1","unstructured":"oltpbench [n.d.]. OLTPBench. https:\/\/github.com\/oltpbenchmark\/oltpbench. oltpbench [n.d.]. OLTPBench. https:\/\/github.com\/oltpbenchmark\/oltpbench."},{"key":"e_1_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Andrew Pavlo. 2017. What Are We Doing With Our Lives? Nobody Cares About Our Concurrency Control Research. In SIGMOD 17. 3. Andrew Pavlo. 2017. What Are We Doing With Our Lives? Nobody Cares About Our Concurrency Control Research. In SIGMOD 17. 3.","DOI":"10.1145\/3035918.3056096"},{"key":"e_1_2_1_10_1","volume-title":"Cobra: Making Transactional Key-Value Stores Verifiably Serializable. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Tan Cheng","year":"2020","unstructured":"Cheng Tan , Changgeng Zhao , Shuai Mu , and Michael Walfish . 2020 . Cobra: Making Transactional Key-Value Stores Verifiably Serializable. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20) . USENIX Association, 63--80. https:\/\/www.usenix.org\/conference\/osdi20\/presentation\/tan Cheng Tan, Changgeng Zhao, Shuai Mu, and Michael Walfish. 2020. Cobra: Making Transactional Key-Value Stores Verifiably Serializable. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20). USENIX Association, 63--80. https:\/\/www.usenix.org\/conference\/osdi20\/presentation\/tan"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064037"}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/3554821.3554885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T11:36:17Z","timestamp":1672227377000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/3554821.3554885"}},"subtitle":["interactively debugging isolation bugs in database applications"],"short-title":[],"issued":{"date-parts":[[2022,8]]},"references-count":11,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["10.14778\/3554821.3554885"],"URL":"https:\/\/doi.org\/10.14778\/3554821.3554885","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2022,8]]}}}