Ad Hoc Transactions in Web Applications: The Good, the Bad, and the Ugly

11Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Many transactions in web applications are constructed ad hoc in the application code. For example, developers might explicitly use locking primitives or validation procedures to coordinate critical code fragments. We refer to database operations coordinated by application code as ad hoc transactions. Until now, little is known about them. This paper presents the first comprehensive study on ad hoc transactions. By studying 91 ad hoc transactions among 8 popular open-source web applications, we find that (i) every studied application uses ad hoc transactions (up to 16 per application), 71 of which play critical roles; (ii) compared with database transactions, concurrency control of ad hoc transactions is much more flexible; (iii) ad hoc transactions are error-prone-53 of them have correctness issues, and 33 of them are confirmed by developers; and (iv) ad hoc transactions have the potential to improve performance in contentious workloads by utilizing application semantics such as access patterns. Based on the findings, we discuss the implications of ad hoc transactions to the database research community.

Cite

CITATION STYLE

APA

Tang, C., Wang, Z., Zhang, X., Yu, Q., Zang, B., Guan, H., & Chen, H. (2022). Ad Hoc Transactions in Web Applications: The Good, the Bad, and the Ugly. In Proceedings of the ACM SIGMOD International Conference on Management of Data (pp. 4–18). Association for Computing Machinery. https://doi.org/10.1145/3514221.3526120

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free