Detecting Isolation Anomalies in Relational DBMSs
Relational Database Management Systems (DBMSs) utilize transactions to ensure data consistency and integrity, while providing multiple isolation levels to strike a balance between consistency and performance. However, isolation anomalies in relational DBMSs can undermine their claimed isolation leve...
Saved in:
| Published in: | Proceedings of the ACM on software engineering Vol. 2; no. ISSTA; pp. 1725 - 1747 |
|---|---|
| Main Authors: | , , , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
New York, NY, USA
ACM
22.06.2025
|
| Subjects: | |
| ISSN: | 2994-970X, 2994-970X |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Relational Database Management Systems (DBMSs) utilize transactions to ensure data consistency and integrity, while providing multiple isolation levels to strike a balance between consistency and performance. However, isolation anomalies in relational DBMSs can undermine their claimed isolation levels, and lead to severe consequences, e.g., incorrect query results and database states. Existing isolation checkers can only work on simple key-value-like data models and the associated read(key) and write(key,value) operations. Therefore, they cannot be directly applied to relational DBMSs that support relational data models and complex SQL operations. In this paper, we propose a novel black-box Isolation checker for Relational DBMSs, IsoRel, which can support relational data models and complex SQL operations. To infer dependencies among transactions in relational DBMSs, we first design an isolation-agnostic SQL statement instrumentation approach to record the data rows accessed by each SQL statement by utilizing two auxiliary columns in each database table. We then utilize the recorded data rows of each SQL statement to construct a transaction dependency graph for relational transactions, and identify isolation anomalies based on anomaly patterns. We evaluate IsoRel on five widely-used relational DBMSs, i.e., MySQL, PostgreSQL, MariaDB, CockroachDB, and TiDB, and all their supported isolation levels. Our evaluation reveals a total of 48 unique isolation anomalies that violate the isolation levels defined by Adya. |
|---|---|
| AbstractList | Relational Database Management Systems (DBMSs) utilize transactions to ensure data consistency and integrity, while providing multiple isolation levels to strike a balance between consistency and performance. However, isolation anomalies in relational DBMSs can undermine their claimed isolation levels, and lead to severe consequences, e.g., incorrect query results and database states. Existing isolation checkers can only work on simple key - value -like data models and the associated read ( key ) and write ( key , value ) operations. Therefore, they cannot be directly applied to relational DBMSs that support relational data models and complex SQL operations.
In this paper, we propose a novel black-box Iso lation checker for Rel ational DBMSs , IsoRel, which can support relational data models and complex SQL operations. To infer dependencies among transactions in relational DBMSs, we first design an isolation-agnostic SQL statement instrumentation approach to record the data rows accessed by each SQL statement by utilizing two auxiliary columns in each database table. We then utilize the recorded data rows of each SQL statement to construct a transaction dependency graph for relational transactions, and identify isolation anomalies based on anomaly patterns. We evaluate IsoRel on five widely-used relational DBMSs, i.e., MySQL, PostgreSQL, MariaDB, CockroachDB, and TiDB, and all their supported isolation levels. Our evaluation reveals a total of 48 unique isolation anomalies that violate the isolation levels defined by Adya. Relational Database Management Systems (DBMSs) utilize transactions to ensure data consistency and integrity, while providing multiple isolation levels to strike a balance between consistency and performance. However, isolation anomalies in relational DBMSs can undermine their claimed isolation levels, and lead to severe consequences, e.g., incorrect query results and database states. Existing isolation checkers can only work on simple key-value-like data models and the associated read(key) and write(key,value) operations. Therefore, they cannot be directly applied to relational DBMSs that support relational data models and complex SQL operations. In this paper, we propose a novel black-box Isolation checker for Relational DBMSs, IsoRel, which can support relational data models and complex SQL operations. To infer dependencies among transactions in relational DBMSs, we first design an isolation-agnostic SQL statement instrumentation approach to record the data rows accessed by each SQL statement by utilizing two auxiliary columns in each database table. We then utilize the recorded data rows of each SQL statement to construct a transaction dependency graph for relational transactions, and identify isolation anomalies based on anomaly patterns. We evaluate IsoRel on five widely-used relational DBMSs, i.e., MySQL, PostgreSQL, MariaDB, CockroachDB, and TiDB, and all their supported isolation levels. Our evaluation reveals a total of 48 unique isolation anomalies that violate the isolation levels defined by Adya. |
| ArticleNumber | ISSTA076 |
| Author | Wei, Jun Gao, Yu Cui, Ziyu Song, Jiansen Yang, Rui Dou, Wensheng Xie, Xudong |
| Author_xml | – sequence: 1 givenname: Rui orcidid: 0009-0009-5428-2852 surname: Yang fullname: Yang, Rui email: yangrui22@otcaix.iscas.ac.cn organization: Institute of Software Chinese Academy of Sciences, Beijing, China, University of Chinese Academy of Sciences, Beijing, China – sequence: 2 givenname: Ziyu orcidid: 0009-0004-7462-194X surname: Cui fullname: Cui, Ziyu email: cuiziyu20@otcaix.iscas.ac.cn organization: Institute of Software Chinese Academy of Sciences, Beijing, China, University of Chinese Academy of Sciences, Beijing, China – sequence: 3 givenname: Wensheng orcidid: 0000-0002-3323-0449 surname: Dou fullname: Dou, Wensheng email: wsdou@otcaix.iscas.ac.cn organization: Institute of Software Chinese Academy of Sciences, Beijing, China, University of Chinese Academy of Sciences, Beijing, China – sequence: 4 givenname: Yu orcidid: 0009-0009-8312-6736 surname: Gao fullname: Gao, Yu email: gaoyu15@otcaix.iscas.ac.cn organization: Institute of Software Chinese Academy of Sciences, Beijing, China, University of Chinese Academy of Sciences, Beijing, China – sequence: 5 givenname: Jiansen orcidid: 0009-0003-0401-2033 surname: Song fullname: Song, Jiansen email: songjiansen20@otcaix.iscas.ac.cn organization: Institute of Software Chinese Academy of Sciences, Beijing, China, University of Chinese Academy of Sciences, Beijing, China – sequence: 6 givenname: Xudong orcidid: 0009-0003-3367-5995 surname: Xie fullname: Xie, Xudong email: xiexudong23@otcaix.iscas.ac.cn organization: Institute of Software Chinese Academy of Sciences, Beijing, China, University of Chinese Academy of Sciences, Beijing, China – sequence: 7 givenname: Jun orcidid: 0000-0002-8561-2481 surname: Wei fullname: Wei, Jun email: wj@otcaix.iscas.ac.cn organization: Institute of Software Chinese Academy of Sciences, Beijing, China, University of Chinese Academy of Sciences, Beijing, China |
| BookMark | eNptj0tLxDAUhYOM4DgO7l1156p6kzZNshxnfAyMCD7AXbl5SaRNpenGf-9oRxFxdS7nfhzOOSST2EVHyDGFM0pLfl4IJhUv9siUKVXmSsDz5Nd9QOYpvQLA1qFUwJTQlRucGUJ8ydapa3AIXcwWsWuxCS5lIWb3bnSxyVYXtw_piOx7bJKb73RGnq4uH5c3-ebuer1cbHKkjBU5lVJaq7zmAiQYWSnPKivQOodelM5rXSEwbUttLXCubcGwkkoL4yh4XszI6Zhr-i6l3vn6rQ8t9u81hfpzbL0buyXzP6QJw1fnocfQ_MOfjDya9if0-_kBzO1e4A |
| CitedBy_id | crossref_primary_10_14778_3734839_3734861 crossref_primary_10_14778_3742728_3742747 |
| Cites_doi | 10.14778/3583140.3583145 10.1145/507338.507354 10.1145/289.291 10.1137/0201010 10.14778/3659437.3659445 10.14778/3430915.3430918 10.5555/573304 10.1145/3533767.3534409 10.14778/2732232.2732237 10.1109/ICDE.2000.839388 10.1145/362384.362685 10.1145/1247480.1247520 10.1145/3368089.3409710 10.1145/3428279 10.1109/TKDE.2006.190 10.1145/3360591 |
| ContentType | Journal Article |
| Copyright | Owner/Author |
| Copyright_xml | – notice: Owner/Author |
| DBID | AAYXX CITATION |
| DOI | 10.1145/3728953 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2994-970X |
| EndPage | 1747 |
| ExternalDocumentID | 10_1145_3728953 3728953 |
| GroupedDBID | AAKMM ACM AEJOY AKRVB ALMA_UNASSIGNED_HOLDINGS LHSKQ M~E AAYXX CITATION |
| ID | FETCH-LOGICAL-a1223-1888dd9fb57080c869f26d7adeeaf74efbb6a02bd4bdd055bd32a689b7ce10f53 |
| ISSN | 2994-970X |
| IngestDate | Sat Nov 29 07:43:49 EST 2025 Tue Nov 18 22:04:26 EST 2025 Mon Jul 14 20:48:58 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | ISSTA |
| Keywords | isolation level Database transaction isolation anomaly |
| Language | English |
| License | This work is licensed under Creative Commons Attribution International 4.0. |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-a1223-1888dd9fb57080c869f26d7adeeaf74efbb6a02bd4bdd055bd32a689b7ce10f53 |
| ORCID | 0009-0009-8312-6736 0009-0003-0401-2033 0000-0002-3323-0449 0009-0004-7462-194X 0009-0003-3367-5995 0000-0002-8561-2481 0009-0009-5428-2852 |
| OpenAccessLink | https://dl.acm.org/doi/10.1145/3728953 |
| PageCount | 23 |
| ParticipantIDs | crossref_primary_10_1145_3728953 crossref_citationtrail_10_1145_3728953 acm_primary_3728953 |
| PublicationCentury | 2000 |
| PublicationDate | 20250622 2025-06-22 |
| PublicationDateYYYYMMDD | 2025-06-22 |
| PublicationDate_xml | – month: 06 year: 2025 text: 20250622 day: 22 |
| PublicationDecade | 2020 |
| PublicationPlace | New York, NY, USA |
| PublicationPlace_xml | – name: New York, NY, USA |
| PublicationTitle | Proceedings of the ACM on software engineering |
| PublicationTitleAbbrev | ACM PACMSE |
| PublicationYear | 2025 |
| Publisher | ACM |
| Publisher_xml | – name: ACM |
| References | Lucas Brutschy, Dimitar Dimitrov, Peter Müller, and Martin Vechev. 2017. Serializability for Eventual Consistency: Criterion, Analysis, and Applications. In Proceedings of ACM SIGPLAN Symposium on Principles of Programming Languages (POPL). 458–472. Manuel Rigger and Zhendong Su. 2020. Testing Database Engines via Pivoted Query Synthesis. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 667–682. Donald R. Slutz. 1998. Massive Stochastic Testing of SQL. In Proceedings of International Conference on Very Large Data Bases (VLDB). 618–622. Kyle Kingsbury and Peter Alvaro. 2020. Elle: Inferring Isolation Anomalies from Experimental Observations. In Proceedings of the VLDB Endowment (VLDB). 14, 268–280. Yingying Zheng, Wensheng Dou, Lei Tang, Ziyu Cui, Yu Gao, Jiansen Song, Liang Xu, Jiaxin Zhu, Wei Wang, Jun Wei, Hua Zhong, and Tao Huang. 2024. Testing Gremlin-Based Graph Database Systems via Query Disassembling. In Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 1695–1707. Nicolas Bruno, Surajit Chaudhuri, and Dilys Thomas. 2006. Generating Queries with Cardinality Constraints for DBMS Testing. IEEE Transactions on Knowledge and Data Engineering (TKDE), 18, 12 (2006), 1721–1725. 2024. PostgreSQL 12.3. https://jepsen.io/analyses/postgresql-12.3?file=postgresql-12.3 Carsten Binnig, Donald Kossmann, Eric Lo, and M. Tamer Özsu. 2007. QAGen: Generating Query-Aware Test Databases. In Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 341–352. Nicolas Bruno and Surajit Chaudhuri. 2005. Flexible Database Generators. In Proceedings of International Conference on Very Large Data Bases (VLDB). 1097–1107. Philip M Lewis, Arthur Bernstein, and Michael Kifer. 2002. Databases and Transaction Processing: An Application-Oriented Approach. ACM SIGMOD Record, 31, 1 (2002), 74–75. Ziyu Cui, Wensheng Dou, Qianwang Dai, Jiansen Song, Wei Wang, Jun Wei, and Dan Ye. 2022. Differentially Testing Database Transactions for Fun and Profit. In Proceedings of IEEE/ACM International Conference on Automated Software Engineering (ASE). 35:1–35:12. Yingying Zheng, Wensheng Dou, Lei Tang, Ziyu Cui, Jiansen Song, Ziyue Cheng, Wei Wang, Jun Wei, Hua Zhong, and Tao Huang. 2024. Differential Optimization Testing of Gremlin-Based Graph Database Systems. In Proceedings of IEEE International Conference on Software Testing, Verification and Validation (ICST). 25–36. Atul Adya, Barbara Liskov, and Patrick O’Neil. 2000. Generalized Isolation Level Definitions. In Proceedings of International Conference on Data Engineering (ICDE). 67–78. Robert Tarjan. 1972. Depth-First Search and Linear Graph Algorithms. SIAM J. Comput., 1, 2 (1972), 146–160. Zu-Ming Jiang, Si Liu, Manuel Rigger, and Zhendong Su. 2023. Detecting Transactional Bugs in Database Engines via Graph-Based Oracle Construction. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 397–417. 2024. MySQL 8.0.34. https://jepsen.io/analyses/mysql-8.0.34?file=mysql-8.0.34 2024. CockroachDB. https://www.cockroachlabs.com Keqiang Li, Siyang Weng, Peiyuan Liu, Lyu Ni, Chengcheng Yang, Rong Zhang, Xuan Zhou, Jianghang Lou, Gui Huang, Weining Qian, and Aoying Zhou. 2023. Leopard: A Black-Box Approach for Efficiently Verifying Various Isolation Levels. In Proceedings of IEEE International Conference on Data Engineering (ICDE). 722–735. Andrea Cerone, Giovanni Bernardi, and Alexey Gotsman. 2015. A Framework for Transactional Consistency Models with Atomic Visibility. In Proceedings of International Conference on Concurrency Theory (CONCUR). 58–71. Jim Gray and Andreas Reuter. 1992. Transaction Processing: Concepts and Techniques. Elsevier. Qiuyang Mang, Aoyang Fang, Boxi Yu, Hanfei Chen, and Pinjia He. 2024. Testing Graph Database Systems via Equivalent Query Rewriting. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). Article 143, 12 pages. Shadi Abdul Khalek, Bassem Elkarablieh, Yai O Laleye, and Sarfraz Khurshid. 2008. Query-Aware Test Generation Using a Relational Constraint Solver. In Proceedings of IEEE/ACM International Conference on Automated Software Engineering (ASE). 238–247. Hal Berenson, Phil Bernstein, Jim Gray, Jim Melton, Elizabeth O’Neil, and Patrick O’Neil. 1995. A Critique of ANSI SQL Isolation Levels. In Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 1–10. Wensheng Dou, Ziyu Cui, Qianwang Dai, Jiansen Song, Dong Wang, Yu Gao, Wei Wang, Jun Wei, Lei Chen, Hanmo Wang, Hua Zhong, and Tao Huang. 2023. Detecting Isolation Bugs via Transaction Oracle Construction. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 1123–1135. Jiansen Song, Wensheng Dou, Ziyu Cui, Qianwang Dai, Wei Wang, Jun Wei, Hua Zhong, and Tao Huang. 2023. Testing Database Systems via Differential Query Execution. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 2072–2084. Peter Bailis, Aaron Davidson, Alan Fekete, Ali Ghodsi, Joseph M. Hellerstein, and Ion Stoica. 2013. Highly Available Transactions: Virtues and Limitations. Proceedings of the VLDB Endowment (VLDB), 7, 3 (2013), 181–192. Edgar F. Codd. 1970. A Relational Model of Data for Large Shared Data Banks. Commun. ACM, 13, 6 (1970), 377–387. Cheng Tan, Changgeng Zhao, Shuai Mu, and Michael Walfish. 2020. Cobra: Making Transactional Key-Value Stores Verifiably Serializable. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 63–80. 2024. TiDB 2.1.7. https://jepsen.io/analyses/tidb-2.1.7?file=tidb-2.1.7 Jiansen Song, Wensheng Dou, Yu Gao, Ziyu Cui, Yingying Zheng, Dong Wang, Wei Wang, Jun Wei, and Tao Huang. 2024. Detecting Metadata-Related Logic Bugs in Database Systems via Raw Database Construction. Proceedings of the VLDB Endowment (VLDB), 17, 8 (2024), 1884–1897. Ranadeep Biswas and Constantin Enea. 2019. On the Complexity of Checking Transactional Consistency. In Proceedings of ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA). 165:1–165:28. Haixiang Li, Xiaoyan Li, Chang Liu, Xiaoyong Du, Wei Lu, and Anqun Pan. 2021. Systematic Definition and Classification of Data Anomalies in DBMS. Journal of Software, 33, 3 (2021), 909–930. Jinsheng Ba and Manuel Rigger. 2023. Testing Database Engines via Query Plan Guidance. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 2060–2071. Yuancheng Jiang, Jiahao Liu, Jinsheng Ba, Roland H. C. Yap, Zhenkai Liang, and Manuel Rigger. 2024. Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). Article 46, 12 pages. Philip A Bernstein, Vassos Hadzilacos, and Nathan Goodman. 1987. Concurrency Control and Recovery in Database Systems. Addison-Wesley Longman Publishing Co., Inc.. Theo Haerder and Andreas Reuter. 1983. Principles of Transaction-Oriented Database Recovery. ACM Computing Surveys (CSUR), 15, 4 (1983), 287–317. Manuel Rigger and Zhendong Su. 2020. Finding Bugs in Database Systems via Query Partitioning. Proceedings of the ACM on Programming Languages, 4, OOPSLA (2020), 211:1–211:30. Jack Clark, Alastair F Donaldson, John Wickerson, and Manuel Rigger. 2024. Validating Database System Isolation Level Implementations with Version Certificate Recovery. In Proceedings of European Conference on Computer Systems (EuroSys). 754–768. Jim Gray, Prakash Sundaresan, Susanne Englert, Ken Baclawski, and Peter J. Weinberger. 1994. Quickly Generating Billion-Record Synthetic Databases. In Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 243–252. Kaile Huang, Si Liu, Zhenge Chen, Hengfeng Wei, David Basin, Haixiang Li, and Anqun Pan. 2023. Efficient Black-box Checking of Snapshot Isolation in Databases. Proceedings of the VLDB Endowment (VLDB), 16, 6 (2023), 1264–1276. Rui Yang, Yingying Zheng, Lei Tang, Wensheng Dou, Wei Wang, and Jun Wei. 2023. Randomized Differential Testing of RDF Stores. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE Demo). 136–140. 2024. MySQL. https://www.mysql.com 2024. SQLancer. https://www.manuelrigger.at/dbms-bugs Jiansen Song, Wensheng Dou, Yingying Zheng, Yu Gao, Ziyu Cui, Wei Wang, and Jun Wei. 2025. Detecting Schema-Related Logic Bugs in Relational DBMSs via Equivalent Database Construction. Proceedings of the VLDB Endowment (VLDB). 2023. go-randgen. https://github.com/pingcap/go-randgen 2024. MariaDB. https://mariadb.org 2024. The ANSI Isolation Levels. http://www.adp-gmbh.ch/ora/misc/isolation_level.html 2024. PostgreSQL. https://www.postgresql.org 2024. GitHub. https://github.com Lei Tang, Wensheng Dou, Yingying Zheng, Lijie Xu, Wei Wang, Jun Wei, and Tao Huang. 2025. Proving Cypher Query Equivalence. In Proceedings of IEEE International Conference on Data Engineering (ICDE). Jian Zhang, Ye Ji, Shuai Mu, and Cheng Tan. 2023. Viper: A Fast Snapshot Isolation Checker. In Proceedings of European Conference on Computer Systems (EuroSys). 654–671. 2024. Jepsen. https://github.com/jepsen-io/jepsen Peter Bailis, Alan Fekete, Ali Ghodsi, Joseph M. Hellerstein, and Ion Stoica. 2016. Scalable Atomic Visibility with RAMP Transactions. ACM Transactions on Database Systems (TODS), 41, 3 (2016), 15:1–15:45. Donald D. Chamberlin and Raymond F. Boyce. 1974. SEQUEL: A Structured English Query Language. In Proceedings of ACM SIGFIDET Workshop on Data Description, Access and Control (SIGFIDET). 249–264. Manuel Rigger and Zhendong Su. 2020. Detecting Optimization Bugs in Database Engines via Non-Optimizing Reference Engine Construction. In Proceedings of ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE). 1140–1152. Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, and Dinghao Wu. 2020. SQUI Jiang Yuancheng (e_1_2_1_43_1) Gray Jim (e_1_2_1_38_1) e_1_2_1_60_1 Zhang Jian (e_1_2_1_62_1) 2023 Khalek Shadi Abdul (e_1_2_1_45_1) 2008 Yang Rui (e_1_2_1_61_1) 2023 Bruno Nicolas (e_1_2_1_25_1) 2005 Cerone Andrea (e_1_2_1_28_1) 2015 Gray Jim (e_1_2_1_36_1) 1981 e_1_2_1_24_1 Slutz Donald R. (e_1_2_1_54_1) 1998 Tan Cheng (e_1_2_1_58_1) 2020 e_1_2_1_26_1 Cui Ziyu (e_1_2_1_32_1) 2022 Zheng Yingying (e_1_2_1_64_1) 2024 Brutschy Lucas (e_1_2_1_27_1) 2017 Clark Jack (e_1_2_1_30_1) 2024 Adya Atul (e_1_2_1_16_1) 1999 Donald (e_1_2_1_29_1) e_1_2_1_31_1 Zhong Rui (e_1_2_1_66_1) 2020 e_1_2_1_8_1 e_1_2_1_56_1 e_1_2_1_6_1 e_1_2_1_12_1 e_1_2_1_4_1 e_1_2_1_10_1 e_1_2_1_52_1 e_1_2_1_2_1 e_1_2_1_39_1 Berenson Hal (e_1_2_1_21_1) 1995 e_1_2_1_14_1 e_1_2_1_37_1 Jiang Zu-Ming (e_1_2_1_44_1) 2023 Hua Ziyue (e_1_2_1_41_1) 2023 e_1_2_1_42_1 e_1_2_1_65_1 Bailis Peter (e_1_2_1_20_1) 2016; 41 e_1_2_1_23_1 Cui Ziyu (e_1_2_1_33_1) 2024 Rigger Manuel (e_1_2_1_53_1) 2020 Kingsbury Kyle (e_1_2_1_46_1) 2020; 14 Bernstein Philip A (e_1_2_1_22_1) Bailis Peter (e_1_2_1_19_1) 2013; 7 Lewis Philip M (e_1_2_1_47_1) 2002; 31 Ba Jinsheng (e_1_2_1_18_1) 2023 Zheng Yingying (e_1_2_1_63_1) 2024 Li Haixiang (e_1_2_1_48_1) 2021; 33 Li Keqiang (e_1_2_1_49_1) 2023 Kenneth Houkjæ (e_1_2_1_40_1) 2006 Cui Ziyu (e_1_2_1_34_1) 2025 Tang Lei (e_1_2_1_59_1) 2025 e_1_2_1_7_1 Song Jiansen (e_1_2_1_57_1) 2025 e_1_2_1_5_1 Mang Qiuyang (e_1_2_1_50_1) 2024 e_1_2_1_3_1 e_1_2_1_13_1 e_1_2_1_51_1 e_1_2_1_1_1 e_1_2_1_11_1 Dou Wensheng (e_1_2_1_35_1) 2023 e_1_2_1_17_1 e_1_2_1_15_1 Song Jiansen (e_1_2_1_55_1) 2023 e_1_2_1_9_1 |
| References_xml | – reference: Haixiang Li, Xiaoyan Li, Chang Liu, Xiaoyong Du, Wei Lu, and Anqun Pan. 2021. Systematic Definition and Classification of Data Anomalies in DBMS. Journal of Software, 33, 3 (2021), 909–930. – reference: Jian Zhang, Ye Ji, Shuai Mu, and Cheng Tan. 2023. Viper: A Fast Snapshot Isolation Checker. In Proceedings of European Conference on Computer Systems (EuroSys). 654–671. – reference: 2023. go-randgen. https://github.com/pingcap/go-randgen – reference: Peter Bailis, Alan Fekete, Ali Ghodsi, Joseph M. Hellerstein, and Ion Stoica. 2016. Scalable Atomic Visibility with RAMP Transactions. ACM Transactions on Database Systems (TODS), 41, 3 (2016), 15:1–15:45. – reference: 2024. DB-Engines. https://db-engines.com/en/ranking – reference: Ranadeep Biswas and Constantin Enea. 2019. On the Complexity of Checking Transactional Consistency. In Proceedings of ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA). 165:1–165:28. – reference: Jiansen Song, Wensheng Dou, Ziyu Cui, Qianwang Dai, Wei Wang, Jun Wei, Hua Zhong, and Tao Huang. 2023. Testing Database Systems via Differential Query Execution. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 2072–2084. – reference: Hal Berenson, Phil Bernstein, Jim Gray, Jim Melton, Elizabeth O’Neil, and Patrick O’Neil. 1995. A Critique of ANSI SQL Isolation Levels. In Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 1–10. – reference: Andrea Cerone, Giovanni Bernardi, and Alexey Gotsman. 2015. A Framework for Transactional Consistency Models with Atomic Visibility. In Proceedings of International Conference on Concurrency Theory (CONCUR). 58–71. – reference: Jim Gray. 1981. The Transaction Concept: Virtues and Limitations. In Proceedings of International Conference on Very Large Data Bases (VLDB). 144–154. – reference: Robert Tarjan. 1972. Depth-First Search and Linear Graph Algorithms. SIAM J. Comput., 1, 2 (1972), 146–160. – reference: Donald R. Slutz. 1998. Massive Stochastic Testing of SQL. In Proceedings of International Conference on Very Large Data Bases (VLDB). 618–622. – reference: Edgar F. Codd. 1970. A Relational Model of Data for Large Shared Data Banks. Commun. ACM, 13, 6 (1970), 377–387. – reference: Yingying Zheng, Wensheng Dou, Lei Tang, Ziyu Cui, Yu Gao, Jiansen Song, Liang Xu, Jiaxin Zhu, Wei Wang, Jun Wei, Hua Zhong, and Tao Huang. 2024. Testing Gremlin-Based Graph Database Systems via Query Disassembling. In Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 1695–1707. – reference: 2024. MySQL 8.0.34. https://jepsen.io/analyses/mysql-8.0.34?file=mysql-8.0.34 – reference: Ziyu Cui, Wensheng Dou, Qianwang Dai, Jiansen Song, Wei Wang, Jun Wei, and Dan Ye. 2022. Differentially Testing Database Transactions for Fun and Profit. In Proceedings of IEEE/ACM International Conference on Automated Software Engineering (ASE). 35:1–35:12. – reference: Ziyue Hua, Wei Lin, Luyao Ren, Zongyang Li, Lu Zhang, Wenpin Jiao, and Tao Xie. 2023. GDsmith: Detecting Bugs in Cypher Graph Database Engines. In Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 163–174. – reference: Kenneth Houkjæ r, Kristian Torp, and Rico Wind. 2006. Simple and Realistic Data Generation. In Proceedings of International Conference on Very Large Data Bases (VLDB). 1243–1246. – reference: Manuel Rigger and Zhendong Su. 2020. Testing Database Engines via Pivoted Query Synthesis. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 667–682. – reference: Donald D. Chamberlin and Raymond F. Boyce. 1974. SEQUEL: A Structured English Query Language. In Proceedings of ACM SIGFIDET Workshop on Data Description, Access and Control (SIGFIDET). 249–264. – reference: Cheng Tan, Changgeng Zhao, Shuai Mu, and Michael Walfish. 2020. Cobra: Making Transactional Key-Value Stores Verifiably Serializable. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 63–80. – reference: Jiansen Song, Wensheng Dou, Yu Gao, Ziyu Cui, Yingying Zheng, Dong Wang, Wei Wang, Jun Wei, and Tao Huang. 2024. Detecting Metadata-Related Logic Bugs in Database Systems via Raw Database Construction. Proceedings of the VLDB Endowment (VLDB), 17, 8 (2024), 1884–1897. – reference: 2024. Jepsen. https://github.com/jepsen-io/jepsen – reference: 2024. SQLsmith. https://jepsen.io – reference: Jim Gray, Prakash Sundaresan, Susanne Englert, Ken Baclawski, and Peter J. Weinberger. 1994. Quickly Generating Billion-Record Synthetic Databases. In Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 243–252. – reference: 2024. The ANSI Isolation Levels. http://www.adp-gmbh.ch/ora/misc/isolation_level.html – reference: Kyle Kingsbury and Peter Alvaro. 2020. Elle: Inferring Isolation Anomalies from Experimental Observations. In Proceedings of the VLDB Endowment (VLDB). 14, 268–280. – reference: Atul Adya, Barbara Liskov, and Patrick O’Neil. 2000. Generalized Isolation Level Definitions. In Proceedings of International Conference on Data Engineering (ICDE). 67–78. – reference: 2024. PostgreSQL. https://www.postgresql.org – reference: Jack Clark, Alastair F Donaldson, John Wickerson, and Manuel Rigger. 2024. Validating Database System Isolation Level Implementations with Version Certificate Recovery. In Proceedings of European Conference on Computer Systems (EuroSys). 754–768. – reference: Theo Haerder and Andreas Reuter. 1983. Principles of Transaction-Oriented Database Recovery. ACM Computing Surveys (CSUR), 15, 4 (1983), 287–317. – reference: 2024. MariaDB. https://mariadb.org – reference: Jinsheng Ba and Manuel Rigger. 2023. Testing Database Engines via Query Plan Guidance. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 2060–2071. – reference: Peter Bailis, Aaron Davidson, Alan Fekete, Ali Ghodsi, Joseph M. Hellerstein, and Ion Stoica. 2013. Highly Available Transactions: Virtues and Limitations. Proceedings of the VLDB Endowment (VLDB), 7, 3 (2013), 181–192. – reference: Atul Adya. 1999. Weak Consistency: A Generalized Theory and Optimistic Implementations for Distributed Transactions. Ph. D. Dissertation. Massachusetts Institute of Technology. – reference: 2024. CockroachDB. https://www.cockroachlabs.com – reference: 2024. SQLancer. https://www.manuelrigger.at/dbms-bugs – reference: Kaile Huang, Si Liu, Zhenge Chen, Hengfeng Wei, David Basin, Haixiang Li, and Anqun Pan. 2023. Efficient Black-box Checking of Snapshot Isolation in Databases. Proceedings of the VLDB Endowment (VLDB), 16, 6 (2023), 1264–1276. – reference: Ziyu Cui, Wensheng Dou, Yu Gao, Rui Yang, Yingying Zheng, Jiansen Song, Yuan Feng, and Jun Wei. 2025. Simple Testing Can Expose Most Critical Transaction Bugs: Understanding and Detecting Write-Specific Serializability Violations in Database Systems. Proceedings of the VLDB Endowment (VLDB). – reference: Wensheng Dou, Ziyu Cui, Qianwang Dai, Jiansen Song, Dong Wang, Yu Gao, Wei Wang, Jun Wei, Lei Chen, Hanmo Wang, Hua Zhong, and Tao Huang. 2023. Detecting Isolation Bugs via Transaction Oracle Construction. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 1123–1135. – reference: Zu-Ming Jiang, Si Liu, Manuel Rigger, and Zhendong Su. 2023. Detecting Transactional Bugs in Database Engines via Graph-Based Oracle Construction. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 397–417. – reference: Lei Tang, Wensheng Dou, Yingying Zheng, Lijie Xu, Wei Wang, Jun Wei, and Tao Huang. 2025. Proving Cypher Query Equivalence. In Proceedings of IEEE International Conference on Data Engineering (ICDE). – reference: Yuancheng Jiang, Jiahao Liu, Jinsheng Ba, Roland H. C. Yap, Zhenkai Liang, and Manuel Rigger. 2024. Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). Article 46, 12 pages. – reference: Qiuyang Mang, Aoyang Fang, Boxi Yu, Hanfei Chen, and Pinjia He. 2024. Testing Graph Database Systems via Equivalent Query Rewriting. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). Article 143, 12 pages. – reference: Manuel Rigger and Zhendong Su. 2020. Detecting Optimization Bugs in Database Engines via Non-Optimizing Reference Engine Construction. In Proceedings of ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE). 1140–1152. – reference: Jiansen Song, Wensheng Dou, Yingying Zheng, Yu Gao, Ziyu Cui, Wei Wang, and Jun Wei. 2025. Detecting Schema-Related Logic Bugs in Relational DBMSs via Equivalent Database Construction. Proceedings of the VLDB Endowment (VLDB). – reference: Lucas Brutschy, Dimitar Dimitrov, Peter Müller, and Martin Vechev. 2017. Serializability for Eventual Consistency: Criterion, Analysis, and Applications. In Proceedings of ACM SIGPLAN Symposium on Principles of Programming Languages (POPL). 458–472. – reference: Manuel Rigger and Zhendong Su. 2020. Finding Bugs in Database Systems via Query Partitioning. Proceedings of the ACM on Programming Languages, 4, OOPSLA (2020), 211:1–211:30. – reference: Shadi Abdul Khalek, Bassem Elkarablieh, Yai O Laleye, and Sarfraz Khurshid. 2008. Query-Aware Test Generation Using a Relational Constraint Solver. In Proceedings of IEEE/ACM International Conference on Automated Software Engineering (ASE). 238–247. – reference: 2024. PostgreSQL 12.3. https://jepsen.io/analyses/postgresql-12.3?file=postgresql-12.3 – reference: Nicolas Bruno and Surajit Chaudhuri. 2005. Flexible Database Generators. In Proceedings of International Conference on Very Large Data Bases (VLDB). 1097–1107. – reference: Keqiang Li, Siyang Weng, Peiyuan Liu, Lyu Ni, Chengcheng Yang, Rong Zhang, Xuan Zhou, Jianghang Lou, Gui Huang, Weining Qian, and Aoying Zhou. 2023. Leopard: A Black-Box Approach for Efficiently Verifying Various Isolation Levels. In Proceedings of IEEE International Conference on Data Engineering (ICDE). 722–735. – reference: Jim Gray and Andreas Reuter. 1992. Transaction Processing: Concepts and Techniques. Elsevier. – reference: Carsten Binnig, Donald Kossmann, Eric Lo, and M. Tamer Özsu. 2007. QAGen: Generating Query-Aware Test Databases. In Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 341–352. – reference: Yingying Zheng, Wensheng Dou, Lei Tang, Ziyu Cui, Jiansen Song, Ziyue Cheng, Wei Wang, Jun Wei, Hua Zhong, and Tao Huang. 2024. Differential Optimization Testing of Gremlin-Based Graph Database Systems. In Proceedings of IEEE International Conference on Software Testing, Verification and Validation (ICST). 25–36. – reference: Philip A Bernstein, Vassos Hadzilacos, and Nathan Goodman. 1987. Concurrency Control and Recovery in Database Systems. Addison-Wesley Longman Publishing Co., Inc.. – reference: Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, and Dinghao Wu. 2020. SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (CCS). 58–71. – reference: Yingying Zheng, Wensheng Dou, Yicheng Wang, Zheng Qin, Lei Tang, Yu Gao, Dong Wang, Wei Wang, and Jun Wei. 2022. Finding Bugs in Gremlin-Based Graph Database Systems via Randomized Differential Testing. In Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 302–313. – reference: Rui Yang, Yingying Zheng, Lei Tang, Wensheng Dou, Wei Wang, and Jun Wei. 2023. Randomized Differential Testing of RDF Stores. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE Demo). 136–140. – reference: 2024. TiDB 2.1.7. https://jepsen.io/analyses/tidb-2.1.7?file=tidb-2.1.7 – reference: 2024. MySQL. https://www.mysql.com – reference: Nicolas Bruno, Surajit Chaudhuri, and Dilys Thomas. 2006. Generating Queries with Cardinality Constraints for DBMS Testing. IEEE Transactions on Knowledge and Data Engineering (TKDE), 18, 12 (2006), 1721–1725. – reference: 2024. GitHub. https://github.com – reference: Philip M Lewis, Arthur Bernstein, and Michael Kifer. 2002. Databases and Transaction Processing: An Application-Oriented Approach. ACM SIGMOD Record, 31, 1 (2002), 74–75. – reference: 2024. TiDB, PingCAP. https://pingcap.com – reference: Ziyu Cui, Wensheng Dou, Yu Gao, Dong Wang, Jiansen Song, Yingying Zheng, Tao Wang, Rui Yang, Kang Xu, Yixin Hu, Jun Wei, and Tao Huang. 2024. Understanding Transaction Bugs in Database Systems. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 163:1–163:13. – ident: e_1_2_1_42_1 doi: 10.14778/3583140.3583145 – volume-title: Proceedings of ACM SIGSAC Conference on Computer and Communications Security (CCS). 58–71 year: 2020 ident: e_1_2_1_66_1 – volume-title: Proceedings of International Conference on Very Large Data Bases (VLDB). 1243–1246 year: 2006 ident: e_1_2_1_40_1 – volume-title: Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 667–682 year: 2020 ident: e_1_2_1_53_1 – volume: 31 start-page: 74 year: 2002 ident: e_1_2_1_47_1 article-title: Databases and Transaction Processing: An Application-Oriented Approach publication-title: ACM SIGMOD Record doi: 10.1145/507338.507354 – volume-title: Proceedings of the VLDB Endowment (VLDB). year: 2025 ident: e_1_2_1_34_1 – volume-title: Proceedings of the VLDB Endowment (VLDB). year: 2025 ident: e_1_2_1_57_1 – volume-title: Proceedings of International Conference on Very Large Data Bases (VLDB). 618–622 year: 1998 ident: e_1_2_1_54_1 – volume-title: Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 163–174 year: 2023 ident: e_1_2_1_41_1 – volume-title: Concurrency Control and Recovery in Database Systems ident: e_1_2_1_22_1 – volume-title: Proceedings of IEEE/ACM International Conference on Automated Software Engineering (ASE). 35:1–35:12 year: 2022 ident: e_1_2_1_32_1 – volume-title: Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 1695–1707 year: 2024 ident: e_1_2_1_63_1 – ident: e_1_2_1_12_1 – ident: e_1_2_1_4_1 – volume-title: Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). Article 143 year: 2024 ident: e_1_2_1_50_1 – ident: e_1_2_1_39_1 doi: 10.1145/289.291 – volume-title: Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 2072–2084 year: 2023 ident: e_1_2_1_55_1 – ident: e_1_2_1_60_1 doi: 10.1137/0201010 – volume-title: Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE Demo). 136–140 year: 2023 ident: e_1_2_1_61_1 – ident: e_1_2_1_56_1 doi: 10.14778/3659437.3659445 – volume-title: Proceedings of IEEE/ACM International Conference on Automated Software Engineering (ASE). 238–247 year: 2008 ident: e_1_2_1_45_1 – ident: e_1_2_1_8_1 – volume-title: Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 1–10 year: 1995 ident: e_1_2_1_21_1 – volume: 14 start-page: 268 year: 2020 ident: e_1_2_1_46_1 article-title: Elle: Inferring Isolation Anomalies from Experimental Observations publication-title: Proceedings of the VLDB Endowment (VLDB). doi: 10.14778/3430915.3430918 – ident: e_1_2_1_2_1 – volume-title: Proceedings of International Conference on Very Large Data Bases (VLDB). 144–154 year: 1981 ident: e_1_2_1_36_1 – ident: e_1_2_1_5_1 – volume-title: Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 243–252 ident: e_1_2_1_38_1 – volume-title: Proceedings of European Conference on Computer Systems (EuroSys). 754–768 year: 2024 ident: e_1_2_1_30_1 – ident: e_1_2_1_37_1 doi: 10.5555/573304 – ident: e_1_2_1_13_1 – ident: e_1_2_1_65_1 doi: 10.1145/3533767.3534409 – ident: e_1_2_1_10_1 – volume-title: Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 397–417 year: 2023 ident: e_1_2_1_44_1 – volume-title: Proceedings of International Conference on Very Large Data Bases (VLDB). 1097–1107 year: 2005 ident: e_1_2_1_25_1 – volume: 7 start-page: 181 year: 2013 ident: e_1_2_1_19_1 article-title: Highly Available Transactions: Virtues and Limitations publication-title: Proceedings of the VLDB Endowment (VLDB) doi: 10.14778/2732232.2732237 – ident: e_1_2_1_17_1 doi: 10.1109/ICDE.2000.839388 – ident: e_1_2_1_31_1 doi: 10.1145/362384.362685 – ident: e_1_2_1_7_1 – year: 1999 ident: e_1_2_1_16_1 article-title: Weak Consistency: A Generalized Theory and Optimistic Implementations for Distributed publication-title: Transactions. Ph. D. Dissertation. Massachusetts Institute of Technology. – ident: e_1_2_1_23_1 doi: 10.1145/1247480.1247520 – volume-title: Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). Article 46 ident: e_1_2_1_43_1 – volume: 41 year: 2016 ident: e_1_2_1_20_1 article-title: Scalable Atomic Visibility with RAMP Transactions publication-title: ACM Transactions on Database Systems (TODS) – volume: 33 start-page: 909 year: 2021 ident: e_1_2_1_48_1 article-title: Systematic Definition and Classification of Data Anomalies in DBMS publication-title: Journal of Software – volume-title: Proceedings of IEEE International Conference on Data Engineering (ICDE). 722–735 year: 2023 ident: e_1_2_1_49_1 – ident: e_1_2_1_51_1 doi: 10.1145/3368089.3409710 – ident: e_1_2_1_1_1 – volume-title: Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 2060–2071 year: 2023 ident: e_1_2_1_18_1 – volume-title: Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 63–80 year: 2020 ident: e_1_2_1_58_1 – ident: e_1_2_1_15_1 – ident: e_1_2_1_14_1 – volume-title: Proceedings of ACM SIGFIDET Workshop on Data Description, Access and Control (SIGFIDET). 249–264 ident: e_1_2_1_29_1 – ident: e_1_2_1_6_1 – volume-title: Proceedings of ACM SIGPLAN Symposium on Principles of Programming Languages (POPL). 458–472 year: 2017 ident: e_1_2_1_27_1 – ident: e_1_2_1_3_1 – volume-title: Proceedings of International Conference on Concurrency Theory (CONCUR). 58–71 year: 2015 ident: e_1_2_1_28_1 – ident: e_1_2_1_11_1 – volume-title: Proceedings of IEEE International Conference on Data Engineering (ICDE). year: 2025 ident: e_1_2_1_59_1 – volume-title: Proceedings of IEEE International Conference on Software Testing, Verification and Validation (ICST). 25–36 year: 2024 ident: e_1_2_1_64_1 – ident: e_1_2_1_52_1 doi: 10.1145/3428279 – volume-title: Proceedings of European Conference on Computer Systems (EuroSys). 654–671 year: 2023 ident: e_1_2_1_62_1 – volume-title: Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 1123–1135 year: 2023 ident: e_1_2_1_35_1 – ident: e_1_2_1_26_1 doi: 10.1109/TKDE.2006.190 – ident: e_1_2_1_9_1 – ident: e_1_2_1_24_1 doi: 10.1145/3360591 – volume-title: Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 163:1–163:13 year: 2024 ident: e_1_2_1_33_1 |
| SSID | ssj0002991170 |
| Score | 2.2952545 |
| Snippet | Relational Database Management Systems (DBMSs) utilize transactions to ensure data consistency and integrity, while providing multiple isolation levels to... |
| SourceID | crossref acm |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 1725 |
| SubjectTerms | Software and its engineering Software testing and debugging |
| SubjectTermsDisplay | Software and its engineering -- Software testing and debugging |
| Title | Detecting Isolation Anomalies in Relational DBMSs |
| URI | https://dl.acm.org/doi/10.1145/3728953 |
| Volume | 2 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2994-970X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002991170 issn: 2994-970X databaseCode: M~E dateStart: 20240101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT-MwELZ47IELr2W15bHyAe0t2saN4_hYXrsrUYRoVypcKjt2RKUlIEJ4XPjtjB3HyVZIsAcuUWXZbuqZznzz8AxCu5ooE42JgygixkCBfzonshcAco4lqKxECdu15JidnCTjMT91EdPCthNgeZ48PvKbDyU1jAGxzdXZ_yC33xQG4DMQHZ5Adni-i_AH2sQFbCIAfFFFXzDyrwBw2-Qrn_9mBN7eYFi08emp12dFnT3Q3x-YiEIB8vrBpInppoKhFxnO6XxWTn1Mo7RpAhfTp9Jj5evSZvSB4Xypm8U_hfXWnpdtBwShJlGKtHySxFQX5qw7rlTKK2NO0JIWP_0eDkf9luAEHEVbShjsJPa6gI9MLYweAzuxKjL8bwntGdXmEw6r69d04hbOo0XCKDcpgIPnxicHb20a8Zh-hPX7V_eszdofbq2BMelVC8a08MhoFS07QwL3KwZYQ3M6X0crdZMO7GT2ZxR6fsCeH7DnBzzNccMP2PLDBvpzdDja_xW4PhmBCAHdBWGSJErxTFIG-D9NYp6RWDGhtBYZi3QmZSy6RKpIKtWlVKoeEXHCJUt12M1o7wtayK9z_RVhQLcglkVEBeUA9ZSETSjJYiZTOBkZdtA6_PjJTVUJpT7ODvpeH8YkdaXlTYeTv5OZc-8g7CfWe8xM2Xx7yhZaavhwGy3c3ZZ6B31K7--mxe03S9IXcRliYw |
| linkProvider | ISSN International Centre |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Detecting+Isolation+Anomalies+in+Relational+DBMSs&rft.jtitle=Proceedings+of+the+ACM+on+software+engineering&rft.au=Yang%2C+Rui&rft.au=Cui%2C+Ziyu&rft.au=Dou%2C+Wensheng&rft.au=Gao%2C+Yu&rft.date=2025-06-22&rft.issn=2994-970X&rft.eissn=2994-970X&rft.volume=2&rft.issue=ISSTA&rft.spage=1725&rft.epage=1747&rft_id=info:doi/10.1145%2F3728953&rft.externalDBID=n%2Fa&rft.externalDocID=10_1145_3728953 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2994-970X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2994-970X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2994-970X&client=summon |