Ad Hoc Transactions through the Looking Glass: An Empirical Study of Application-Level Transactions in Web Applications

Many transactions in web applications are constructed ad hoc in the application code. For example, developers might explicitly use locking primitives or validation procedures to coordinate critical code fragments. We refer to database operations coordinated by application code as ad hoc transactions...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACM transactions on database systems 2024-02, Vol.49 (1), p.1-43, Article 3
Hauptverfasser: Wang, Zhaoguo, Tang, Chuzhe, Zhang, Xiaodong, Yu, Qianmian, Zang, Binyu, Guan, Haibing, Chen, Haibo
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 43
container_issue 1
container_start_page 1
container_title ACM transactions on database systems
container_volume 49
creator Wang, Zhaoguo
Tang, Chuzhe
Zhang, Xiaodong
Yu, Qianmian
Zang, Binyu
Guan, Haibing
Chen, Haibo
description Many transactions in web applications are constructed ad hoc in the application code. For example, developers might explicitly use locking primitives or validation procedures to coordinate critical code fragments. We refer to database operations coordinated by application code as ad hoc transactions. Until now, little is known about them. This paper presents the first comprehensive study on ad hoc transactions. By studying 91 ad hoc transactions among eight popular open-source web applications, we found that (i) every studied application uses ad hoc transactions (up to 16 per application), 71 of which play critical roles; (ii) compared with database transactions, concurrency control of ad hoc transactions is much more flexible; (iii) ad hoc transactions are error-prone—53 of them have correctness issues, and 33 of them are confirmed by developers; and (iv) ad hoc transactions have the potential for improving performance in contentious workloads by utilizing application semantics such as access patterns. Based on these findings, we discuss the implications of ad hoc transactions to the database research community.
doi_str_mv 10.1145/3638553
format Article
fullrecord <record><control><sourceid>acm_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1145_3638553</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3638553</sourcerecordid><originalsourceid>FETCH-LOGICAL-a1543-97280a6603a74d4ea3e73c60d3e72b3adac011da53530d40c6113956f480dd453</originalsourceid><addsrcrecordid>eNpVkDFPwzAQhS0EEqEgdiZvTAG7ZzsJW1SVFikSA0WM0dV22kASR3YL6r8nVQuC6ZPuvveGR8g1Z3ecC3kPClIp4YREXMokFkqIUxIxUONYZlyek4sQ3hljIs2SiHzlhs6dpguPXUC9qV0X6Gbt3Xa1Hmhp4dxH3a3orMEQHmje0Wnb177W2NCXzdbsqKto3vfNcNmn48J-2uZ_X93RN7v8a4VLclZhE-zVkSPy-jhdTOZx8Tx7muRFjFwKiLNknDJUigEmwgiLYBPQipmB4yWgQc04NyhBAjOCacU5ZFJVImXGCAkjcnvo1d6F4G1V9r5u0e9Kzsr9XuVxr8G8OZio21_p5_kNPONlHg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Ad Hoc Transactions through the Looking Glass: An Empirical Study of Application-Level Transactions in Web Applications</title><source>ACM Digital Library</source><creator>Wang, Zhaoguo ; Tang, Chuzhe ; Zhang, Xiaodong ; Yu, Qianmian ; Zang, Binyu ; Guan, Haibing ; Chen, Haibo</creator><creatorcontrib>Wang, Zhaoguo ; Tang, Chuzhe ; Zhang, Xiaodong ; Yu, Qianmian ; Zang, Binyu ; Guan, Haibing ; Chen, Haibo</creatorcontrib><description>Many transactions in web applications are constructed ad hoc in the application code. For example, developers might explicitly use locking primitives or validation procedures to coordinate critical code fragments. We refer to database operations coordinated by application code as ad hoc transactions. Until now, little is known about them. This paper presents the first comprehensive study on ad hoc transactions. By studying 91 ad hoc transactions among eight popular open-source web applications, we found that (i) every studied application uses ad hoc transactions (up to 16 per application), 71 of which play critical roles; (ii) compared with database transactions, concurrency control of ad hoc transactions is much more flexible; (iii) ad hoc transactions are error-prone—53 of them have correctness issues, and 33 of them are confirmed by developers; and (iv) ad hoc transactions have the potential for improving performance in contentious workloads by utilizing application semantics such as access patterns. Based on these findings, we discuss the implications of ad hoc transactions to the database research community.</description><identifier>ISSN: 0362-5915</identifier><identifier>EISSN: 1557-4644</identifier><identifier>DOI: 10.1145/3638553</identifier><language>eng</language><publisher>New York, NY: ACM</publisher><subject>Database transaction processing ; Information systems ; Web applications</subject><ispartof>ACM transactions on database systems, 2024-02, Vol.49 (1), p.1-43, Article 3</ispartof><rights>Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-a1543-97280a6603a74d4ea3e73c60d3e72b3adac011da53530d40c6113956f480dd453</cites><orcidid>0009-0004-1834-8942 ; 0000-0002-4714-7400 ; 0000-0001-8923-9293 ; 0000-0002-0220-5726 ; 0000-0001-7757-5708 ; 0000-0002-9720-0361 ; 0000-0002-1968-7645</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://dl.acm.org/doi/pdf/10.1145/3638553$$EPDF$$P50$$Gacm$$H</linktopdf><link.rule.ids>314,780,784,2282,27924,27925,40196,76228</link.rule.ids></links><search><creatorcontrib>Wang, Zhaoguo</creatorcontrib><creatorcontrib>Tang, Chuzhe</creatorcontrib><creatorcontrib>Zhang, Xiaodong</creatorcontrib><creatorcontrib>Yu, Qianmian</creatorcontrib><creatorcontrib>Zang, Binyu</creatorcontrib><creatorcontrib>Guan, Haibing</creatorcontrib><creatorcontrib>Chen, Haibo</creatorcontrib><title>Ad Hoc Transactions through the Looking Glass: An Empirical Study of Application-Level Transactions in Web Applications</title><title>ACM transactions on database systems</title><addtitle>ACM TODS</addtitle><description>Many transactions in web applications are constructed ad hoc in the application code. For example, developers might explicitly use locking primitives or validation procedures to coordinate critical code fragments. We refer to database operations coordinated by application code as ad hoc transactions. Until now, little is known about them. This paper presents the first comprehensive study on ad hoc transactions. By studying 91 ad hoc transactions among eight popular open-source web applications, we found that (i) every studied application uses ad hoc transactions (up to 16 per application), 71 of which play critical roles; (ii) compared with database transactions, concurrency control of ad hoc transactions is much more flexible; (iii) ad hoc transactions are error-prone—53 of them have correctness issues, and 33 of them are confirmed by developers; and (iv) ad hoc transactions have the potential for improving performance in contentious workloads by utilizing application semantics such as access patterns. Based on these findings, we discuss the implications of ad hoc transactions to the database research community.</description><subject>Database transaction processing</subject><subject>Information systems</subject><subject>Web applications</subject><issn>0362-5915</issn><issn>1557-4644</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNpVkDFPwzAQhS0EEqEgdiZvTAG7ZzsJW1SVFikSA0WM0dV22kASR3YL6r8nVQuC6ZPuvveGR8g1Z3ecC3kPClIp4YREXMokFkqIUxIxUONYZlyek4sQ3hljIs2SiHzlhs6dpguPXUC9qV0X6Gbt3Xa1Hmhp4dxH3a3orMEQHmje0Wnb177W2NCXzdbsqKto3vfNcNmn48J-2uZ_X93RN7v8a4VLclZhE-zVkSPy-jhdTOZx8Tx7muRFjFwKiLNknDJUigEmwgiLYBPQipmB4yWgQc04NyhBAjOCacU5ZFJVImXGCAkjcnvo1d6F4G1V9r5u0e9Kzsr9XuVxr8G8OZio21_p5_kNPONlHg</recordid><startdate>20240228</startdate><enddate>20240228</enddate><creator>Wang, Zhaoguo</creator><creator>Tang, Chuzhe</creator><creator>Zhang, Xiaodong</creator><creator>Yu, Qianmian</creator><creator>Zang, Binyu</creator><creator>Guan, Haibing</creator><creator>Chen, Haibo</creator><general>ACM</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0009-0004-1834-8942</orcidid><orcidid>https://orcid.org/0000-0002-4714-7400</orcidid><orcidid>https://orcid.org/0000-0001-8923-9293</orcidid><orcidid>https://orcid.org/0000-0002-0220-5726</orcidid><orcidid>https://orcid.org/0000-0001-7757-5708</orcidid><orcidid>https://orcid.org/0000-0002-9720-0361</orcidid><orcidid>https://orcid.org/0000-0002-1968-7645</orcidid></search><sort><creationdate>20240228</creationdate><title>Ad Hoc Transactions through the Looking Glass: An Empirical Study of Application-Level Transactions in Web Applications</title><author>Wang, Zhaoguo ; Tang, Chuzhe ; Zhang, Xiaodong ; Yu, Qianmian ; Zang, Binyu ; Guan, Haibing ; Chen, Haibo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a1543-97280a6603a74d4ea3e73c60d3e72b3adac011da53530d40c6113956f480dd453</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Database transaction processing</topic><topic>Information systems</topic><topic>Web applications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wang, Zhaoguo</creatorcontrib><creatorcontrib>Tang, Chuzhe</creatorcontrib><creatorcontrib>Zhang, Xiaodong</creatorcontrib><creatorcontrib>Yu, Qianmian</creatorcontrib><creatorcontrib>Zang, Binyu</creatorcontrib><creatorcontrib>Guan, Haibing</creatorcontrib><creatorcontrib>Chen, Haibo</creatorcontrib><collection>CrossRef</collection><jtitle>ACM transactions on database systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wang, Zhaoguo</au><au>Tang, Chuzhe</au><au>Zhang, Xiaodong</au><au>Yu, Qianmian</au><au>Zang, Binyu</au><au>Guan, Haibing</au><au>Chen, Haibo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Ad Hoc Transactions through the Looking Glass: An Empirical Study of Application-Level Transactions in Web Applications</atitle><jtitle>ACM transactions on database systems</jtitle><stitle>ACM TODS</stitle><date>2024-02-28</date><risdate>2024</risdate><volume>49</volume><issue>1</issue><spage>1</spage><epage>43</epage><pages>1-43</pages><artnum>3</artnum><issn>0362-5915</issn><eissn>1557-4644</eissn><abstract>Many transactions in web applications are constructed ad hoc in the application code. For example, developers might explicitly use locking primitives or validation procedures to coordinate critical code fragments. We refer to database operations coordinated by application code as ad hoc transactions. Until now, little is known about them. This paper presents the first comprehensive study on ad hoc transactions. By studying 91 ad hoc transactions among eight popular open-source web applications, we found that (i) every studied application uses ad hoc transactions (up to 16 per application), 71 of which play critical roles; (ii) compared with database transactions, concurrency control of ad hoc transactions is much more flexible; (iii) ad hoc transactions are error-prone—53 of them have correctness issues, and 33 of them are confirmed by developers; and (iv) ad hoc transactions have the potential for improving performance in contentious workloads by utilizing application semantics such as access patterns. Based on these findings, we discuss the implications of ad hoc transactions to the database research community.</abstract><cop>New York, NY</cop><pub>ACM</pub><doi>10.1145/3638553</doi><tpages>43</tpages><orcidid>https://orcid.org/0009-0004-1834-8942</orcidid><orcidid>https://orcid.org/0000-0002-4714-7400</orcidid><orcidid>https://orcid.org/0000-0001-8923-9293</orcidid><orcidid>https://orcid.org/0000-0002-0220-5726</orcidid><orcidid>https://orcid.org/0000-0001-7757-5708</orcidid><orcidid>https://orcid.org/0000-0002-9720-0361</orcidid><orcidid>https://orcid.org/0000-0002-1968-7645</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0362-5915
ispartof ACM transactions on database systems, 2024-02, Vol.49 (1), p.1-43, Article 3
issn 0362-5915
1557-4644
language eng
recordid cdi_crossref_primary_10_1145_3638553
source ACM Digital Library
subjects Database transaction processing
Information systems
Web applications
title Ad Hoc Transactions through the Looking Glass: An Empirical Study of Application-Level Transactions in Web Applications
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T22%3A40%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-acm_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Ad%20Hoc%20Transactions%20through%20the%20Looking%20Glass:%20An%20Empirical%20Study%20of%20Application-Level%20Transactions%20in%20Web%20Applications&rft.jtitle=ACM%20transactions%20on%20database%20systems&rft.au=Wang,%20Zhaoguo&rft.date=2024-02-28&rft.volume=49&rft.issue=1&rft.spage=1&rft.epage=43&rft.pages=1-43&rft.artnum=3&rft.issn=0362-5915&rft.eissn=1557-4644&rft_id=info:doi/10.1145/3638553&rft_dat=%3Cacm_cross%3E3638553%3C/acm_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true