Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Bahareh Sadat Arab is active.

Publication


Featured researches published by Bahareh Sadat Arab.


conference on information and knowledge management | 2016

Reenactment for Read-Committed Snapshot Isolation

Bahareh Sadat Arab; Dieter Gawlick; Vasudha Krishnaswamy; Venkatesh Radhakrishnan; Boris Glavic

Provenance for transactional updates is critical for many applications such as auditing and debugging of transactions. Recently, we have introduced MV-semirings, an extension of the semiring provenance model that supports updates and transactions. Furthermore, we have proposed reenactment, a declarative form of replay with provenance capture, as an efficient and non-invasive method for computing this type of provenance. However, this approach is limited to the snapshot isolation (SI) concurrency control protocol while many real world applications apply the read committed version of snapshot isolation (RC-SI) to improve performance at the cost of consistency. We present non trivial extensions of the model and reenactment approach to be able to compute provenance of RC-SI transactions efficiently. In addition, we develop techniques for applying reenactment across multiple RC-SI transactions. Our experiments demonstrate that our implementation in the GProM system supports efficient re-construction and querying of provenance.


IEEE Transactions on Knowledge and Data Engineering | 2018

Using Reenactment to Retroactively Capture Provenance for Transactions

Bahareh Sadat Arab; Dieter Gawlick; Vasudha Krishnaswamy; Venkatesh Radhakrishnan; Boris Glavic

Database provenance explains how results are derived by queries. However, many use cases such as auditing and debugging of transactions require understanding of how the current state of a database was derived by a transactional history. We present MV-semirings, a provenance model for queries and transactional histories that supports two common multi-version concurrency control protocols: snapshot isolation (SI) and read committed snapshot isolation (RC-SI). Furthermore, we introduce an approach for retroactively capturing such provenance using reenactment, a novel technique for replaying a transactional history with provenance capture. Reenactment exploits the time travel and audit logging capabilities of modern DBMS to replay parts of a transactional history using queries. Importantly, our technique requires no changes to the transactional workload or underlying DBMS and results in only moderate runtime overhead for transactions. We have implemented our approach on top of a commercial DBMS and our experiments confirm that by applying novel optimizations we can efficiently capture provenance for complex transactions over large data sets.


very large data bases | 2017

Debugging transactions and tracking their provenance with reenactment

Xing Niu; Bahareh Sadat Arab; Seokki Lee; Su Feng; Xun Zou; Dieter Gawlick; Vasudha Krishnaswamy; Zhen Hua Liu; Boris Glavic

Debugging transactions and understanding their execution are of immense importance for developing OLAP applications, to trace causes of errors in production systems, and to audit the operations of a database. However, debugging transactions is hard for several reasons: 1) after the execution of a transaction, its input is no longer available for debugging, 2) internal states of a transaction are typically not accessible, and 3) the execution of a transaction may be affected by concurrently running transactions. We present a debugger for transactions that enables non-invasive, postmortem debugging of transactions with provenance tracking and supports what-if scenarios (changes to transaction code or data). Using reenactment, a declarative replay technique we have developed, a transaction is replayed over the state of the DB seen by its original execution including all its interactions with concurrently executed transactions from the history. Importantly, our approach uses the temporal database and audit logging capabilities available in many DBMS and does not require any modifications to the underlying database system nor transactional workload.


Proceedings of the 6th USENIX Workshop on the Theory and Practice of Provenance | 2014

A Generic Provenance Middleware for Database Queries, Updates, and Transactions

Bahareh Sadat Arab; Dieter Gawlick; Venkatesh Radhakrishnan; Hao Guo; Boris Glavic


conference on innovative data systems research | 2017

Adaptive Schema Databases

William Spoth; Bahareh Sadat Arab; Eric S. Chan; Dieter Gawlick; Adel Ghoneimy; Boris Glavic; Beda Christoph Hammerschmidt; Oliver Kennedy; Seokki Lee; Zhen Hua Liu; Xing Niu; Ying Yang


6th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2014) | 2014

A Generic Provenance Middleware for Queries, Updates, and Transactions

Bahareh Sadat Arab; Dieter Gawlick; Venkatesh Radhakrishnan; Hao Guo; Boris Glavic


Archive | 2014

Reenacting Transactions to Compute their Provenance

Bahareh Sadat Arab; Dieter Gawlick; Vasudha Krishnaswamy; Venkatesh Radhakrishnan; Boris Glavic


Archive | 2016

Formal Foundations of Reenactment and Transaction Provenance

Bahareh Sadat Arab; Dieter Gawlick; Vasudha Krishnaswamy; Venkatesh Radhakrishnan; Boris Glavic


TaPP'16 Proceedings of the 8th USENIX Conference on Theory and Practice of Provenance | 2016

Provenance-aware versioned dataworkspaces

Xing Niu; Bahareh Sadat Arab; Dieter Gawlick; Zhen Hua Liu; Vasudha Krishnaswamy; Oliver Kennedy; Boris Glavic


IEEE Data(base) Engineering Bulletin | 2018

GProM - A Swiss Army Knife for Your Provenance Needs.

Bahareh Sadat Arab; Su Feng; Boris Glavic; Seokki Lee; Xing Niu; Qitian Zeng

Collaboration


Dive into the Bahareh Sadat Arab's collaboration.

Top Co-Authors

Avatar

Boris Glavic

Illinois Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xing Niu

Illinois Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Seokki Lee

Illinois Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hao Guo

Illinois Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Su Feng

Illinois Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge