Phoenix
Record locking protocols
Hold write locks => eliminate dirty read
Hold read locks => repeatable read with phantoms
Hold “predicate locks” => consistent read & serializable transactions
Locking and clusters