{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T06:41:13Z","timestamp":1698043273224},"reference-count":17,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2007,3,22]],"date-time":"2007-03-22T00:00:00Z","timestamp":1174521600000},"content-version":"vor","delay-in-days":5924,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Systems &amp; Computers in Japan"],"published-print":{"date-parts":[[1991,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Locking is used widely for concurrency control in database systems, and locking methods are categorized as static locking or dynamic locking. For distributed database systems, this paper proposes a new deadlock prevention method for static locking and a new deadlock avoidance method for dynamic locking. The common advantages of these methods are as follows: (1) system performance is improved by using time stamps; (2) since transactions are executed without explicitly using time\u2010stamp ordering, after a transaction lock is permitted, even when another transaction with a smaller time stamp arrives, the rollback of the transaction is unnecessary; and (3) since time stamping is used only for deadlock resolution, the proposed methods can easily be introduced to existing distributed database systems that use locking control.<\/jats:p>","DOI":"10.1002\/scj.4690220501","type":"journal-article","created":{"date-parts":[[2007,7,7]],"date-time":"2007-07-07T20:51:34Z","timestamp":1183841494000},"page":"1-12","source":"Crossref","is-referenced-by-count":0,"title":["Deadlock prevention and avoidance methods using timestamps for locking control in distributed database systems"],"prefix":"10.1002","volume":"22","author":[{"given":"Tetsuji","family":"Kobayashi","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2007,3,22]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.233145"},{"key":"e_1_2_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/320141.320146"},{"key":"e_1_2_1_4_2","volume-title":"Concurrency Control and Recovery in Database Systems","author":"Bernstein P. A.","year":"1987"},{"key":"e_1_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/15833.15837"},{"key":"e_1_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-08755-9_9"},{"issue":"6","key":"e_1_2_1_7_2","first-page":"1140","article-title":"Concurrency control of distributed database systems by cautious schedulers","volume":"70","author":"Harashima S.","year":"1987","journal-title":"Trans. I.E.I.C.E."},{"key":"e_1_2_1_8_2","article-title":"Concurrency control by cautious schedulers","volume":"48","author":"Ibaraki T.","year":"1985","journal-title":"IPSJ Tech. Rep. Database Systems"},{"key":"e_1_2_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1980.1653786"},{"issue":"8","key":"e_1_2_1_10_2","first-page":"1020","article-title":"Theoretical approaches to the problem of multiuser database systems","volume":"24","author":"Kambayashi Y.","year":"1983","journal-title":"Journal of IPSJ"},{"issue":"2","key":"e_1_2_1_11_2","first-page":"236","article-title":"A locking method for increasing concurrency in database systems","volume":"27","author":"Kobayashi T.","year":"1986","journal-title":"Journal of IPSJ"},{"key":"e_1_2_1_12_2","article-title":"A deadlock resolution scheme for distributed database systems","volume":"87","author":"Kobayashi T.","year":"1987","journal-title":"IPSJ Tech. Rep."},{"key":"e_1_2_1_13_2","article-title":"A deadlock avoidance scheme for distributed database systems using dynamic locking","volume":"88","author":"Kobayashi T.","year":"1988","journal-title":"I.E.I.C.E. Tech. Rep."},{"key":"e_1_2_1_14_2","first-page":"95","volume-title":"Database Architecture","author":"Lomet D. B.","year":"1979"},{"issue":"9","key":"e_1_2_1_15_2","first-page":"1010","article-title":"On serializability theory in database concurrency control","volume":"26","author":"Shojiro M.","year":"1985","journal-title":"Journal of IPSJ"},{"key":"e_1_2_1_16_2","unstructured":"S.Taniguchi S.Nishio andT.Ibaraki.The performance of cautious schedulers for database systems. Proc. Symposium on Advanced Database Systems. IPSJ pp.99\u2013108(Dec.1988)."},{"key":"e_1_2_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/320251.320260"},{"issue":"1","key":"e_1_2_1_18_2","first-page":"67","article-title":"A priority based distributed deadlock detection algorithm","volume":"11","author":"Sinha M. K.","year":"1985","journal-title":"IEEE Trans."}],"container-title":["Systems and Computers in Japan"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fscj.4690220501","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/scj.4690220501","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T01:34:33Z","timestamp":1698024873000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/scj.4690220501"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991,1]]},"references-count":17,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1991,1]]}},"alternative-id":["10.1002\/scj.4690220501"],"URL":"https:\/\/doi.org\/10.1002\/scj.4690220501","archive":["Portico"],"relation":{},"ISSN":["0882-1666","1520-684X"],"issn-type":[{"value":"0882-1666","type":"print"},{"value":"1520-684X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1991,1]]}}}