{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:36:11Z","timestamp":1742913371808,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031642845"},{"type":"electronic","value":"9783031642852"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-64285-2_11","type":"book-chapter","created":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T18:04:50Z","timestamp":1719857090000},"page":"203-213","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Checking Transaction Isolation Violations Using Graph Queries"],"prefix":"10.1007","author":[{"given":"Stefania","family":"Dumbrava","sequence":"first","affiliation":[]},{"given":"Zhao","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Burcu Kulahcioglu","family":"Ozkan","sequence":"additional","affiliation":[]},{"given":"Jingxuan","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,2]]},"reference":[{"key":"11_CR1","unstructured":"Adya, A., Liskov, B., O\u2019Neil, P.E.: Generalized isolation level definitions. In: ICDE, pp. 67\u201378. IEEE Computer Society (2000)"},{"issue":"3","key":"11_CR2","doi-asserted-by":"publisher","first-page":"268","DOI":"10.14778\/3430915.3430918","volume":"14","author":"P Alvaro","year":"2020","unstructured":"Alvaro, P., Kingsbury, K.: Elle: inferring isolation anomalies from experimental observations. Proc. VLDB Endow. 14(3), 268\u2013280 (2020)","journal-title":"Proc. VLDB Endow."},{"key":"11_CR3","unstructured":"Angles, R.: The property graph database model. In: AMW. CEUR Workshop Proceedings, vol.\u00a02100. CEUR-WS.org (2018)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Angles, R., et al.: PG-schema: schemas for property graphs. Proc. ACM Manag. Data 1(2), 198:1\u2013198:25 (2023)","DOI":"10.1145\/3589778"},{"key":"11_CR5","unstructured":"AWS. Amazon Neptune (2024). https:\/\/aws.amazon.com\/neptune\/"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Berenson, H., Bernstein, P.A., Gray, J., Melton, J., O\u2019Neil, E.J., O\u2019Neil, P.E.: A critique of ANSI SQL isolation levels. In: SIGMOD Conference, pp. 1\u201310. ACM Press (1995)","DOI":"10.1145\/568271.223785"},{"issue":"2","key":"11_CR7","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1145\/356842.356846","volume":"13","author":"PA Bernstein","year":"1981","unstructured":"Bernstein, P.A., Goodman, N.: Concurrency control in distributed database systems. ACM Comput. Surv. 13(2), 185\u2013221 (1981)","journal-title":"ACM Comput. Surv."},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Besta, M., et al.: Demystifying graph databases: analysis and taxonomy of data organization, system designs, and graph queries. ACM Comput. Surv. 56(2), 31:1\u201331:40 (2024)","DOI":"10.1145\/3604932"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Biswas, R., Enea, C.: On the complexity of checking transactional consistency. Proc. ACM Program. Lang. 3(OOPSLA), 165:1\u2013165:28 (2019)","DOI":"10.1145\/3360591"},{"issue":"4","key":"11_CR10","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/3335409.3335411","volume":"47","author":"A Bonifati","year":"2018","unstructured":"Bonifati, A., Dumbrava, S.: Graph queries: from theory to practice. SIGMOD Rec. 47(4), 5\u201316 (2018)","journal-title":"SIGMOD Rec."},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Cerone, A., Gotsman, A.: Analysing snapshot isolation. In: PODC, pp. 55\u201364. ACM (2016)","DOI":"10.1145\/2933057.2933096"},{"key":"11_CR12","doi-asserted-by":"publisher","unstructured":"Clark, J.: Verifying serializability protocols with version order recovery (2021). https:\/\/doi.org\/10.3929\/ethz-b-000507577","DOI":"10.3929\/ethz-b-000507577"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Dumbrava, S., Jin, Z., Kulahcioglu\u00a0Ozkan, B., Qiu, J.: GRAIL: checking transaction isolation violations with graph queries. In: ICSE Poster Track (2024). https:\/\/hal.science\/hal-04475697","DOI":"10.1145\/3639478.3643094"},{"key":"11_CR14","unstructured":"Dumbrava, S., Jin, Z., Ozkan, B.K., Qiu, J.: GRAph-based Isolation Level Checker (GRAIL) Artifact (2023). https:\/\/github.com\/jasonqiu98\/GRAIL-artifact"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Erling, O., et al.: The LDBC social network benchmark: interactive workload. In: SIGMOD Conference, pp. 619\u2013630. ACM (2015)","DOI":"10.1145\/2723372.2742786"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Francis, N., et al.: Cypher: an evolving query language for property graphs. In: SIGMOD Conference, pp. 1433\u20131445. ACM (2018)","DOI":"10.1145\/3183713.3190657"},{"issue":"3\u20134","key":"11_CR17","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0020-0190(00)00051-X","volume":"74","author":"HN Gabow","year":"2000","unstructured":"Gabow, H.N.: Path-based depth-first search for strong and biconnected components. Inf. Process. Lett. 74(3\u20134), 107\u2013114 (2000)","journal-title":"Inf. Process. Lett."},{"key":"11_CR18","unstructured":"GQL. GQL graph query language (2024). https:\/\/www.gqlstandards.org\/"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Huang, K., et al.: Efficient black-box checking of snapshot isolation in databases. Proc. VLDB Endow. 16(6), 1264\u20131276 (2023)","DOI":"10.14778\/3583140.3583145"},{"key":"11_CR20","unstructured":"Inc., A.: ArangoDB (2023). https:\/\/www.arangodb.com\/"},{"key":"11_CR21","unstructured":"Inc., B.G.: AgensGraph (2024). https:\/\/bitnine.net\/agensgraph\/"},{"key":"11_CR22","unstructured":"Kingsbury., K.: Gretchen: offline serializability verification. In: clojure (2022). https:\/\/github.com\/aphyr\/gretchen"},{"key":"11_CR23","unstructured":"Kingsbury, K.: Jepsen (2022). http:\/\/jepsen.io\/"},{"key":"11_CR24","unstructured":"Kingsbury, K.: Jepsen analyses (2022). https:\/\/jepsen.io\/analyses"},{"key":"11_CR25","unstructured":"Labs, R.: RedisGraph (2017). https:\/\/oss.redislabs.com\/redisgraph\/"},{"key":"11_CR26","unstructured":"Memgraph. Memgraph (2024). https:\/\/memgraph.com\/"},{"key":"11_CR27","unstructured":"Neo4j. Neo4j (2023). https:\/\/neo4j.com\/"},{"issue":"4","key":"11_CR28","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1145\/322154.322158","volume":"26","author":"CH Papadimitriou","year":"1979","unstructured":"Papadimitriou, C.H.: The serializability of concurrent database updates. J. ACM 26(4), 631\u2013653 (1979)","journal-title":"J. ACM"},{"key":"11_CR29","unstructured":"Paradies, M.: Graph pattern matching in SAP HANA (2017). https:\/\/tinyurl.com\/ycxu54pr"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Sakr, S., et al.: The future is big graphs: a community view on graph processing systems. Commun. ACM 64(9), 62\u201371 (2021)","DOI":"10.1145\/3434642"},{"key":"11_CR31","doi-asserted-by":"publisher","unstructured":"Sinha, A., Malik, S., Wang, C., Gupta, A.: Predicting serializability violations: SMT-based search vs. DPOR-based search. In: Eder, K., Louren\u00e7o, J., Shehory, O. (eds.) HVC 2011. LNCS, vol. 7261, pp. 95\u2013114. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34188-5_11","DOI":"10.1007\/978-3-642-34188-5_11"},{"key":"11_CR32","unstructured":"solidIT: DB-Engines Ranking (2024). https:\/\/db-engines.com\/en\/ranking_trend\/graph+dbms"},{"key":"11_CR33","doi-asserted-by":"crossref","unstructured":"Sovran, Y., Power, R., Aguilera, M.K., Li, J.: Transactional storage for geo-replicated systems. In: SOSP, pp. 385\u2013400. ACM (2011)","DOI":"10.1145\/2043556.2043592"},{"key":"11_CR34","unstructured":"Tan, C., Zhao, C., Mu, S., Walfish, M.: Cobra: Making transactional key-value stores verifiably serializable. In: OSDI, pp. 63\u201380. USENIX Association (2020)"},{"key":"11_CR35","doi-asserted-by":"publisher","unstructured":"Waudby, J., Steer, B.A., Karimov, K., Marton, J., Boncz, P., Sz\u00e1rnyas, G.: Towards testing ACID compliance in the LDBC social network benchmark. In: Nambiar, R., Poess, M. (eds.) TPCTC 2020. LNCS, vol. 12752, pp. 1\u201317. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-84924-5_1","DOI":"10.1007\/978-3-030-84924-5_1"},{"key":"11_CR36","doi-asserted-by":"crossref","unstructured":"Zhang, J., Ji, Y., Mu, S., Tan, C.: Viper: a fast snapshot isolation checker. In: EuroSys, pp. 654\u2013671. ACM (2023)","DOI":"10.1145\/3552326.3567492"}],"container-title":["Lecture Notes in Computer Science","Graph Transformation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-64285-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T18:06:06Z","timestamp":1719857166000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-64285-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031642845","9783031642852"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-64285-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICGT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Graph Transformation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Enschede","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icgt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.researchr.org\/home\/icgt-2024","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}