{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:00:22Z","timestamp":1725804022037},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319109329"},{"type":"electronic","value":"9783319109336"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10933-6_25","type":"book-chapter","created":{"date-parts":[[2014,9,2]],"date-time":"2014-09-02T10:47:30Z","timestamp":1409654850000},"page":"337-351","source":"Crossref","is-referenced-by-count":1,"title":["Observations on Fine-Grained Locking in XML DBMSs"],"prefix":"10.1007","author":[{"given":"Martin","family":"Hiller","sequence":"first","affiliation":[]},{"given":"Caetano","family":"Sauer","sequence":"additional","affiliation":[]},{"given":"Theo","family":"H\u00e4rder","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"25_CR1","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s13222-014-0160-3","volume":"14","author":"S. B\u00e4chle","year":"2014","unstructured":"B\u00e4chle, S., Sauer, C.: Unleashing XQuery for Data-Independent Programming. Datenbank-Spektrum\u00a014(2), 135\u2013150 (2014)","journal-title":"Datenbank-Spektrum"},{"key":"25_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-642-03573-9_4","volume-title":"Database and Expert Systems Applications","author":"S. B\u00e4chle","year":"2009","unstructured":"B\u00e4chle, S., H\u00e4rder, T.: The Real Performance Drivers Behind XML Lock Protocols. In: Bhowmick, S.S., K\u00fcng, J., Wagner, R. (eds.) DEXA 2009. LNCS, vol.\u00a05690, pp. 38\u201352. Springer, Heidelberg (2009)"},{"unstructured":"BrackitDB \u2013 Google Project Hosting (2014), \n                    \n                      http:\/\/code.google.com\/p\/brackit\/wiki\/BrackitDB","key":"25_CR3"},{"unstructured":"Gray, J., Reuter, A.: Transaction Processing: Concepts and Techniques. Morgan Kaufmann (1993)","key":"25_CR4"},{"issue":"1","key":"25_CR5","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.datak.2007.11.001","volume":"65","author":"M.P. Haustein","year":"2008","unstructured":"Haustein, M.P., H\u00e4rder, T.: An Efficient Infrastructure for Native Transactional XML Processing. Data & Knowl. Eng.\u00a065(1), 147\u2013173 (2008)","journal-title":"Data & Knowl. Eng."},{"unstructured":"Haustein, M.P., H\u00e4rder, T., Luttenberger, K.: Contest of XML Lock Protocols. In: Proc. VLDB, pp. 1069\u20131080 (2006)","key":"25_CR6"},{"issue":"1","key":"25_CR7","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.datak.2007.11.001","volume":"65","author":"M.P. Haustein","year":"2008","unstructured":"Haustein, M.P., H\u00e4rder, T.: Optimizing Lock Protocols for Native XML Processing. Data & Knowl. Eng.\u00a065(1), 147\u2013173 (2008)","journal-title":"Data & Knowl. Eng."},{"doi-asserted-by":"crossref","unstructured":"Hiller, M.: Evaluation of Fine-grained Locking in XML Databases. Master Thesis, University of Kaiserslautern (2014)","key":"25_CR8","DOI":"10.1007\/978-3-319-10933-6_25"},{"issue":"4","key":"25_CR9","first-page":"298","volume":"5","author":"P.-A. Larson","year":"2011","unstructured":"Larson, P.-A., et al.: High-Performance Concurrency Control Mechanisms for Main-Memory Databases. PVLDB\u00a05(4), 298\u2013309 (2011)","journal-title":"PVLDB"},{"issue":"2","key":"25_CR10","first-page":"121","volume":"7","author":"S. Pelley","year":"2013","unstructured":"Pelley, S., et al.: Storage Management in the NVRAM Era. PVLDB\u00a07(2), 121\u2013132 (2013)","journal-title":"PVLDB"},{"issue":"1-2","key":"25_CR11","first-page":"51","volume":"24","author":"C. Mathis","year":"2009","unstructured":"Mathis, C., H\u00e4rder, T., Schmidt, K.: Storing and Indexing XML Documents Upside Down. Computer Science - R&D\u00a024(1-2), 51\u201368 (2009)","journal-title":"Computer Science - R&D"},{"unstructured":"Mohan, C.: ARIES\/KVL: A Key-Value Locking Method for Concurrency Control of Multiaction Transactions Operating on B-Tree Indexes. In: Proc. VLDB, pp. 392\u2013405 (1990)","key":"25_CR12"},{"key":"25_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1007\/978-3-540-77566-9_40","volume-title":"SOFSEM 2008: Theory and Practice of Computer Science","author":"A. Siirtola","year":"2008","unstructured":"Siirtola, A., Valenta, M.: Verifying Parameterized taDOM+ Lock Managers. In: Geffert, V., Karhum\u00e4ki, J., Bertoni, A., Preneel, B., N\u00e1vrat, P., Bielikov\u00e1, M. (eds.) SOFSEM 2008. LNCS, vol.\u00a04910, pp. 460\u2013472. Springer, Heidelberg (2008)"},{"issue":"2","key":"25_CR14","first-page":"21","volume":"36","author":"M. Stonebraker","year":"2013","unstructured":"Stonebraker, M., Weisberg, A.: The VoltDB Main Memory DBMS. IEEE Data Eng. Bull.\u00a036(2), 21\u201327 (2013)","journal-title":"IEEE Data Eng. Bull."}],"container-title":["Lecture Notes in Computer Science","Advances in Databases and Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10933-6_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T19:16:14Z","timestamp":1558984574000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10933-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319109329","9783319109336"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10933-6_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}