{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T12:32:07Z","timestamp":1725971527608},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319763477"},{"type":"electronic","value":"9783319763484"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76348-4_83","type":"book-chapter","created":{"date-parts":[[2018,3,21]],"date-time":"2018-03-21T15:10:42Z","timestamp":1521645042000},"page":"868-879","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Blind Write Protocol"],"prefix":"10.1007","author":[{"given":"Khairul","family":"Anshar","sequence":"first","affiliation":[]},{"given":"Nanna","family":"Suryana","sequence":"additional","affiliation":[]},{"given":"Noraswaliza","family":"Binti Abdullah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,22]]},"reference":[{"key":"83_CR1","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1145\/362384.362685","volume":"13","author":"EF Codd","year":"1970","unstructured":"Codd, E.F.: A relational model of data for large shared data banks. Commun. ACM 13, 377\u2013387 (1970)","journal-title":"Commun. ACM"},{"key":"83_CR2","first-page":"624","volume":"19","author":"KP Eswaran","year":"1976","unstructured":"Eswaran, K.P., Gray, J.N., Lorie, R.A., Traiger, I.L.: The notions of consistency and predicate lock in a database system. ACM Comput. Surv. 19, 624\u2013633 (1976)","journal-title":"ACM Comput. Surv."},{"key":"83_CR3","doi-asserted-by":"crossref","unstructured":"Stearns, R.E., Lewis, P.M., Rosenkrantz, D.J.: Concurrency control for database systems. In: Proceedings of 7th Symposium on Foundations of Computer Science, pp. 19\u201332 (1976)","DOI":"10.1109\/SFCS.1976.12"},{"key":"83_CR4","doi-asserted-by":"crossref","unstructured":"Gray, J., Lorie, R.A., Putzolu, G.R., Traiger, I.L.: Granularity of locks and degrees of consistency in a shared data base. In: IFIP Working Conference on Modelling in Data Base Management Systems, pp. 365\u2013394 (1976)","DOI":"10.1145\/1282480.1282513"},{"key":"83_CR5","doi-asserted-by":"crossref","unstructured":"Bernstein, P.A., Shipman, D.W., Wong, W.S.: Formal aspects of serializability in database concurrency control. In: IEEE, vol SE-5, no. 3 (1979)","DOI":"10.1109\/TSE.1979.234182"},{"issue":"2","key":"83_CR6","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1145\/319566.319567","volume":"6","author":"HT Kung","year":"1981","unstructured":"Kung, H.T., Androbinson, J.T.: An optimistic methods for concurrency control. ACM Trans. Database Syst. 6(2), 213\u2013226 (1981)","journal-title":"ACM Trans. Database Syst."},{"key":"83_CR7","doi-asserted-by":"crossref","unstructured":"Stearns, R.E., Rosenkrantz D.J.: Distributed database concurrency controls using before-values. In: Proceedings of the 1981 ACM SIGMOD International Conference on Management of Data (1981)","DOI":"10.1145\/582318.582330"},{"issue":"2","key":"83_CR8","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1145\/356842.356846","volume":"13","author":"PA Bernstein","year":"1981","unstructured":"Bernstein, P.A., Goodman, N.: Concurrency control in distributed database systems. ACM Comput. Surv. (CSUR) 13(2), 185\u2013221 (1981)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"83_CR9","volume-title":"Concurrency Control and Recovery in Database Systems","author":"PA Bernstein","year":"1986","unstructured":"Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison-Wesley Longman Publishing Co., Inc., Boston (1986)"},{"key":"83_CR10","doi-asserted-by":"crossref","unstructured":"das Chagas Mendonca, N., de Oliveira Anido, R.: Using extended hierarchical quorum consensus to control replicated data: from traditional voting to logical structures. In: Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences, Wailea, HI, USA, pp. 303\u2013312 (1994)","DOI":"10.1109\/HICSS.1994.323253"},{"key":"83_CR11","doi-asserted-by":"crossref","unstructured":"Berenson, H., Bernstein, P., Gray, J., Melton, J., O\u2019Neil, E., O\u2019Neil, P.: A critique of ANSI SQL isolation levels. In: Carey, M., Schneider, D. (eds.) Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data (SIGMOD 1995), pp. 1\u201310. ACM, New York (1995)","DOI":"10.1145\/223784.223785"},{"issue":"1\u20132","key":"83_CR12","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/S0020-0255(96)00159-4","volume":"96","author":"A Burger","year":"1997","unstructured":"Burger, A., Kumar, V., Hines, M.L.: Performance of multiversion and distributed two-phase locking concurrency control mechanisms in distributed databases. Inf. Sci. 96(1\u20132), 129\u2013152 (1997)","journal-title":"Inf. Sci."},{"key":"83_CR13","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1145\/363951.363955","volume":"25","author":"B Kemme","year":"2000","unstructured":"Kemme, B., Alonso, G.: A new approach to developing and implementing eager database replication protocols. ACM Trans. Database Syst. 25, 333\u2013379 (2000)","journal-title":"ACM Trans. Database Syst."},{"key":"83_CR14","volume-title":"High Performance MySQL","author":"DJ Balling","year":"2008","unstructured":"Balling, D.J., Lentz, A., Zawodny, J.D., Tkachenko, V., Zaitsev, P., Schwartz, B.: High Performance MySQL, 2nd edn. O\u2019Reilly Media, Sebastopol (2008)","edition":"2"},{"key":"83_CR15","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/1435417.1435432","volume":"52","author":"W Vogels","year":"2009","unstructured":"Vogels, W.: Eventually consistent. Commun. ACM 52, 40\u201344 (2009)","journal-title":"Commun. ACM"},{"key":"83_CR16","doi-asserted-by":"crossref","unstructured":"Alomari, M., Fekete, A., R\u00f6hm, U.: A robust technique to ensure serializable executions with snapshot isolation DBMS. In: IEEE 25th International Conference on Data Engineering, Shanghai, pp. 341\u2013352 (2009)","DOI":"10.1109\/ICDE.2009.22"},{"issue":"4","key":"83_CR17","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/1620585.1620587","volume":"34","author":"J Cahill","year":"2009","unstructured":"Cahill, J., Rohm, U., Fekete, A.D.: Serializable isolation for snapshot databases. ACM Trans. Database Syst. 34(4), 20 (2009)","journal-title":"ACM Trans. Database Syst."},{"issue":"12","key":"83_CR18","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1145\/2500500","volume":"56","author":"Doug Terry","year":"2013","unstructured":"Terry, D.: Replicated data consistency explained through baseball. Commun. ACM 56(12), 82\u201389 (2013)","journal-title":"Commun. ACM"},{"key":"83_CR19","doi-asserted-by":"crossref","unstructured":"Bernstein, P.A., Das, S.: Rethinking eventual consistency. In: Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data (SIGMOD 2013), pp. 923\u2013928. ACM, New York (2013)","DOI":"10.1145\/2463676.2465339"},{"key":"83_CR20","doi-asserted-by":"crossref","unstructured":"Zhou, X., Yu, Z., Tan, K.L.: Posterior snapshot isolation. In: 2017 IEEE 33rd International Conference on Data Engineering (ICDE), San Diego, CA, pp. 797\u2013808 (2017)","DOI":"10.1109\/ICDE.2017.130"},{"key":"83_CR21","doi-asserted-by":"crossref","unstructured":"Alomari, M., Fekete, A.: Serializable use of read committed isolation level. In: 2015 IEEE\/ACS 12th International Conference of Computer Systems and Applications (AICCSA), Marrakech, pp. 1\u20138 (2015)","DOI":"10.1109\/AICCSA.2015.7507103"},{"key":"83_CR22","doi-asserted-by":"crossref","unstructured":"Zendaoui, F., Hidouci, W.K.: Performance evaluation of serializable snapshot isolation in PostgreSQL. In: 2015 12th International Symposium on Programming and Systems (ISPS), Algiers, pp. 1\u201311 (2015)","DOI":"10.1109\/ISPS.2015.7244971"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems Design and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76348-4_83","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T17:18:06Z","timestamp":1660670286000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76348-4_83"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319763477","9783319763484"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76348-4_83","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}