{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:49:20Z","timestamp":1725986960843},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319991320"},{"type":"electronic","value":"9783319991337"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99133-7_2","type":"book-chapter","created":{"date-parts":[[2018,8,6]],"date-time":"2018-08-06T10:38:25Z","timestamp":1533551905000},"page":"21-37","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["ThespisDIIP: Distributed Integrity Invariant Preservation"],"prefix":"10.1007","author":[{"given":"Carl","family":"Camilleri","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Joseph G.","family":"Vella","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vitezslav","family":"Nezval","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,8,7]]},"reference":[{"issue":"1","key":"2_CR1","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/BF01784241","volume":"9","author":"M Ahamad","year":"1995","unstructured":"Ahamad, M., Neiger, G., Burns, J.E., Kohli, P., Hutto, P.W.: Causal memory: definitions, implementation, and programming. Distrib. Comput. 9(1), 37\u201349 (1995)","journal-title":"Distrib. Comput."},{"key":"2_CR2","unstructured":"Almeida, P.S., Shoker, A., Moreno, C.B.: Exactly-once quantity transfer (2015)"},{"issue":"3","key":"2_CR3","doi-asserted-by":"publisher","first-page":"185","DOI":"10.14778\/2735508.2735509","volume":"8","author":"P Bailis","year":"2014","unstructured":"Bailis, P., Fekete, A., Franklin, M.J., Ghodsi, A.: Coordination avoidance in database systems. Proc. VLDB Endow. 8(3), 185\u2013196 (2014)","journal-title":"Proc. VLDB Endow."},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Bailis, P., Fekete, A., Franklin, M.J., Ghodsi, A., Hellerstein, J.M., Stoica, I.: Feral concurrency control: an empirical investigation of modern application integrity. In: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, pp. 1327\u20131342. ACM (2015)","DOI":"10.1145\/2723372.2737784"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Bailis, P., Ghodsi, A., Hellerstein, J.M., Stoica, I.: Bolt-on causal consistency. In: Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, pp. 761\u2013772. ACM (2013)","DOI":"10.1145\/2463676.2465279"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Balegas, V., Pregui\u00e7a, N., Duarte, S., Ferreira, C., Rodrigues, R.: IPA: invariant-preserving applications for weakly-consistent replicated databases. arXiv preprint arXiv:1802.08474 (2018)","DOI":"10.14778\/3297753.3297760"},{"issue":"3","key":"2_CR7","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/BF01232643","volume":"3","author":"D Barbar\u00e1-Mill\u00e1","year":"1994","unstructured":"Barbar\u00e1-Mill\u00e1, D., Garcia-Molina, H.: The demarcation protocol: a technique for maintaining constraints in distributed database systems. VLDB J. - Int. J. Very Large Data Bases 3(3), 325\u2013353 (1994)","journal-title":"VLDB J. - Int. J. Very Large Data Bases"},{"key":"2_CR8","unstructured":"Borr, A.: Transaction monitoring in encompass. In: Proceedings of 7th VLDB (1981)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Brewer, E.A.: Towards robust distributed systems. In: PODC, vol. 7 (2000)","DOI":"10.1145\/343477.343502"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Camilleri, C., Vella, J.G., Nezval, V.: Thespis: actor-based causal consistency. In: 2017 28th International Workshop on Database and Expert Systems Applications (DEXA), pp. 42\u201346. IEEE (2017)","DOI":"10.1109\/DEXA.2017.25"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Cetintemel, U., Ozden, B., Franklin, M.J., Silberschatz, A.: Design and evaluation of redistribution strategies for wide-area commodity distribution. In: 2001 21st International Conference on Distributed Computing Systems, pp. 154\u2013161. IEEE (2001)","DOI":"10.1109\/ICDSC.2001.918944"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Cooper, B.F., Silberstein, A., Tam, E., Ramakrishnan, R., Sears, R.: Benchmarking cloud serving systems with YCSB. In: Proceedings of the 1st ACM Symposium on Cloud Computing, pp. 143\u2013154. ACM (2010)","DOI":"10.1145\/1807128.1807152"},{"issue":"2","key":"2_CR13","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1509\/jmkr.43.2.182","volume":"43","author":"PJ Danaher","year":"2006","unstructured":"Danaher, P.J., Mullarkey, G.W., Essegaier, S.: Factors affecting web site visit duration: a cross-domain analysis. J. Market. Res. 43(2), 182\u2013194 (2006)","journal-title":"J. Market. Res."},{"issue":"1","key":"2_CR14","first-page":"26","volume":"1","author":"MM Elbushra","year":"2014","unstructured":"Elbushra, M.M., Lindstr\u00f6m, J.: Eventual consistent databases: state of the art. Open J. Databases (OJDB) 1(1), 26\u201341 (2014)","journal-title":"Open J. Databases (OJDB)"},{"issue":"2","key":"2_CR15","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/564585.564601","volume":"33","author":"S Gilbert","year":"2002","unstructured":"Gilbert, S., Lynch, N.: Brewer\u2019s conjecture and the feasibility of consistent, available, partition-tolerant web services. ACM SIGACT News 33(2), 51\u201359 (2002)","journal-title":"ACM SIGACT News"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Golubchik, L., Thomasian, A.: Token allocation in distributed systems. In: Proceedings of the 12th International Conference on Distributed Computing Systems, pp. 64\u201371. IEEE (1992)","DOI":"10.1109\/ICDCS.1992.235054"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/3-540-08755-9_9","volume-title":"Operating Systems","author":"JN Gray","year":"1978","unstructured":"Gray, J.N.: Notes on data base operating systems. In: Bayer, R., Graham, R.M., Seegm\u00fcller, G. (eds.) Operating Systems. LNCS, vol. 60, pp. 393\u2013481. Springer, Heidelberg (1978). https:\/\/doi.org\/10.1007\/3-540-08755-9_9"},{"issue":"3","key":"2_CR18","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1145\/24068.27643","volume":"5","author":"M Herlihy","year":"1987","unstructured":"Herlihy, M.: Concurrency versus availability: atomicity mechanisms for replicated data. ACM Trans. Comput. Syst. (TOCS) 5(3), 249\u2013274 (1987)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"2_CR19","unstructured":"Herlihy, M.P., Wing, J.M.: Linearizability: a correctness condition for concurrent objects. ACM Trans. Program. Lang. Syst. (TOPLAS) 12(3), 463\u2013492 (1990)"},{"key":"2_CR20","unstructured":"Hewitt, C., Bishop, P., Steiger, R.: A universal modular actor formalism for artificial intelligence. In: Proceedings of the 3rd International Joint Conference on Artificial Intelligence, pp. 235\u2013245. Morgan Kaufmann Publishers Inc. (1973)"},{"key":"2_CR21","unstructured":"Ivica, S.B., Aleksandar, M.R., Radomir, M.A.: Crypto-currency and e-financials. J. Econ. Law 132 (2014)"},{"key":"2_CR22","unstructured":"Jansen, B.J., Spink, A.: An analysis of web documents retrieved and viewed. In: International Conference on Internet Computing, pp. 65\u201369. Citeseer (2003)"},{"key":"2_CR23","unstructured":"Krishnakumar, N., Bernstein, A.J.: High throughput escrow algorithms for replicated databases. In: VLDB, vol. 1992, pp. 175\u2013186 (1992)"},{"issue":"2","key":"2_CR24","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1145\/279227.279229","volume":"16","author":"L Lamport","year":"1998","unstructured":"Lamport, L.: The part-time parliament. ACM Trans. Comput. Syst. (TOCS) 16(2), 133\u2013169 (1998)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"2_CR25","unstructured":"Mahajan, P., Alvisi, L., Dahlin, M.: Consistency, availability, and convergence. University of Texas at Austin Technical report, 11 (2011)"},{"issue":"3","key":"2_CR26","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1080\/01449290410001669914","volume":"23","author":"FF-H Nah","year":"2004","unstructured":"Nah, F.F.-H.: A study on tolerable waiting time: how long are web users willing to wait? Behav. Inf. Technol. 23(3), 153\u2013163 (2004)","journal-title":"Behav. Inf. Technol."},{"issue":"11","key":"2_CR27","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1145\/7239.7265","volume":"4","author":"PE O\u2019Neil","year":"1986","unstructured":"O\u2019Neil, P.E.: The Escrow transactional model. ACM Trans. Database Syst. 4(11), 405\u2013430 (1986)","journal-title":"ACM Trans. Database Syst."},{"key":"2_CR28","unstructured":"Radev, R.: Representing a relational database as a directed graph and some applications. In: Balkan Conference in Informatics, p. 1 (2013)"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Soparkar, N., Silberschatz, A.: Data-valued partitioning and virtual messages. In: Proceedings of the Ninth ACM Symposium on Principles of Database Systems, pp. 357\u2013367. ACM (1990)","DOI":"10.1145\/298514.298587"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Takaishi, M., Leguizamo, C.P., Kimura, S., Takanuki, R.: Autonomous multi-agent-based data allocation technology in decentralized database systems for timeliness. In: Proceedings of Autonomous Decentralized Systems, ISADS 2005, pp. 25\u201332. IEEE (2005)","DOI":"10.1109\/ISADS.2005.1452012"},{"issue":"1","key":"2_CR31","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1435417.1435432","volume":"52","author":"W Vogels","year":"2009","unstructured":"Vogels, W.: Eventually consistent. Commun. ACM 52(1), 40\u201344 (2009)","journal-title":"Commun. ACM"},{"key":"2_CR32","unstructured":"Zona, R.: The economic impacts of unacceptable web site download speeds. Technical report, Research report (1999). http:\/\/www.zonaresearch.com"}],"container-title":["Communications in Computer and Information Science","Database and Expert Systems Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99133-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T18:09:22Z","timestamp":1571681362000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-99133-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319991320","9783319991337"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99133-7_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}