{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:50:56Z","timestamp":1725511856165},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540759119"},{"type":"electronic","value":"9783540759126"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-75912-6_6","type":"book-chapter","created":{"date-parts":[[2007,10,12]],"date-time":"2007-10-12T05:40:16Z","timestamp":1192167616000},"page":"69-83","source":"Crossref","is-referenced-by-count":1,"title":["A Closer Look at Database Replication Middleware Architectures for Enterprise Applications"],"prefix":"10.1007","author":[{"given":"J. E.","family":"Armend\u00e1riz-I\u00f1igo","sequence":"first","affiliation":[]},{"given":"H.","family":"Decker","sequence":"additional","affiliation":[]},{"given":"F. D.","family":"Mu\u00f1oz-Esco\u00ed","sequence":"additional","affiliation":[]},{"given":"J. R. Gonz\u00e1lez","family":"de Mend\u00edvil","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Ir\u00fan, L., Mu\u00f1oz, F., Decker, H., Bernab\u00e9u-Aub\u00e1n, J.M.: COPLA: A platform for eager and lazy replication in networked databases. In: ICEIS 2003, vol.\u00a01, pp. 273\u2013278 (2003)"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1145\/1113574.1113576","volume":"23","author":"M. Pati\u00f1o-Mart\u00ednez","year":"2005","unstructured":"Pati\u00f1o-Mart\u00ednez, M., Jim\u00e9nez-Peris, R., Kemme, B., Alonso, G.: MIDDLE-R: Consistent database replication at the middleware level. ACM Trans. Comput. Syst.\u00a023, 375\u2013423 (2005)","journal-title":"ACM Trans. Comput. Syst."},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/11681885_4","volume-title":"Trends in Enterprise Application Architecture","author":"J.E. Armend\u00e1riz","year":"2006","unstructured":"Armend\u00e1riz, J.E., Decker, H., Mu\u00f1oz, F.D., Ir\u00fan, L., de Juan, R.: A middleware architecture for supporting adaptable replication of enterprise application data. In: Draheim, D., Weber, G. (eds.) TEAA 2005. LNCS, vol.\u00a03888, pp. 29\u201343. Springer, Heidelberg (2006)"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TKDE.2005.161","volume":"17","author":"L. Gao","year":"2005","unstructured":"Gao, L., Dahlin, M., Nayate, A., Zheng, J., Iyengar, A.: Improving availability and performance with application-specific data replication. IEEE Trans. Knowl. Data Eng.\u00a017, 106\u2013120 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1145\/115302.115289","volume":"16","author":"M.J. Carey","year":"1991","unstructured":"Carey, M.J., Livny, M.: Conflict detection tradeoffs for replicated data. ACM Trans. Database Syst.\u00a016, 703\u2013746 (1991)","journal-title":"ACM Trans. Database Syst."},{"key":"6_CR6","first-page":"134","volume-title":"VLDB","author":"B. Kemme","year":"2000","unstructured":"Kemme, B., Alonso, G.: Don\u2019t be lazy, be consistent: Postgres-R, a new way to implement database replication. In: Abbadi, A.E., Brodie, M.L., Chakravarthy, S., Dayal, U., Kamel, N., Schlageter, G., Whang, K.Y. (eds.) VLDB, pp. 134\u2013143. Morgan Kaufmann, San Francisco (2000)"},{"key":"6_CR7","first-page":"422","volume-title":"ICDE","author":"S. Wu","year":"2005","unstructured":"Wu, S., Kemme, B.: Postgres-R(SI): Combining replica control with concurrency control based on snapshot isolation. In: ICDE, pp. 422\u2013433. IEEE-CS, Los Alamitos (2005)"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"1218","DOI":"10.1109\/TKDE.2003.1232274","volume":"15","author":"J. Holliday","year":"2003","unstructured":"Holliday, J., Steinke, R.C., Agrawal, D., Abbadi, A.E.: Epidemic algorithms for replicated databases. IEEE Trans. Knowl. Data Eng.\u00a015, 1218\u20131238 (2003)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Lin, Y., Kemme, B., Pati\u00f1o-Mart\u00ednez, M., Jim\u00e9nez-Peris, R.: Middleware based data replication providing snapshot isolation. In: SIGMOD Conference (2005)","DOI":"10.1145\/1066157.1066205"},{"key":"6_CR10","unstructured":"Cecchet, E., Marguerite, J., Zwaenepoel, W.: C-JDBC: Flexible database clustering middleware. In: USENIX Annual Technical Conference, FREENIX Track, USENIX, 9\u201318 (2004)"},{"key":"6_CR11","unstructured":"Esparza-Peidro, J., Mu\u00f1oz-Esco\u00ed, F., Ir\u00fan-Briz, L., Bernab\u00e9u-Aub\u00e1n, J.: Rjdbc: a simple database replication engine. In: ICEIS 2004. Proc. of the 6th Int\u2019l Conf. Enterprise Information Systems (2004)"},{"key":"6_CR12","first-page":"291","volume-title":"HICSS","author":"J. Armend\u00e1riz","year":"2005","unstructured":"Armend\u00e1riz, J., Gonz\u00e1lez de Mend\u00edvil, J., Mu\u00f1oz-Esco\u00ed, F.: A lock-based algorithm for concurrency control and recovery in a middleware replication software architecture. In: HICSS, p. 291a. IEEE-CS, Los Alamitos (2005)"},{"key":"6_CR13","first-page":"1","volume-title":"SIGMOD Conference","author":"H. Berenson","year":"1995","unstructured":"Berenson, H., Bernstein, P.A., Gray, J., Melton, J., O\u2019Neil, E.J., O\u2019Neil, P.E.: A critique of ANSI SQL isolation levels. In: SIGMOD Conference, pp. 1\u201310. ACM Press, New York (1995)"},{"key":"6_CR14","volume-title":"SRDS","author":"S. Elnikety","year":"2005","unstructured":"Elnikety, S., Pedone, F., Zwaenopoel, W.: Database replication using generalized snapshot isolation. In: SRDS, IEEE-CS, Los Alamitos (2005)"},{"key":"6_CR15","volume-title":"Concurrency Control and Recovery in Database Systems","author":"P.A. Bernstein","year":"1987","unstructured":"Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading (1987)"},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1145\/1071610.1071615","volume":"30","author":"A. Fekete","year":"2005","unstructured":"Fekete, A., Liarokapis, D., O\u2019Neil, E., O\u2019Neil, P., Shasha, D.: Making snapshot isolation serializable. ACM Trans. Database Syst.\u00a030, 492\u2013528 (2005)","journal-title":"ACM Trans. Database Syst."},{"key":"6_CR17","first-page":"173","volume-title":"SIGMOD Conference","author":"J. Gray","year":"1996","unstructured":"Gray, J., Helland, P., O\u2019Neil, P.E., Shasha, D.: The dangers of replication and a solution. In: SIGMOD Conference, pp. 173\u2013182. ACM Press, New York (1996)"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Wiesmann, M., Schiper, A., Pedone, F., Kemme, B., Alonso, G.: Database replication techniques: A three parameter classification. In: SRDS, pp. 206\u2013217 (2000)","DOI":"10.1109\/RELDI.2000.885408"},{"key":"6_CR19","unstructured":"TPC-W: Transaction processing\u00a0performance council (2006), Accessible in URL, http:\/\/www.tpc.org"},{"key":"6_CR20","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1145\/503112.503113","volume":"33","author":"G. Chockler","year":"2001","unstructured":"Chockler, G., Keidar, I., Vitenberg, R.: Group communication specifications: a comprehensive study. ACM Comput. Surv.\u00a033, 427\u2013469 (2001)","journal-title":"ACM Comput. Surv."},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Petersen, K., Spreitzer, M., Terry, D.B., Theimer, M., Demers, A.J.: Flexible update propagation for weakly consistent replication. In: SOSP, pp. 288\u2013301 (1997)","DOI":"10.1145\/268998.266711"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Wiesmann, M., Pedone, F., Schiper, A., Kemme, B., Alonso, G.: Understanding replication in databases and distributed systems. In: ICDCS, pp. 464\u2013474 (2000)","DOI":"10.1109\/ICDCS.2000.840959"},{"key":"6_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/3-540-36087-5_50","volume-title":"EurAsia-ICT 2002: Information and Communication Technology","author":"L. Rodrigues","year":"2002","unstructured":"Rodrigues, L., Miranda, H., Almeida, R., Martins, J., Vicente, P.: The globdata fault-tolerant replicated distributed object database. In: Shafazand, H., Tjoa, A.M. (eds.) EurAsia-ICT 2002. LNCS, vol.\u00a02510, pp. 426\u2013433. Springer, Heidelberg (2002)"},{"key":"6_CR24","unstructured":"Armend\u00e1riz, J., Ju\u00e1rez, J., Garitagoitia, J., de Mend\u00edvil, J.R.G., Mu\u00f1oz-Esco\u00ed, F.: Implementing database replication protocols based on O2PL in a middleware architecture. In: IASTED DBA, pp. 176\u2013181 (2006)"},{"key":"6_CR25","first-page":"401","volume-title":"SRDS","author":"F.D. Mu\u00f1oz","year":"2006","unstructured":"Mu\u00f1oz, F.D., Pla, J., Ruiz, M.I., Ir\u00fan, L., Decker, H., Armend\u00e1riz, J.E., de Mend\u00edvil, J.R.G.: Managing transaction conflicts in middleware-based database replication architectures. In: SRDS, pp. 401\u2013410. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"6_CR26","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/102792.102801","volume":"34","author":"F. Cristian","year":"1991","unstructured":"Cristian, F.: Understanding fault-tolerant distributed systems. Commun. ACM\u00a034, 56\u201378 (1991)","journal-title":"Commun. ACM"},{"key":"6_CR27","volume-title":"Fourth Workshop on Future Trends of Distributed Systems","author":"A. Ricciardi","year":"1993","unstructured":"Ricciardi, A., Schiper, A., Birman, K.P.: Understanding partitions and the \u201cno partition\u201d assumption. In: Fourth Workshop on Future Trends of Distributed Systems, IEEE Computer Society Press, Los Alamitos (1993)"},{"key":"6_CR28","first-page":"150","volume-title":"SRDS","author":"R. Jim\u00e9nez-Peris","year":"2002","unstructured":"Jim\u00e9nez-Peris, R., Pati\u00f1o-Mart\u00ednez, M., Alonso, G.: Non-intrusive, parallel recovery of replicated data. In: SRDS, pp. 150\u2013159. IEEE-CS, Los Alamitos (2002)"},{"key":"6_CR29","first-page":"117","volume-title":"DSN","author":"B. Kemme","year":"2001","unstructured":"Kemme, B., Bartoli, A., Babaoglu, \u00d6.: Online reconfiguration in replicated databases based on group communication. In: DSN, pp. 117\u2013130. IEEE-CS, Los Alamitos (2001)"},{"key":"6_CR30","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1086\/209287","volume":"19","author":"R. Burke","year":"1992","unstructured":"Burke, R., Harlam, B., Kahn, B., Lodish, L.: Comparing dynamic consumer choice in real and computer-simulated environments. Journal of Consumer Research\u00a019, 71\u201382 (1992)","journal-title":"Journal of Consumer Research"},{"key":"6_CR31","doi-asserted-by":"publisher","first-page":"38","DOI":"10.2307\/1251788","volume":"61","author":"J. Alba","year":"1997","unstructured":"Alba, J., Lynch, J., Weitz, B., Janiszewski, C., Lutz, R., Sawyer, A., Wood, S.: Interactive home shopping: Consumer, retailer and manufacturer incentives to participate in electronic marketplaces. Journal of Marketing\u00a061, 38\u201353 (1997)","journal-title":"Journal of Marketing"},{"key":"6_CR32","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1080\/10196780050177099","volume":"10","author":"J. Otto","year":"2000","unstructured":"Otto, J., Chung, Q.: A framework for cyber-enhanced retailing: Integrating e-commerce retailing with brick-and-mortar retailing. Electronic Markets\u00a010, 185\u2013191 (2000)","journal-title":"Electronic Markets"},{"key":"6_CR33","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/S0167-8116(00)00005-7","volume":"17","author":"A. Degeratu","year":"2000","unstructured":"Degeratu, A., Rangasway, A., Wu, J.: Consumer choice behavior in online and traditional supermarkets. the effects of brand name, price, and other search attributes. International Journal of Research in Marketing\u00a017, 55\u201378 (2000)","journal-title":"International Journal of Research in Marketing"}],"container-title":["Lecture Notes in Computer Science","Trends in Enterprise Application Architecture"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75912-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T15:21:50Z","timestamp":1556896910000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75912-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540759119","9783540759126"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75912-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}