{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T16:07:28Z","timestamp":1725638848299},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642258206"},{"type":"electronic","value":"9783642258213"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25821-3_1","type":"book-chapter","created":{"date-parts":[[2011,12,5]],"date-time":"2011-12-05T06:09:36Z","timestamp":1323065376000},"page":"1-19","source":"Crossref","is-referenced-by-count":5,"title":["Democratizing Transactional Programming"],"prefix":"10.1007","author":[{"given":"Vincent","family":"Gramoli","sequence":"first","affiliation":[]},{"given":"Rachid","family":"Guerraoui","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1145\/360363.360369","volume":"19","author":"K.P. Eswaran","year":"1976","unstructured":"Eswaran, K.P., Gray, J.N., Lorie, R.A., Traiger, I.L.: The notions of consistency and predicate locks in a database system. Commun. ACM\u00a019, 624\u2013633 (1976)","journal-title":"Commun. ACM"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1145\/322154.322158","volume":"26","author":"C.H. Papadimitriou","year":"1979","unstructured":"Papadimitriou, C.H.: The serializability of concurrent database updates. J. ACM\u00a026, 631\u2013653 (1979)","journal-title":"J. ACM"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Guerraoui, R., Kapalka, M.: Principles of Transactional Memory. Morgan&Claypool (2010)","DOI":"10.2200\/S00253ED1V01Y201009DCT004"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Liskov, B., Scheifler, R.: Guardians and actions: linguistic support for robust, distributed programs. In: POPL, pp. 7\u201319 (1982)","DOI":"10.1145\/582153.582155"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","first-page":"343","volume-title":"Distributed Systems","author":"B. Liskov","year":"1985","unstructured":"Liskov, B.: The Argus Language and System. In: Alford, M.W., Hommel, G., Schneider, F.B., Ansart, J.P., Lamport, L., Mullery, G.P., Zhou, T.H. (eds.) Distributed Systems. LNCS, vol.\u00a0190, pp. 343\u2013430. Springer, Heidelberg (1985)"},{"issue":"1","key":"1_CR6","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TSE.1985.231536","volume":"SE-11","author":"G.T. Almes","year":"1985","unstructured":"Almes, G.T., Black, A.P., Lazowska, E.D., Noe, J.D.: The eden system: A technical review. IEEE Trans. on Software Engineering\u00a0SE-11(1), 43\u201359 (1985)","journal-title":"IEEE Trans. on Software Engineering"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/BFb0053036","volume-title":"ECOOP \u201992 European Conference on Object-Oriented Programming","author":"R. Guerraoui","year":"1992","unstructured":"Guerraoui, R., Capobianchi, R., Lanusse, A., Roux, P.: Nesting Actions through Asynchronous Message Passing: the ACS Protocol. In: Madsen, O.L. (ed.) ECOOP 1992. LNCS, vol.\u00a0615, pp. 170\u2013184. Springer, Heidelberg (1992)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Knight, T.: An architecture for mostly functional languages. In: LFP, pp. 105\u2013112 (1986)","DOI":"10.1145\/319838.319854"},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1145\/173682.165164","volume":"21","author":"M. Herlihy","year":"1993","unstructured":"Herlihy, M., Moss, J.E.B.: Transactional memory: architectural support for lock-free data structures. SIGARCH Comput. Archit. News\u00a021, 289\u2013300 (1993)","journal-title":"SIGARCH Comput. Archit. News"},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1145\/1508284.1508263","volume":"44","author":"D. Dice","year":"2009","unstructured":"Dice, D., Lev, Y., Moir, M., Nussbaum, D.: Early experience with a commercial hardware transactional memory implementation. SIGPLAN Not.\u00a044, 157\u2013168 (2009)","journal-title":"SIGPLAN Not."},{"key":"1_CR11","unstructured":"Diestelhorst, S., Hohmuth, M., Pohlack, M.: Sane semantics of best-effort hardware transactional memory. In: WTTM (2010)"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Dalessandro, L., Carouge, F., White, S., Lev, Y., Moir, M., Scott, M.L., Spear, M.F.: Hybrid NOrec: a case study in the effectiveness of best effort hardware transactional memory. In: ASPLOS, pp. 39\u201352 (2011)","DOI":"10.1145\/1950365.1950373"},{"issue":"5","key":"1_CR13","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MM.2010.80","volume":"30","author":"P. Felber","year":"2010","unstructured":"Felber, P., Riviere, E., Moreira, W., Harmanci, D., Marlier, P., Diestelhorst, S., Hohmuth, M., Pohlack, M., Cristal, A., Hur, I., Unsal, O., Stenstrom, P., Dragojevic, A., Guerraoui, R., Kapalka, M., Gramoli, V., Drepper, U., Tomic, S., Afek, Y., Korland, G., Shavit, N., Fetzer, C., Nowack, M., Riegel, T.: The velox transactional memory stack. IEEE Micro\u00a030(5), 76\u201387 (2010)","journal-title":"IEEE Micro"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Shavit, N., Touitou, D.: Software transactional memory. In: PODC, pp. 204\u2013213 (1995)","DOI":"10.1145\/224964.224987"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Herlihy, M., Luchangco, V., Moir, M., Scherer III, W.N.: Software transactional memory for dynamic-sized data structures. In: PODC, pp. 92\u2013101 (2003)","DOI":"10.1145\/872035.872048"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/11864219_14","volume-title":"Distributed Computing","author":"D. Dice","year":"2006","unstructured":"Dice, D., Shalev, O., Shavit, N.N.: Transactional Locking II. In: Dolev, S. (ed.) DISC 2006. LNCS, vol.\u00a04167, pp. 194\u2013208. Springer, Heidelberg (2006)"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/11864219_20","volume-title":"Distributed Computing","author":"T. Riegel","year":"2006","unstructured":"Riegel, T., Felber, P., Fetzer, C.: A Lazy Snapshot Algorithm with Eager Validation. In: Dolev, S. (ed.) DISC 2006. LNCS, vol.\u00a04167, pp. 284\u2013298. Springer, Heidelberg (2006)"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Dragojevic, A., Guerraoui, R., Kapalka, M.: Stretching transactional memory. In: PLDI, pp. 155\u2013165 (2011)","DOI":"10.1145\/1543135.1542494"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Guerraoui, R., Kapalka, M., Vitek, J.: STMBench7: a benchmark for software transactional memory. In: EuroSys, pp. 315\u2013324 (2007)","DOI":"10.1145\/1272996.1273029"},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1007\/978-3-642-22655-7_29","volume-title":"ECOOP 2011 \u2013 Object-Oriented Programming","author":"D. Harmanci","year":"2011","unstructured":"Harmanci, D., Gramoli, V., Felber, P.: Atomic Boxes: Coordinated Exception Handling with Transactional Memory. In: Mezini, M. (ed.) ECOOP 2011. LNCS, vol.\u00a06813, pp. 634\u2013657. Springer, Heidelberg (2011)"},{"key":"1_CR21","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1145\/1454456.1454466","volume":"6","author":"C. Cascaval","year":"2008","unstructured":"Cascaval, C., Blundell, C., Michael, M., Cain, H.W., Wu, P., Chiras, S., Chatterjee, S.: Software transactional memory: Why is it only a research toy? Queue\u00a06, 46\u201358 (2008)","journal-title":"Queue"},{"issue":"4","key":"1_CR22","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/1924421.1924440","volume":"54","author":"A. Dragojevic","year":"2011","unstructured":"Dragojevic, A., Felber, P., Gramoli, V., Guerraoui, R.: Why STM can be more than a research toy. Commun. ACM\u00a054(4), 70\u201377 (2011)","journal-title":"Commun. ACM"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Lynch, N.A.: Multilevel atomicity a new correctness criterion for database concurrency control. ACM Trans. Database Syst.\u00a08 (1983)","DOI":"10.1145\/319996.319999"},{"key":"1_CR24","unstructured":"Moss, J.E.B.: Open nested transactions: Semantics and support. In: WMPI (2006)"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Reuter, A.: Concurrency on high-traffic data elements. In: PODS, pp. 83\u201392 (1982)","DOI":"10.1145\/588111.588126"},{"key":"1_CR26","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1145\/7239.7265","volume":"11","author":"P.E. O\u2019Neil","year":"1986","unstructured":"O\u2019Neil, P.E.: The escrow transactional method. ACM Trans. Database Syst.\u00a011, 405\u2013430 (1986)","journal-title":"ACM Trans. Database Syst."},{"key":"1_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-642-04355-0_12","volume-title":"Distributed Computing","author":"P. Felber","year":"2009","unstructured":"Felber, P., Gramoli, V., Guerraoui, R.: Elastic Transactions. In: Keidar, I. (ed.) DISC 2009. LNCS, vol.\u00a05805, pp. 93\u2013107. Springer, Heidelberg (2009)"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Michael, M.M.: High performance dynamic lock-free hash tables and list-based sets. In: SPAA, pp. 73\u201382 (2002)","DOI":"10.1145\/564870.564881"},{"key":"1_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/11795490_3","volume-title":"Principles of Distributed Systems","author":"S. Heller","year":"2006","unstructured":"Heller, S., Herlihy, M., Luchangco, V., Moir, M., Scherer III, W.N., Shavit, N.: A Lazy Concurrent List-Based Set Algorithm. In: Anderson, J.H., Prencipe, G., Wattenhofer, R. (eds.) OPODIS 2005. LNCS, vol.\u00a03974, pp. 3\u201316. Springer, Heidelberg (2006)"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Harris, T., Marlow, S., Peyton-Jones, S., Herlihy, M.: Composable memory transactions. In: PPoPP, pp. 48\u201360 (2005)","DOI":"10.1145\/1065944.1065952"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Ghemawat, S., Gobioff, H., Leung, S.-T.: The google file system. In: SOSP (2003)","DOI":"10.1145\/945445.945450"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Greenwald, M.: Two-handed emulation: how to build non-blocking implementations of complex data-structures using DCAS. In: PODC, pp. 260\u2013269 (2002)","DOI":"10.1145\/571825.571874"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Scherer III, W.N., Scott, M.L.: Advanced contention management for dynamic software transactional memory. In: PODC, pp. 240\u2013248 (2005)","DOI":"10.1145\/1073814.1073861"},{"key":"1_CR34","unstructured":"Transactional Memory Specification Drafting Group: Draft specification of transactional language constructs for C++ (2009), http:\/\/software.intel.com\/file\/21569"},{"issue":"1","key":"1_CR35","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1142\/S0129626410000041","volume":"20","author":"V. Gramoli","year":"2010","unstructured":"Gramoli, V., Harmanci, D., Felber, P.: On the input acceptance of transactional memory. Parallel Processing Letters\u00a020(1), 31\u201350 (2010)","journal-title":"Parallel Processing Letters"},{"key":"1_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/3-540-45414-4_21","volume-title":"Distributed Computing","author":"T. Harris","year":"2001","unstructured":"Harris, T.: A Pragmatic Implementation of Non-Blocking Linked-Lists. In: Welch, J.L. (ed.) DISC 2001. LNCS, vol.\u00a02180, pp. 300\u2013314. Springer, Heidelberg (2001)"},{"key":"1_CR37","unstructured":"Peierls, T., Goetz, B., Bloch, J., Bowbeer, J., Lea, D., Holmes, D.: Java Concurrency in Practice. Addison-Wesley (2005)"},{"key":"1_CR38","doi-asserted-by":"crossref","unstructured":"Ni, Y., Menon, V., Abd-Tabatabai, A.-R., Hosking, A.L., Hudson, R.L., Moss, J.E.B., Saha, B., Shpeisman, T.: Open nesting in software transactional memory. In: PPoPP (2007)","DOI":"10.1145\/1229428.1229442"},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Herlihy, M., Koskinen, E.: Transactional boosting: A methodology for highly-concurrent transactional objects. In: PPoPP (2008)","DOI":"10.1145\/1345206.1345237"},{"issue":"10","key":"1_CR40","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1016\/j.jpdc.2010.02.008","volume":"70","author":"D. Harmanci","year":"2010","unstructured":"Harmanci, D., Gramoli, V., Felber, P., Fetzer, C.: Extensible transactional memory testbed. J. Parallel and Distrib. Comp.\u00a070(10), 1053\u20131067 (2010)","journal-title":"J. Parallel and Distrib. Comp."},{"key":"1_CR41","unstructured":"Liu, Y., Spear, M.: Toxic transactions. In: Transact (2011)"}],"container-title":["Lecture Notes in Computer Science","Middleware 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25821-3_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:58:27Z","timestamp":1606186707000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25821-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642258206","9783642258213"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25821-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}