{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:47:19Z","timestamp":1725742039180},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642400469"},{"type":"electronic","value":"9783642400476"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40047-6_39","type":"book-chapter","created":{"date-parts":[[2013,7,20]],"date-time":"2013-07-20T08:18:02Z","timestamp":1374308282000},"page":"369-381","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["On the Scalability of Snapshot Isolation"],"prefix":"10.1007","author":[{"given":"Masoud","family":"Saeida Ardekani","sequence":"first","affiliation":[]},{"given":"Pierre","family":"Sutra","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Shapiro","sequence":"additional","affiliation":[]},{"given":"Nuno","family":"Pregui\u00e7a","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","unstructured":"Daudjee, K., et al.: Lazy database replication with snapshot isolation. In: VLDB, pp. 715\u2013726 (September 2006)"},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Serrano, D., et al.: Boosting Database Replication Scalability through Partial Replication and 1-Copy-Snapshot-Isolation. In: PRDC, pp. 290\u2013297 (December 2007)","DOI":"10.1109\/PRDC.2007.39"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Armend\u00e1riz-I\u00f1igo, J.E., et al.: SIPRe: a partial database replication protocol with SI replicas. In: SAC, pp. 2181\u20132185 (March 2008)","DOI":"10.1145\/1363686.1364207"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Bieniusa, A., et al.: Consistency in hindsight: A fully decentralized stm algorithm. In: IPDPS, pp. 1\u201312 (April 2010)","DOI":"10.1109\/IPDPS.2010.5470446"},{"key":"39_CR5","unstructured":"Riegel, T., et al.: Snapshot isolation for software transactional memory. In: TRANSACT (June 2006)"},{"key":"39_CR6","unstructured":"Adya, A.: Weak Consistency: A Generalized Theory and Optimistic Implementations for Distributed Transactions. Ph.D., MIT (March 1999)"},{"key":"39_CR7","unstructured":"Elnikety, S., et al.: Database Replication Using Generalized Snapshot Isolation. In: SRDS, pp. 73\u201384 (October 2005)"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Berenson, H., et al.: A critique of ansi sql isolation levels. In: SIGMOD, pp. 1\u201310 (May 1995)","DOI":"10.1145\/568271.223785"},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Sovran, Y., et al.: Transactional storage for geo-replicated systems. In: SOSP, pp. 385\u2013400 (October 2011)","DOI":"10.1145\/2043556.2043592"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Schiper, N., et al.: P-store: Genuine partial replication in wide area networks. In: SRDS, pp. 214\u2013224 (November 2010)","DOI":"10.1109\/SRDS.2010.32"},{"key":"39_CR11","unstructured":"Ardekani, M.S., et al.: Non-Monotonic Snapshot Isolation. INRIA, Tech. Rep. RR-7805 (October 2012)"},{"key":"39_CR12","unstructured":"Bernstein, P., et al.: Concurrency Control and Recovery in Database Systems. Addison Wesley Publishing Company (1987)"},{"issue":"2","key":"39_CR13","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1145\/3149.214121","volume":"32","author":"M.J. Fischer","year":"1985","unstructured":"Fischer, M.J., et al.: Impossibility of distributed consensus with one faulty process. Journal of the ACM\u00a032(2), 374\u2013382 (1985)","journal-title":"Journal of the ACM"},{"key":"39_CR14","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/0304-3975(91)90224-P","volume":"82","author":"M. Abadi","year":"1991","unstructured":"Abadi, M., et al.: The existence of refinement mappings. Theory Computer Science\u00a082, 253\u2013284 (1991)","journal-title":"Theory Computer Science"},{"issue":"2","key":"39_CR15","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TSE.1985.232196","volume":"SE-11","author":"A. Chan","year":"1985","unstructured":"Chan, A., et al.: Implementing Distributed Read-Only Transactions. IEEE Transactions on Software Engineering\u00a0SE-11(2), 205\u2013212 (1985)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"2","key":"39_CR16","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1145\/319702.319704","volume":"7","author":"H. Garcia-Molina","year":"1982","unstructured":"Garcia-Molina, H., et al.: Read-only transactions in a distributed database. ACM Trans. Database Syst.\u00a07(2), 209\u2013234 (1982)","journal-title":"ACM Trans. Database Syst."},{"key":"39_CR17","doi-asserted-by":"crossref","unstructured":"Attiya, H., et al.: Inherent limitations on disjoint-access parallel implementations of transactional memory. In: SPAA, pp. 69\u201378 (2009)","DOI":"10.1145\/1583991.1584015"},{"issue":"2","key":"39_CR18","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1145\/226643.226647","volume":"43","author":"T.D. Chandra","year":"1996","unstructured":"Chandra, T.D., et al.: Unreliable failure detectors for reliable distributed systems. Journal of the ACM\u00a043(2), 225\u2013267 (1996)","journal-title":"Journal of the ACM"},{"issue":"4","key":"39_CR19","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1145\/322154.322158","volume":"26","author":"C.H. Papadimitriou","year":"1979","unstructured":"Papadimitriou, C.H.: The serializability of concurrent database updates. Journal of the ACM\u00a026(4), 631\u2013653 (1979)","journal-title":"Journal of the ACM"},{"key":"39_CR20","doi-asserted-by":"crossref","unstructured":"Guerraoui, R., et al.: On the correctness of transactional memory. In: PPoPP, pp. 175\u2013184 (2008)","DOI":"10.1145\/1345206.1345233"},{"key":"39_CR21","unstructured":"Peluso, S., et al.: Genuine replication, opacity and wait-free read transactions: can a stm get them all? In: WTTM, Madeira, Portugal (July 2012)"},{"key":"39_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-540-87779-0_21","volume-title":"Distributed Computing","author":"R. Guerraoui","year":"2008","unstructured":"Guerraoui, R., Henzinger, T.A., Singh, V.: Permissiveness in transactional memories. In: Taubenfeld, G. (ed.) DISC 2008. LNCS, vol.\u00a05218, pp. 305\u2013319. Springer, Heidelberg (2008)"},{"key":"39_CR23","doi-asserted-by":"crossref","unstructured":"Sciascia, D., et al.: Scalable deferred update replication. In: DSN, pp. 1\u201312 (June 2012)","DOI":"10.1109\/DSN.2012.6263931"},{"key":"39_CR24","doi-asserted-by":"crossref","unstructured":"Peluso, S., et al.: When scalability meets consistency: Genuine multiversion update-serializable partial data replication. In: ICDCS, pp. 455\u2013465 (June 2012)","DOI":"10.1109\/ICDCS.2012.55"}],"container-title":["Lecture Notes in Computer Science","Euro-Par 2013 Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40047-6_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,19]],"date-time":"2020-04-19T21:06:29Z","timestamp":1587330389000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40047-6_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642400469","9783642400476"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40047-6_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}