{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:28:48Z","timestamp":1742992128151,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540572015"},{"type":"electronic","value":"9783642784958"}],"license":[{"start":{"date-parts":[[1993,1,1]],"date-time":"1993-01-01T00:00:00Z","timestamp":725846400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1993,1,1]],"date-time":"1993-01-01T00:00:00Z","timestamp":725846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1993]]},"DOI":"10.1007\/978-3-642-78495-8_8","type":"book-chapter","created":{"date-parts":[[2011,11,18]],"date-time":"2011-11-18T04:02:13Z","timestamp":1321588933000},"page":"90-102","source":"Crossref","is-referenced-by-count":0,"title":["Bounds for Blocking and Deadlock in Transaction Systems with Two-Phase Locking"],"prefix":"10.1007","author":[{"given":"Gerhard","family":"Ha\u00dflinger","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal D., El Abbadi A. and Jeffers R.: An approach to eliminate transaction blocking in locking protocols, Proceedings of the 11th International ACM Conference on Principles of Database Systems, pp. 223\u2013235, 1992","DOI":"10.1145\/137097.137877"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1145\/32204.32220","volume":"12","author":"R Agrawal","year":"1987","unstructured":"Agrawal R, Carey M. and Livny M.: Concurrency control performance models: alternatives and implications, ACM Trans, on Database Systems 12, pp. 609\u2013654, 1987","journal-title":"ACM Trans, on Database Systems"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal R., Carey M. and McVoy L.: The performance of alternative strategies for dealing with deadlocks in database management systems, IEEE Trans, on Software Engineering SE-13, pp. 1348\u20131363, 1987","DOI":"10.1109\/TSE.1987.233145"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Becker A.: Leistungseinbu\u00dfen in einem DB-System mit Zwei-Phasen Sperrprotokoll, Informatik Fachbericht IFB 110 zur MMB-Tagung, Springer, pp. 217\u2013232, 1985","DOI":"10.1007\/978-3-642-87472-7_16"},{"key":"8_CR5","volume-title":"Addison-Wesley","author":"P Bernstein","year":"1987","unstructured":"Bernstein P., Hadzilacos V. and Goodman N.: Concurrency Control and Recovery in Database Systems, Addison-Wesley, 1987"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Bohn V., H\u00e4rder T. and Rahm E.: Extended Memory Support for High Performance Transaction Systems, Proc. of the MMB-Conference, Informatik Fachbericht IFB 286., Springer, pp. 92\u2013108, 1991","DOI":"10.1007\/978-3-642-76934-4_7"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Breitenbach C., Hasslinger G. and Herold P.: Deadlocks in einem verteilten System mit zentraler Datenhaltung: Vergleich von Aufl\u00f6sungsstrategien und Absch\u00e4tzung der Deadlockrate, Informatik Fachbericht IFB 267 zur Tagung Kommunikation in Verteilten Systemen, Springer, pp. 320\u2013334, 1991","DOI":"10.1007\/978-3-642-76462-2_23"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Dan A., Towsley F. and Kohler W.: Modeling the effects of data and resource contention on the performance of optimistic concurrency control protocols, Proceedings of the 5th International IEEE Conference on Data Engineering, pp. 418\u2013425, 1988","DOI":"10.1109\/ICDE.1988.105486"},{"key":"8_CR9","volume-title":"John Wiley","author":"W Feller","year":"1957","unstructured":"Feller W.: An Introduction to Probability Theory and its Applications, John Wiley, 1957"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Franaszek P., Robinson J. and Thomasian A.: Access invariance and its use in high contention environments, Proceedings of the 7th International IEEE Conference on Data Engineering, pp. 47\u201355, 1990","DOI":"10.1109\/ICDE.1990.113453"},{"key":"8_CR11","volume-title":"Technical Report RJ","author":"J Gray","year":"1981","unstructured":"Gray J., Homan P., Obermarck R. and Korth H.: A straw man analysis of the probability of waiting and deadlock in a database system, Technical Report RJ 3066, IBM Research Lab., San Jose, California, 1981"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Hartzman C.: The delay due to dynamic two-phase locking, IEEE Trans. on Software Engineering SE-15, pp. 72\u201382, 1989","DOI":"10.1109\/32.21728"},{"key":"8_CR13","unstructured":"Heiss U. and Wagner R.: Adaptive load control in transaction processing systems, Proceedings of the 17th International Conference on Very Large Data Bases, pp. 47\u201354, 1991"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/51708.51709","volume":"17","author":"B Jiang","year":"1988","unstructured":"Jiang B.: Deadlock detection is really cheap, ACM Sigmod Record 17, pp. 2\u201313, 1988","journal-title":"ACM Sigmod Record"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Moenkeberg A. and Weikum G.: Conflict-driven load control for the avoidance of data- contention thrashing, Proceedings of the 8th International IEEE Conference on Data Engineering, pp. 632\u2013639, 1991","DOI":"10.1109\/ICDE.1991.131512"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1145\/79147.79152","volume":"37","author":"I Ryu","year":"1990","unstructured":"Ryu I. and Thomasian A.: Analysis of database performance with dynamic locking, Journal of the ACM, Vol. 37, pp. 491\u2013523, 1990","journal-title":"Journal of the ACM"},{"key":"8_CR17","first-page":"1","volume-title":"Performance 81","author":"A Shum","year":"1981","unstructured":"Shum A. and Spirakis P.: Performance analysis of concurrency control methods in database systems, Performance \u201981, F. Kylstra Ed., Elsevier North-Holland pp. 1\u201318, 1981"},{"key":"8_CR18","first-page":"631","volume-title":"Stochastic Analysis of Computer and Communication Systems","author":"Y Tay","year":"1990","unstructured":"Tay Y.: Issues in modeling locking performance, Stochastic Analysis of Computer and Communication Systems, H. Takagi Ed., Elsevier North-Holland pp. 631\u2013655, 1990"},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1145\/4879.4880","volume":"10","author":"Y Tay","year":"1985","unstructured":"Tay Y., Goodman N. and Suri R.: Locking performance in centralized databases, ACM Trans. on Database Systems 10, pp. 415\u2013462, 1985","journal-title":"ACM Trans. on Database Systems"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Thomasian A.: Performance limits of two-phase locking, Proceedings of the 7th International IEEE Conference on Data Engineering, pp. 426\u2013435, 1991","DOI":"10.1109\/ICDE.1991.131491"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Thomasian A. and Ryu I.: Performance analysis of two-phase locking, IEEE Trans. on Software Engineering SE-17, pp. 386\u2013402, 1991","DOI":"10.1109\/32.90443"},{"key":"8_CR22","volume-title":"Addison-Wesley","author":"G Weikum","year":"1988","unstructured":"Weikum G.: Transaktionen in Datenbanken, Addison-Wesley, 1988"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Wang P. and Li O.: A unified concurrency control algorithm for distributed database systems, Proceedings of the 5th International IEEE Conference on Data Engineering, pp. 410\u2013417, 1988","DOI":"10.1109\/ICDE.1988.105485"}],"container-title":["Informatik aktuell","Messung, Modellierung und Bewertung von Rechen- und Kommunikationssystemen"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-78495-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T05:58:38Z","timestamp":1741931918000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-78495-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993]]},"ISBN":["9783540572015","9783642784958"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-78495-8_8","relation":{},"ISSN":["1431-472X"],"issn-type":[{"type":"print","value":"1431-472X"}],"subject":[],"published":{"date-parts":[[1993]]}}}