{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T05:58:56Z","timestamp":1703224736290},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2009,6,10]],"date-time":"2009-06-10T00:00:00Z","timestamp":1244592000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Acta Informatica"],"published-print":{"date-parts":[[2009,7]]},"DOI":"10.1007\/s00236-009-0097-4","type":"journal-article","created":{"date-parts":[[2009,6,9]],"date-time":"2009-06-09T00:58:45Z","timestamp":1244509125000},"page":"297-330","source":"Crossref","is-referenced-by-count":4,"title":["Correctness proof of a database replication protocol under the perspective of the I\/O automaton model"],"prefix":"10.1007","volume":"46","author":[{"given":"Jos\u00e9 Enrique","family":"Armend\u00e1riz-I\u00f1igo","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 Ram\u00f3n","family":"Gonz\u00e1lez de Mend\u00edvil","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Ram\u00f3n","family":"Garitagoitia","sequence":"additional","affiliation":[]},{"given":"Francesc D.","family":"Mu\u00f1oz-Esco\u00ed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,6,10]]},"reference":[{"key":"97_CR1","unstructured":"Adya, A.: Weak consistency: a generalized theory and optimistic implementations for distributed transactions. Ph.D. thesis, Massachusetts Institute of Technology (1999)"},{"key":"97_CR2","unstructured":"Armend\u00e1riz-I\u00f1igo, J.E., Ju\u00e1rez-Rodr\u00edguez, J.R., Gonz\u00e1lez de Mend\u00edvil, J.R.: Correctness criteria for replicated database systems with snapshot isolation replicas. Tech. Rep. ITI-ITE-08\/03, Instituto Tecnol\u00f3gico de Inform\u00e1tica (2008). http:\/\/www.iti.upv.es\/~armendariz\/research\/pdf\/ITI-ITE-08-03.pdf"},{"key":"97_CR3","doi-asserted-by":"crossref","unstructured":"Berenson, H., Bernstein, P.A., Gray, J., Melton, J., O\u2019Neil, E.J., O\u2019Neil, P.E.: A critique of ANSI SQL isolation levels. In: Carey, M.J., Schneider, D.A. (eds.) SIGMOD Conference, pp. 1\u201310. ACM Press, New York (1995)","DOI":"10.1145\/223784.223785"},{"issue":"2","key":"97_CR4","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/230798.230809","volume":"39","author":"P.A. Bernstein","year":"1996","unstructured":"Bernstein P.A.: Middleware: a model for distributed system services. Commun. ACM 39(2), 86\u201398 (1996)","journal-title":"Commun. ACM"},{"key":"97_CR5","volume-title":"Concurrency Control and Recovery in Database Systems","author":"P.A. Bernstein","year":"1987","unstructured":"Bernstein P.A., Hadzilacos V., Goodman N.: Concurrency Control and Recovery in Database Systems. Addison Wesley, Reading (1987)"},{"issue":"4","key":"97_CR6","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1145\/115302.115289","volume":"16","author":"M.J. Carey","year":"1991","unstructured":"Carey M.J., Livny M.: Conflict detection tradeoffs for replicated data. ACM Trans. Database Syst. 16(4), 703\u2013746 (1991)","journal-title":"ACM Trans. Database Syst."},{"issue":"8","key":"97_CR7","first-page":"1110","volume":"13","author":"N. Carvalho","year":"2007","unstructured":"Carvalho N., Correia A. Jr, Pereira J., Rodrigues L., Oliveira R.C., Guedes S.: On the use of a reflective architecture to augment database management systems. J. Univers. Comput. Sci. 13(8), 1110\u20131135 (2007)","journal-title":"J. Univers. Comput. Sci."},{"issue":"2","key":"97_CR8","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1145\/226643.226647","volume":"43","author":"T.D. Chandra","year":"1996","unstructured":"Chandra T.D., Toueg S.: Unreliable failure detectors for reliable distributed systems. J. ACM 43(2), 225\u2013267 (1996)","journal-title":"J. ACM"},{"issue":"4","key":"97_CR9","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1145\/503112.503113","volume":"33","author":"G. Chockler","year":"2001","unstructured":"Chockler G., Keidar I., Vitenberg R.: Group communication specifications: a comprehensive study. ACM Comput. Surv. 33(4), 427\u2013469 (2001)","journal-title":"ACM Comput. Surv."},{"key":"97_CR10","unstructured":"Daudjee, K., Salem, K.: Lazy database replication with snapshot isolation. In: VLDB. Seoul, Korea (2006)"},{"key":"97_CR11","doi-asserted-by":"crossref","unstructured":"D\u00e9fago, X., Schiper, A., Urb\u00e1n, P.: Total order broadcast and multicast algorithms: taxonomy and survey. ACM Comput. Surv. 36(4), 372\u2013421 (2004). http:\/\/doi.acm.org\/10.1145\/1041680.1041682","DOI":"10.1145\/1041680.1041682"},{"key":"97_CR12","doi-asserted-by":"crossref","unstructured":"Elnikety, S., Dropsho, S., Pedone, F.: Tashkent: Uniting durability with transaction ordering for high-performance scalable database replication. In: ACM Eurosys. Leuven (2006)","DOI":"10.1145\/1217935.1217947"},{"key":"97_CR13","doi-asserted-by":"crossref","unstructured":"Elnikety, S., Pedone, F., Zwaenopoel, W.: Database replication using generalized snapshot isolation. In: The 24th IEEE Symposium on Reliable Distributed Systems (SRDS\u201905). IEEE Computer Society, Los Alamitos (2005)","DOI":"10.1109\/RELDIS.2005.14"},{"key":"97_CR14","doi-asserted-by":"crossref","unstructured":"Fekete, A., Liarokapis, D., O\u2019Neil, E., O\u2019Neil, P., Shasha, D.: Making snapshot isolation serializable. ACM Trans. Database Syst. 30(2), 492\u2013528 (2005). http:\/\/doi.acm.org\/10.1145\/1071610.1071615","DOI":"10.1145\/1071610.1071615"},{"issue":"4","key":"97_CR15","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1145\/195664.195666","volume":"19","author":"K.J. Goldman","year":"1994","unstructured":"Goldman K.J., Lynch N.A.: Quorum consensus in nested transaction systems. ACM Trans. Database Syst. 19(4), 537\u2013585 (1994)","journal-title":"ACM Trans. Database Syst."},{"key":"97_CR16","unstructured":"Gonz\u00e1lez de Mend\u00edvil, J.R., Armend\u00e1riz-I\u00f1igo, J.E., Mu\u00f1oz-Esco\u00ed, F.D., Ir\u00fan-Briz, L., Garitagoitia, J.R., Ju\u00e1rez-Rodr\u00edguez, J.R.: Non-blocking ROWA protocols implement GSI using SI replicas. Tech. Rep. ITI-ITE-07\/10, Instituto Tecnol\u00f3gico de Inform\u00e1tica (2007). http:\/\/www.iti.upv.es\/~armendariz\/research\/pdf\/ITI-ITE-07-10.pdf"},{"key":"97_CR17","doi-asserted-by":"crossref","unstructured":"Gray, J., Helland, P., O\u2019Neil, P.E., Shasha, D.: The dangers of replication and a solution. In: Jagadish, H.V., Mumick, I.S. (eds.) SIGMOD Conference, pp. 173\u2013182. ACM Press (1996)","DOI":"10.1145\/233269.233330"},{"key":"97_CR18","volume-title":"Communicating Sequential Processes","author":"C.A.R. Hoare","year":"1985","unstructured":"Hoare C.A.R.: Communicating Sequential Processes. Prentice-Hall, Englewood Cliffs (1985)"},{"issue":"5","key":"97_CR19","doi-asserted-by":"crossref","first-page":"1218","DOI":"10.1109\/TKDE.2003.1232274","volume":"15","author":"J. Holliday","year":"2003","unstructured":"Holliday J., Steinke R.C., Agrawal D., Abbadi A.E.: Epidemic algorithms for replicated databases. IEEE Trans. Knowl. Data Eng. 15(5), 1218\u20131238 (2003)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"97_CR20","unstructured":"Kemme, B., Alonso, G.: Don\u2019t be lazy, be consistent: postgres-R, a new way to implement database replication. In: Abbadi, A.E., Brodie, M.L., Chakravarthy, S., Dayal, U., Kamel, N., Schlageter, G., Whang, K.Y. (eds.) VLDB, pp. 134\u2013143. Morgan Kaufmann, Los Altos (2000)"},{"issue":"3","key":"97_CR21","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1145\/363951.363955","volume":"25","author":"B. Kemme","year":"2000","unstructured":"Kemme B., Alonso G.: A new approach to developing and implementing eager database replication protocols. ACM Trans. Database Syst. 25(3), 333\u2013379 (2000)","journal-title":"ACM Trans. Database Syst."},{"key":"97_CR22","doi-asserted-by":"crossref","unstructured":"Kemme, B., Bartoli, A., Babaoglu, \u00d6.: Online reconfiguration in replicated databases based on group communication. In: DSN, pp. 117\u2013130. IEEE-CS Press, Los Alamitos (2001)","DOI":"10.1109\/DSN.2001.941398"},{"key":"97_CR23","unstructured":"Lamport, L.: Specifying Systems: The TLA+ Language and Tools for Hardware and Software Engineers. Addison Wesley Professional (2002)"},{"key":"97_CR24","doi-asserted-by":"crossref","unstructured":"Liang, W., Kemme, B.: Online recovery in cluster databases. In: 11th international conference on Extending database technology, pp. 121\u2013132. ACM, New York (2008)","DOI":"10.1145\/1353343.1353362"},{"key":"97_CR25","doi-asserted-by":"crossref","unstructured":"Lin, Y., Kemme, B., Pati\u00f1o-Mart\u00ednez, M., Jim\u00e9nez-Peris, R.: Middleware based data replication providing snapshot isolation. In: SIGMOD Conference. ACM, New York (2005)","DOI":"10.1145\/1066157.1066205"},{"key":"97_CR26","volume-title":"Distributed Systems","author":"N.A. Lynch","year":"1996","unstructured":"Lynch N.A.: Distributed Systems. Morgan Kaufmann Publishers, Los Altos (1996)"},{"key":"97_CR27","doi-asserted-by":"crossref","unstructured":"Lynch, N.A., Merritt, M., Weihl, W.E., Fekete, A.: A theory of atomic transactions. In: 2nd Intnl. Conf. on Database Theory (ICDT), LNCS 326, pp. 41\u201371. Springer, Bruges (1988)","DOI":"10.1007\/3-540-50171-1_3"},{"issue":"3","key":"97_CR28","first-page":"219","volume":"2","author":"N.A. Lynch","year":"1989","unstructured":"Lynch N.A., Tuttle M.R.: An introduction to input\/output automata. CWI-Q. 2(3), 219\u2013246 (1989)","journal-title":"CWI-Q."},{"key":"97_CR29","unstructured":"Microsoft SQL Server 2005: SQL Server 2005 row versioning-based transaction isolation. (2008). http:\/\/msdn2.microsoft.com\/en-us\/library\/ms345124.aspx"},{"key":"97_CR30","doi-asserted-by":"crossref","unstructured":"Milner, R.: A Calculus of Communicating Systems. In: Lecture Notes in Computer Science, vol. 2. 171\u00a0pp. Springer-Verlag (1980)","DOI":"10.1007\/3-540-10235-3"},{"key":"97_CR31","doi-asserted-by":"crossref","unstructured":"Mu\u00f1oz-Esco\u00ed, F.D., Pla-Civera, J., Ruiz-Fuertes, M.I., Ir\u00fan-Briz, L., Decker, H., Armend\u00e1riz-I\u00f1igo, J.E., de Mend\u00edvil, J.R.G.: Managing transaction conflicts in middleware-based database replication architectures. In: SRDS, pp. 401\u2013410. IEEE Computer Society (2006)","DOI":"10.1109\/SRDS.2006.29"},{"key":"97_CR32","unstructured":"Oracle Corporation: Oracle 11g Release 1 (2008). Accessible in URL: http:\/\/download.oracle.com\/docs\/cd\/B28359_01\/server.111\/b28318.pdf"},{"issue":"4","key":"97_CR33","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1145\/1113574.1113576","volume":"23","author":"M. Pati\u00f1o-Mart\u00ednez","year":"2005","unstructured":"Pati\u00f1o-Mart\u00ednez M., Jim\u00e9nez-Peris R., Kemme B., Alonso G.: MIDDLE-R: consistent database replication at the middleware level. ACM Trans. Comput. Syst. 23(4), 375\u2013423 (2005)","journal-title":"ACM Trans. Comput. Syst."},{"key":"97_CR34","unstructured":"Pedone, F.: The database state machine and group communication issues (th\u00e8se n. 2090). Ph.D. thesis, \u00c9cole Polytecnique F\u00e9d\u00e9rale de Lausanne, Lausanne (1999)"},{"issue":"4","key":"97_CR35","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1007\/s00778-006-0026-x","volume":"17","author":"C. Plattner","year":"2008","unstructured":"Plattner C., Alonso G., \u00d6zsu M.T.: Extending DBMSs with satellite databases. VLDB J. 17(4), 657\u2013682 (2008)","journal-title":"VLDB J."},{"key":"97_CR36","unstructured":"PostgreSQL: The world\u2019s most advance open source database web site (2008). Accessible in URL: http:\/\/www.postgresql.org"},{"key":"97_CR37","doi-asserted-by":"crossref","unstructured":"Ruiz-Fuertes, M.I., Pla-Civera, J., Armend\u00e1riz-I\u00f1igo, J.E., de Mend\u00edvil, J.R.G., Mu\u00f1oz-Esco\u00ed, F.D.: Revisiting certification-based replicated database recovery. In: Meersman, R., Tari, Z. (eds.) OTM Conferences (1). Lecture Notes in Computer Science, vol. 4803, pp. 489\u2013504. Springer (2007)","DOI":"10.1007\/978-3-540-76848-7_35"},{"key":"97_CR38","doi-asserted-by":"crossref","unstructured":"Salas, J., Jim\u00e9nez-Peris, R., Pati\u00f1o-Mart\u00ednez, M., Kemme, B.: Lightweight reflection for middleware-based database replication. In: SRDS, pp. 377\u2013390. IEEE Computer Society (2006)","DOI":"10.1109\/SRDS.2006.28"},{"issue":"3","key":"97_CR39","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1145\/158439.158441","volume":"25","author":"A.U. Shankar","year":"1993","unstructured":"Shankar A.U.: An introduction to assertional reasoning for concurrent systems. ACM Comput. Surv. 25(3), 225\u2013262 (1993)","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"97_CR40","first-page":"551","volume":"17","author":"M. Wiesmann","year":"2005","unstructured":"Wiesmann M., Schiper A.: Comparison of database replication techniques based on total order broadcast. IEEE TKDE 17(4), 551\u2013566 (2005)","journal-title":"IEEE TKDE"},{"key":"97_CR41","doi-asserted-by":"crossref","unstructured":"Wiesmann, M., Schiper, A., Pedone, F., Kemme, B., Alonso, G.: Database replication techniques: a three parameter classification. In: Proc. of the 19th IEEE Symposium on Reliable Distributed Systems (SRDS\u201900), pp. 206\u2013217 (2000)","DOI":"10.1109\/RELDI.2000.885408"},{"key":"97_CR42","unstructured":"Wu, S., Kemme, B.: Postgres-R(SI): combining replica control with concurrency control based on snapshot isolation. In: ICDE, pp. 422\u2013433. IEEE Computer Society (2005)"},{"key":"97_CR43","doi-asserted-by":"crossref","unstructured":"Zuikeviciute, V., Pedone, F.: Conflict aware load balancing techniques for database replication. In: 23rd ACM Symposium on Applied Computing (SAC 2008), pp. 2169\u20132173. ACM Press, New York (2008)","DOI":"10.1145\/1363686.1364205"}],"container-title":["Acta Informatica"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00236-009-0097-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00236-009-0097-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00236-009-0097-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T09:41:55Z","timestamp":1558690915000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00236-009-0097-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,10]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,7]]}},"alternative-id":["97"],"URL":"https:\/\/doi.org\/10.1007\/s00236-009-0097-4","relation":{},"ISSN":["0001-5903","1432-0525"],"issn-type":[{"value":"0001-5903","type":"print"},{"value":"1432-0525","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,6,10]]}}}