{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T13:32:42Z","timestamp":1694525562071},"reference-count":28,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1993,8,1]],"date-time":"1993-08-01T00:00:00Z","timestamp":744163200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,17]],"date-time":"2013-07-17T00:00:00Z","timestamp":1374019200000},"content-version":"vor","delay-in-days":7290,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer and System Sciences"],"published-print":{"date-parts":[[1993,8]]},"DOI":"10.1016\/0022-0000(93)90023-p","type":"journal-article","created":{"date-parts":[[2003,12,4]],"date-time":"2003-12-04T07:01:00Z","timestamp":1070521260000},"page":"157-184","source":"Crossref","is-referenced-by-count":9,"title":["The impact of recovery on concurrency control"],"prefix":"10.1016","volume":"47","author":[{"given":"William E.","family":"Weihl","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0022-0000(93)90023-P_BIB1","article-title":"An Architecture for Reliable Decentralized Systems","author":"Allchin","year":"1983"},{"key":"10.1016\/0022-0000(93)90023-P_BIB2","series-title":"Proceedings, Second Annual ACM Symposium on Principles of Distributed Computing","first-page":"45","article-title":"A concurrency control theory for nested transactions","author":"Beeri","year":"1983"},{"issue":"No. 2","key":"10.1016\/0022-0000(93)90023-P_BIB3","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1145\/356842.356846","article-title":"Concurrency control in distributed database systems","volume":"13","author":"Bernstein","year":"1981","journal-title":"ACM Comput. Surveys"},{"issue":"No. 3","key":"10.1016\/0022-0000(93)90023-P_BIB4","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1109\/TSE.1983.236732","article-title":"Analyzing concurrency control when user and system operations differ","volume":"SE-9","author":"Bernstein","year":"1983","journal-title":"IEEE Trans. Software Engin."},{"issue":"No. 11","key":"10.1016\/0022-0000(93)90023-P_BIB5","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1145\/360363.360369","article-title":"The notions of consistency and predicate locks in a database system","volume":"19","author":"Eswaran","year":"1976","journal-title":"Comm. ACM"},{"key":"10.1016\/0022-0000(93)90023-P_BIB6","series-title":"Operating Systems\u2014An Advanced Course","article-title":"Notes on database operating systems","volume":"Vol. 60","author":"Gray","year":"1978"},{"issue":"No. 2","key":"10.1016\/0022-0000(93)90023-P_BIB7","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1145\/356842.356847","article-title":"The recovery manager of the System R database manager","volume":"13","author":"Gray","year":"1981","journal-title":"ACM Comp. Surveys"},{"issue":"No. 1","key":"10.1016\/0022-0000(93)90023-P_BIB8","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1145\/42267.42272","article-title":"A theory of reliability in database systems","volume":"35","author":"Hadzilacos","year":"1988","journal-title":"J. Assoc. Comput. Mach."},{"key":"10.1016\/0022-0000(93)90023-P_BIB9","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1145\/322358.322363","article-title":"Locking primitives in a database system","volume":"30","author":"Korth","year":"1983","journal-title":"J. Assoc. Comput. Mach."},{"issue":"No. 2","key":"10.1016\/0022-0000(93)90023-P_BIB10","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1145\/319566.319567","article-title":"On optimistic methods for concurrency control","volume":"6","author":"Kung","year":"1981","journal-title":"ACM Trans. Database Systems"},{"key":"10.1016\/0022-0000(93)90023-P_BIB11","series-title":"Distributed Systems: Architecture and Implementation","first-page":"246","article-title":"Atomic transactions","volume":"Vol. 105","author":"Lampson","year":"1981"},{"issue":"No. 3","key":"10.1016\/0022-0000(93)90023-P_BIB12","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1145\/2166.357215","article-title":"Guardians and actions: Linguistic support for robust, distributed programs","volume":"5","author":"Liskov","year":"1983","journal-title":"ACM Trans. Programm. Lang. Systems"},{"key":"10.1016\/0022-0000(93)90023-P_BIB13_1","doi-asserted-by":"crossref","DOI":"10.1145\/41840.41852","article-title":"Hierarchical Correctness Proofs for Distributed Algorithms","author":"Lynch","year":"1987"},{"key":"10.1016\/0022-0000(93)90023-P_BIB13_2","first-page":"137","article-title":"Proceedings, Sixth ACM Symposium on Principles of Distributed Computing","author":"Lynch","year":"1987"},{"key":"10.1016\/0022-0000(93)90023-P_BIB14","series-title":"Centrum voor Wiskunde en Informatica Quarterly","article-title":"An introduction to input\/output automata","author":"Lynch","year":"1988"},{"issue":"No. 4","key":"10.1016\/0022-0000(93)90023-P_BIB15","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1145\/358468.358475","article-title":"A comparison of two network-based file servers","volume":"25","author":"Mitchell","year":"1982","journal-title":"Comm. ACM"},{"key":"10.1016\/0022-0000(93)90023-P_BIB16","article-title":"Abstraction in Concurrency Control and Recovery Management (Revised)","author":"Moss","year":"1986"},{"issue":"No. 4","key":"10.1016\/0022-0000(93)90023-P_BIB17","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1145\/7239.7265","article-title":"The escrow transactional method","volume":"11","author":"O'Neil","year":"1986","journal-title":"ACM Trans. Database Systems"},{"issue":"No. 4","key":"10.1016\/0022-0000(93)90023-P_BIB18","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1145\/322154.322158","article-title":"The serializability of concurrent database updates","volume":"26","author":"Papadimitriou","year":"1979","journal-title":"J. ACM"},{"issue":"No. 4","key":"10.1016\/0022-0000(93)90023-P_BIB19","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1145\/989.1188","article-title":"Synchronizing shared abstract types","volume":"2","author":"Schwarz","year":"1984","journal-title":"ACM Trans. Comput. Systems"},{"key":"10.1016\/0022-0000(93)90023-P_BIB20","article-title":"Crash Recovery in a Distributed Database System","author":"Skeen","year":"1982"},{"issue":"No. 6","key":"10.1016\/0022-0000(93)90023-P_BIB21","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1109\/TSE.1985.232244","article-title":"Support for distributed transactions in the TABS prototype","volume":"SE-11","author":"Spector","year":"1985","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/0022-0000(93)90023-P_BIB22","article-title":"Specification and Implementation of Atomic Data Types","author":"Weihl","year":"1984"},{"issue":"No. 12","key":"10.1016\/0022-0000(93)90023-P_BIB23","doi-asserted-by":"crossref","first-page":"1488","DOI":"10.1109\/12.9728","article-title":"Commutativity-based concurrency control for abstract data types","volume":"37","author":"Weihl","year":"1988","journal-title":"IEEE Trans. Comput."},{"issue":"No. 4","key":"10.1016\/0022-0000(93)90023-P_BIB24","article-title":"Local atomicity properties: Modular concurrency control for abstract data types","volume":"11","author":"Weihl","year":"1989","journal-title":"ACM Trans. Programm. Lang. Systems"},{"key":"10.1016\/0022-0000(93)90023-P_BIB25","doi-asserted-by":"crossref","DOI":"10.1145\/3318.3319","article-title":"Implementation of resilient, atomic data types","volume":"7","author":"Weihl","year":"1985","journal-title":"ACM Trans. Programm. Lang. Systems"},{"key":"10.1016\/0022-0000(93)90023-P_BIB26","series-title":"Proceedings, Fifth ACM Symposium on Principles of Database Systems","first-page":"31","article-title":"A theoretical foundation of multi-level concurrency control","author":"Weikum","year":"1986"},{"key":"10.1016\/0022-0000(93)90023-P_BIB27","series-title":"Proceedings, Tenth International Conference on Very Large Data Bases","first-page":"454","article-title":"Architectural issues of transaction management in multi-layered systems","author":"Weikum","year":"1984"}],"container-title":["Journal of Computer and System Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:002200009390023P?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:002200009390023P?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T08:57:58Z","timestamp":1550307478000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/002200009390023P"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993,8]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1993,8]]}},"alternative-id":["002200009390023P"],"URL":"https:\/\/doi.org\/10.1016\/0022-0000(93)90023-p","relation":{},"ISSN":["0022-0000"],"issn-type":[{"value":"0022-0000","type":"print"}],"subject":[],"published":{"date-parts":[[1993,8]]}}}