{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,16]],"date-time":"2025-03-16T04:04:02Z","timestamp":1742097842081,"version":"3.38.0"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2002,9,1]],"date-time":"2002-09-01T00:00:00Z","timestamp":1030838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2002,9]]},"DOI":"10.1109\/tkde.2002.1033779","type":"journal-article","created":{"date-parts":[[2002,10,18]],"date-time":"2002-10-18T21:39:07Z","timestamp":1034977147000},"page":"1126-1140","source":"Crossref","is-referenced-by-count":1,"title":["Flexible robust programming in distributed object systems"],"prefix":"10.1109","volume":"14","author":[{"given":"M.","family":"Ahamad","sequence":"first","affiliation":[]},{"given":"M.","family":"Chelliah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/74850.74863"},{"article-title":"Mach: a New Kernel Foundation for Unix Development","volume-title":"Proc. Usenix Conf.","author":"Accetta","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/130888.130889"},{"article-title":"A Practical Approach to Realizing Extended Transaction Models","volume-title":"Proc. 21st Conf. Very Large Data Bases","author":"Barga","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/191839.191848"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.21236\/ADA243512"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.21236\/ADA177091"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.1991.148636"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1992.243618"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/93597.98729"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/2.116849"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/2.16189"},{"volume-title":"Database Transaction Models for Advanced Applications","year":"1992","author":"Elmagarmid","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1992.243619"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/319983.319985"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/38713.38742"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1142\/S0218215794000144"},{"volume-title":"Transaction Processing: Concepts and Techniques","year":"1992","author":"Gray","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/27636.27640"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/32.159831"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1990.113511"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/99332.99366"},{"article-title":"A Formal Approach to Recovery by Compensating Transactions","volume-title":"Proc. 16th Conf. Very Large Data Bases","author":"Korth","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/50202.50248"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2166.357215"},{"volume-title":"Nested Transactions: An Approach to Reliable Distributed Computing","year":"1985","author":"Moss","key":"ref26"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1007\/BF01228707","article-title":"Cooperative Transaction Hierarchies: A Transaction Model to Support Design Applications","volume-title":"Proc. 16th Conf. Very Large Data Bases","author":"Nodine"},{"article-title":"Split-Transactions for Open-Ended Activities","volume-title":"Proc. 14th Int\u2019l Conf. Very Large Data Bases","author":"Pu","key":"ref28"},{"article-title":"Light-Weight Recoverable Virtual Memory","volume-title":"Proc. 14th Symp. Operating System Principles","author":"Satyanarayanan","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.1989.72745"},{"article-title":"The Design and Implementation of Arjuna","year":"1989","author":"Shrivastava","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.1990.89273"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232244"},{"article-title":"How Big Can an Atomic Action Be","volume-title":"Proc. Fifth Symp. Reliable Distributed Systems","author":"Taylor","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/32.24722"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/323647.323640"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/69\/22199\/01033779.pdf?arnumber=1033779","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,15]],"date-time":"2025-03-15T05:27:10Z","timestamp":1742016430000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1033779\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,9]]},"references-count":36,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2002,9]]}},"URL":"https:\/\/doi.org\/10.1109\/tkde.2002.1033779","relation":{},"ISSN":["1041-4347"],"issn-type":[{"type":"print","value":"1041-4347"}],"subject":[],"published":{"date-parts":[[2002,9]]}}}