{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:18:43Z","timestamp":1740133123625,"version":"3.37.3"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2015,11,1]],"date-time":"2015-11-01T00:00:00Z","timestamp":1446336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100006129","name":"FCT","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006129","id-type":"DOI","asserted-by":"publisher"}]},{"name":"FCT projects","award":["PEst-OE\/EEI\/LA0021\/2013","PPTDC\/EEI-SCR\/2776\/2012","EXPL\/EEI-ESS\/0361\/2013"],"award-info":[{"award-number":["PEst-OE\/EEI\/LA0021\/2013","PPTDC\/EEI-SCR\/2776\/2012","EXPL\/EEI-ESS\/0361\/2013"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Parallel Distrib. Syst."],"published-print":{"date-parts":[[2015,11,1]]},"DOI":"10.1109\/tpds.2014.2363460","type":"journal-article","created":{"date-parts":[[2014,10,16]],"date-time":"2014-10-16T18:44:22Z","timestamp":1413485062000},"page":"2942-2955","source":"Crossref","is-referenced-by-count":1,"title":["Chasing the Optimum in Replicated In-Memory Transactional Platforms via Protocol Adaptation"],"prefix":"10.1109","volume":"26","author":[{"given":"Maria","family":"Couceiro","sequence":"first","affiliation":[]},{"given":"Pedro","family":"Ruivo","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Romano","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Rodrigues","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"237","article-title":"Dynamic performance tuning of word-based software transactional memory","author":"felber","year":"0","journal-title":"Proc 13th ACM SIGPLAN Symp Principles Practice Parallel Programm"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1810479.1810530"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/69.43419"},{"key":"ref32","first-page":"32","article-title":"Fuzzy modeling based resource management for virtualized database systems","author":"wang","year":"0","journal-title":"Proc Int Symp Model Anal Simul Comput Telecommun Syst"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2013.9"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038934"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2086696.2086733"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2009.34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367928"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICAS.2006.64"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2006.1639369"},{"key":"ref27","first-page":"635","article-title":"Constructing adaptive software in distributed systems","author":"chen","year":"0","journal-title":"Proc 21st Int Conf Distrib Comput Syst"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038931"},{"key":"ref2","first-page":"198","article-title":"Exploiting distributed version concurrency in a transactional memory cluster","author":"manassiev","year":"0","journal-title":"Proc 11th ACM SIGPLAN Symp Principles Practice Parallel Programm"},{"key":"ref1","first-page":"1150","article-title":"The end of an architectural era: (It&#x2019;s time for a complete rewrite)","author":"stonebraker","year":"0","journal-title":"Proc Int Conf On Very Large Data Bases"},{"key":"ref20","first-page":"1","article-title":"Backpropagation: The basic theory","author":"rumelhart","year":"1995","journal-title":"Backpropagation"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1162\/089976601300014493"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1115\/1.3662552"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/41.1-2.100"},{"key":"ref26","first-page":"37","article-title":"Protocol switching: Exploiting meta-properties","author":"liu","year":"0","journal-title":"Proceedings of the International Workshop on Applied Reliable Group Communication"},{"key":"ref25","first-page":"1157","article-title":"An introduction to variable and feature selection","volume":"3","author":"guyon","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1041680.1041682"},{"year":"0","key":"ref11"},{"key":"ref40","first-page":"354","article-title":"Adaptive software transactional memory","author":"marathe","year":"0","journal-title":"Proc 19th Int Conf Distrib Comput"},{"year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2371536.2371559"},{"journal-title":"Machine Learning","year":"1997","author":"mitchell","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1171"},{"year":"0","key":"ref16"},{"journal-title":"Neural Networks A Comprehensive Foundation","year":"1994","author":"haykin","key":"ref17"},{"key":"ref18","first-page":"185","article-title":"Fast training of support vector machines using sequential minimal optimization","author":"platt","year":"1999","journal-title":"Advances in Kernel Methods"},{"key":"ref19","first-page":"1305","author":"frank","year":"2005","journal-title":"Weka A Machine Learning Workbench for Data Mining"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022887812188"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2009.55"},{"key":"ref6","first-page":"199","author":"budhiraja","year":"1993","journal-title":"The primary-backup approach"},{"key":"ref5","first-page":"134","article-title":"Don&#x2019;t be lazy, be consistent: Postgres-r, a new way to implement database replication","author":"kemme","year":"0","journal-title":"Proc 26th Int Conf Very Large Data Bases"},{"year":"0","key":"ref8"},{"journal-title":"Concurrency Control and Recovery in Database Systems","year":"1986","author":"bernstein","key":"ref7"},{"key":"ref49","first-page":"335","article-title":"The chubby lock service for loosely-coupled distributed systems","author":"burrows","year":"0","journal-title":"Proc Symp Oper Syst Design Implement"},{"year":"0","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.29"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SASO.2010.41"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294278"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755938"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/HiPC.2011.6152736"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1363917"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25821-3_16"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.30"}],"container-title":["IEEE Transactions on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/71\/7293777\/06926806.pdf?arnumber=6926806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:28:19Z","timestamp":1642004899000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6926806\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,1]]},"references-count":49,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tpds.2014.2363460","relation":{},"ISSN":["1045-9219"],"issn-type":[{"type":"print","value":"1045-9219"}],"subject":[],"published":{"date-parts":[[2015,11,1]]}}}