{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:53Z","timestamp":1750307993567,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,6,27]],"date-time":"2006-06-27T00:00:00Z","timestamp":1151366400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,6,27]]},"DOI":"10.1145\/1142473.1142512","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"page":"337-346","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Recovery from \"bad\" user transactions"],"prefix":"10.1145","author":[{"given":"David","family":"Lomet","sequence":"first","affiliation":[{"name":"Microsoft Research, Redmond, WA"}]},{"given":"Zografoula","family":"Vagena","sequence":"additional","affiliation":[{"name":"Univ. of California Riverside, Riverside, CA"}]},{"given":"Roger","family":"Barga","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA"}]}],"member":"320","published-online":{"date-parts":[[2006,6,27]]},"reference":[{"volume-title":"ICDE 1999:  276--285","author":"Bohannon Philip","key":"e_1_3_2_1_1_1","unstructured":"Philip Bohannon , Rajeev Rastogi , S. Seshadri , Abraham Silberschatz , and S. Sudarshan : Using Codewords to Protect Database Data from a Class of Software Errors . ICDE 1999: 276--285 Philip Bohannon, Rajeev Rastogi, S. Seshadri, Abraham Silberschatz, and S. Sudarshan: Using Codewords to Protect Database Data from a Class of Software Errors. ICDE 1999: 276--285"},{"key":"e_1_3_2_1_2_1","volume-title":"Vassos Hadzilacos","author":"Bernstein Philip A.","year":"1987","unstructured":"Philip A. Bernstein , Vassos Hadzilacos , Nathan Goodman : Concurrency Control and Recovery in Database Systems. Addison-Wesley 1987 , ISBN 0-201-10715-5 Philip A. Bernstein, Vassos Hadzilacos, Nathan Goodman: Concurrency Control and Recovery in Database Systems. Addison-Wesley 1987, ISBN 0-201-10715-5"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/67544.66956"},{"key":"e_1_3_2_1_4_1","first-page":"380","article-title":"Exploiting a History Database for Backup","volume":"1993","author":"Lomet David","unstructured":"David Lomet and Betty Salzberg : Exploiting a History Database for Backup . VLDB 1993 : 380 -- 390 David Lomet and Betty Salzberg: Exploiting a History Database for Backup. VLDB 1993: 380--390","journal-title":"VLDB"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.162"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/128765.128770"},{"key":"e_1_3_2_1_7_1","unstructured":"Oracle: Oracle Database 10g Release 2 High Availability. http:\/\/www.oracle.com\/technology\/deploy\/availability\/pdf\/TWP_HA_10gR2_HA_Overview.pdf May 2005.  Oracle: Oracle Database 10g Release 2 High Availability. http:\/\/www.oracle.com\/technology\/deploy\/availability\/pdf\/TWP_HA_10gR2_HA_Overview.pdf May 2005."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","DOI":"10.21236\/ADA187244","volume-title":"The Design of the POSTGRES Storage System. VLDB, 289--300","author":"Stonebraker Michael","year":"1987","unstructured":"Michael Stonebraker : The Design of the POSTGRES Storage System. VLDB, 289--300 , 1987 . Michael Stonebraker: The Design of the POSTGRES Storage System. VLDB, 289--300, 1987."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.50912"},{"key":"e_1_3_2_1_10_1","unstructured":"Abdullah Uz Tansel James Clifford Shashi K. Gadia Sushil Jajodia Arie Segev Richard T. Snodgrass: Temporal Databases: Theory Design and Implementation Benjamin\/Cummings 1993   Abdullah Uz Tansel James Clifford Shashi K. Gadia Sushil Jajodia Arie Segev Richard T. Snodgrass: Temporal Databases: Theory Design and Implementation Benjamin\/Cummings 1993"}],"event":{"name":"SIGMOD\/PODS06: International Conference on Management of Data and Symposium on Principles Database and Systems","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","ACM Association for Computing Machinery"],"location":"Chicago IL USA","acronym":"SIGMOD\/PODS06"},"container-title":["Proceedings of the 2006 ACM SIGMOD international conference on Management of data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1142473.1142512","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1142473.1142512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:19Z","timestamp":1750259179000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1142473.1142512"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,6,27]]},"references-count":10,"alternative-id":["10.1145\/1142473.1142512","10.1145\/1142473"],"URL":"https:\/\/doi.org\/10.1145\/1142473.1142512","relation":{},"subject":[],"published":{"date-parts":[[2006,6,27]]},"assertion":[{"value":"2006-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}