{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:05Z","timestamp":1750307465126,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,6,6]],"date-time":"2010-06-06T00:00:00Z","timestamp":1275782400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"MOST","award":["Mar-72"],"award-info":[{"award-number":["Mar-72"]}]},{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["1104\/05"],"award-info":[{"award-number":["1104\/05"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,6,6]]},"DOI":"10.1145\/1859127.1859145","type":"proceedings-article","created":{"date-parts":[[2010,9,28]],"date-time":"2010-09-28T17:41:50Z","timestamp":1285695710000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Concurrent one-way protocols in around-the-clock social networks"],"prefix":"10.1145","author":[{"given":"Royi","family":"Ronen","sequence":"first","affiliation":[{"name":"Technion - Israel Institute of Technology"}]},{"given":"Oded","family":"Shmueli","sequence":"additional","affiliation":[{"name":"Technion - Israel Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2010,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The Claremont Report on Database Research","author":"R. Agrawal","year":"2008","unstructured":"}} R. Agrawal et. al. The Claremont Report on Database Research . Berkeley, California , 2008 . }}R. Agrawal et. al. The Claremont Report on Database Research. Berkeley, California, 2008."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1374780.1374794"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/588011.588019"},{"volume-title":"http:\/\/www.facebook.com","year":"2010","key":"e_1_3_2_1_4_1","unstructured":"}}Facebook. http:\/\/www.facebook.com , 2010 . }}Facebook. http:\/\/www.facebook.com, 2010."},{"key":"e_1_3_2_1_5_1","volume-title":"http:\/\/developers.facebook.com","author":"Language Facebook Query","year":"2010","unstructured":"}} Facebook Query Language . http:\/\/developers.facebook.com , 2010 . }}Facebook Query Language. http:\/\/developers.facebook.com, 2010."},{"key":"e_1_3_2_1_6_1","volume-title":"http:\/\/www.google.com\/buzz","author":"Buzz Google","year":"2010","unstructured":"}} Google Buzz . http:\/\/www.google.com\/buzz , 2010 . }}Google Buzz. http:\/\/www.google.com\/buzz, 2010."},{"volume-title":"http:\/\/www.myspace.com","year":"2010","key":"e_1_3_2_1_7_1","unstructured":"}}MySpace. http:\/\/www.myspace.com , 2010 . }}MySpace. http:\/\/www.myspace.com, 2010."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1516360.1516427"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.172"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/322169.322176"},{"volume-title":"http:\/\/twitter.com\/","year":"2010","key":"e_1_3_2_1_11_1","unstructured":"}}Twitter. http:\/\/twitter.com\/ , 2010 . }}Twitter. http:\/\/twitter.com\/, 2010."},{"key":"e_1_3_2_1_12_1","volume-title":"G","author":"Weikum G.","year":"2002","unstructured":"}} G. Weikum , G . Vossen : Transactional Information Systems. Morgan Kaufmann , CA, 2002 . }}G. Weikum, G. Vossen: Transactional Information Systems. Morgan Kaufmann, CA, 2002."},{"key":"e_1_3_2_1_13_1","volume-title":"Goodman: Concurrency Control and Recovery in Database Systems","author":"Bernstein P. A.","year":"1987","unstructured":"}} P. A. Bernstein , V. Hadzilacos , N. Goodman: Concurrency Control and Recovery in Database Systems . Addison-Wesley , MA , 1987 . }}P. A. Bernstein, V. Hadzilacos, N. Goodman: Concurrency Control and Recovery in Database Systems. Addison-Wesley, MA, 1987."},{"key":"e_1_3_2_1_14_1","unstructured":"}}Wikipedia entry on Social Networks. http:\/\/en.wikipedia.org\/wiki\/Social_network.  }}Wikipedia entry on Social Networks. http:\/\/en.wikipedia.org\/wiki\/Social_network."},{"key":"e_1_3_2_1_15_1","volume-title":"Java Twitter API","author":"Jtwitter Winterwell","year":"2010","unstructured":"}} Winterwell Jtwitter , Java Twitter API , 2010 . http:\/\/www.winterwell.com\/software\/jtwitter.php. }}Winterwell Jtwitter, Java Twitter API, 2010. http:\/\/www.winterwell.com\/software\/jtwitter.php."}],"event":{"name":"SIGMOD\/PODS '10: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"],"location":"Indianapolis Indiana","acronym":"SIGMOD\/PODS '10"},"container-title":["Procceedings of the 13th International Workshop on the Web and Databases"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1859127.1859145","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1859127.1859145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:31Z","timestamp":1750248511000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1859127.1859145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6,6]]},"references-count":15,"alternative-id":["10.1145\/1859127.1859145","10.1145\/1859127"],"URL":"https:\/\/doi.org\/10.1145\/1859127.1859145","relation":{},"subject":[],"published":{"date-parts":[[2010,6,6]]},"assertion":[{"value":"2010-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}