{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:32Z","timestamp":1763468072798,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,4,10]],"date-time":"2012-04-10T00:00:00Z","timestamp":1334016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,4,10]]},"DOI":"10.1145\/2168836.2168839","type":"proceedings-article","created":{"date-parts":[[2012,4,10]],"date-time":"2012-04-10T12:19:38Z","timestamp":1334060378000},"page":"15-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Improving server applications with system transactions"],"prefix":"10.1145","author":[{"given":"Sangman","family":"Kim","sequence":"first","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"given":"Michael Z.","family":"Lee","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"given":"Alan M.","family":"Dunn","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"given":"Owen S.","family":"Hofmann","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"given":"Xuan","family":"Wang","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]},{"given":"Emmett","family":"Witchel","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"given":"Donald E.","family":"Porter","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,4,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Dovecot mailbox format - maildir. http:\/\/wiki.dovecot.org\/MailboxFormat\/Maildir.  Dovecot mailbox format - maildir. http:\/\/wiki.dovecot.org\/MailboxFormat\/Maildir."},{"key":"e_1_3_2_1_2_1","unstructured":"Welcome to the dovecot wiki. http:\/\/wiki2.dovecot.org\/.  Welcome to the dovecot wiki. http:\/\/wiki2.dovecot.org\/."},{"key":"e_1_3_2_1_3_1","volume-title":"http:\/\/www.routeviews.org\/","author":"University of oregon route views project.","year":"2000","unstructured":"University of oregon route views project. http:\/\/www.routeviews.org\/ , 2000 . University of oregon route views project. http:\/\/www.routeviews.org\/, 2000."},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"OSDI","author":"Aviram A.","year":"2010","unstructured":"A. Aviram , S.-C. Weng , S. Hu , and B. Ford . Efficient system-enforced deterministic parallelism . In OSDI , pages 1 -- 16 , 2010 . A. Aviram, S.-C. Weng, S. Hu, and B. Ford. Efficient system-enforced deterministic parallelism. In OSDI, pages 1--16, 2010."},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"OSDI","author":"Bergan T.","year":"2010","unstructured":"T. Bergan , N. Hunt , L. Ceze , and S. D. Gribble . Deterministic process groups in dOS . In OSDI , pages 1 -- 16 , 2010 . T. Bergan, N. Hunt, L. Ceze, and S. D. Gribble. Deterministic process groups in dOS. In OSDI, pages 1--16, 2010."},{"key":"e_1_3_2_1_6_1","volume-title":"Using maildir format (the original specification)","author":"Bernstein D. J.","year":"1995","unstructured":"D. J. Bernstein . Using maildir format (the original specification) , 1995 . http:\/\/cr.yp.to\/proto\/maildir.html. D. J. Bernstein. Using maildir format (the original specification), 1995. http:\/\/cr.yp.to\/proto\/maildir.html."},{"key":"e_1_3_2_1_7_1","volume-title":"WDDD.","author":"Blundell C.","year":"2005","unstructured":"C. Blundell , E. C. Lewis , and M. M. K. Martin . Deconstructing transactions: The subtleties of atomicity . In WDDD. Jun 2005 . C. Blundell, E. C. Lewis, and M. M. K. Martin. Deconstructing transactions: The subtleties of atomicity. In WDDD. Jun 2005."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/4221.214134"},{"key":"e_1_3_2_1_9_1","volume-title":"A benchmark suite for high performance java. Concurrency - Practice and Experience, 12(6):375--388","author":"Bull J.","year":"2000","unstructured":"J. Bull , L. Smith , M. Westhead , D. Henty , and R. Davey . A benchmark suite for high performance java. Concurrency - Practice and Experience, 12(6):375--388 , 2000 . J. Bull, L. Smith, M. Westhead, D. Henty, and R. Davey. A benchmark suite for high performance java. Concurrency - Practice and Experience, 12(6):375--388, 2000."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.10"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629602"},{"key":"e_1_3_2_1_13_1","volume-title":"March","author":"Crispin M.","year":"2003","unstructured":"M. Crispin . INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1. RFC 3501 (Proposed Standard) , March 2003 . Obsoletes by RFC 2060. M. Crispin. INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1. RFC 3501 (Proposed Standard), March 2003. Obsoletes by RFC 2060."},{"key":"e_1_3_2_1_14_1","volume-title":"July","author":"Dice D.","year":"2001","unstructured":"D. Dice , H. Huang , and M. Yang . Asymmetric dekker synchronization , July 2001 . http:\/\/home.comcast.net\/ pjbishop\/Dave\/Asymmetric-Dekker-Synchronization.txt. D. Dice, H. Huang, and M. Yang. Asymmetric dekker synchronization, July 2001. http:\/\/home.comcast.net\/ pjbishop\/Dave\/Asymmetric-Dekker-Synchronization.txt."},{"key":"e_1_3_2_1_15_1","unstructured":"Dovecot maildir and racing. http:\/\/www.dovecot.org\/list\/dovecot\/2006-March\/011811.html.  Dovecot maildir and racing. http:\/\/www.dovecot.org\/list\/dovecot\/2006-March\/011811.html."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the Ottawa Linux Symposium","author":"Franke H.","year":"2002","unstructured":"H. Franke , R. Russel , and M. Kirkwood . Fuss, futexes and furwocks: Fast userlevel locking in Linux . In Proceedings of the Ottawa Linux Symposium , 2002 . H. Franke, R. Russel, and M. Kirkwood. Fuss, futexes and furwocks: Fast userlevel locking in Linux. In Proceedings of the Ottawa Linux Symposium, 2002."},{"key":"e_1_3_2_1_17_1","first-page":"89","volume-title":"USENIX","author":"Gal E.","year":"2005","unstructured":"E. Gal and S. Toledo . A transactional flash file system for microcontrollers . In USENIX , pages 89 -- 104 , 2005 . E. Gal and S. Toledo. A transactional flash file system for microcontrollers. In USENIX , pages 89--104, 2005."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966456"},{"key":"e_1_3_2_1_19_1","volume-title":"Morgan Kaufmann","author":"Gray J.","year":"1993","unstructured":"J. Gray and A. Reuter . Transaction Processing: Concepts and Techniques . Morgan Kaufmann , 1993 . J. Gray and A. Reuter. Transaction Processing: Concepts and Techniques. Morgan Kaufmann, 1993."},{"key":"e_1_3_2_1_20_1","first-page":"364","volume-title":"Modeling in Data Base Management Systems","author":"Gray J. N.","year":"1976","unstructured":"J. N. Gray , R. A. Lorie , G. R. Putzolu , and I. L. Traiger . Granularity of locks and degrees of consistency in a shared data base . Modeling in Data Base Management Systems , pages 364 -- 394 , 1976 . J. N. Gray, R. A. Lorie, G. R. Putzolu, and I. L. Traiger. Granularity of locks and degrees of consistency in a shared data base. Modeling in Data Base Management Systems, pages 364--394, 1976."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/165123.165164"},{"key":"e_1_3_2_1_22_1","volume-title":"Oakland","author":"Jana S.","year":"2011","unstructured":"S. Jana , D. E. Porter , and V. Shmatikov . TxBox: Building secure, efficient sandboxes with system transactions . In Oakland , Oakland, CA , May 2011 . S. Jana, D. E. Porter, and V. Shmatikov. TxBox: Building secure, efficient sandboxes with system transactions. In Oakland, Oakland, CA, May 2011."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294267"},{"key":"e_1_3_2_1_24_1","first-page":"575","volume-title":"DSN","author":"Kotla R.","year":"2003","unstructured":"R. Kotla and M. Dahlin . High throughput Byzantine fault tolerance . In DSN , pages 575 -- 584 . IEEE, 2003 . R. Kotla and M. Dahlin. High throughput Byzantine fault tolerance. In DSN, pages 575--584. IEEE, 2003."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-006-0155-x"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081893"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168902"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1725"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095829"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346321"},{"key":"e_1_3_2_1_32_1","first-page":"1","volume-title":"OSDI","author":"Nightingale E. B.","year":"2006","unstructured":"E. B. Nightingale , K. Veeraraghavan , P. M. Chen , and J. Flinn . Rethink the sync . In OSDI , pages 1 -- 14 , 2006 . E. B. Nightingale, K. Veeraraghavan, P. M. Chen, and J. Flinn. Rethink the sync. In OSDI, pages 1--14, 2006."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629591"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167515.1167496"},{"key":"e_1_3_2_1_36_1","volume-title":"Windows Internals","author":"Russinovich M.","year":"2009","unstructured":"M. Russinovich and D. Solomon . Windows Internals . Microsoft Press , 2009 . M. Russinovich and D. Solomon. Windows Internals. Microsoft Press, 2009."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/121132.121171"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/645478.654970"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/238721.238779"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/224964.224987"},{"key":"e_1_3_2_1_42_1","first-page":"189","volume-title":"NSDI","author":"Singh A.","year":"2008","unstructured":"A. Singh , T. Das , P. Maniatis , P. Druschel , and T. Roscoe . BFT protocols under fire . In NSDI , pages 189 -- 204 , 2008 . A. Singh, T. Das, P. Maniatis, P. Druschel, and T. Roscoe. BFT protocols under fire. In NSDI, pages 189--204, 2008."},{"key":"e_1_3_2_1_43_1","first-page":"29","volume-title":"FAST","author":"Spillane R.","year":"2009","unstructured":"R. Spillane , S. Gaikwad , M. Chinni , E. Zadok , and C. P. Wright . Enabling transactional file access via lightweight kernel extensions . In FAST , pages 29 -- 42 , 2009 . R. Spillane, S. Gaikwad, M. Chinni, E. Zadok, and C. P. Wright. Enabling transactional file access via lightweight kernel extensions. In FAST, pages 29--42, 2009."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294284"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294268"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/323647.323640"},{"key":"e_1_3_2_1_47_1","first-page":"245","volume-title":"NSDI","author":"Wester B.","year":"2009","unstructured":"B. Wester , J. Cowling , E. B. Nightingale , P. M. Chen , J. Flinn , and B. Liskov . Tolerating latency in replicated state machines . In NSDI , pages 245 -- 260 , 2009 . B. Wester, J. Cowling, E. B. Nightingale, P. M. Chen, J. Flinn, and B. Liskov. Tolerating latency in replicated state machines. In NSDI, pages 245--260, 2009."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945470"},{"key":"e_1_3_2_1_49_1","volume-title":"Delivering signals for fun and profit","author":"Zalewski M.","year":"2001","unstructured":"M. Zalewski . Delivering signals for fun and profit , 2001 . http:\/\/lcamtuf.coredump.cx\/signals.txt. M. Zalewski. Delivering signals for fun and profit, 2001. http:\/\/lcamtuf.coredump.cx\/signals.txt."},{"key":"e_1_3_2_1_50_1","volume-title":"TRANSACT. ACM","author":"Zilles C.","year":"2006","unstructured":"C. Zilles and L. Baugh . Extending hardware transactional memory to support non-busy waiting and non-transactional actions . In TRANSACT. ACM , 2006 . C. Zilles and L. Baugh. Extending hardware transactional memory to support non-busy waiting and non-transactional actions. In TRANSACT. ACM, 2006."}],"event":{"name":"EuroSys '12: Seventh EuroSys Conference 2012","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Bern Switzerland","acronym":"EuroSys '12"},"container-title":["Proceedings of the 7th ACM european conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2168836.2168839","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2168836.2168839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:45Z","timestamp":1750240485000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2168836.2168839"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,10]]},"references-count":49,"alternative-id":["10.1145\/2168836.2168839","10.1145\/2168836"],"URL":"https:\/\/doi.org\/10.1145\/2168836.2168839","relation":{},"subject":[],"published":{"date-parts":[[2012,4,10]]},"assertion":[{"value":"2012-04-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}