{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T11:48:24Z","timestamp":1763466504865,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,6,22]],"date-time":"2013-06-22T00:00:00Z","timestamp":1371859200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,6,22]]},"DOI":"10.1145\/2463676.2465271","type":"proceedings-article","created":{"date-parts":[[2013,6,25]],"date-time":"2013-06-25T19:13:21Z","timestamp":1372187601000},"page":"73-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["A scalable lock manager for multicores"],"prefix":"10.1145","author":[{"given":"Hyungsoo","family":"Jung","sequence":"first","affiliation":[{"name":"NICTA, Sydney, Australia"}]},{"given":"Hyuck","family":"Han","sequence":"additional","affiliation":[{"name":"Samsung Electronics, Hwasung, South Korea"}]},{"given":"Alan D.","family":"Fekete","sequence":"additional","affiliation":[{"name":"University of Sydney, Sydney, Australia"}]},{"given":"Gernot","family":"Heiser","sequence":"additional","affiliation":[{"name":"NICTA and UNSW, Sydney, Australia"}]},{"given":"Heon Y.","family":"Yeom","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2013,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926442"},{"key":"e_1_3_2_1_2_1","volume-title":"Concurrency Control and Recovery in Database Systems","author":"Bernstein P. A.","year":"1987","unstructured":"P. A. Bernstein , V. Hadzilacos , and N. Goodman . Concurrency Control and Recovery in Database Systems . Addison-Wesley , 1987 . P. A. Bernstein, V. Hadzilacos, and N. Goodman. Concurrency Control and Recovery in Database Systems. Addison-Wesley, 1987."},{"key":"e_1_3_2_1_3_1","first-page":"1","volume-title":"OSDI","author":"Boyd-Wickizer S.","year":"2010","unstructured":"S. Boyd-Wickizer , A. T. Clements , Y. Mao , A. Pesterev , M. F. Kaashoek , R. Morris , and N. Zeldovich . An Analysis of Linux Scalability to Many Cores . In OSDI , pages 1 -- 8 , 2010 . S. Boyd-Wickizer, A. T. Clements, Y. Mao, A. Pesterev, M. F. Kaashoek, R. Morris, and N. Zeldovich. An Analysis of Linux Scalability to Many Cores. In OSDI, pages 1--8, 2010."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the Linux Symposium","author":"Boyd-Wickizer S.","year":"2012","unstructured":"S. Boyd-Wickizer , M. F. Kaashoek , R. Morris , and N. Zeldovich . Non-scalable Locks are Dangerous . In Proceedings of the Linux Symposium , Ottawa, Canada , July 2012 . S. Boyd-Wickizer, M. F. Kaashoek, R. Morris, and N. Zeldovich. Non-scalable Locks are Dangerous. In Proceedings of the Linux Symposium, Ottawa, Canada, July 2012."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2150998"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806907.1806908"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338626.2338630"},{"key":"e_1_3_2_1_8_1","volume-title":"Morgan Kaufmann","author":"Gray J.","year":"1993","unstructured":"J. Gray and A. Reuter . Transaction Processing: Concepts and Techniques . Morgan Kaufmann , 1993 . J. Gray and A. Reuter. Transaction Processing: Concepts and Techniques. Morgan Kaufmann, 1993."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1543481"},{"key":"e_1_3_2_1_10_1","volume-title":"Morgan Kaufmann","author":"Herlihy M.","year":"2008","unstructured":"M. Herlihy and N. Shavit . The Art of Multiprocessor Programming . Morgan Kaufmann , 2008 . M. Herlihy and N. Shavit. The Art of Multiprocessor Programming. Morgan Kaufmann, 2008."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1516360.1516365"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-011-0260-8"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/103727.103729"},{"issue":"1","key":"e_1_3_2_1_14_1","first-page":"928","volume":"3","author":"Pandis I.","year":"2010","unstructured":"I. Pandis , R. Johnson , N. Hardavellas , and A. Ailamaki . Data-oriented Transaction Execution. PVLDB , 3 ( 1-2 ): 928 -- 939 , 2010 . I. Pandis, R. Johnson, N. Hardavellas, and A. Ailamaki. Data-oriented Transaction Execution. PVLDB, 3(1-2):928--939, 2010.","journal-title":"Data-oriented Transaction Execution. PVLDB"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14778\/2021017.2021019"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168870"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966448"},{"key":"e_1_3_2_1_18_1","volume-title":"UNIX Systems for Modern Architectures: Symmetric Multiprocessing and Caching for Kernel Programmers","author":"Schimmel C.","year":"1994","unstructured":"C. Schimmel . UNIX Systems for Modern Architectures: Symmetric Multiprocessing and Caching for Kernel Programmers . Addison-Wesley Professional , 1994 . C. Schimmel. UNIX Systems for Modern Architectures: Symmetric Multiprocessing and Caching for Kernel Programmers. Addison-Wesley Professional, 1994."},{"key":"e_1_3_2_1_19_1","first-page":"795","volume-title":"PVLDB","author":"Sewall J.","year":"2011","unstructured":"J. Sewall , J. Chhugani , C. Kim , and P. Dubey . PALM: Parallel Architecture-Friendly Latch-Free Modification to B++Trees on Many-Core Processors . In PVLDB , pages 795 -- 806 , 2011 . J. Sewall, J. Chhugani, C. Kim, and P. Dubey. PALM: Parallel Architecture-Friendly Latch-Free Modification to B++Trees on Many-Core Processors. In PVLDB, pages 795--806, 2011."},{"key":"e_1_3_2_1_20_1","volume-title":"Morgan Kaufmann","author":"Weikum G.","year":"2001","unstructured":"G. Weikum and G. Vossen . Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery . Morgan Kaufmann , 2001 . G. Weikum and G. Vossen. Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery. Morgan Kaufmann, 2001."}],"event":{"name":"SIGMOD\/PODS'13: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"],"location":"New York New York USA","acronym":"SIGMOD\/PODS'13"},"container-title":["Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2463676.2465271","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2463676.2465271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:05Z","timestamp":1750235945000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2463676.2465271"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,22]]},"references-count":20,"alternative-id":["10.1145\/2463676.2465271","10.1145\/2463676"],"URL":"https:\/\/doi.org\/10.1145\/2463676.2465271","relation":{},"subject":[],"published":{"date-parts":[[2013,6,22]]},"assertion":[{"value":"2013-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}