{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T09:11:55Z","timestamp":1773393115406,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,7,25]],"date-time":"2016-07-25T00:00:00Z","timestamp":1469404800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,7,25]]},"DOI":"10.1145\/2933057.2933096","type":"proceedings-article","created":{"date-parts":[[2016,7,26]],"date-time":"2016-07-26T20:07:42Z","timestamp":1469563662000},"page":"55-64","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Analysing Snapshot Isolation"],"prefix":"10.1145","author":[{"given":"Andrea","family":"Cerone","sequence":"first","affiliation":[{"name":"IMDEA Software Institute, Pozuelo de Alarcon, Spain"}]},{"given":"Alexey","family":"Gotsman","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Pozuelo de Alarcon, Spain"}]}],"member":"320","published-online":{"date-parts":[[2016,7,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The Clojure language: Refs and transactions. http:\/\/clojure.org\/refs.  The Clojure language: Refs and transactions. http:\/\/clojure.org\/refs."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2000.839388"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25873-2_6"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588562"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/223784.223785"},{"key":"e_1_3_2_1_7_1","volume-title":"Concurrency Control and Recovery in Database Systems","author":"Bernstein P. A.","year":"1987","unstructured":"P. A. Bernstein , V. Hadzilacos , and N. Goodman . Concurrency Control and Recovery in Database Systems . Addison-Wesley , 1987 . P. A. Bernstein, V. Hadzilacos, and N. Goodman. Concurrency Control and Recovery in Database Systems. Addison-Wesley, 1987."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2010.5470446"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620585.1620587"},{"key":"e_1_3_2_1_10_1","volume-title":"CONCUR. Dagstuhl","author":"Cerone A.","year":"2015","unstructured":"A. Cerone , G. Bernardi , and A. Gotsman . A framework for transactional consistency models with atomic visibility . In CONCUR. Dagstuhl , 2015 . A. Cerone, G. Bernardi, and A. Gotsman. A framework for transactional consistency models with atomic visibility. In CONCUR. Dagstuhl, 2015."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2933057.2933096"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48653-5_26"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/977401.978143"},{"key":"e_1_3_2_1_14_1","volume-title":"VLDB","author":"Daudjee K.","year":"2006","unstructured":"K. Daudjee and K. Salem . Lazy database replication with snapshot isolation . In VLDB , 2006 . K. Daudjee and K. Salem. Lazy database replication with snapshot isolation. In VLDB, 2006."},{"key":"e_1_3_2_1_15_1","volume-title":"HotPar","author":"Dias R. J.","year":"2011","unstructured":"R. J. Dias , J. M. Louren\u00e7o , and N. Pregui\u00e7a . Efficient and correct transactional memory programs combining snapshot isolation and static analysis . In HotPar , 2011 . R. J. Dias, J. M. Louren\u00e7o, and N. Pregui\u00e7a. Efficient and correct transactional memory programs combining snapshot isolation and static analysis. In HotPar, 2011."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2555243.2555259"},{"key":"e_1_3_2_1_17_1","volume-title":"Towards formally specifying and verifying transactional memory. Formal Aspects of Computing, 25(5)","author":"Doherty S.","year":"2013","unstructured":"S. Doherty , L. Groves , V. Luchangco , and M. Moir . Towards formally specifying and verifying transactional memory. Formal Aspects of Computing, 25(5) , 2013 . S. Doherty, L. Groves, V. Luchangco, and M. Moir. Towards formally specifying and verifying transactional memory. Formal Aspects of Computing, 25(5), 2013."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2005.14"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1071610.1071615"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1813164.1813180"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1345206.1345233"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/165123.165164"},{"key":"e_1_3_2_1_23_1","volume-title":"VLDB","author":"Jorwekar S.","year":"2007","unstructured":"S. Jorwekar , A. Fekete , K. Ramamritham , and S. Sudarshan . Automating the detection of snapshot isolation anomalies . In VLDB , 2007 . S. Jorwekar, A. Fekete, K. Ramamritham, and S. Sudarshan. Automating the detection of snapshot isolation anomalies. In VLDB, 2007."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1538909.1538913"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541952"},{"key":"e_1_3_2_1_26_1","volume-title":"OSDI","author":"Mu S.","year":"2014","unstructured":"S. Mu , Y. Cui , Y. Zhang , W. Lloyd , and J. Li . Extracting more concurrency from distributed transactions . In OSDI , 2014 . S. Mu, Y. Cui, Y. Zhang, W. Lloyd, and J. Li. Extracting more concurrency from distributed transactions. In OSDI, 2014."},{"key":"e_1_3_2_1_27_1","volume-title":"OSDI","author":"Peng D.","year":"2010","unstructured":"D. Peng and F. Dabek . Large-scale incremental processing using distributed transactions and notifications . In OSDI , 2010 . D. Peng and F. Dabek. Large-scale incremental processing using distributed transactions and notifications. In OSDI, 2010."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40047-6_39"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2007.39"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/211414.211427"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/42190.42277"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043592"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/381992.383631"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522731"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2688500.2688506"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815430"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-013-0318-x"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522729"}],"event":{"name":"PODC '16: ACM Symposium on Principles of Distributed Computing","location":"Chicago Illinois USA","acronym":"PODC '16","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","SIGACT ACM Special Interest Group on Algorithms and Computation Theory"]},"container-title":["Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2933057.2933096","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2933057.2933096","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:51Z","timestamp":1750222491000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2933057.2933096"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,25]]},"references-count":37,"alternative-id":["10.1145\/2933057.2933096","10.1145\/2933057"],"URL":"https:\/\/doi.org\/10.1145\/2933057.2933096","relation":{},"subject":[],"published":{"date-parts":[[2016,7,25]]},"assertion":[{"value":"2016-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}