{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:56Z","timestamp":1750220696750,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,14]],"date-time":"2020-06-14T00:00:00Z","timestamp":1592092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Research Foundation - Flanders (FWO)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,14]]},"DOI":"10.1145\/3375395.3387655","type":"proceedings-article","created":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T15:10:29Z","timestamp":1590765029000},"page":"315-330","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Deciding Robustness for Lower SQL Isolation Levels"],"prefix":"10.1145","author":[{"given":"Bas","family":"Ketsman","sequence":"first","affiliation":[{"name":"Vrije Universiteit Brussel, Brussels, Belgium"}]},{"given":"Christoph","family":"Koch","sequence":"additional","affiliation":[{"name":"\u00c9cole polytechnique f\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]},{"given":"Frank","family":"Neven","sequence":"additional","affiliation":[{"name":"Hasselt University and Transnational University of Limburg, Hasselt, Belgium"}]},{"given":"Brecht","family":"Vandevoort","sequence":"additional","affiliation":[{"name":"Hasselt University and Transnational University of Limburg, Hasselt, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2020,6,14]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.5555\/846219.847380"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/ICDE.2008.4497466"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/AICCSA.2015.7507103"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.14778\/2732232.2732237"},{"key":"e_1_3_2_1_5_1","first-page":"24","volume-title":"USENIX HotOS","author":"Bailis P.","year":"2013","unstructured":"P. Bailis , A. Fekete , A. Ghodsi , J. M. Hellerstein , and I. Stoica . HAT, not CAP: Towards highly available transactions . In USENIX HotOS , pages 24 -- 24 , 2013 . P. Bailis, A. Fekete, A. Ghodsi, J. M. Hellerstein, and I. Stoica. HAT, not CAP: Towards highly available transactions. In USENIX HotOS, pages 24--24, 2013."},{"key":"e_1_3_2_1_6_1","first-page":"286","volume-title":"CAV","author":"Beillahi S. M.","year":"2019","unstructured":"S. M. Beillahi , A. Bouajjani , and C. Enea . Checking robustness against snapshot isolation . In CAV , pages 286 -- 304 , 2019 . S. M. Beillahi, A. Bouajjani, and C. Enea. Checking robustness against snapshot isolation. In CAV, pages 286--304, 2019."},{"key":"e_1_3_2_1_7_1","first-page":"1","volume-title":"CONCUR","author":"Beillahi S. M.","year":"2019","unstructured":"S. M. Beillahi , A. Bouajjani , and C. Enea . Robustness against transactional causal consistency . In CONCUR , pages 1 -- 18 , 2019 . S. M. Beillahi, A. Bouajjani, and C. Enea. Robustness against transactional causal consistency. In CONCUR, pages 1--18, 2019."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/223784.223785"},{"key":"e_1_3_2_1_9_1","first-page":"1","volume-title":"CONCUR","author":"Bernardi G.","year":"2016","unstructured":"G. Bernardi and A. Gotsman . Robustness against consistency models with atomic visibility . In CONCUR , pages 7: 1 -- 7 :15, 2016 . G. Bernardi and A. Gotsman. Robustness against consistency models with atomic visibility. In CONCUR, pages 7:1--7:15, 2016."},{"key":"e_1_3_2_1_10_1","first-page":"58","volume-title":"CONCUR","author":"Cerone A.","year":"2015","unstructured":"A. Cerone , G. Bernardi , and A. Gotsman . A framework for transactional consistency models with atomic visibility . In CONCUR , pages 58 -- 71 , 2015 . A. Cerone, G. Bernardi, and A. Gotsman. A framework for transactional consistency models with atomic visibility. In CONCUR, pages 58--71, 2015."},{"issue":"2","key":"e_1_3_2_1_11_1","first-page":"1","volume":"65","author":"Cerone A.","year":"2018","unstructured":"A. Cerone and A. Gotsman . Analysing snapshot isolation. J. ACM , 65 ( 2 ): 1 -- 41 , 2018 . A. Cerone and A. Gotsman. Analysing snapshot isolation. J. ACM, 65(2):1--41, 2018.","journal-title":"Analysing snapshot isolation. J. ACM"},{"key":"e_1_3_2_1_12_1","first-page":"1","volume":"26","author":"Cerone A.","year":"2017","unstructured":"A. Cerone , A. Gotsman , and H. Yang . Algebraic Laws for Weak Consistency. In CONCUR, pages 26 : 1 -- 26 :18, 2017 . A. Cerone, A. Gotsman, and H. Yang. Algebraic Laws for Weak Consistency. In CONCUR, pages 26:1--26:18, 2017.","journal-title":"Algebraic Laws for Weak Consistency. In CONCUR, pages"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1016\/0196-6774(87)90018-6"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/1065167.1065193"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/1071610.1071615"},{"key":"e_1_3_2_1_16_1","volume-title":"The Theory of Database Concurrency Control","author":"Papadimitriou C. H.","year":"1986","unstructured":"C. H. Papadimitriou . The Theory of Database Concurrency Control . Computer Science Press , 1986 . C. H. Papadimitriou. The Theory of Database Concurrency Control. Computer Science Press, 1986."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/1391289.1391291"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/211414.211427"},{"unstructured":"TPC-C. On-line transaction processing benchmark. http:\/\/www.tpc.org\/tpcc\/.  TPC-C. On-line transaction processing benchmark. http:\/\/www.tpc.org\/tpcc\/.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","volume-title":"Morgan Kaufmann","author":"Weikum G.","year":"2002","unstructured":"G. Weikum and G. Vossen . Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery . Morgan Kaufmann , 2002 . G. Weikum and G. Vossen. Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery. Morgan Kaufmann, 2002."}],"event":{"sponsor":["SIGMOD ACM Special Interest Group on Management of Data"],"acronym":"SIGMOD\/PODS '20","name":"SIGMOD\/PODS '20: International Conference on Management of Data","location":"Portland OR USA"},"container-title":["Proceedings of the 39th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3375395.3387655","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3375395.3387655","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:32:48Z","timestamp":1750199568000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3375395.3387655"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,14]]},"references-count":20,"alternative-id":["10.1145\/3375395.3387655","10.1145\/3375395"],"URL":"https:\/\/doi.org\/10.1145\/3375395.3387655","relation":{},"subject":[],"published":{"date-parts":[[2020,6,14]]},"assertion":[{"value":"2020-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}