Publisher
Springer International Publishing
Reference13 articles.
1. Chan, A., Fox, S., Lin, W.-T. K., Nori, A., and Ries, D. R. (1982). The implementation of an integrated concurrency control and recovery scheme. ACM SIGMOD Conference, pp. 184191. 10.1145/582383.582386. 254, 274
2. Graefe, G. (2010). A survey of B-tree locking techniques. ACM TODS, 35(3) (Chapter 1). 10.1145/1806907.1806908. 257
3. Graefe, G., Lillibridge, M., Kuno, H. A., Tucek, J., and Veitch, A. C. (2013). Controlled lock violation. ACM SIGMOD Conference, pp. 85-96 (Chapter 4). 10.1145/2463676.2465325. 259
4. Graefe, G. and Kimura, H. (2015). Orthogonal key-value locking. BTW Conference, pp. 237256 (Chapter 5). 255, 256
5. Gray, J., Lorie, R. A., Putzolu, G. R., and Traiger, I. L. (1975). Granularity of locks in a large shared database. VLDB Conference, pp. 428-451. 10.1145/1282480.1282513. 261, 274