{"id":"https://openalex.org/W2166357363","doi":"https://doi.org/10.1109/cmpsac.1991.170154","title":"A deadlock detection and resolution algorithm for sequential transaction processing with multiple lock modes","display_name":"A deadlock detection and resolution algorithm for sequential transaction processing with multiple lock modes","publication_year":2002,"publication_date":"2002-12-10","ids":{"openalex":"https://openalex.org/W2166357363","doi":"https://doi.org/10.1109/cmpsac.1991.170154","mag":"2166357363"},"language":"en","primary_location":{"id":"doi:10.1109/cmpsac.1991.170154","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cmpsac.1991.170154","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"[1991] Proceedings The Fifteenth Annual International Computer Software &amp; Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056487906","display_name":"Yong-Kuk Park","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136447","display_name":"Ulsan University Hospital","ror":"https://ror.org/03sab2a45","country_code":"KR","type":"healthcare","lineage":["https://openalex.org/I4210136447"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Y.C. Park","raw_affiliation_strings":["Dept. of Comput. Sci., Ulsan Univ., Kyungnam, South Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of Comput. Sci., Ulsan Univ., Kyungnam, South Korea","institution_ids":["https://openalex.org/I4210136447"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031838897","display_name":"Peter Scheuermann","orcid":null},"institutions":[{"id":"https://openalex.org/I111979921","display_name":"Northwestern University","ror":"https://ror.org/000e0be47","country_code":"US","type":"education","lineage":["https://openalex.org/I111979921"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"P. Scheuermann","raw_affiliation_strings":["Department of EECS, Northwestern University, Evanston, IL, USA"],"affiliations":[{"raw_affiliation_string":"Department of EECS, Northwestern University, Evanston, IL, USA","institution_ids":["https://openalex.org/I111979921"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5056487906"],"corresponding_institution_ids":["https://openalex.org/I4210136447"],"apc_list":null,"apc_paid":null,"fwci":0.4497,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.70563904,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"se 13","issue":null,"first_page":"70","last_page":"77"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11125","display_name":"Petri Nets in System Modeling","score":0.9810000061988831,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13471","display_name":"Cognitive Functions and Memory","score":0.9800999760627747,"subfield":{"id":"https://openalex.org/subfields/3205","display_name":"Experimental and Cognitive Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7742971777915955},{"id":"https://openalex.org/keywords/two-phase-locking","display_name":"Two-phase locking","score":0.7208924293518066},{"id":"https://openalex.org/keywords/lock","display_name":"Lock (firearm)","score":0.656535267829895},{"id":"https://openalex.org/keywords/deadlock-prevention-algorithms","display_name":"Deadlock prevention algorithms","score":0.6510617733001709},{"id":"https://openalex.org/keywords/deadlock","display_name":"Deadlock","score":0.6157196164131165},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5852027535438538},{"id":"https://openalex.org/keywords/granularity","display_name":"Granularity","score":0.582889199256897},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5331271290779114},{"id":"https://openalex.org/keywords/transaction-processing","display_name":"Transaction processing","score":0.524463415145874},{"id":"https://openalex.org/keywords/concurrency-control","display_name":"Concurrency control","score":0.49187803268432617},{"id":"https://openalex.org/keywords/serializability","display_name":"Serializability","score":0.47068503499031067},{"id":"https://openalex.org/keywords/resolution","display_name":"Resolution (logic)","score":0.44285696744918823},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3591461777687073},{"id":"https://openalex.org/keywords/distributed-transaction","display_name":"Distributed transaction","score":0.3321576714515686},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12972676753997803},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11644318699836731},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.0882079005241394}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7742971777915955},{"id":"https://openalex.org/C131346163","wikidata":"https://www.wikidata.org/wiki/Q2290484","display_name":"Two-phase locking","level":5,"score":0.7208924293518066},{"id":"https://openalex.org/C174839445","wikidata":"https://www.wikidata.org/wiki/Q1134386","display_name":"Lock (firearm)","level":2,"score":0.656535267829895},{"id":"https://openalex.org/C113429609","wikidata":"https://www.wikidata.org/wiki/Q4060699","display_name":"Deadlock prevention algorithms","level":3,"score":0.6510617733001709},{"id":"https://openalex.org/C159023740","wikidata":"https://www.wikidata.org/wiki/Q623276","display_name":"Deadlock","level":2,"score":0.6157196164131165},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5852027535438538},{"id":"https://openalex.org/C177774035","wikidata":"https://www.wikidata.org/wiki/Q1246948","display_name":"Granularity","level":2,"score":0.582889199256897},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5331271290779114},{"id":"https://openalex.org/C72108876","wikidata":"https://www.wikidata.org/wiki/Q844565","display_name":"Transaction processing","level":3,"score":0.524463415145874},{"id":"https://openalex.org/C84511453","wikidata":"https://www.wikidata.org/wiki/Q2914952","display_name":"Concurrency control","level":3,"score":0.49187803268432617},{"id":"https://openalex.org/C191558696","wikidata":"https://www.wikidata.org/wiki/Q137712","display_name":"Serializability","level":5,"score":0.47068503499031067},{"id":"https://openalex.org/C138268822","wikidata":"https://www.wikidata.org/wiki/Q1051925","display_name":"Resolution (logic)","level":2,"score":0.44285696744918823},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3591461777687073},{"id":"https://openalex.org/C25185021","wikidata":"https://www.wikidata.org/wiki/Q4053284","display_name":"Distributed transaction","level":4,"score":0.3321576714515686},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12972676753997803},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11644318699836731},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0882079005241394},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cmpsac.1991.170154","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cmpsac.1991.170154","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"[1991] Proceedings The Fifteenth Annual International Computer Software &amp; Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7699999809265137,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1545155892","https://openalex.org/W1569132584","https://openalex.org/W1973483597","https://openalex.org/W2035069351","https://openalex.org/W2035907333","https://openalex.org/W2083342911","https://openalex.org/W2102333161","https://openalex.org/W2132007926","https://openalex.org/W2138709157","https://openalex.org/W2160017790","https://openalex.org/W2340365916","https://openalex.org/W4244285670","https://openalex.org/W6703962106"],"related_works":["https://openalex.org/W1945998143","https://openalex.org/W2082153234","https://openalex.org/W2016035261","https://openalex.org/W2053886714","https://openalex.org/W2053888684","https://openalex.org/W3026482885","https://openalex.org/W2400812042","https://openalex.org/W2165783456","https://openalex.org/W2273209818","https://openalex.org/W2134151046"],"abstract_inverted_index":{"An":[0],"algorithm":[1,103],"for":[2,17,60,66,89],"deadlock":[3,68,97],"detection":[4,69],"and":[5,28,45,99,106,111],"resolution":[6,70,102],"in":[7,34,72,95],"sequential":[8],"transaction":[9],"processing":[10],"is":[11,15,71,114],"presented.":[12],"Two-phase":[13],"locking":[14,26],"assumed":[16],"ensuring":[18],"serializability,":[19],"the":[20,24,37,67,73,90],"lock":[21,39,50,61],"requests":[22,51],"obey":[23],"granularity":[25],"protocol,":[27],"each":[29,48],"granule":[30],"may":[31],"be":[32],"locked":[33],"one":[35],"of":[36,75,92],"following":[38],"modes:":[40],"IS,":[41],"IX,":[42],"S,":[43],"SIX":[44],"X.":[46],"For":[47],"object,":[49],"are":[52,109],"honored":[53],"according":[54],"to":[55],"a":[56,76,81,93,96,101],"first-come-first-served":[57],"basis":[58],"except":[59],"conversions.":[62],"The":[63,85],"basic":[64],"idea":[65],"construction":[74],"new":[77],"direct":[78],"graph":[79],"called":[80],"holder/waiter-transaction":[82],"waited-by":[83],"graph.":[84],"authors":[86],"establish":[87],"guidelines":[88],"identification":[91],"victim":[94],"cycle":[98],"propose":[100],"whose":[104,112],"time":[105],"space":[107],"requirements":[108],"reasonable":[110],"solution":[113],"near":[115],"optimal.<":[116],"<ETX":[117],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[118],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">&gt;</ETX>":[119]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
