{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,19]],"date-time":"2023-11-19T00:15:01Z","timestamp":1700352901126},"reference-count":14,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2002,4,12]],"date-time":"2002-04-12T00:00:00Z","timestamp":1018569600000},"content-version":"vor","delay-in-days":2,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2002,4,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Developing concurrent applications is not a trivial task. As programs grow larger and become more complex, advanced concurrency control mechanisms are needed to ensure that application consistency is not compromised. Managing mutual exclusion on a per\u2010object basis is not sufficient to guarantee isolation of sets of semantically\u2010related actions. In this paper, we consider \u2018atomic blocks\u2019, a simple and lightweight concurrency control paradigm that enables arbitrary blocks of code to access multiple shared objects in isolation. We evaluate various strategies for implementing atomic blocks in Java, in such a way that concurrency control is transparent to the programmer, isolation is preserved, and concurrency is maximized. We discuss these concurrency control strategies and evaluate them in terms of complexity and performance. Copyright \u00a9 2002 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/cpe.635","type":"journal-article","created":{"date-parts":[[2002,8,25]],"date-time":"2002-08-25T23:24:15Z","timestamp":1030317855000},"page":"261-285","source":"Crossref","is-referenced-by-count":5,"title":["Advanced concurrency control in Java"],"prefix":"10.1002","volume":"14","author":[{"given":"Pascal","family":"Felber","sequence":"first","affiliation":[]},{"given":"Michael K.","family":"Reiter","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2002,4,12]]},"reference":[{"key":"e_1_2_1_2_2","volume-title":"Transaction Processing: Concepts and Techniques","author":"Gray J","year":"1993"},{"key":"e_1_2_1_3_2","volume-title":"Concurrent Programming in Java","author":"Lea D","year":"1997"},{"key":"e_1_2_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/280277.280278"},{"key":"e_1_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1830-2"},{"key":"e_1_2_1_6_2","volume-title":"Java 2 Platform, Enterprise Edition: Platform and Component Specifications","author":"Shannon B","year":"2000"},{"key":"e_1_2_1_7_2","volume-title":"Core Jini","author":"Edwards BMWK","year":"2000"},{"key":"e_1_2_1_8_2","volume-title":"Concurrency Control and Recovery in Database Systems","author":"Bernstein P","year":"1987"},{"key":"e_1_2_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/322169.322176"},{"key":"e_1_2_1_10_2","unstructured":"FelberP ReiterM.Advanced concurrency control in Java.Technical Report Bell Labs Research January2002."},{"key":"e_1_2_1_11_2","volume-title":"Distributed Algorithms","author":"Lynch N","year":"1996"},{"key":"e_1_2_1_12_2","volume-title":"Design Patterns, Elements of Reusable Object\u2010Oriented Software","author":"Gamma E","year":"1995"},{"key":"e_1_2_1_13_2","unstructured":"BlosserJ. Explore the dynamic proxy api.JavaWorld.http:\/\/www.javaworld.com\/javaworld\/jw\u201011\u20102000\/jw\u20101110\u2010proxy.html\u2018November2000\u2019."},{"key":"e_1_2_1_14_2","volume-title":"Locking Performance in Centralized Databases","author":"Tay Y","year":"1987"},{"key":"e_1_2_1_15_2","volume-title":"Human Behaviour and Principle of Least Effort","author":"Zipf G","year":"1949"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fcpe.635","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.635","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,18]],"date-time":"2023-11-18T09:33:49Z","timestamp":1700300029000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.635"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,4,10]]},"references-count":14,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2002,4,10]]}},"alternative-id":["10.1002\/cpe.635"],"URL":"https:\/\/doi.org\/10.1002\/cpe.635","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"value":"1532-0626","type":"print"},{"value":"1532-0634","type":"electronic"}],"subject":[],"published":{"date-parts":[[2002,4,10]]}}}