Abraham Silberschatz :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
C. Mohan :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Which papers of C. Mohan cite Abraham Silberschatz Ordered by citing publication [Change the order to 'ordered by cited' ]
Gustavo Alonso , Divyakant Agrawal , Amr El Abbadi , Mohan Kamath , Roger Günthör , C. Mohan Advanced Transaction Models in Workflow Contexts. [Citation Graph (10, 16)][DBLP ] ICDE, 1996, pp:574-581 [Conf ] Cites:
C. Mohan , Hamid Pirahesh ARIES-RRH: Restricted Repeating of History in the ARIES Transaction Recovery Method. [Citation Graph (17, 24)][DBLP ] ICDE, 1991, pp:718-727 [Conf ] Cites:
C. Mohan , Donald S. Fussell , Abraham Silberschatz Compatibility and Commutativity in Non-two-phase Locking Protocols. [Citation Graph (1, 11)][DBLP ] PODS, 1982, pp:283-292 [Conf ] Cites:
Zvi M. Kedem , Abraham Silberschatz Controlling Concurrency Using Locking Protocols (Preliminary Report) [Citation Graph (10, 0)][DBLP ] FOCS, 1979, pp:274-285 [Conf ]
Donald S. Fussell , Zvi M. Kedem , Abraham Silberschatz Deadlock Removal Using Partial Rollback in Database Systems. [Citation Graph (3, 7)][DBLP ] SIGMOD Conference, 1981, pp:65-73 [Conf ]
Donald S. Fussell , Zvi M. Kedem , Abraham Silberschatz A Theory of Correct Locking Protocols for Database Systems [Citation Graph (5, 9)][DBLP ] VLDB, 1981, pp:112-124 [Conf ]
Zvi M. Kedem , Abraham Silberschatz Non-Two-Phase Locking Protocols with Shared and Exclusive Locks. [Citation Graph (10, 11)][DBLP ] VLDB, 1980, pp:309-317 [Conf ]
Abraham Silberschatz , Zvi M. Kedem Consistency in Hierarchical Database Systems. [Citation Graph (43, 0)][DBLP ] J. ACM, 1980, v:27, n:1, pp:72-80 [Journal ]
Abraham Silberschatz , Zvi M. Kedem A Family of Locking Protocols for Database Systems that Are Modeled by Directed Graphs. [Citation Graph (10, 0)][DBLP ] IEEE Trans. Software Eng., 1982, v:8, n:6, pp:558-562 [Journal ]
C. Mohan , Inderpal Narang Algorithms for Creating Indexes for Very Large Tables Without Quiescing Updates. [Citation Graph (14, 12)][DBLP ] SIGMOD Conference, 1992, pp:361-370 [Conf ] Cites:
Zvi M. Kedem , C. Mohan , Abraham Silberschatz An Efficient Deadlock Removal Scheme for Non-Two-Phase Locking Protocols. [Citation Graph (1, 13)][DBLP ] VLDB, 1982, pp:91-97 [Conf ] Cites:
Zvi M. Kedem , Abraham Silberschatz Controlling Concurrency Using Locking Protocols (Preliminary Report) [Citation Graph (10, 0)][DBLP ] FOCS, 1979, pp:274-285 [Conf ]
Donald S. Fussell , Zvi M. Kedem , Abraham Silberschatz Deadlock Removal Using Partial Rollback in Database Systems. [Citation Graph (3, 7)][DBLP ] SIGMOD Conference, 1981, pp:65-73 [Conf ]
Donald S. Fussell , Zvi M. Kedem , Abraham Silberschatz A Theory of Correct Locking Protocols for Database Systems [Citation Graph (5, 9)][DBLP ] VLDB, 1981, pp:112-124 [Conf ]
Zvi M. Kedem , Abraham Silberschatz Non-Two-Phase Locking Protocols with Shared and Exclusive Locks. [Citation Graph (10, 11)][DBLP ] VLDB, 1980, pp:309-317 [Conf ]
Zvi M. Kedem , Abraham Silberschatz Locking Protocols: From Exclusive to Shared Locks [Citation Graph (12, 0)][DBLP ] J. ACM, 1983, v:30, n:4, pp:787-804 [Journal ]
Abraham Silberschatz , Zvi M. Kedem Consistency in Hierarchical Database Systems. [Citation Graph (43, 0)][DBLP ] J. ACM, 1980, v:27, n:1, pp:72-80 [Journal ]
Abraham Silberschatz , Zvi M. Kedem A Family of Locking Protocols for Database Systems that Are Modeled by Directed Graphs. [Citation Graph (10, 0)][DBLP ] IEEE Trans. Software Eng., 1982, v:8, n:6, pp:558-562 [Journal ]
C. Mohan , Gustavo Alonso , Roger Günthör , Mohan Kamath Exotica: A Research Perspective ob Workflow Management Systems. [Citation Graph (9, 13)][DBLP ] IEEE Data Eng. Bull., 1995, v:18, n:1, pp:19-26 [Journal ] Cites:
C. Mohan , Donald J. Haderle , Bruce G. Lindsay , Hamid Pirahesh , Peter M. Schwarz ARIES: A Transaction Recovery Method Supporting Fine-Granularity Locking and Partial Rollbacks Using Write-Ahead Logging. [Citation Graph (111, 59)][DBLP ] ACM Trans. Database Syst., 1992, v:17, n:1, pp:94-162 [Journal ] Cites: