Last update: Sat Jan 6 02:03:49 MST 2018
@Article{Buckley:1984:SNH,
author = "G. N. Buckley and A. Silberschatz",
title = "Short Notes: on the Heterogeneous Guard Locking
Protocol",
journal = j-COMP-J,
volume = "27",
number = "1",
pages = "86--87",
month = feb,
year = "1984",
CODEN = "CMPJA6",
DOI = "https://doi.org/10.1093/comjnl/27.1.86",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
bibdate = "Tue Dec 4 14:48:16 MST 2012",
bibsource = "http://comjnl.oxfordjournals.org/content/27/1.toc;
http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
http://www3.oup.co.uk/computer_journal/hdb/Volume_27/Issue_01/",
URL = "http://comjnl.oxfordjournals.org/content/27/1/86.full.pdf+html;
http://www3.oup.co.uk/computer_journal/hdb/Volume_27/Issue_01/tiff/86.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_27/Issue_01/tiff/87.tif",
acknowledgement = ack-nhfb,
classcodes = "C6150J (Operating systems); C6160 (Database management
systems (DBMS))",
corpsource = "Texas Univ., Austin, TX, USA",
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
keywords = "database management systems; database systems;
deadlock avoidance; heterogeneous guard locking
protocol; nontwo-phase locking protocol; operating
systems (computers); protocol; protocols; rooted
directed acyclic graphs",
treatment = "T Theoretical or Mathematical",
}