{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:58:57Z","timestamp":1725663537584},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540193333"},{"type":"electronic","value":"9783540391944"}],"license":[{"start":{"date-parts":[[1988,1,1]],"date-time":"1988-01-01T00:00:00Z","timestamp":567993600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1988]]},"DOI":"10.1007\/3-540-19333-2_2","type":"book-chapter","created":{"date-parts":[[2012,2,25]],"date-time":"2012-02-25T15:05:32Z","timestamp":1330182332000},"page":"19-37","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["On the duality of fault tolerant system structures"],"prefix":"10.1007","author":[{"given":"S. K.","family":"Shrivastava","sequence":"first","affiliation":[]},{"given":"L. V.","family":"Mancini","sequence":"additional","affiliation":[]},{"given":"B.","family":"Randell","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,27]]},"reference":[{"issue":"6","key":"2_CR1","doi-asserted-by":"crossref","first-page":"684","DOI":"10.1109\/TSE.1986.6312966","volume":"SE-12","author":"J. N. Gray","year":"1986","unstructured":"J.N. Gray, \u201cAn approach to decentralized computer systems\u201d, IEEE Trans. on Soft. Eng., SE-12, No.6, 1986, pp.684\u2013689.","journal-title":"IEEE Trans. on Soft. Eng."},{"key":"2_CR2","first-page":"3","volume":"13","author":"H. C. Lauer","year":"1979","unstructured":"H.C. Lauer and R.M. Needham, \u201cOn the duality of operating system structures\u201d, Proc. of 2nd Int. Symp. on Operating Systems, INRIA, Oct. 1978; reprinted in ACM Operating System Review, Vol.13, April 1979, pp.3\u201319.","journal-title":"Proc. of 2nd Int. Symp. on Operating Systems, INRIA, Oct. 1978; reprinted in ACM Operating System Review"},{"issue":"3","key":"2_CR3","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1145\/2166.357215","volume":"5","author":"B. Liskov","year":"1983","unstructured":"B. Liskov and R. Scheifler, \u201cGuardians and actions: linguistic support for robust distributed programs\u201d, ACM TOPLAS, Vol.5, No.3, 1983, pp.381\u2013404.","journal-title":"ACM TOPLAS"},{"issue":"6","key":"2_CR4","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1109\/TSE.1985.232244","volume":"SE-11","author":"A. Z. Spector","year":"1985","unstructured":"A.Z. Spector et al, \u201cSupport for distributed transactions in the TABS prototype\u201d, IEEE Trans. on Soft. Eng., SE-11, No.6, 1985, pp.520\u2013530.","journal-title":"IEEE Trans. on Soft. Eng."},{"issue":"3","key":"2_CR5","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/TSE.1984.5010234","volume":"SE-10","author":"L. Svobodova","year":"1984","unstructured":"L. Svobodova, \u201cResilient distributed computing\u201d, IEEE Trans. on Soft. Eng., SE-10, No.3, 1984, pp.257\u2013268.","journal-title":"IEEE Trans. on Soft. Eng."},{"issue":"4","key":"2_CR6","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1109\/TSE.1981.230846","volume":"SE-7","author":"S. K. Shrivastava","year":"1981","unstructured":"S.K. Shrivastava, \u201cStructuring distributed systems for recoverability and crash resistance\u201d, IEEE Trans. on Soft. Eng., SE-7, No.4, 1981, pp.436\u2013447.","journal-title":"IEEE Trans. on Soft. Eng."},{"issue":"4","key":"2_CR7","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1145\/323627.323636","volume":"19","author":"K. P. Birman","year":"1985","unstructured":"K.P. Birman, \u201cReplication and fault tolerance in the ISIS system\u201d, Proc. of 10th Symp. on Princ. of Op. Sys., ACM Operating Systems Review, 19, No.4, 1985, pp.79\u201386.","journal-title":"Proc. of 10th Symp. on Princ. of Op. Sys., ACM Operating Systems Review"},{"key":"2_CR8","unstructured":"E. Nett et al, \u201cProfemo: design and implementation of a fault tolerant distributed system architecture\u201d, GMD Studien, No. 100, Tech. report, GMD, St. Augustine, 1985."},{"issue":"11","key":"2_CR9","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1145\/360363.360369","volume":"19","author":"K. Eswaren","year":"1976","unstructured":"K. Eswaren et al, \u201cOn the notions of consistency and predicate locks in a database system\u201d, CACM, 19, No. 11, 1976, pp.624\u2013633.","journal-title":"CACM"},{"key":"2_CR10","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/BF00289593","volume":"16","author":"E. Best","year":"1981","unstructured":"E. Best and B. Randell, \u201cA formal model of atomicity in asynchronous systems\u201d, Acta Informatica, 16, 1981, pp.93\u2013124.","journal-title":"Acta Informatica"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"C.T Davies, \u201cRecovery semantics for a DB\/DC system\u201d, Proc. of ACM Nat. Conf., 1973, pp. 136\u2013141.","DOI":"10.1145\/800192.805694"},{"issue":"1","key":"2_CR12","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/TSE.1986.6312921","volume":"SE-12","author":"D. J. Taylor","year":"1986","unstructured":"D.J. Taylor, \u201cConcurrency and forward recovery in atomic actions\u201d, IEEE Trans. on Soft. Eng., SE-12, No. 1, 1986, pp.69\u201378.","journal-title":"IEEE Trans. on Soft. Eng."},{"issue":"8","key":"2_CR13","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1145\/359576.359585","volume":"21","author":"C. A. R. R. Hoare","year":"1978","unstructured":"C.A.R. Hoare, \u201cCommunicating sequential processes\u201d, CACM, 21, No.8, 1978, pp.666\u2013677.","journal-title":"CACM"},{"issue":"2","key":"2_CR14","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1109\/TSE.1980.230469","volume":"SE-6","author":"D. L. Russell","year":"1980","unstructured":"D.L. Russell, \u201cState restoration in systems of communicating processes\u201d, IEEE Trans. on Soft. Eng., SE-6, No.2, 1980, pp.183\u2013193.","journal-title":"IEEE Trans. on Soft. Eng."},{"issue":"3","key":"2_CR15","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1109\/TSE.1982.235106","volume":"SE-8","author":"K. H. Kim","year":"1982","unstructured":"K.H. Kim, \u201cApproaches to mechanization of the conversation scheme based on monitors\u201d, IEEE Trans. on Soft. Eng., SE-8, No.3, 1982, pp.189\u2013197.","journal-title":"IEEE Trans. on Soft. Eng."},{"issue":"3","key":"2_CR16","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1109\/TSE.1978.231500","volume":"SE-4","author":"S. K. Shrivastava","year":"1978","unstructured":"S.K. Shrivastava and J.P. Banatre, \u201cReliable resource allocation between unreliable processes\u201d, IEEE Trans. on Soft. Eng., SE-4, No.3, 1978, pp.230\u2013241.","journal-title":"IEEE Trans. on Soft. Eng."},{"key":"2_CR17","first-page":"159","volume":"FTCS-11","author":"W. G. Wood","year":"1981","unstructured":"W.G. Wood, \u201cA decentralized recovery control protocol\u201d, Digest of papers, FTCS-11, Portland, 1981, pp.159\u2013164.","journal-title":"Digest of papers"},{"issue":"1","key":"2_CR18","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/TSE.1987.232562","volume":"SE-13","author":"R. Koo","year":"1987","unstructured":"R. Koo and S. Toueg, \u201cCheckpointing and rollback recovery for distributed systems\u201d, IEEE Trans. on Soft. Eng., SE-13, No.1, 1987, pp.23\u201331.","journal-title":"IEEE Trans. on Soft. Eng."},{"issue":"2","key":"2_CR19","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/TSE.1975.6312842","volume":"SE-1","author":"B. Randell","year":"1975","unstructured":"B. Randell, \u201cSystem structure for software fault tolerance\u201d, IEEE Trans. on Soft. Eng., SE-1, No.2, 1975, pp.220\u2013232.","journal-title":"IEEE Trans. on Soft. Eng."},{"issue":"1","key":"2_CR20","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/214451.214456","volume":"3","author":"K. M. Chandy","year":"1985","unstructured":"K.M. Chandy and L. Lamport, \u201cDistributed snapshots: determining global states of distributed systems\u201d, ACM TOCS, 3, No.1, 1985, pp.63\u201375.","journal-title":"ACM TOCS"},{"issue":"2","key":"2_CR21","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1145\/356725.356729","volume":"10","author":"B. Randell","year":"1978","unstructured":"B. Randell, P.A. Lee and P.C. Treleaven, \u201cReliability issues in computing system design\u201d, ACM Comp. Surveys, 10, No.2, 1978, pp.123\u2013166.","journal-title":"ACM Comp. Surveys"},{"issue":"3","key":"2_CR22","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1109\/TSE.1983.237017","volume":"SE-9","author":"T. Anderson","year":"1983","unstructured":"T. Anderson and J.C. Knight, \u201cA framework for software fault tolerance in real time systems\u201d, IEEE Trans. on Soft. Eng., SE-9, No.3, 1983, pp.355\u2013364.","journal-title":"IEEE Trans. on Soft. Eng."},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"C. Mohan and B.G. Lindsay, \u201cEfficient commit protocols for the tree of processes model of distributed transactions\u201d, Proc. of 2nd ACM Symp. on Princ. of Dist. Comp., Montreal, 1983, pp.76\u201388.","DOI":"10.1145\/800221.806711"},{"issue":"6","key":"2_CR24","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1109\/TC.1982.1676035","volume":"C-31","author":"F. Cristian","year":"1982","unstructured":"F. Cristian, \u201cException handling and software fault tolerance\u201d, IEEE Trans on Computers, C-31, No. 6, 1982, pp.531\u2013540.","journal-title":"IEEE Trans on Computers"},{"key":"2_CR25","volume-title":"Fault Tolerance: Principles and Practice","author":"T. Anderson","year":"1981","unstructured":"T. Anderson and P.A. Lee, \u201cFault Tolerance: Principles and Practice\u201d, Prentice Hall, London, 1981."},{"issue":"8","key":"2_CR26","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1109\/TSE.1986.6312984","volume":"SE-12","author":"R. H. Campbell","year":"1986","unstructured":"R.H. Campbell and B. Randell, \u201cError recovery in asynchronous systems\u201d, IEEE Trans. on Soft. Eng., SE-12, No.8, 1986, pp.811\u2013826.","journal-title":"IEEE Trans. on Soft. Eng."},{"key":"2_CR27","volume-title":"Distributed systems and computer networks","author":"M. Sloman","year":"1987","unstructured":"M. Sloman and J. Karmer, \u201cDistributed systems and computer networks\u201d, Prentice Hall, London, 1987."},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"J.E. Dobson and B. Randell, \u201cBuilding reliable secure computing systems out of unreliable insecure components\u201d, Proc. of IEEE Symp. on Security and Privacy, Oakland, CA, April 1986, pp.187\u2013193.","DOI":"10.1109\/SP.1986.10018"}],"container-title":["Lecture Notes in Computer Science","Experiences with Distributed Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-19333-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T18:49:50Z","timestamp":1578509390000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-19333-2_2"}},"subtitle":["Preliminary version"],"short-title":[],"issued":{"date-parts":[[1988]]},"ISBN":["9783540193333","9783540391944"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/3-540-19333-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1988]]},"assertion":[{"value":"27 May 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}