{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:12:38Z","timestamp":1743027158876,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540877783"},{"type":"electronic","value":"9783540877790"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-87779-0_23","type":"book-chapter","created":{"date-parts":[[2008,9,22]],"date-time":"2008-09-22T05:17:14Z","timestamp":1222060634000},"page":"335-349","source":"Crossref","is-referenced-by-count":0,"title":["Optimizing Threshold Protocols in Adversarial Structures"],"prefix":"10.1007","author":[{"given":"Maurice","family":"Herlihy","sequence":"first","affiliation":[]},{"given":"Flavio P.","family":"Junqueira","sequence":"additional","affiliation":[]},{"given":"Keith","family":"Marzullo","sequence":"additional","affiliation":[]},{"given":"Lucia Draque","family":"Penso","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","volume-title":"Distributed Computing: Fundamentals, Simulations, and Advanced Topics","author":"H. Attiya","year":"1998","unstructured":"Attiya, H., Welch, J.: Distributed Computing: Fundamentals, Simulations, and Advanced Topics. McGraw-Hill, New York (1998)"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/167088.167119","volume-title":"Proceedings of the Twenty-Fifth ACM Symposium on Theory of Computing (STOC 1993)","author":"E. Borowsky","year":"1993","unstructured":"Borowsky, E., Gafni, E.: Generalized FLP impossibility result for t-resilient asynchronous computations. In: Proceedings of the Twenty-Fifth ACM Symposium on Theory of Computing (STOC 1993), pp. 91\u2013100. ACM Press, New York (1993)"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Budhiraja, N., Marzullo, K., Schneider, F., Toueg, S.: Optimal primary-backup protocols. In: Proceedings of the Sixth International Workshop on Distributed Algorithms (WDAG 1997), pp. 362\u2013378 (November 1992)","DOI":"10.1007\/3-540-56188-9_24"},{"key":"23_CR4","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1145\/571637.571640","volume":"20","author":"M. Castro","year":"2002","unstructured":"Castro, M., Liskov, B.: Practical byzantine fault-tolerance and proactive recovery. ACM Transactions on Computer Systems\u00a020, 398\u2013461 (2002)","journal-title":"ACM Transactions on Computer Systems"},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/859716.859718","volume":"21","author":"M. Castro","year":"2003","unstructured":"Castro, M., Rodrigues, R., Liskov, B.: BASE: Using abstraction to improve fault tolerance. ACM Transactions on Computer Systems\u00a021, 236\u2013269 (2003)","journal-title":"ACM Transactions on Computer Systems"},{"key":"23_CR6","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1109\/ICPADS.2002.1183448","volume-title":"Proceedings of the Ninth IEEE International Conference on Parallel and Distributed Systems","author":"R. Ekwall","year":"2002","unstructured":"Ekwall, R., Urban, P., Schiper, A.: Robust TCP connections for fault tolerant computing. In: Proceedings of the Ninth IEEE International Conference on Parallel and Distributed Systems, pp. 501\u2013508. ACM Press, New York (2002)"},{"issue":"4","key":"23_CR7","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1145\/4221.4223","volume":"32","author":"H. Garcia-Molina","year":"1985","unstructured":"Garcia-Molina, H., Barbara, D.: How to assign votes in a distributed system. Journal of the ACM\u00a032(4), 841\u2013860 (1985)","journal-title":"Journal of the ACM"},{"key":"23_CR8","volume-title":"Introduction to Reliable Distributed Programming","author":"R. Guerraoui","year":"2006","unstructured":"Guerraoui, R., Rodrigues, L.: Introduction to Reliable Distributed Programming. Springer, Heidelberg (2006)"},{"key":"23_CR9","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1145\/1281100.1281120","volume-title":"Proceedings of the Twenty-Sixth ACM Symposium on Principles of Distributed Computing (PODC 2007)","author":"R. Guerraoui","year":"2007","unstructured":"Guerraoui, R., Vukolic, M.: Refined quorum systems. In: Proceedings of the Twenty-Sixth ACM Symposium on Principles of Distributed Computing (PODC 2007), pp. 119\u2013128. Springer, Heidelberg (2007)"},{"issue":"1","key":"23_CR10","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1145\/114005.102808","volume":"13","author":"M. Herlihy","year":"1991","unstructured":"Herlihy, M.: Wait-free synchronization. ACM Transactions on Programming Languages and Systems\u00a013(1), 124\u2013149 (1991)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"issue":"6","key":"23_CR11","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1145\/331524.331529","volume":"46","author":"M. Herlihy","year":"1999","unstructured":"Herlihy, M., Shavit, N.: The topological structure of asynchronous computability. Journal of the ACM\u00a046(6), 858\u2013923 (1999)","journal-title":"Journal of the ACM"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Hirt, M., Maurer, U.: Complete characterization of adversaries tolerable in secure multi-party computation. In: Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing (PODC 1997), pp. 25\u201334 (August 1997)","DOI":"10.1145\/259380.259412"},{"key":"23_CR13","unstructured":"Junqueira, F.: Coping with Dependent Failures in Distributed Systems. Number 0737 in CS2003. Ph.D. Thesis, UC San Diego (September 2002)"},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/3-540-37795-6_6","volume":"2584","author":"F. Junqueira","year":"2003","unstructured":"Junqueira, F., Marzullo, K.: Designing algorithms for dependent process failures. Future Directions in Distributed Computing\u00a02584, 24\u201328 (2003)","journal-title":"Future Directions in Distributed Computing"},{"key":"23_CR15","first-page":"274","volume-title":"Proceedings of the Conference on Distributed Computing Systems (ICDCS 2003)","author":"F. Junqueira","year":"2003","unstructured":"Junqueira, F., Marzullo, K.: Synchronous consensus for dependent process failures. In: Proceedings of the Conference on Distributed Computing Systems (ICDCS 2003), pp. 274\u2013283. Springer, Heidelberg (2003)"},{"key":"23_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1007\/11549468_69","volume-title":"Euro-Par 2005 Parallel Processing","author":"F. Junqueira","year":"2005","unstructured":"Junqueira, F., Marzullo, K.: Replication predicates for dependent-failures algorithms. In: Cunha, J.C., Medeiros, P.D. (eds.) Euro-Par 2005. LNCS, vol.\u00a03648, pp. 617\u2013632. Springer, Heidelberg (2005)"},{"issue":"17","key":"23_CR17","doi-asserted-by":"publisher","first-page":"2255","DOI":"10.1002\/cpe.1170","volume":"19","author":"F. Junqueira","year":"2007","unstructured":"Junqueira, F., Marzullo, K.: A framework for the design of dependent-failure algorithms. Concurrency and Computation: Practice and Experience\u00a019(17), 2255\u20132269 (2007)","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"23_CR18","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/s00446-006-0005-x","volume":"19","author":"L. Lamport","year":"2006","unstructured":"Lamport, L.: Fast Paxos. Distributed Computing\u00a019, 79\u2013103 (2006)","journal-title":"Distributed Computing"},{"issue":"3","key":"23_CR19","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L. Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Transactions on Programming Languages and Systems\u00a04(3), 382\u2013401 (1982)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Malkhi, D., Reiter, M.: Byzantine quorum systems. Distributed Computing\u00a011(4) (October\/June 1998)","DOI":"10.1007\/s004460050050"},{"key":"23_CR21","volume-title":"Computer Related Risks","author":"P.G. Neumann","year":"1995","unstructured":"Neumann, P.G.: Computer Related Risks. ACM Press, New York (1995)"},{"issue":"4","key":"23_CR22","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1145\/98163.98167","volume":"22","author":"F. Schneider","year":"1990","unstructured":"Schneider, F.: Implementing fault-tolerant services using the state-machine approach: a tutorial. ACM Computing Surveys\u00a022(4), 299\u2013319 (1990)","journal-title":"ACM Computing Surveys"},{"key":"23_CR23","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1109\/SRDS.2006.44","volume-title":"Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006)","author":"T. Warns","year":"2006","unstructured":"Warns, T., Freiling, F.C., Hasselbring, W.: Consensus using structural failure models. In: Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), pp. 212\u2013224. Springer, Heidelberg (2006)"},{"key":"23_CR24","first-page":"25","volume-title":"The 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2007)","author":"P. Zieli\u0144ski","year":"2007","unstructured":"Zieli\u0144ski, P.: Automatic verification and discovery of Byzantine consensus protocols. In: The 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2007), pp. 25\u201328. IEEE Computer Society, Los Alamitos (2007)"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87779-0_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,4]],"date-time":"2024-05-04T04:07:26Z","timestamp":1714795646000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-540-87779-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540877783","9783540877790"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87779-0_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}