{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T03:08:42Z","timestamp":1648696122651},"reference-count":15,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[1994,7,1]],"date-time":"1994-07-01T00:00:00Z","timestamp":773020800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Microprocessing and Microprogramming"],"published-print":{"date-parts":[[1994,7]]},"DOI":"10.1016\/0165-6074(94)90107-4","type":"journal-article","created":{"date-parts":[[2003,8,8]],"date-time":"2003-08-08T04:56:10Z","timestamp":1060318570000},"page":"427-438","source":"Crossref","is-referenced-by-count":0,"title":["Efficient checkpointing procedures for fault tolerant distributed systems"],"prefix":"10.1016","volume":"40","author":[{"given":"Kassem","family":"Saleh","sequence":"first","affiliation":[]},{"given":"Anjali","family":"Agarwal","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/0165-6074(94)90107-4_BIB1","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/214451.214456","article-title":"Distributed snapshots: determining global states of distributed systems","volume":"3","author":"Chandy","year":"1985","journal-title":"ACM Trans. Comp. Sys."},{"key":"10.1016\/0165-6074(94)90107-4_BIB2","series-title":"Proc. 10th Int. Conf. on Distributed Computing Systems","first-page":"134","article-title":"Causal distributed breakpoints","author":"Fowler","year":"1990"},{"issue":"4","key":"10.1016\/0165-6074(94)90107-4_BIB3","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1109\/12.88464","article-title":"Stabilizing communication protocols","volume":"40","author":"Gouda","year":"1991","journal-title":"IEEE Trans. Comput."},{"issue":"6","key":"10.1016\/0165-6074(94)90107-4_BIB4","first-page":"1715","article-title":"A recovery sequence generation system for design of recoverable protocols","volume":"E-74","author":"Kakuda","year":"1991","journal-title":"Trans. IEICE"},{"issue":"1","key":"10.1016\/0165-6074(94)90107-4_BIB5","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/TSE.1987.232562","article-title":"Checkpointing and rollback-recovery for distributed systems","volume":"SE-13","author":"Koo","year":"1987","journal-title":"Trans. Software Eng."},{"issue":"7","key":"10.1016\/0165-6074(94)90107-4_BIB6","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1145\/359545.359563","article-title":"Time, clocks and the ordering of events in a distributed system","volume":"21","author":"Lamport","year":"1978","journal-title":"Comm. ACM"},{"key":"10.1016\/0165-6074(94)90107-4_BIB7","series-title":"Fault Tolerance: Principles and Practice","author":"Lee","year":"1990"},{"key":"10.1016\/0165-6074(94)90107-4_BIB8","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/0020-0190(85)90048-1","article-title":"Global and logical time in distributed procedures","volume":"20","author":"Morgan","year":"1985","journal-title":"Inform. Process Lett."},{"key":"10.1016\/0165-6074(94)90107-4_BIB9","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1109\/TSE.1975.6312842","article-title":"System structure for software fault tolerance","volume":"SE-1","author":"Randell","year":"1975","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/0165-6074(94)90107-4_BIB10","series-title":"Proc. Second Int. Workshop on Responsive Computer Systems (IWRCS'92)","first-page":"92","article-title":"A distributed snapshots procedure and its application to protocol stabilization","author":"Saleh","year":"1992"},{"key":"10.1016\/0165-6074(94)90107-4_BIB11","doi-asserted-by":"crossref","DOI":"10.1016\/0164-1212(94)90055-8","article-title":"An efficient recovery procedure for fault tolerance in distributed systems","author":"Saleh","year":"1994","journal-title":"J. Syst. Software"},{"issue":"8","key":"10.1016\/0165-6074(94)90107-4_BIB12","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1016\/0950-5849(93)90046-6","article-title":"Dynamic checkpointing procedure for the design of stabilizing protocols","volume":"18","author":"Saleh","year":"1993","journal-title":"J. Inform. Software Technol."},{"key":"10.1016\/0165-6074(94)90107-4_BIB13","first-page":"183","article-title":"Procedures for the design of responsive communication protocols","volume":"vol. 1","author":"Saleh","year":"1993"},{"key":"10.1016\/0165-6074(94)90107-4_BIB14","unstructured":"K. Saleh, I. Ahmed, K. Al-Saqabi and A. Agarwal, A recovery approach to the design of stabilizing communication protocols, to appear in Comput. Comm."},{"key":"10.1016\/0165-6074(94)90107-4_BIB15","series-title":"Distributed Databases","first-page":"191","article-title":"Reconstruction of consistent global states in distributed databases","author":"Schlageter","year":"1980"}],"container-title":["Microprocessing and Microprogramming"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0165607494901074?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0165607494901074?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T01:53:39Z","timestamp":1552614819000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0165607494901074"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994,7]]},"references-count":15,"journal-issue":{"issue":"6","published-print":{"date-parts":[[1994,7]]}},"alternative-id":["0165607494901074"],"URL":"https:\/\/doi.org\/10.1016\/0165-6074(94)90107-4","relation":{},"ISSN":["0165-6074"],"issn-type":[{"value":"0165-6074","type":"print"}],"subject":[],"published":{"date-parts":[[1994,7]]}}}