{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T10:33:17Z","timestamp":1725618797928},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[1990,9,3]]},"DOI":"10.1145\/504136.504138","type":"proceedings-article","created":{"date-parts":[[2004,2,3]],"date-time":"2004-02-03T11:34:51Z","timestamp":1075808091000},"page":"1-6","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Lazy replication"],"prefix":"10.1145","author":[{"given":"Rivka","family":"Ladin","sequence":"first","affiliation":[{"name":"Digital Equipment Corp., Cambridge, MA"}]},{"given":"Barbara","family":"Liskov","sequence":"additional","affiliation":[{"name":"MIT Laboratory for Computer Science, Cambridge, MA"}]},{"given":"Liuba","family":"Shrira","sequence":"additional","affiliation":[{"name":"MIT Laboratory for Computer Science, Cambridge, MA"}]}],"member":"320","published-online":{"date-parts":[[1990,9,3]]},"reference":[{"key":"e_1_3_2_1_1_2","doi-asserted-by":"publisher","DOI":"10.1145\/1994.2207"},{"key":"e_1_3_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/41457.37515"},{"key":"e_1_3_2_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/358468.358487"},{"volume-title":"M.I.T.","author":"Farrell K. A.","key":"e_1_3_2_1_4_2","unstructured":"Farrell , K. A. A Deadlock Detection Scheme for Argus. Senior Thesis. Laboratory of Computer Science , M.I.T. , Cambridge , MA .]] Farrell, K. A. A Deadlock Detection Scheme for Argus. Senior Thesis. Laboratory of Computer Science, M.I.T., Cambridge, MA.]]"},{"key":"e_1_3_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/588111.588124"},{"key":"e_1_3_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/800215.806583"},{"key":"e_1_3_2_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/41625.41627"},{"key":"e_1_3_2_1_9_2","doi-asserted-by":"publisher","DOI":"10.5555\/42468.42469"},{"key":"e_1_3_2_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/93385.93399"},{"key":"e_1_3_2_1_11_2","volume-title":"MA","author":"Ladin R., A","year":"1989","unstructured":"Ladin , R., A Method for Constructing Highly Available Services and An Algorithm for Distributed Garbage Collection. Ph.D. Th., M.I.T. Laboratory for Computer Science, Cambridge , MA , May 1989 .]] Ladin, R., A Method for Constructing Highly Available Services and An Algorithm for Distributed Garbage Collection. Ph.D. Th., M.I.T. Laboratory for Computer Science, Cambridge, MA, May 1989.]]"},{"key":"e_1_3_2_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/10590.10591"},{"key":"e_1_3_2_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/10590.10593"},{"key":"e_1_3_2_1_15_2","first-page":"2","volume-title":"Proc. of the 17th International Symposium on Fault-Tolerant Computing, IEEE","author":"Liskov B.","year":"1987","unstructured":"Liskov , B. , Scheifler , R. , Walker , E. , and Weihl , W . Orphan Detection (Extended Abstract) . Proc. of the 17th International Symposium on Fault-Tolerant Computing, IEEE , Pittsburgh, Pa. , July , 1987 , pp. 2 - 7 .]] Liskov, B., Scheifler, R., Walker, E., and Weihl, W. Orphan Detection (Extended Abstract). Proc. of the 17th International Symposium on Fault-Tolerant Computing, IEEE, Pittsburgh, Pa., July, 1987, pp. 2-7.]]"},{"key":"e_1_3_2_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232835"},{"key":"e_1_3_2_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/800222.806750"}],"event":{"name":"EW90: ACM\/SIOPS European Workshop","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Bologna Italy","acronym":"EW90"},"container-title":["Proceedings of the 4th workshop on ACM SIGOPS European workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/504136.504138","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T11:04:54Z","timestamp":1673435094000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/504136.504138"}},"subtitle":["exploiting the semantics of distributed services"],"short-title":[],"issued":{"date-parts":[[1990,9,3]]},"references-count":16,"alternative-id":["10.1145\/504136.504138","10.1145\/504136"],"URL":"https:\/\/doi.org\/10.1145\/504136.504138","relation":{},"subject":[],"published":{"date-parts":[[1990,9,3]]},"assertion":[{"value":"1990-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}