{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T05:16:30Z","timestamp":1733202990887,"version":"3.30.0"},"reference-count":10,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":6362,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Syst. Comp. Jpn."],"published-print":{"date-parts":[[1998,4]]},"DOI":"10.1002\/(sici)1520-684x(199804)29:4<11::aid-scj2>3.0.co;2-r","type":"journal-article","created":{"date-parts":[[2002,8,25]],"date-time":"2002-08-25T19:32:29Z","timestamp":1030303949000},"page":"11-21","source":"Crossref","is-referenced-by-count":0,"title":["Implementation and evaluation of a highly reliable server with QRM"],"prefix":"10.1002","volume":"29","author":[{"given":"Hideaki","family":"Hirayama","sequence":"first","affiliation":[]},{"given":"Yoshio","family":"Masubuchi","sequence":"additional","affiliation":[]},{"given":"Satoshi","family":"Hoshina","sequence":"additional","affiliation":[]},{"given":"Tomofumi","family":"Shimada","sequence":"additional","affiliation":[]},{"given":"Nobuhiro","family":"Kato","sequence":"additional","affiliation":[]},{"given":"Masaharu","family":"Nozaki","sequence":"additional","affiliation":[]}],"member":"311","reference":[{"key":"10.1002\/(SICI)1520-684X(199804)29:4<11::AID-SCJ2>3.0.CO;2-R-BIB1","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/2.56849","article-title":"Fault-tolerant computing: fundamental concepts","volume":"23","author":"Nelson","year":"1990","journal-title":"IEEE Computer"},{"key":"10.1002\/(SICI)1520-684X(199804)29:4<11::AID-SCJ2>3.0.CO;2-R-BIB2","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/2.56850","article-title":"Fault tolerance in commercial computers","volume":"23","author":"Siewiorek","year":"1990","journal-title":"IEEE Computer"},{"key":"10.1002\/(SICI)1520-684X(199804)29:4<11::AID-SCJ2>3.0.CO;2-R-BIB3","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/2.17","article-title":"Sequoia: A fault-tolerant tightly coupled multiprocessor for transaction processing","volume":"21","author":"Bernstein","year":"1988","journal-title":"IEEE Computer"},{"key":"10.1002\/(SICI)1520-684X(199804)29:4<11::AID-SCJ2>3.0.CO;2-R-BIB4","unstructured":"P. A. Lee, N. Ghani, and K. Heron. A recovery cache for the pdp-11. Proceedings of the 9th Annual International Symposium on Fault-Tolerant Computing, pp. 3\u00e2\u0080\u00938 (1979)."},{"key":"10.1002\/(SICI)1520-684X(199804)29:4<11::AID-SCJ2>3.0.CO;2-R-BIB5","article-title":"Highly reliable server with QR M","volume":"FTS96-56","author":"Hirayama","year":"1996","journal-title":"Tech. Rep. I.E.I.C.E."},{"issue":"4","key":"10.1002\/(SICI)1520-684X(199804)29:4<11::AID-SCJ2>3.0.CO;2-R-BIB6","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1093\/comjnl\/21.4.306","article-title":"A reconsideration of the recovery block scheme","volume":"21","author":"Lee","year":"1978","journal-title":"The Computer Journal"},{"key":"10.1002\/(SICI)1520-684X(199804)29:4<11::AID-SCJ2>3.0.CO;2-R-BIB7","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/192537.192541","article-title":"History cache: Hardware support for reverse execution","volume":"22","author":"Sosic","year":"1994","journal-title":"Computer Architecture News"},{"key":"10.1002\/(SICI)1520-684X(199804)29:4<11::AID-SCJ2>3.0.CO;2-R-BIB8","doi-asserted-by":"crossref","unstructured":"I. Lee and R. K. Iyer. Faults, symptoms, and software fault tolerance in the Tandem GUARDIA N90 operating system. Proceedings of the 23rd Annual International Symposium on Fault-Tolerant Computing, pp. 20\u00e2\u0080\u009329 (June 1993).","DOI":"10.1109\/FTCS.1993.627304"},{"key":"10.1002\/(SICI)1520-684X(199804)29:4<11::AID-SCJ2>3.0.CO;2-R-BIB9","unstructured":"H. Mogi. Verification of performance evaluation technique for computers with trace driven simulation. The 53rd Annual Symposium of IPSJ (Sept. 1996). (in Japanese)"},{"key":"10.1002\/(SICI)1520-684X(199804)29:4<11::AID-SCJ2>3.0.CO;2-R-BIB10","unstructured":"Y. Horiuchi and H. Mogi. Performance evaluation of OS with trace driven simulation. The 52nd Annual Symposium of IPSJ (March 1996). (in Japanese)"}],"container-title":["Systems and Computers in Japan"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2F(SICI)1520-684X(199804)29:4%3C11::AID-SCJ2%3E3.0.CO;2-R","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/(SICI)1520-684X(199804)29:4%3C11::AID-SCJ2%3E3.0.CO;2-R","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T19:41:14Z","timestamp":1733168474000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/(SICI)1520-684X(199804)29:4<11::AID-SCJ2>3.0.CO;2-R"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,4]]},"references-count":10,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1998,4]]}},"URL":"https:\/\/doi.org\/10.1002\/(sici)1520-684x(199804)29:4<11::aid-scj2>3.0.co;2-r","relation":{},"ISSN":["0882-1666","1520-684X"],"issn-type":[{"type":"print","value":"0882-1666"},{"type":"electronic","value":"1520-684X"}],"subject":[],"published":{"date-parts":[[1998,4]]}}}