{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:12:06Z","timestamp":1725567126535},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540280637"},{"type":"electronic","value":"9783540316749"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11533962_22","type":"book-chapter","created":{"date-parts":[[2010,9,26]],"date-time":"2010-09-26T18:02:10Z","timestamp":1285524130000},"page":"246-257","source":"Crossref","is-referenced-by-count":1,"title":["Implementing Rollback-Recovery Coordinated Checkpoints"],"prefix":"10.1007","author":[{"given":"Clairton","family":"Buligon","sequence":"first","affiliation":[]},{"given":"S\u00e9rgio","family":"Cechin","sequence":"additional","affiliation":[]},{"given":"Ingrid","family":"Jansch-P\u00f4rto","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"22_CR1","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1145\/568522.568525","volume":"34","author":"E.N. Elnozahy","year":"2002","unstructured":"Elnozahy, E.N., Johnson, D.B., Wang, Y.M.: A Survey of Rollback-Recovery Protocols in Message-Passing Systems. ACM Computing Surveys\u00a034(3), 375\u2013408 (2002)","journal-title":"ACM Computing Surveys"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Elnozahy, E.N., Johnson, D.B., Zwaenepoel, W.: The performance of consistent checkpointing. In: Proc. 11th Symposium on Reliable Systems, pp. 39\u201347 (1992)","DOI":"10.1109\/RELDIS.1992.235144"},{"issue":"1","key":"22_CR3","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/214451.214456","volume":"3","author":"K.M. Chandy","year":"1985","unstructured":"Chandy, K.M., Lamport, L.: Distributed snapshots: Determining global states of distributed systems. ACM Transactions on Computer Systems\u00a03(1), 63\u201375 (1985)","journal-title":"ACM Transactions on Computer Systems"},{"issue":"3","key":"22_CR4","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1145\/3959.3962","volume":"3","author":"R.E. Strom","year":"1985","unstructured":"Strom, R.E., Yemini, S.A.: Optimistic recovery in distributed systems. ACM Transactions on Computer Systems\u00a03(3), 204\u2013226 (1985)","journal-title":"ACM Transactions on Computer Systems"},{"issue":"10","key":"22_CR5","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1109\/71.539735","volume":"7","author":"R. Prakash","year":"1996","unstructured":"Prakash, R., Singhal, M.: Low-cost checkpointing and failure recovery in mobile computing systems. IEEE Transactions on Parallel and Distributed Systems\u00a07(10), 1035\u20131048 (1996)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"22_CR6","unstructured":"Alvisi, L., et al.: An Analysis of communication-induced checkpointing. Technical Report, TR-99-01. Department of Computer Science, Univ. of Texas, Austin (1999)"},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s004460050003","volume":"13","author":"J.-M. H\u00e9lary","year":"2000","unstructured":"H\u00e9lary, J.-M., Mostefaoui, A., Raynal, M.: Communication-based prevention of useless checkpoints in distributed computations. Distributed Computing\u00a013, 29\u201343 (2000)","journal-title":"Distributed Computing"},{"issue":"1","key":"22_CR8","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/TSE.1987.232562","volume":"SE-13","author":"R. Koo","year":"1987","unstructured":"Koo, R., Toueg, S.: Checkpointing and rollback-recovery for distributed systems. IEEE Transactions on software engineering\u00a0SE-13(1), 23\u201331 (1987)","journal-title":"IEEE Transactions on software engineering"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Elnozahy, E.N., Zwaenepoel, W.: Manetho: transparent rollback-recovery with lo woverhead, limited rollback and fast output commit. IEEE Transactions on Computers, Special Issue on Fault-Tolerant Computing\u00a041(5), 526\u2013531","DOI":"10.1109\/12.142678"},{"key":"22_CR10","unstructured":"Cristian, F., Aguili, H., Strong, R.: Atomic broadcast: from simple message diffusion to Byzantine agreement. In: Proc. 15th IEEE Fault Tolerant Computer Systems, pp. 200\u2013206 (1995)"},{"issue":"3","key":"22_CR11","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1145\/357369.357371","volume":"1","author":"R.D. Schlichting","year":"1983","unstructured":"Schlichting, R.D., Schneider, F.B.: Fail-Stop processors: An approach to designing fault-tolerant computing systems. ACM Transactions on Computer Systems\u00a01(3), 222\u2013238 (1983)","journal-title":"ACM Transactions on Computer Systems"},{"key":"22_CR12","volume-title":"Fault tolerance in distributed systems","author":"P. Jalote","year":"1994","unstructured":"Jalote, P.: Fault tolerance in distributed systems. Prentice Hall, Englewood Cliffs (1994)"},{"key":"22_CR13","unstructured":"Cechin, S.L., Jansch-P\u00f4rto, I.: A New Efficient Coordinated Checkpointing. In: Proc. 2nd IEEE Latin American Test Workshop, Cancun, Mexico, pp. 56\u201361 (2001)"},{"issue":"3","key":"22_CR14","doi-asserted-by":"publisher","first-page":"872","DOI":"10.1145\/177492.177726","volume":"16","author":"L. Lamport","year":"1994","unstructured":"Lamport, L.: The temporal logic of actions. ACM Transactions on Programming Languages and Systems\u00a016(3), 872\u2013923 (1994)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"22_CR15","unstructured":"Cechin, S.L.: TLA formal proof of rollback recovery protocol. Technical Report (RP- 319). Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre, Brazil (2002)"},{"key":"22_CR16","unstructured":"Zhong, H., Nieh, J.: Crak: Linux checkpointing\/restart as a kernel module. Technical Report CUCS-014-01, Department of Computer Science, Columbia University, Columbia, USA (2001)"},{"key":"22_CR17","unstructured":"Rubini, A.: Linux device drivers. Market Books (1999)"},{"key":"22_CR18","unstructured":"Fontoura, A. B.: Evaluation of approaches for capturing the application data. MSc. Dissertation. Instituto de Inform\u00e1tica, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil (2002) (in Portuguese)"}],"container-title":["Lecture Notes in Computer Science","Advanced Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11533962_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:09:42Z","timestamp":1605643782000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11533962_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540280637","9783540316749"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11533962_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}