{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:23:16Z","timestamp":1742397796627,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540287001"},{"type":"electronic","value":"9783540319252"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11549468_71","type":"book-chapter","created":{"date-parts":[[2010,10,25]],"date-time":"2010-10-25T17:18:34Z","timestamp":1288027114000},"page":"644-653","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A Hybrid Message Logging-CIC Protocol for Constrained Checkpointability"],"prefix":"10.1007","author":[{"given":"Fran\u00e7oise","family":"Baude","sequence":"first","affiliation":[]},{"given":"Denis","family":"Caromel","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Delb\u00e9","sequence":"additional","affiliation":[]},{"given":"Ludovic","family":"Henrio","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"71_CR1","unstructured":"Aglets Software Development Kit. IBM (1999), http:\/\/www.trl.ibm.com\/aglets\/"},{"key":"71_CR2","doi-asserted-by":"crossref","unstructured":"Ramkumar, B., Strumpen, V.: Portable checkpointing for heterogenous architectures. In: Fault-Tolerant Parallel and Distributed Systems, pp. 73\u201392 (1998)","DOI":"10.1007\/978-1-4615-5449-3_4"},{"key":"71_CR3","volume-title":"Dependable Systems and Networks - Student Forum","author":"C. Delb\u00e9","year":"2004","unstructured":"Delb\u00e9, C.: Causal ordering of asynchronous request services. In: Dependable Systems and Networks - Student Forum, June 2004, IEEE, Los Alamitos (2004)"},{"issue":"4","key":"71_CR4","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s004460050018","volume":"9","author":"B. Charron-Bost","year":"1996","unstructured":"Charron-Bost, B., Mattern, F., Tel, G.: Synchronous, asynchronous, and causally ordered communications. Distributed Computing\u00a09(4), 173\u2013191 (1996)","journal-title":"Distributed Computing"},{"key":"71_CR5","unstructured":"Briatico, D., Ciuffoletti, A., Simoncini, L.: A distributed domino-effect free recovery algorithm. In: IEEE International Symposium on Reliability, Distributed Software, and Databases, pp. 207\u2013215 (1984)"},{"key":"71_CR6","volume-title":"31st ACM Symposium on Principles of Programming Languages","author":"D. Caromel","year":"2004","unstructured":"Caromel, D., Henrio, L., Serpette, B.: Asynchronous and deterministic objects. In: 31st ACM Symposium on Principles of Programming Languages, ACM Press, New York (2004)"},{"key":"71_CR7","first-page":"1043","volume-title":"Concurrency Practice and Experience","author":"D. Caromel","year":"1998","unstructured":"Caromel, D., Klauser, W., Vayssiere, J.: Towards seamless computing and metacomputing in java. In: Fox, G.C. (ed.) Concurrency Practice and Experience, November 1998, vol.\u00a010, pp. 1043\u20131061. Wiley & Sons, Ltd., Chichester (1998)"},{"key":"71_CR8","doi-asserted-by":"crossref","unstructured":"Manivannan, D., Singhal, M.: A low-overhead recovery technique using quasisynchronous checkpointing. In: Proceedings of the 16th ICDCS, pp. 100\u2013107 (1996)","DOI":"10.1109\/ICDCS.1996.507906"},{"key":"71_CR9","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1109\/71.780865","volume":"10","author":"D. Manivannan","year":"1999","unstructured":"Manivannan, D., Singhal, M.: Quasi-synchronous checkpointing: Models, characterization, and classification. IEEE Transactions on Parallel and Distributed Systems\u00a010, 703\u2013713 (1999)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"71_CR10","unstructured":"Baude, F., Caromel, D., Delb\u00e9, C., Henrio, L.: A fault tolerance protocol for asp calculus: Design and proof. Technical Report RR-5246, INRIA (2004)"},{"issue":"10","key":"71_CR11","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/966049.781513","volume":"38","author":"G. Bronevetsky","year":"2003","unstructured":"Bronevetsky, G., Marques, D., Pingali, K., Stodghill, P.: Automated applicationlevel checkpointing of mpi programs. SIGPLAN Not.\u00a038(10), 84\u201394 (2003)","journal-title":"SIGPLAN Not."},{"key":"71_CR12","unstructured":"Ruiz-Garcia, J.C., Killijian, M.O., Fabre, J.C., Chiba, S.: Optimized object state checkpointing using compile-time reflection. In: Workshop on Embedded Fault- Tolerant Systems, pp. 46\u201348 (1998)"},{"key":"71_CR13","unstructured":"Howell, J.: Straightforward java persistence through checkpointing. In: Proceedings of the 3rd International Workshop on Persistence and Java, pp. 322\u2013334 (1998)"},{"key":"71_CR14","unstructured":"Plank, J.S., Beck, M., Kingsley, G., Li, K.: Libckpt: Transparent checkpointing under Unix. In: Usenix Winter Technical Conference, January 1995, pp. 213\u2013223 (1995)"},{"key":"71_CR15","doi-asserted-by":"crossref","unstructured":"Alvisi, L., Elnozahy, E.N., Rao, S., Husain, S., Mel, A.D.: An analysis of communication induced checkpointing. In: Symposium on Fault-Tolerant Computing, pp. 242\u2013249 (1999)","DOI":"10.1109\/FTCS.1999.781058"},{"key":"71_CR16","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1145\/357369.357371","volume":"1","author":"R.D. Schlichting","year":"1983","unstructured":"Schlichting, R.D., Schneider, F.B.: Fail-stop processors: an approach to designing fault-tolerant computing systems. ACM Transactions on Computer Systems\u00a01, 222\u2013238 (1983)","journal-title":"ACM Transactions on Computer Systems"},{"key":"71_CR17","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1145\/3959.3962","volume":"3","author":"R.E. Strom","year":"1985","unstructured":"Strom, R.E., Yemini, S.: Optimistic recovery in distributed systems. ACM Transactions on Computer Systems\u00a03, 204\u2013226 (1985)","journal-title":"ACM Transactions on Computer Systems"},{"key":"71_CR18","unstructured":"Bouchenak, S.: Pickling threads state in the java system. In: Third European Research Seminar on Advances in Distributed Systems (1999)"},{"issue":"2","key":"71_CR19","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1145\/226643.226647","volume":"43","author":"T.D. Chandra","year":"1996","unstructured":"Chandra, T.D., Toueg, S.: Unreliable failure detectors for reliable distributed systems. Journal of the ACM\u00a043(2), 225\u2013267 (1996)","journal-title":"Journal of the ACM"}],"container-title":["Lecture Notes in Computer Science","Euro-Par 2005 Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11549468_71","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T05:22:17Z","timestamp":1740633737000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11549468_71"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540287001","9783540319252"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11549468_71","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}