{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,19]],"date-time":"2025-01-19T21:40:23Z","timestamp":1737322823900,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540426806"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-45453-5_74","type":"book-chapter","created":{"date-parts":[[2007,7,20]],"date-time":"2007-07-20T21:34:16Z","timestamp":1184967256000},"page":"574-581","source":"Crossref","is-referenced-by-count":0,"title":["QOS-based Checkpoint ProtOcOl for Multimedia Network Systems"],"prefix":"10.1007","author":[{"given":"Shinji","family":"Osada","sequence":"first","affiliation":[]},{"given":"1Hiroaki","family":"Higaki","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"74_CR1","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1145\/1994.2207","volume":"9","author":"P.A. Bernstein","year":"1984","unstructured":"Bernstein, P.A. and Goodman, N., \u201cAn Algorithm for Concurrency Control and Recovery in Replicated Distributed Databases,\u201d ACM Trans. on Database Systems, Vol. 9, No. 4, pp. 1197\u20131207 (1984).","journal-title":"ACM Trans. on Database Systems"},{"doi-asserted-by":"crossref","unstructured":"Bhargava, B. and Liao, S.R., \u201cIndependent Check-pointing and Concurrent Rollback for Recovery in Distributed Systems,\u201d The 7th International Symposium on Reliable Distributed Steins, pp. 3\u201312 (1988).","key":"74_CR2","DOI":"10.1109\/RELDIS.1988.25775"},{"issue":"1","key":"74_CR3","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/214451.214456","volume":"3","author":"K.M. Chaudy","year":"1985","unstructured":"Chaudy, K.M. and Lamport, L., \u201cDistributed Snap shot: Determining Global States of Distributed Systems,\u201d ACM Trams. on Computer Systems, Vol. 3, No. 1, pp. 63\u201375 (1985).","journal-title":"ACM Trams. on Computer Systems"},{"doi-asserted-by":"crossref","unstructured":"Cristiau, F. and Jahaiiai, F., \u201cA Timestamp-Based Checkpointing Protocol for Long Lived Distributed Computations,\u201d Reliable Distributed Software and Database Systems, pp. 12\u201320 (1991).","key":"74_CR4","DOI":"10.1109\/RELDIS.1991.145399"},{"unstructured":"Douglas, E.C., \u201cInternetworking with TCP\/IP,\u201d Prentice-Hall (1991).","key":"74_CR5"},{"unstructured":"Elozahy, E.N., Johnson, D.B. and Wang, Y.M., \u201cA Survey of Rollback-Recovery Protocols in Message-Passing Systems,\u201d Technical Note of Carnegie Mellon University, CMU-CS-96-181 (1996).","key":"74_CR6"},{"doi-asserted-by":"crossref","unstructured":"Elnozahy, E.N., Johnson, D.B. and Zwaenepoel, W., \u201cThe performance of consistent checkpointing,\u201d The 11th International Symposium on Reliable Distributed Systems, pp. 39\u201347 (1992).","key":"74_CR7","DOI":"10.1109\/RELDIS.1992.235144"},{"doi-asserted-by":"crossref","unstructured":"Giffrod, D.K., \u201cWeighted Voting for Replication Data, \u201d The 7th ACM Symposium on Operating Systems, pp. 150\u2013162 (1979).","key":"74_CR8","DOI":"10.1145\/800215.806583"},{"doi-asserted-by":"crossref","unstructured":"Higaki, H., Nemoto, N., Tanaka, K. and Takizawa, M., \u201cProtocol for Groups of Pseudo-Active Replication Objects,\u201d International Workshop on Object Oriented Realtime Distributed Systems, pp. 35\u201341 (1999).","key":"74_CR9","DOI":"10.1109\/WORDSF.1999.842330"},{"doi-asserted-by":"crossref","unstructured":"Juang, T.T.Y. and Venkatesan, S., \u201cEfficient Algorithms for Crash Recovery in Distributed Systems,\u201d The 10th Conference on Foundations of Software Technology and Theoretical Computer Science, pp. 349\u2013361 (1990).","key":"74_CR10","DOI":"10.1007\/3-540-53487-3_56"},{"doi-asserted-by":"crossref","unstructured":"Johnson, D.B., \u201cEfficient Transparent Optimistic Rollback Recovery for Distributed Application Programs,\u201d The 12th International Symposium on Reliable Distributed Steins, pp. 86\u201395 (1993).","key":"74_CR11","DOI":"10.21236\/ADA268981"},{"issue":"1","key":"74_CR12","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/TSE.1987.232562","volume":"SE-13","author":"R. Koo","year":"1987","unstructured":"Koo, R. and Toueg, S., \u201cCheckpointing and Rollback-Recovery for Distributed Systems,\u201d IEEE Trans. on Software Engineering, Vol. SE-13, No. 1, pp. 23\u201331 (1987).","journal-title":"IEEE Trans. on Software Engineering"},{"issue":"9","key":"74_CR13","doi-asserted-by":"publisher","first-page":"996","DOI":"10.1109\/12.83661","volume":"40","author":"A. Kumar","year":"1991","unstructured":"Kumar, A., \u201cHierarchical Quorum Consensus: A New Algorithm For Mamagiug Replicated Data,\u201d IEEE Trans. on Computers, Vol. 40, No. 9, pp. 996\u20131004 (1991).","journal-title":"IEEE Trans. on Computers"},{"doi-asserted-by":"crossref","unstructured":"Lampsou, B.W., Paul, M. and Siegert, H.J., \u201cDistributed Systems-Architecture and Implementation,\u201d Springer-Verlag, pp. 246\u2013265 (1981).","key":"74_CR14","DOI":"10.1007\/3-540-10571-9_11"},{"unstructured":"Mathew, E. H. and Russell, M. S., \u201cMULTIMEDIA COMPUTING-Case Studies from MIT Project Athena,\u201d Addison-Wesley (1993).","key":"74_CR15"},{"unstructured":"Paukaj, J., \u201cFault Tolerance in Distributed Systems,\u201d Prentice Hall, pp.185\u2013213 (1994).","key":"74_CR16"},{"issue":"7","key":"74_CR17","doi-asserted-by":"publisher","first-page":"936","DOI":"10.1109\/32.42736","volume":"14","author":"C.A. Pu","year":"1988","unstructured":"Pu, C.A., Noe, D.D. and Proudfoot, A., \u201cRegeneration of Replicated objects: A Technique and its Eden Implementation,\u201d IEEE Trans. on Software Engineering, Vol. 14, No. 7, pp. 936\u2013945 (1988).","journal-title":"IEEE Trans. on Software Engineering"},{"unstructured":"Shimamura, K., Tanaka., K. and Takizawa, M., \u201cGroup Protocol for Exchanging Multimedia Objects in a Group,\u201d 2000 ICDCS Workshop on Group Computation and Comninunications, pp. 33\u201340 (2000).","key":"74_CR18"},{"doi-asserted-by":"crossref","unstructured":"Silva, L.M. and Silva, J.G., \u201cGlobal Checkpointing for Distributed Programs,\u201d The 11th International Symposium on Reliable Distributed Systems, pp. 155\u2013162 (1992).","key":"74_CR19","DOI":"10.1109\/RELDIS.1992.235131"},{"key":"74_CR20","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/0020-0190(87)90203-1","volume":"25","author":"K. Venkatesh","year":"1987","unstructured":"Venkatesh, K., Radhakrishnan, T. and Li, H.F., \u201cOptimal and Local Recording for Domino-Free Rollback Recovery,\u201d Information Processing Letters, Vol. 25, pp. 295\u2013303 (1987).","journal-title":"Information Processing Letters"},{"unstructured":"Wood, W.G., \u201cA Decentralized Recovery Protocol,\u201d The 11th International Symposium on Fault Tolerant Computing Systems, pp. 159\u2013164 (1981).","key":"74_CR21"}],"container-title":["Lecture Notes in Computer Science","Advances in Multimedia Information Processing \u2014 PCM 2001"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45453-5_74.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,19]],"date-time":"2025-01-19T20:59:56Z","timestamp":1737320396000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45453-5_74"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540426806"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-45453-5_74","relation":{},"subject":[]}}