{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:46:23Z","timestamp":1725551183281},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540664888"},{"type":"electronic","value":"9783540482499"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48249-0_17","type":"book-chapter","created":{"date-parts":[[2010,3,29]],"date-time":"2010-03-29T17:13:11Z","timestamp":1269882791000},"page":"187-201","source":"Crossref","is-referenced-by-count":0,"title":["Extendable Ground-to-Air Communication Architecture for CoDySa"],"prefix":"10.1007","author":[{"given":"Algirdas","family":"Pakstas","sequence":"first","affiliation":[]},{"given":"Igor","family":"Shagaev","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,14]]},"reference":[{"key":"17_CR1","unstructured":"ODIAC-Operational Requirements for Air Traffic Management (ATM) Air\/Ground Data Communications Services, EUROCONTROL 1998. (\n                    http:\/\/www.eurocontrol.be\/projects\/eatchip\/odiac\/\n                    \n                  )"},{"key":"17_CR2","unstructured":"EATCHIP PHASE III Human Machine Interface (HMI). EUROCONTROL, 1998 (http:\/\/www.eurocontrol.be\/projects\/eatchip\/hmi\/)"},{"key":"17_CR3","unstructured":"Shagaev, I., Pliaskota, S. BASS: on Board Active Safety System. Active Control of Safety. Flight Review, No. 7-8 (1996)"},{"key":"17_CR4","first-page":"117","volume-title":"Yet Another Approach to Classification Of Redundancy","author":"I. Shagaev","year":"1990","unstructured":"Shagaev, I. Yet Another Approach to Classification Of Redundancy. In: IMEKO Congress, Helsinki, Finland (1990) 117\u2013124"},{"key":"17_CR5","unstructured":"Shagaev, I., et al. Fault Tolerant RAM With Extremely High Reliability, Part 1. Automatic and Remote Control, No.3 (1992)"},{"key":"17_CR6","unstructured":"Shagaev, I., et al. Fault Tolerant RAM with Extremely High Reliability, Part 2. Automatic and Remote Control, No.2 (1993)"},{"key":"17_CR7","unstructured":"The Java language: a white paper. Sun Microsystems (1995) \n                    http:\/\/java.sun.com\/"},{"key":"17_CR8","volume-title":"Real-Time Java","author":"K. Nilsen","year":"1996","unstructured":"Nilsen, K. Real-Time Java (v.1.1) Iowa State University, Ames, Iowa (1996) \n                    http:\/\/www.newmonics.com"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Dean, D., Felten, E. W., and Wallach, D. S. Java Security: From HotJava to Netscape and Beyond. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, California (1996) 190\u2013200","DOI":"10.1109\/SECPRI.1996.502681"},{"key":"17_CR10","first-page":"125","volume":"2","author":"P. Niinimaki","year":"1998","unstructured":"Niinimaki P., Markkanen P., Kajava J. Java Applets and Security. In: Databases and Information Systems, Proc. 3rd IEEE International Baltic Workshop, April 15-17, Riga, Latvia, Vol. 2 (1998) 125\u2013136","journal-title":"Proc. 3rd IEEE International Baltic Workshop"},{"key":"17_CR11","volume-title":"Introducing Juice","author":"M. Franz","year":"1996","unstructured":"Franz, M., Kistler, T. Introducing Juice. Irvine: University of California (1996) \n                    http:\/\/caesar.ics.uci.edu\/ juice\/index.html"},{"issue":"N 7","key":"17_CR12","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1002\/spe.4380180707","volume":"18","author":"N. Wirth","year":"1988","unstructured":"Wirth, N. The Programming Language Oberon. Software \u2014 Practice and Experience, Vol.18, N 7 (1988) 671\u2013691.","journal-title":"Software \u2014 Practice and Experience"},{"issue":"12","key":"17_CR13","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1002\/spe.4380251204","volume":"25","author":"M. Brandis","year":"1995","unstructured":"Brandis, M., Crelier, R., Franz, M., and Templ, J. The Oberon System Family. Software-Practice and Experience, Vol.25 No12 (1995) 1331\u20131366","journal-title":"Software-Practice and Experience"},{"key":"17_CR14","isbn-type":"print","volume-title":"Code-Generation On-the-Fly: A Key to Portable Software","author":"M. Franz","year":"1994","unstructured":"Franz, M. Code-Generation On-the-Fly: A Key to Portable Software. Z\u00fcrich: Verlag der Fachvereine, ISBN 3-7281-2115-0 (1994)","ISBN":"http:\/\/id.crossref.org\/isbn\/3728121150"},{"issue":"12","key":"17_CR15","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/265563.265576","volume":"40","author":"M. Franz","year":"1997","unstructured":"Franz, M., Kistler, T. Slim Binaries. Communications of the ACM, Vol.40, No 12 (1997) 87\u201394","journal-title":"Communications of the ACM"},{"key":"17_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/3-540-62852-5_19","volume-title":"Mobile Object Systems: Towards the Programmable Internet","author":"M. Franz","year":"1997","unstructured":"Franz, M. Adaptive Compression of Syntax Trees and Iterative Dynamic Code Optimization: Two Basic Technologies for Mobile-Object Systems. In: Vitek, J. and Tschudin, C. (Eds.), Mobile Object Systems: Towards the Programmable Internet, Springer Lecture Notes in Computer Science, No. 1222 (1997) 263\u2013276"},{"issue":"6","key":"17_CR17","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MC.1984.1659158","volume":"17","author":"T. A. Welch","year":"1984","unstructured":"Welch, T. A. A Technique for High-Performance Data Compression. IEEE Computer, Vol. 17, No 6 (1984) 8\u201319","journal-title":"IEEE Computer"},{"issue":"5","key":"17_CR18","first-page":"521","volume":"4","author":"M. Franz","year":"1998","unstructured":"Franz, M. Open Standards Beyond Java: On the Future of Mobile Code for the Internet. Journal of Universal Computer Science, Vol. 4, No:5 (1998) 521\u2013532","journal-title":"Journal of Universal Computer Science"},{"key":"17_CR19","unstructured":"Yellin, F. Low Level Security in Java. In: Fourth International World Wide Web Conference, World Wide Web Consortium, Boston, Massachusetts (1995) \n                    http:\/\/www.w3.org\/pub\/Conferences\/WWW4\/Papers\/197"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48249-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T21:00:41Z","timestamp":1550955641000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48249-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540664888","9783540482499"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-48249-0_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}