{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T17:20:55Z","timestamp":1725643255426},"publisher-location":"London","reference-count":12,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9783540196464"},{"type":"electronic","value":"9781447131786"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1990]]},"DOI":"10.1007\/978-1-4471-3178-6_18","type":"book-chapter","created":{"date-parts":[[2011,12,14]],"date-time":"2011-12-14T07:53:50Z","timestamp":1323849230000},"page":"259-273","source":"Crossref","is-referenced-by-count":1,"title":["Veritos Distributed Operating System Project \u2014 An Overview \u2014"],"prefix":"10.1007","author":[{"given":"Uwe","family":"Baumgarten","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"The Programming Language ADA - Reference Manual, American National Standards Institute, Inc., ANSI\/MIL-STD- 1815A-1988, LNCS, 155, Springer-Verlag, 1983"},{"key":"18_CR2","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1093\/comjnl\/26.4.360","volume":"26","author":"MP Atkinson","year":"1983","unstructured":"Atkinson, M.P., Bailey, P.J., Chisholm, K.J., Cockshott, P.W., Morrision, R., An Approach to Persistent Programming, The Computer Journal, Vol. 26, No. 4, 1983","journal-title":"The Computer Journal"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"U. Baumgarten, R. Kewitz, D. K\u00f6nig, P.P. Spies, Werkzeuge zur Entwicklung Verteilter Systeme, GI - 18. Jahrestagung II, Hamburg, Oktober 1988, Informatik-Fachberichte, 188, Springer-Verlag, 1988 (in german, title: \u201cTools for the Development of Distributed Systems\u201d)","DOI":"10.1007\/978-3-642-74135-7_43"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Eckert, C., Homogeneous Memory-Management in the Context of the Veritos - Project, Proceedings of the Workshop on Computer Architectures to Support Security and Persistence of Information, Bremen, May 1990, in this issue","DOI":"10.1007\/978-1-4471-3178-6_19"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Fabry, R.S., Capability-Based Addressing, CACM, Vol. 17, No. 7, July 1974, pp.403\u2013412","DOI":"10.1145\/361011.361070"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Hoare, C.A.R., Monitors: An Operating System Structuring Concept, CACM, Vol. 17, No. 10, October 1974","DOI":"10.1145\/355620.361161"},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1145\/35037.42182","volume":"6","author":"E Jul","year":"1988","unstructured":"Jul, E., Levy, H., Hutchinson, N., Black, A., Fine-Grained Mobility in the Emerald System, ACM TOCS, V01.6, No. 1, February 1988, pp.109\u2013133","journal-title":"ACM TOCS"},{"key":"18_CR8","volume-title":"Object-oriented Software Construction","author":"B Meyer","year":"1988","unstructured":"Meyer, Bertrand, Object-oriented Software Construction, Prentice Hall, New York, 1988"},{"key":"18_CR9","first-page":"38","volume":"13","author":"J Nehmer","year":"1990","unstructured":"Nehmer, J., Schmutz, H., Steinmetz, R., Netz-Betriebssystem\/ver teil tes Betriebssystem, Informatik-Spektrum, Vol. 13, No. 1, 1990, pp. 38\u201339","journal-title":"Informatik-Spektrum"},{"key":"18_CR10","volume-title":"A Programmer\u2019s View of the Intel 432 System","author":"EI Organick","year":"1983","unstructured":"Organick, E.I., A Programmer\u2019s View of the Intel 432 System, McGraw-Hill Book Company, New York, 1983"},{"key":"18_CR11","unstructured":"Spies, P.P., Sprachkonzepte f\u00fcr die Konstruktion Verteilter Systeme, Interne Berichte, Fachbereich Informatik, Universit\u00e4t Oldenburg, Bericht SA\/88\/2, August 1988 (in german, title: \u201cLanguage Concepts for the Construction of Distributed Systems\u201d)"},{"key":"18_CR12","unstructured":"Spies, P.P., Verteilte Systeme - Eine noch zu nutzende Chance -, 11. ITG\/GI Fachtagung, Architektur von Rechensystemen, P. M\u00fcller-Stoy (Hrsg.), M\u00fcnchen, M\u00e4rz 1990, pp. 415\u2013428"}],"container-title":["Workshops in Computing","Security and Persistence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4471-3178-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T22:28:47Z","timestamp":1561069727000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4471-3178-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990]]},"ISBN":["9783540196464","9781447131786"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-1-4471-3178-6_18","relation":{},"ISSN":["1431-1682"],"issn-type":[{"type":"print","value":"1431-1682"}],"subject":[],"published":{"date-parts":[[1990]]}}}