{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T21:40:22Z","timestamp":1737582022732,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770916"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77092-3_36","type":"book-chapter","created":{"date-parts":[[2007,11,24]],"date-time":"2007-11-24T07:59:32Z","timestamp":1195891172000},"page":"410-421","source":"Crossref","is-referenced-by-count":5,"title":["An Efficient Handoff Strategy for Mobile Computing Checkpoint System"],"prefix":"10.1007","author":[{"given":"Chaoguang","family":"Men","sequence":"first","affiliation":[]},{"given":"Zhenpeng","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Dongsheng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"36_CR1","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1145\/568522.568525","volume":"34","author":"E.N. Elnozahy","year":"2002","unstructured":"Elnozahy, E.N., Alvisi, L., Wang, Y.M., Johnson, D.B.: A Survey of Rollback-Recovery Protocols in Message-Passing Systems. ACM Computing Surveys\u00a034(3), 375\u2013408 (2002)","journal-title":"ACM Computing Surveys"},{"key":"36_CR2","unstructured":"Ching, E.Y., Phipatanasuphorn, V.: A Survey of Checkpoint-Recovery Techniques in Wireless Networks (2002), http:\/\/www.cae.wisc.edu\/~ece753\/papers\/Paper_9.pdf"},{"issue":"4","key":"36_CR3","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1109\/TMC.2002.1175540","volume":"1","author":"T. Park","year":"2002","unstructured":"Park, T., Woo, N., Yeom, H.Y.: An Efficient Optimistic Message Logging Scheme for Recoverable Mobile Computing Systems. IEEE Transactions on Mobile Computing\u00a01(4), 265\u2013277 (2002)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"36_CR4","unstructured":"Park, T., Woo, N., Yeom, H.Y.: An Efficient Recovery Scheme for Mobile Computing Environments. In: The 8th International Conference on Parallel and Distributed Systems (ICPADS), Kyongju City, Korea, pp. 53\u201360 (2001)"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Pradhan, D.K., Krishna, P., Vaiday, N.H.: Recoverable Mobile Environment: Design and Trade-off Analysis. In: Proc. of the 26th Int\u2019l Symp. on Fault Tolerant Computing System, Sendai, Japan, pp. 16\u201325 (1996)","DOI":"10.1109\/FTCS.1996.534590"},{"issue":"1","key":"36_CR6","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/TR.2004.837518","volume":"54","author":"I.-R. Chen","year":"2005","unstructured":"Chen, I.-R., Gu, B., George, S.E., Cheng, S.-T.: On failure recoverability of client-server applications in mobile wireless environments. IEEE Transactions on Reliability\u00a054(1), 115\u2013122 (2005)","journal-title":"IEEE Transactions on Reliability"}],"container-title":["Lecture Notes in Computer Science","Embedded and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77092-3_36.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T21:07:53Z","timestamp":1737580073000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77092-3_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770916"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77092-3_36","relation":{},"subject":[]}}