{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T15:40:11Z","timestamp":1739029211736,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642008863"},{"type":"electronic","value":"9783642008870"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00887-0_1","type":"book-chapter","created":{"date-parts":[[2009,3,19]],"date-time":"2009-03-19T13:49:36Z","timestamp":1237470576000},"page":"1-21","source":"Crossref","is-referenced-by-count":2,"title":["Dependability, Abstraction, and Programming"],"prefix":"10.1007","author":[{"given":"David","family":"Lomet","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Avi\u017eienis, A., Laprie, J.-C., Randell, B.: Fundamental Concepts of Computer System Dependability. In: IARP\/IEEE-RAS Workshop, Seoul (2001)"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Barga, R., Chen, S., Lomet, D.: Improving Logging and Recovery Performance in Phoenix\/App. In: ICDE Conference, Boston, pp. 486\u2013497 (2004)","DOI":"10.1109\/ICDE.2004.1320021"},{"issue":"2","key":"1_CR3","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/565117.565139","volume":"31","author":"R. Barga","year":"2002","unstructured":"Barga, R., Lomet, D.: Phoenix Project: Fault Tolerant Applications. SIGMOD Record\u00a031(2), 94\u2013100 (2002)","journal-title":"SIGMOD Record"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Barga, R., Lomet, D., Paparizos, S., Yu, H., Chandrasekaran, S.: Persistent Applications via Automatic Recovery. In: IDEAS Conference, Hong Kong, pp. 258\u2013267 (2003)","DOI":"10.1109\/IDEAS.2003.1214935"},{"issue":"3","key":"1_CR5","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1145\/1013202.1013205","volume":"4","author":"R. Barga","year":"2004","unstructured":"Barga, R., Lomet, D., Shegalov, G., Weikum, G.: Recovery Guarantees for Internet Applications. ACM Trans. on Internet Technology\u00a04(3), 289\u2013328 (2004)","journal-title":"ACM Trans. on Internet Technology"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Barga, R., Lomet, D., Weikum, G.: Recovery Guarantees for Multi-tier Applications. In: ICDE Conference, San Jose, pp. 543\u2013554 (2002)","DOI":"10.1109\/ICDE.2002.994773"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Bernstein, P., Hsu, M., Mann, B.: Implementing Recoverable Requests Using Queues. In: SIGMOD Conference, Atlantic City, pp. 112\u2013122 (1990)","DOI":"10.1145\/93597.98721"},{"key":"1_CR8","volume-title":"Principles of Transaction Processing","author":"P.A. Bernstein","year":"1996","unstructured":"Bernstein, P.A., Newcomer, E.: Principles of Transaction Processing. Morgan Kaufmann, San Francisco (1996)"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Borg, A., Baumbach, J., Glazer, S.: A message system supporting fault tolerance. In: Symposium on Operating Systems Principles, pp. 90\u201399 (1983)","DOI":"10.1145\/800217.806617"},{"issue":"3","key":"1_CR10","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1145\/568522.568525","volume":"34","author":"E.N. Elnozahy","year":"2002","unstructured":"Elnozahy, E.N., Alvisi, L., Wang, Y.-M., Johnson, D.B.: A survey of rollback-recovery protocols in message-passing systems. ACM Comput. Surv.\u00a034(3), 375\u2013408 (2002)","journal-title":"ACM Comput. Surv."},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Fr\u00f8lund, S., Guerraoui, R.: A Pragmatic Implementation of e-Transactions. In: IEEE Symposium on Reliable Distributed Systems, N\u00fcrnberg, pp. 186\u2013195 (2000)","DOI":"10.1109\/RELDI.2000.885406"},{"key":"1_CR12","unstructured":"Gray, J.: Keynote address Internet Reliability. In: 2nd HDCC Workshop, Santa Cruz, CA (May 2001)"},{"key":"1_CR13","volume-title":"Transaction Processing: Concepts and Techniques","author":"J. Gray","year":"1993","unstructured":"Gray, J., Reuter, A.: Transaction Processing: Concepts and Techniques. Morgan Kaufmann, San Francisco (1993)"},{"issue":"2","key":"1_CR14","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1093\/comjnl\/43.2.95","volume":"43","author":"H.A.R. Hoare","year":"2000","unstructured":"Hoare, H.A.R.: As quoted in B. Randell: Turing Memorial Lecture Facing Up to Faults. Comput. J.\u00a043(2), 95\u2013106 (2000)","journal-title":"Comput. J."},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Lomet, D.: Robust Web Services via Interaction Contracts. In: TES Workshop, Toronto, pp. 1\u201314 (2004)","DOI":"10.1007\/978-3-540-31811-8_1"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Lomet, D.: Persistent Middle Tier Components without Logging. In: IDEAS Conference, Montreal, pp. 37\u201346 (2005)","DOI":"10.1109\/IDEAS.2005.43"},{"key":"1_CR17","unstructured":"Lomet, D.: Faithless Replay. for Persistent Logless Mid-Tier Components. Microsoft Research Technical Report MSR-TR-2008-50 (April 2008)"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Narasimhan, P., Moser, L., Melliar-Smith, P.M.: Lessons Learned in Building a Fault-Tolerant CORBA System. In: DSN 2002, pp. 39\u201344 (2002)","DOI":"10.1109\/DSN.2002.1028884"},{"key":"1_CR19","unstructured":"MSDN Library: Persistence Overview, http:\/\/msdn.microsoft.com\/workshop\/author\/persistence\/overview.asp"},{"key":"1_CR20","unstructured":"OMG: CORBA 2000. Fault Tolerant CORBA Spec V1.0, http:\/\/cgi.omg.org\/cgi-bin\/doc?ptc\/00-04-04"},{"key":"1_CR21","unstructured":"Patterson, D.: Recovery Oriented Computing (talk) (September 2001), http:\/\/roc.cs.berkeley.edu"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Shegalov, G., Weikum, G.: Formal Verification of Web Service Interaction Contracts. IEEE SCC\u00a0(2), 525\u2013528 (2008)","DOI":"10.1109\/SCC.2008.67"},{"key":"1_CR23","unstructured":"Sun 2001. Enterprise Java Beans Specification, Vers. 2.0 (2001), http:\/\/java.sun.com\/products\/ejb\/docs.html"},{"key":"1_CR24","volume-title":"Transactional Information Systems","author":"G. Weikum","year":"2002","unstructured":"Weikum, G., Vossen, G.: Transactional Information Systems. Morgan Kaufmann, San Francisco (2002)"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00887-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T15:25:48Z","timestamp":1739028348000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00887-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642008863","9783642008870"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00887-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}