{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:15:57Z","timestamp":1742912157355,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642160226"},{"type":"electronic","value":"9783642160233"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16023-3_34","type":"book-chapter","created":{"date-parts":[[2010,9,19]],"date-time":"2010-09-19T20:41:49Z","timestamp":1284928909000},"page":"420-434","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Lightweight Live Migration for High Availability Cluster Service"],"prefix":"10.1007","author":[{"given":"Bo","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Binoy","family":"Ravindran","sequence":"additional","affiliation":[]},{"given":"Changsoo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,9,20]]},"reference":[{"key":"34_CR1","unstructured":"Kopper, K.: The Linux Enterprise Cluster: build a highly available cluster with commodity hardware and free software. No Starch Press (2004)"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing. Technical report (2009)","DOI":"10.1145\/1721654.1721672"},{"key":"34_CR3","unstructured":"Blake, V.: Five nines: A telecom myth. Communications Technology (2009)"},{"key":"34_CR4","volume-title":"Fault-Tolerant Real-Time Systems: The Problem of Replica Determinism","author":"S. Poledna","year":"1996","unstructured":"Poledna, S.: Fault-Tolerant Real-Time Systems: The Problem of Replica Determinism. Kluwer Academic Publishers, Dordrecht (1996)"},{"key":"34_CR5","volume-title":"Distributed Systems","author":"S. Mullender","year":"1993","unstructured":"Mullender, S.: Distributed Systems. Addison Wesley Publishing Company, Reading (1993)"},{"key":"34_CR6","unstructured":"Carwardine, J.: Providing open architecture high availability solutions. HA forum (2005)"},{"key":"34_CR7","first-page":"273","volume-title":"NSDI 2005: Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation","author":"C. Clark","year":"2005","unstructured":"Clark, C., Fraser, K., Hand, S., Hansen, J.G., Jul, E., Limpach, C., Pratt, I., Warfield, A.: Live migration of virtual machines. In: NSDI 2005: Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation, pp. 273\u2013286. USENIX Association, Berkeley (2005)"},{"issue":"2","key":"34_CR8","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/564585.564601","volume":"33","author":"S. Gilbert","year":"2002","unstructured":"Gilbert, S., Lynch, N.: Brewer\u2019s conjecture and the feasibility of consistent, available, partition-tolerant web services. SIGACT News\u00a033(2), 51\u201359 (2002)","journal-title":"SIGACT News"},{"issue":"2","key":"34_CR9","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/1131322.1131328","volume":"40","author":"M.F. Mergen","year":"2006","unstructured":"Mergen, M.F., Uhlig, V., Krieger, O., Xenidis, J.: Virtualization for high-performance computing. SIGOPS Oper. Syst. Rev.\u00a040(2), 8\u201311 (2006)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"34_CR10","unstructured":"Cully, B., Lefebvre, G., Meyer, D., Feeley, M., Hutchinson, N., Warfield, A.: Remus: high availability via asynchronous virtual machine replication. In: NSDI 2008: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, pp. 161\u2013174. USENIX Association (2008)"},{"key":"34_CR11","first-page":"1","volume-title":"SOSP 1995: Proceedings of the fifteenth ACM symposium on Operating systems principles","author":"T.C. Bressoud","year":"1995","unstructured":"Bressoud, T.C., Schneider, F.B.: Hypervisor-based fault tolerance. In: SOSP 1995: Proceedings of the fifteenth ACM symposium on Operating systems principles, pp. 1\u201311. ACM, New York (1995)"},{"key":"34_CR12","unstructured":"Aguilera, M.K., Spence, S., Veitch, A.: Olive: distributed point-in-time branching storage for real systems. In: NSDI 2006: Proceedings of the 3rd conference on Networked Systems Design & Implementation, Berkeley, CA, USA, pp. 27\u201327 (2006)"},{"key":"34_CR13","volume-title":"High Availability: Design, Techniques and Processes","author":"M. Hawkins","year":"2000","unstructured":"Hawkins, M., Piedad, F.: High Availability: Design, Techniques and Processes. Prentice Hall PTR, Upper Saddle River (2000)"},{"key":"34_CR14","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1145\/233269.233330","volume-title":"SIGMOD 1996: Proceedings of the 1996 ACM SIGMOD international conference on Management of data","author":"J. Gray","year":"1996","unstructured":"Gray, J., Helland, P., O\u2019Neil, P., Shasha, D.: The dangers of replication and a solution. In: SIGMOD 1996: Proceedings of the 1996 ACM SIGMOD international conference on Management of data, pp. 173\u2013182. ACM, New York (1996)"},{"issue":"3","key":"34_CR15","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1145\/367701.367728","volume":"32","author":"D.S. Miloj\u0301i\u010di\u0107","year":"2000","unstructured":"Miloj\u0301i\u010di\u0107, D.S., Douglis, F., Paindaveine, Y., Wheeler, R., Zhou, S.: Process migration. ACM Comput. Surv.\u00a032(3), 241\u2013299 (2000)","journal-title":"ACM Comput. Surv."},{"key":"34_CR16","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1145\/945445.945462","volume-title":"SOSP 2003: Proceedings of the nineteenth ACM symposium on Operating systems principles","author":"P. Barham","year":"2003","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: SOSP 2003: Proceedings of the nineteenth ACM symposium on Operating systems principles, pp. 164\u2013177. ACM, New York (2003)"},{"key":"34_CR17","first-page":"169","volume-title":"VEE 2007: Proceedings of the 3rd international conference on Virtual execution environments","author":"R. Bradford","year":"2007","unstructured":"Bradford, R., Kotsovinos, E., Feldmann, A., Schi\u00f6berg, H.: Live wide-area migration of virtual machines including local persistent state. In: VEE 2007: Proceedings of the 3rd international conference on Virtual execution environments, pp. 169\u2013179. ACM, New York (2007)"},{"key":"34_CR18","doi-asserted-by":"crossref","unstructured":"Dunlap, G.W., King, S.T., Cinar, S., Basrai, M.A., Chen, P.M.: Revirt: enabling intrusion analysis through virtual-machine logging and replay. SIGOPS Oper. Syst. Rev. 36(SI), 211\u2013224 (2002)","DOI":"10.1145\/844128.844148"},{"key":"34_CR19","unstructured":"Elnozahy, E.N.: Manetho: fault tolerance in distributed systems using rollback-recovery and process replication. PhD thesis, Houston, TX, USA, Chairman-Zwaenepoel, Willy (1994)"},{"key":"34_CR20","unstructured":"Mchardy, P.: Linux imq, \nhttp:\/\/www.linuximq.net\/"},{"key":"34_CR21","unstructured":"Russell, R., Welte, H.: Linux netfilter hacking howto, \nhttp:\/\/www.iptables.org\/documentation\/HOWTO\/netfilter-hacking-HOWTO.html"},{"key":"34_CR22","unstructured":"Xen Community: Xen unstable source, \nhttp:\/\/xenbits.xensource.com\/xen-unstable.hg"},{"key":"34_CR23","unstructured":"Cully, B., Lefebvre, G., Meyer, D., Feeley, M., Hutchinson, N., Warfield, A.: Remus source code, \nhttp:\/\/dsg.cs.ubc.ca\/remus\/"},{"key":"34_CR24","series-title":"The protocols","volume-title":"TCP\/IP illustrated","author":"W.R. Stevens","year":"1993","unstructured":"Stevens, W.R.: TCP\/IP illustrated. The protocols, vol.\u00a01. Addison-Wesley Longman Publishing Co., Inc., Boston (1993)"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16023-3_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T03:37:23Z","timestamp":1630726643000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-16023-3_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642160226","9783642160233"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16023-3_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]},"assertion":[{"value":"20 September 2010","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}