{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:42:01Z","timestamp":1725666121182},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540182948"},{"type":"electronic","value":"9783642456282"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1987]]},"DOI":"10.1007\/978-3-642-45628-2_31","type":"book-chapter","created":{"date-parts":[[2012,3,5]],"date-time":"2012-03-05T21:25:11Z","timestamp":1330982711000},"page":"348-361","source":"Crossref","is-referenced-by-count":4,"title":["Fault Tolerance based on Time-Staggered Redundancy"],"prefix":"10.1007","author":[{"given":"Klaus","family":"Echtle","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","first-page":"209","volume-title":"On the Security of Compressed Encodings","author":"SG Akt","year":"1984","unstructured":"S. G. Akt On the Security of Compressed Encodings. Crypto 83, Conf. Proc., Plenum Press, New York, 1984, pp. 209\u2013230."},{"key":"31_CR2","volume-title":"Fault Tolerance \u2014 Principles and Practice","author":"T Anderson","year":"1981","unstructured":"T. Anderson, P. A. Lee: Fault Tolerance \u2014 Principles and Practice. Prentice Hall, London, 1981."},{"key":"31_CR3","unstructured":"A. Avizienis et at The UCLA Dedix System: A Distributed Testbed for Multiple-Version Software. FTCS-15, Conf. Proc., IEEE, 1986, pp. 126-134."},{"key":"31_CR4","unstructured":"O. Babaoglu, R. Drummond, P. Stephenson: The Impact of Communication Network Properties on Reliable Broadcast Protocols. FTCS-16, Conf. Proc., IEEE, 1986, pp. 212-217."},{"key":"31_CR5","unstructured":"W. B\u00fccken: Synchronisierung von Proze\u00dfexemplaren bei zeitgestaffelter statischer Redundanz. Diplomarbeit, Fak. f\u00fcr Informatik, Univ. Karlsruhe, 1986."},{"issue":"3","key":"31_CR6","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1145\/989.357400","volume":"2","author":"JM Chang","year":"1984","unstructured":"J. M. Chang, N. F. Maxemchuk: Reliable Broadcast Protocols. ACM ToCS 2, No. 3,1984, pp. 251\u2013273.","journal-title":"ACM ToCS"},{"key":"31_CR7","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1109\/TSE.1985.232245","volume":"6","author":"B Chor","year":"1985","unstructured":"B. Chor, B. Coan: A Simple and Efficient Randomized Byzantine Agreement Algorithm. IEEE Trans. Softw. Eng. SE-11, No. 6, 1985, pp. 531\u2013539.","journal-title":"IEEE Trans. Softw. Eng. SE-11"},{"issue":"5","key":"31_CR8","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/323627.323635","volume":"19","author":"EC Cooper","year":"1985","unstructured":"E C. Cooper: Replicated Distributed Programs. ACM Operating Systems Review 19, No. 5, 1985, pp. 53\u201378.","journal-title":"ACM Operating Systems Review"},{"key":"31_CR9","unstructured":"F. Cristian, H Aghili, R. Strong: Atomic Broadcast: From simple Message Diffusion to Byzantine Agreement. FTCS-15, Conf. Proc., IEEE, 1985, pp. 200-206."},{"key":"31_CR10","unstructured":"M. Dal Cin et al: ATTEMPTO, a Fault-Tolerant Multiprocessor Working Station, Design and Concepts. FTCS-13, Conf. Proc., IEEE, 1983, pp. 10-13."},{"key":"31_CR11","unstructured":"Denning Cryptography and Data Security. Addison Wesley Publishing Company, London, 1982."},{"key":"31_CR12","first-page":"299","volume-title":"Implementierung von anwendungsspezifischer Fehlertoleranz f\u00fcr Proze\u00dfautomatisierungssysteme","author":"F Demmelmeier","year":"1982","unstructured":"F. Demmelmeier, W. Ries: Implementierung von anwendungsspezifischer Fehlertoleranz f\u00fcr Proze\u00dfautomatisierungssysteme. IFB 54, Springer, Heidelberg, 1982, pp. 299\u2013314."},{"key":"31_CR13","unstructured":"M. Dertinger: Vergleichende Bewertung von Fehlertoleranz-Verfahren aufgrund zeitgestaffelter statischer Redundanz. Diplomarbeit, Fak. f\u00fcr Informatik, Univ. Karlsruhe, 1986."},{"key":"31_CR14","first-page":"315","volume-title":"Fehlermaskierende verteilte Systeme zur Erf\u00fcllung hoher Zuverl\u00e4ssigkeitsanforderungen in Proze\u00dfrechner-Netzen","author":"K Echtle","year":"1984","unstructured":"K. Echtle: Fehlermaskierende verteilte Systeme zur Erf\u00fcllung hoher Zuverl\u00e4ssigkeitsanforderungen in Proze\u00dfrechner-Netzen. IFB 78, Springer, Heidelberg, 1984, pp. 315\u2013328."},{"key":"31_CR15","first-page":"73","volume-title":"Fehlermodellierung bei Simulation und Verifikation von Fehlertoleranz-Algorithmen f\u00fcr verteilte Systeme","author":"K Echtle","year":"1984","unstructured":"K. Echtle: Fehlermodellierung bei Simulation und Verifikation von Fehlertoleranz-Algorithmen f\u00fcr verteilte Systeme. IFB 83, Springer, Heidelberg, 1984, pp. 73\u201388."},{"key":"31_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-71147-3","volume-title":"Fehlermaskierung durch verteilte Systeme","author":"K Echtle","year":"1986","unstructured":"K. Echtle: Fehlermaskierung durch verteilte Systeme. PhD-Thesis, IFB 121, Springer, Heidelberg, 1986."},{"key":"31_CR17","unstructured":"K. Echtle: Fault-Masking with Reduced Redundant Communication. FTCS-16, Conf. Proc, IEEE, 1986, pp. 178-183."},{"key":"31_CR18","unstructured":"K. Echtle: Fault Masking and Sequence Agreement by a Voting Protocol with Low Message Number. 6th Symp. on Reliability in Distr. Software and Database Systems, Conf. Proc. IEEE, 1987."},{"key":"31_CR19","unstructured":"R. A. Frohwerk: Signature Analysis: A New Digital Field Service Method Hewlett-Packard Journal, May 1977, pp. 2-8."},{"key":"31_CR20","unstructured":"P. Gunningberg Voting and Redundancy Management implemented by Protocols in Distributed Systems. FTCS-13, Conf. Proc., IEEE, 1983, pp. 182-185."},{"key":"31_CR21","unstructured":"R. Hofmann: Fehlerbehandlung bei zeitgestaffelter statischer Redundanz. Diplomarbeit, Fak. f\u00fcr Informatik, Univ. Karlsruhe, 1986."},{"key":"31_CR22","unstructured":"K. K\u00fcspert: Datenbank-Recovery und Fehlertoleranz in Datenbanksystemen. Newsletter of GI-NTG-GMA-Fachgruppe Fehlertolerierende Rechensysteme, Jan. 1986, pp. 4-19."},{"issue":"3","key":"31_CR23","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L Lamport","year":"1982","unstructured":"L. Lamport, R. Shostak, M. Pease: The Byzantine Generals Problem. ACM ToPLaS 4, No. 3, 1982, pp. 382\u2013401.","journal-title":"ACM ToPLaS"},{"key":"31_CR24","unstructured":"G. LeLann: Issues in Fault-Tolerant Real-Time Local Area Networks. 5th Symp. on Reliability in Distr. Software and Database Systems, Conf. Proc., IEEE, 1986, pp. 28-32."},{"key":"31_CR25","doi-asserted-by":"crossref","unstructured":"N. Lynch, M. Fischer, R. Fowler: A Simple and Efficient Byzantine Generals Algorithm. 2nd Symp. on Reliability in Distr. Software and Database Systems, Conf. Proc., IEEE, 1982, pp. 46-52.","DOI":"10.21236\/ADA113241"},{"key":"31_CR26","doi-asserted-by":"crossref","unstructured":"L. Mancini: Modular Redundancy in a Message Passing System. IEEE Trans. Softw. Eng SE-12, No. 1, 1986, pp. 79\u201386.","DOI":"10.1109\/TSE.1986.6312922"},{"key":"31_CR27","unstructured":"F. Ptteli, H. Garcia-Molina: Database Processing with Triple Modular Redundancy. 5th Symp. on Reliability in Distr. Software and Database Systems, Conf. Proc., IEEE, 1986, pp. 95-103."},{"issue":"5","key":"31_CR28","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1145\/773379.806618","volume":"17","author":"ML Powell","year":"1983","unstructured":"M. L. Powell, D. L. Presotto: Publishing A Reliable Broadcast Communication Mechanism. ACM Operating Systems Review 17, No. 5, 1983, pp. 100\u2013109.","journal-title":"ACM Operating Systems Review"},{"key":"31_CR29","unstructured":"D. Pradham, S. M. Reddy: A Fault-Tolerant Communication Architecture for Distributed Systems. FTCS-11, Conf. Proc., IEEE, 1981, pp. 214-220."},{"key":"31_CR30","unstructured":"R. K. Scott, J. W. Gault, D. F. McAllister: The consensus recovery block. Total systems reliability symposium, U. S. National Bureau of Standards NBS, Gaithersburg 12 \/1983, pp. 74-85."},{"key":"31_CR31","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1145\/190.357399","volume":"2","author":"FB Schneiden","year":"1984","unstructured":"F. B. Schneiden Byzantine Generals in Action: Implementing Fail-Stop Processors. ACM ToCS 2, No. 2, 1984, pp. 145\u2013154.","journal-title":"ACM ToCS 2"},{"key":"31_CR32","unstructured":"H. R. Strong D. Dolev: Byzantine Agreement. Comosac 83, Conf. Proc., IEEE 1983, pp. 77-81."},{"key":"31_CR33","unstructured":"N. Theuretzbacher: VOTRICS: Voting Triple Modular Computing System FTCS-16, Conf. Proc., IEEE, 1986, pp. 144-150."},{"key":"31_CR34","doi-asserted-by":"crossref","unstructured":"M. N. Wegman, L Carter: New Classes and Applications of Hash Functions. 20th Annual Symp. on Foundations of Computer Science, Conf. Proc, 1979, pp. 175-182.","DOI":"10.1109\/SFCS.1979.26"},{"key":"31_CR35","unstructured":"G. York, D. Siewiorek, Z. Segall: Software-Voting in Asynchronous NMR Computer Structures. Int. Report CMU CS 83 128, Carnegie-Melon Uni, 1983."}],"container-title":["Informatik-Fachberichte","Fehlertolerierende Rechensysteme \/ Fault-Tolerant Computing Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45628-2_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T13:43:49Z","timestamp":1620135829000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-45628-2_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1987]]},"ISBN":["9783540182948","9783642456282"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45628-2_31","relation":{},"ISSN":["0343-3005"],"issn-type":[{"type":"print","value":"0343-3005"}],"subject":[],"published":{"date-parts":[[1987]]}}}