{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T12:13:35Z","timestamp":1725624815171},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540112099"},{"type":"electronic","value":"9783642683565"}],"license":[{"start":{"date-parts":[[1982,1,1]],"date-time":"1982-01-01T00:00:00Z","timestamp":378691200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1982]]},"DOI":"10.1007\/978-3-642-68356-5_16","type":"book-chapter","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T05:11:37Z","timestamp":1319519497000},"page":"220-234","source":"Crossref","is-referenced-by-count":0,"title":["Konzepte zur Erh\u00f6hung der Zuverl\u00e4ssigkeit und Sicherheit von Software durch Rechnersysteme mit typengesteuerten Operationen"],"prefix":"10.1007","author":[{"given":"Gottfried","family":"Bonn","sequence":"first","affiliation":[]},{"given":"Wolf","family":"Viehweger","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","first-page":"644","volume":"7","author":"EA Feustel","year":"1973","unstructured":"Feustel, E.A.: On the Advantages of Tagged Architecture. IEEE-TOC, Vol. C-22, No. 7, S. 644\u2013656, 1973.","journal-title":"On the Advantages of Tagged Architecture. IEEE-TOC, Vol. C-22"},{"key":"16_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-96595-1","volume-title":"Rechnerarchitektur","author":"WK Giloi","year":"1981","unstructured":"Giloi, W.K.: Rechnerarchitektur, Springer-Verlag, Berlin, 1981."},{"key":"16_CR3","volume-title":"Advances in Computer Architecture","author":"GJ Myers","year":"1978","unstructured":"Myers, G.J.: Advances in Computer Architecture. New York, Wiley-Interscience, 1978."},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Berstis, V.: Security and Protection of Data in the IBM System\/38. 7th Symposium on CA, IEEE, S. 245\u2013252, 1980.","DOI":"10.1145\/800053.801932"},{"key":"16_CR5","volume-title":"International Journal of Computer and Information Science","author":"WK Giloi","year":"1982","unstructured":"Giloi, W.K., Gueth, R.: Concepts and Realization of a High-Performance Data Type Architecture. International Journal of Computer and Information Science, 1982."},{"key":"16_CR6","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/BFb0029355","volume":"16","author":"RH Campbell","year":"1974","unstructured":"Campbell, R.H., Habermann, A.N.: The Specification of Process Synchronization by Path Expressions. Lecture Notes in Computer Science 16, S. 89\u2013102, 1974.","journal-title":"Lecture Notes in Computer Science"},{"key":"16_CR7","unstructured":"Keramidis, S., Reitenspiess, M., Weber, K.: Sprachkonstrukte und Betriebs-systemunterst\u00fctzung f\u00fcr asynchrone und verteilte Proze\u00dfsysteme. Berichte des German Chapter of the ACM 7, 1981."},{"key":"16_CR8","first-page":"1980","volume-title":"S. 329\u2013352","author":"G Bonn","year":"1980","unstructured":"Bonn, G., Patz, M., Saenger, F.: Grundprinzipien und Betriebserfahrungen mit Fehlererkennung und -anzeige bei fehlertoleranten Proze\u00dfrechnersystemen mit funktionsbeteiligter Redundanz. Fachberichte Messen, Steuern, Regeln 5. INTER-KAMA-Kongre\u00df 1980. S. 329\u2013352. Springer-Verlag, Berlin, 1980."},{"key":"16_CR9","volume-title":"Rekonfiguration und Restauration von verteilten Proze\u00dfsystemen in fehlertoleranten verteilten Rechensystemen","author":"M Seifert","year":"1981","unstructured":"Seifert, M.: Rekonfiguration und Restauration von verteilten Proze\u00dfsystemen in fehlertoleranten verteilten Rechensystemen. Universit\u00e4t Karlsruhe, Dissertation 1981."},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Randell, B.: System Structure for Software Fault Tolerance. IEEE Trans, on Software Engineering, SE-1, No. 2, Juni 1975, pp. 220\u2013232.","DOI":"10.1109\/TSE.1975.6312842"},{"key":"16_CR11","first-page":"28","volume":"I","author":"DA Menasce","year":"1979","unstructured":"Menasce, D.A., et al.: A Formal Model of Crash Recovery in Computer Systems. Proc. 12th Hawaii Int. Conf. on System Sciences, Honolulu, Jan. 1979, Vol. I, pp. 28\u201335.","journal-title":"Proc. 12th Hawaii Int. Conf. on System Sciences, Honolulu"},{"key":"16_CR12","first-page":"171","volume-title":"Lecture Notes in Computer Science","author":"JJ Horning","year":"1974","unstructured":"Horning, J.J. Lauer, H.C., Meliiar-Smith, P., Randell, B.: A Program Structure for Error Detection and Recovery, in: Lecture Notes in Computer Science, 16, Springer Verlag, Berlin, 1974, S. 171\u2013187."},{"key":"16_CR13","volume-title":"Zustandssicherungs- und Wiederanlaufverfahren f\u00fcr verteilte Netzbe-triebssysteme mit dynamischer Redundanz. Techn","author":"M Patz","year":"1981","unstructured":"Patz, M.: Zustandssicherungs- und Wiederanlaufverfahren f\u00fcr verteilte Netzbe-triebssysteme mit dynamischer Redundanz. Techn. Universit\u00e4t M\u00fcnchen. Dissertation 1981."}],"container-title":["Informatik-Fachberichte","Fehlertolerierende Rechnersysteme"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-68356-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T04:56:46Z","timestamp":1557896206000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-68356-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1982]]},"ISBN":["9783540112099","9783642683565"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-68356-5_16","relation":{},"ISSN":["0343-3005"],"issn-type":[{"type":"print","value":"0343-3005"}],"subject":[],"published":{"date-parts":[[1982]]}}}