{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T19:09:24Z","timestamp":1672340964957},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[1979,11,1]],"date-time":"1979-11-01T00:00:00Z","timestamp":310262400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Acta Informatica"],"published-print":{"date-parts":[[1979,11]]},"DOI":"10.1007\/bf00268319","type":"journal-article","created":{"date-parts":[[2004,9,30]],"date-time":"2004-09-30T03:48:17Z","timestamp":1096516097000},"page":"321-338","source":"Crossref","is-referenced-by-count":5,"title":["Analyse et optimisation d'une proc\ufffddure de reprise dans un syst\ufffdme de gestion de donn\ufffdes centralis\ufffdes"],"prefix":"10.1007","volume":"12","author":[{"given":"N.","family":"Mikou","sequence":"first","affiliation":[]},{"given":"S.","family":"Tucci","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"CR1","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/TSE.1975.6312824","volume":"1","author":"K.M. Chandy","year":"1975","unstructured":"Chandy, K.M.; Browne, J.C.; Dissly, C.W.; Uhrig, W.R.: Analytical models for roll-back and recovery strategies in data base systems. IEEE Trans, of Software Eng., 1, 100?110 (1975)","journal-title":"IEEE Trans, of Software Eng."},{"key":"CR2","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/C-M.1975.218955","volume":"8","author":"K.M. Chandy","year":"1975","unstructured":"Chandy, K.M.: A survey of analytic models of roll-back and recovery strategies. IEEE Computer 8, 40?47 (1975)","journal-title":"IEEE Computer"},{"key":"CR3","unstructured":"\u00c7inlar, E.: Introduction to stochastic process. Prentice Hall, 1975"},{"key":"CR4","unstructured":"Cohen, J.: The single server queue. North Holland Series in Applied Mathematics and Mechanics. North Holland Publishing Company, 1969"},{"key":"CR5","doi-asserted-by":"crossref","unstructured":"Crane, M.A.; Iglehart, D.L.: Simulating Stable stochastic systems III: Regenerative processes and discrete-event simulation. Op. Res vol. 23, n 1, Janvier-F\u00e9vrier 1975","DOI":"10.1287\/opre.23.1.33"},{"key":"CR6","doi-asserted-by":"crossref","unstructured":"Crane, M.A.; Iglehart, D.L.: Simulating stable stochastic systems IV: Approximation Techniques. Mane. Scie. vol. 21, n 11, Juillet 1975","DOI":"10.1287\/mnsc.21.11.1215"},{"key":"CR7","unstructured":"Fishman, G.S.: Concepts and methods in discrete event digital simulation, pp. 162?163, Wiley Interscience, 1973"},{"key":"CR8","doi-asserted-by":"crossref","unstructured":"Gelenbe, E.; Derochette, D.: On the stochastic behaviour of a computer system under intermittent failure. In Modelling and Performance Evaluation of Computer Systems. H. Beilner et E. Gelenbe Eds. North Holland, 1976, aussi dans CACM 21, 493?499 (1978)","DOI":"10.1145\/359511.359531"},{"key":"CR9","volume-title":"Proc. 2nd International Symposium of Software Engineering","author":"E. Gelenbe","year":"1976","unstructured":"Gelenbe, E.: On roll-back recovery with multiple checkpoints. Proc. 2nd International Symposium of Software Engineering. (IEEE press), San Francisco, Oct. 1976"},{"key":"CR10","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1145\/322123.322131","volume":"26","author":"E. Gelenbe","year":"1979","unstructured":"Gelenbe, E.: On the optimum checkpoint interval. JACM 26, 259?270 (1979)","journal-title":"JACM"},{"key":"CR11","doi-asserted-by":"crossref","unstructured":"Lavenberg, S.S.; Slutz, D.R.: Regenerative simulation of a queueing model of an automated tape library. IBM J. Res. Develop. Sept. 1975","DOI":"10.1147\/rd.195.0463"},{"key":"CR12","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1145\/361147.361115","volume":"17","author":"J.W. Young","year":"1974","unstructured":"Young, J.W.: A first-order approximation to the optimum checkpoint interval. CACM 17, 530?531 (1974)","journal-title":"CACM"}],"container-title":["Acta Informatica"],"original-title":[],"language":"fr","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00268319.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF00268319\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00268319","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,3]],"date-time":"2019-04-03T15:21:11Z","timestamp":1554304871000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF00268319"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1979,11]]},"references-count":12,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1979,11]]}},"alternative-id":["BF00268319"],"URL":"https:\/\/doi.org\/10.1007\/bf00268319","relation":{},"ISSN":["0001-5903","1432-0525"],"issn-type":[{"value":"0001-5903","type":"print"},{"value":"1432-0525","type":"electronic"}],"subject":[],"published":{"date-parts":[[1979,11]]}}}