{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T11:16:15Z","timestamp":1719227775264},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2011,11,9]],"date-time":"2011-11-09T00:00:00Z","timestamp":1320796800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Theory Comput Syst"],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1007\/s00224-011-9369-9","type":"journal-article","created":{"date-parts":[[2011,11,8]],"date-time":"2011-11-08T10:48:35Z","timestamp":1320749315000},"page":"694-705","source":"Crossref","is-referenced-by-count":5,"title":["Second-Level Algorithms, Superrecursivity, and Recovery Problem in Distributed Systems"],"prefix":"10.1007","volume":"50","author":[{"given":"Mark","family":"Burgin","sequence":"first","affiliation":[]},{"given":"Bidyut","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,11,9]]},"reference":[{"key":"9369_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-0701-6","volume-title":"Complexity of Real Computation","author":"L. Blum","year":"1998","unstructured":"Blum, L., Cucker, F., Shub, M., Smale, S.: Complexity of Real Computation. Springer, New York (1998)"},{"issue":"12","key":"9369_CR2","doi-asserted-by":"crossref","first-page":"1449","DOI":"10.1080\/00207160310001606034","volume":"80","author":"M. Burgin","year":"2003","unstructured":"Burgin, M.: Nonlinear phenomena in spaces of algorithms. Int. J. Comput. Math. 80(12), 1449\u20131476 (2003)","journal-title":"Int. J. Comput. Math."},{"key":"9369_CR3","volume-title":"Superrecursive Algorithms","author":"M. Burgin","year":"2005","unstructured":"Burgin, M.: Superrecursive Algorithms. Springer, New York (2005)"},{"issue":"2","key":"9369_CR4","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1109\/71.910871","volume":"12","author":"G. Cao","year":"2001","unstructured":"Cao, G., Singhal, M.: Mutable Checkpoints: A new checkpointing approach for mobile computing systems. IEEE Trans. Parallel Distrib. Syst. 12(2), 157\u2013172 (2001)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"9369_CR5","volume-title":"Cellular Automata","author":"E.F. Codd","year":"1968","unstructured":"Codd, E.F.: Cellular Automata. Academic Press, New York (1968)"},{"key":"9369_CR6","first-page":"86","volume-title":"Proceedings of the 11th Symp. Reliable Distributed Systems","author":"E.N. Elnozahy","year":"1992","unstructured":"Elnozahy, E.N., Johnson, D.B., Zwaenepoel, W.: The performance of consistent check pointing. In: Proceedings of the 11th Symp. Reliable Distributed Systems, pp.\u00a086\u201395 (1992)"},{"key":"9369_CR7","first-page":"434","volume-title":"Lecture Notes in Computer Science","author":"B. Gupta","year":"2009","unstructured":"Gupta, B., Rahimi, S.: Novel crash recovery approach for concurrent failures in cluster federation. In: Lecture Notes in Computer Science, vol.\u00a05529, pp.\u00a0434\u2013445 (2009)"},{"issue":"4","key":"9369_CR8","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1049\/iet-cdt:20060102","volume":"1","author":"B. Gupta","year":"2007","unstructured":"Gupta, B., Rahimi, S., Liu, Z.: A novel low-overhead roll-forward recovery scheme for distributed systems. IET Comput. Digit. Tech. 1(4), 397\u2013404 (2007)","journal-title":"IET Comput. Digit. Tech."},{"key":"9369_CR9","volume-title":"Introduction to Automata Theory, Languages, and Computation","author":"J.E. Hopcroft","year":"2007","unstructured":"Hopcroft, J.E., Motwani, R., Ullman, J.D.: Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, Boston (2007)"},{"key":"9369_CR10","doi-asserted-by":"crossref","first-page":"1695","DOI":"10.1016\/S0743-7315(02)00005-9","volume":"62","author":"D. Manivannan","year":"2002","unstructured":"Manivannan, D., Singhal, M.: Asynchronous recovery without using vector timestamps. J. Parallel Distrib. Comput. 62, 1695\u20131728 (2002)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"1","key":"9369_CR11","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/TSE.1987.232562","volume":"SE-13","author":"R. Koo","year":"1987","unstructured":"Koo, R., Toueg, S.: Checkpointing and rollback-recovery for distributed systems. IEEE Trans. Softw. Eng. SE-13(1), 23\u201331 (1987)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"9369_CR12","unstructured":"Miller, M.: Cloud Computing: Web-Based Applications that Change the Way You Work and Collaborate Online. Safari (2008)"},{"key":"9369_CR13","volume-title":"Theory of Recursive Functions and Effective Computability","author":"H. Rogers","year":"1987","unstructured":"Rogers, H.: Theory of Recursive Functions and Effective Computability. MIT Press, Cambridge (1987)"},{"key":"9369_CR14","volume-title":"Introduction to the Theory of Computation","author":"M. Sipser","year":"1997","unstructured":"Sipser, M.: Introduction to the Theory of Computation. PWS Publishing, Boston (1997)"},{"key":"9369_CR15","first-page":"619","volume-title":"Proceedings of the IFIP Theoretical Computer Science","author":"J. Leeuwen Van","year":"2000","unstructured":"Van Leeuwen, J., Wiedermann, J.: On the power of interactive computing. In: Proceedings of the IFIP Theoretical Computer Science, pp.\u00a0619\u2013623 (2000)"},{"key":"9369_CR16","volume-title":"The Art of Computer Programming, Vol.\u00a01: Fundamental Algorithms","author":"D. Knuth","year":"1973","unstructured":"Knuth, D.: The Art of Computer Programming, Vol.\u00a01: Fundamental Algorithms. Addison-Wesley, Reading (1973)"},{"key":"9369_CR17","first-page":"17","volume-title":"Proceedings of the 2006 International Conference on Foundations of Computer Science","author":"M. Burgin","year":"2006","unstructured":"Burgin, M.: Algorithmic control in concurrent computations. In: Proceedings of the 2006 International Conference on Foundations of Computer Science, pp. 17\u201323. CSREA Press, Las Vegas (2006)"},{"issue":"4","key":"9369_CR18","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1145\/505482.505490","volume":"26","author":"J.P. Lewis","year":"2001","unstructured":"Lewis, J.P.: Limits to software estimation. Softw. Eng. Notes 26(4), 54\u201359 (2001)","journal-title":"Softw. Eng. Notes"},{"key":"9369_CR19","volume-title":"Measuring Power of Algorithms, Computer Programs, and Information Automata","author":"M. Burgin","year":"2010","unstructured":"Burgin, M.: Measuring Power of Algorithms, Computer Programs, and Information Automata. Nova Science Publishers, Hauppauge (2010)"},{"issue":"1","key":"9369_CR20","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/214451.214456","volume":"3","author":"K.M. Chandy","year":"1985","unstructured":"Chandy, K.M., Lamport, L.: Distributed snapshots: determining global states of distributed systems. ACM Trans. Comput. Syst. 3(1), 63\u201375 (1985)","journal-title":"ACM Trans. Comput. Syst."},{"issue":"7","key":"9369_CR21","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1109\/71.780865","volume":"10","author":"D. Manivannan","year":"1999","unstructured":"Manivannan, D., Singhal, M.: Quasi-synchronous checkpointing: models, characterization, and classification. IEEE Trans. Parallel Distrib. Syst. 10(7), 703\u2013713 (1999)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"9369_CR22","first-page":"282","volume-title":"Reliable Computing Systems","author":"B. Randell","year":"1979","unstructured":"Randell, B.: Reliable Computing Systems, Operating Systems: An Advanced Course, pp. 282\u2013391. Springer, New York (1979)"},{"issue":"2","key":"9369_CR23","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1109\/71.342127","volume":"6","author":"R.H.B. Netzer","year":"1995","unstructured":"Netzer, R.H.B., Xu, J.: Necessary and sufficient conditions for consistent global snapshots. IEEE Trans. Parallel Distrib. Syst. 6(2), 165\u2013169 (1995)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"9369_CR24","first-page":"207","volume-title":"Proceedings of the 4th IEEE Symposium on Reliability in Distributed Software and Database","author":"D. Briatico","year":"1984","unstructured":"Briatico, D., Ciuffoletti, A., Simoncini, L.: A distributed domino-effect free recovery algorithm. In: Proceedings of the 4th IEEE Symposium on Reliability in Distributed Software and Database, pp.\u00a0207\u2013215 (1984)"},{"key":"9369_CR25","doi-asserted-by":"crossref","first-page":"1127","DOI":"10.1016\/S0304-3975(02)00566-2","volume":"290","author":"G. Cao","year":"2003","unstructured":"Cao, G., Singhal, M.: Checkpointing with mutable checkpoints. Theor. Comput. Sci. 290, 1127\u20131148 (2003)","journal-title":"Theor. Comput. Sci."},{"key":"9369_CR26","first-page":"155","volume-title":"Proceedings of the 11th IEEE Symposium on Reliable Distributed Systems","author":"L.M.E. Silva","year":"1992","unstructured":"Silva, L.M.E., Silva, J.G.: Global checkpointing for distributed programs. In: Proceedings of the 11th IEEE Symposium on Reliable Distributed Systems, pp.\u00a0155\u2013162 (1992)"},{"issue":"7","key":"9369_CR27","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1145\/359545.359563","volume":"21","author":"L. Lamport","year":"1978","unstructured":"Lamport, L.: Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21(7), 558\u2013565 (1978)","journal-title":"Commun. ACM"},{"key":"9369_CR28","unstructured":"Gupta, B., Nikolaev, R., Chirra, R.: A recovery scheme for cluster federations using sender-based message logging, to appear in the J. Comput. Inf. Technol."},{"key":"9369_CR29","first-page":"136","volume-title":"Proceedings of 7th Intl. Symposium on Parallel Architectures, Algorithms and Networks (ISPAN\u201904)","author":"J. Cao","year":"2004","unstructured":"Cao, J., Chen, Y., Zhang, K., He, Y.: Checkpointing in hybrid distributed systems. In: Proceedings of 7th Intl. Symposium on Parallel Architectures, Algorithms and Networks (ISPAN\u201904), Hong Kong, China, pp.\u00a0136\u2013141 (2004)"},{"key":"9369_CR30","first-page":"773","volume-title":"Proceedings of 4th IEEE\/ACM Intl. Symposium on Cluster Computing and the Grid","author":"S. Monnet","year":"2004","unstructured":"Monnet, S., et al.: Hybrid checkpointing for parallel applications in cluster federations. In: Proceedings of 4th IEEE\/ACM Intl. Symposium on Cluster Computing and the Grid, Chicago, USA, pp.\u00a0773\u2013782 (2004)"}],"container-title":["Theory of Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00224-011-9369-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00224-011-9369-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00224-011-9369-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T11:54:23Z","timestamp":1558698863000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00224-011-9369-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11,9]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,5]]}},"alternative-id":["9369"],"URL":"https:\/\/doi.org\/10.1007\/s00224-011-9369-9","relation":{},"ISSN":["1432-4350","1433-0490"],"issn-type":[{"value":"1432-4350","type":"print"},{"value":"1433-0490","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,11,9]]}}}