{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T11:10:05Z","timestamp":1737544205876,"version":"3.33.0"},"publisher-location":"Boston, MA","reference-count":18,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387728117"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-72812-4_2","type":"book-chapter","created":{"date-parts":[[2007,10,4]],"date-time":"2007-10-04T06:15:53Z","timestamp":1191478553000},"page":"13-24","source":"Crossref","is-referenced-by-count":0,"title":["Validating Desktop Grid Results By Comparing Intermediate Checkpoints"],"prefix":"10.1007","author":[{"given":"Filipe","family":"Araujo","sequence":"first","affiliation":[]},{"given":"Patricio","family":"Domingues","sequence":"additional","affiliation":[]},{"given":"Derrick","family":"Kondo","sequence":"additional","affiliation":[]},{"given":"Luis Moura","family":"Silva","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"A. Agbaria and R. Friedman. A replication-and checkpoint-based approach for anomaly-based intrusion detection and recovery. Distributed Computing Systems Workshops, 2005. 25th IEEE International Conference on, pages 137\u2013143, 2005.","DOI":"10.1109\/ICDCSW.2005.21"},{"key":"2_CR2","unstructured":"D. Allen. Personal communication, June 2006."},{"key":"2_CR3","unstructured":"C. An. Personal communication, March 2006."},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"D. Anderson. BOINC: A system for public-resource computing and storage. In 5th IEEE\/ACM International Workshop on Grid Computing, Pittsburgh, USA, 2004.","DOI":"10.1109\/GRID.2004.14"},{"key":"2_CR5","unstructured":"D. Antonelli, A. Cordero, and A. Mettler. Securing Distributed Computation with Untrusted Participants. 2004."},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"810","DOI":"10.1126\/science.308.5723.810","volume":"308","author":"J. Bohannon","year":"2005","unstructured":"J. Bohannon. Grassroots supercomputing. Science, 308(6 May):810\u2013813, 2005.","journal-title":"Science"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"C. Christensen, T. Aina, and D. Stainforth. The challenge of volunteer computing with lengthy climate model simulations. In 1st IEEE International Conference on e-Science and Grid Computing, pages 8\u201315, Melbourne, Australia, 2005. IEEE Computer Society.","DOI":"10.1109\/E-SCIENCE.2005.76"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"W. Du, J. Jia, M. Mangal, and M. Murugesan. Uncheatable grid computing. Distributed Computing Systems, 2004. Proceedings. 24th International Conference on, pages 4\u201311, 2004.","DOI":"10.1109\/ICDCS.2004.1281562"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"D. Eastlake and P. Jones. RFC 3174: US Secure Hash Algorithm 1 (SHA1). Request for Comments, September, 2001.","DOI":"10.17487\/rfc3174"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"G. Fedak, C. Germain, V. Neri, and F. Cappello. Xtremweb: A generic global computing system. In 1st Int\u2019l Symposium on Cluster Computing and the Grid (CCGRID\u201901), pages 582\u2013587, Brisbane, 2001.","DOI":"10.1109\/CCGRID.2001.923246"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"A. Holohan and A. Garg. Collaboration Online: The Example of Distributed Computing. Journal of Computer-Mediated Communication, 10(4), 2005.","DOI":"10.1111\/j.1083-6101.2005.tb00279.x"},{"key":"2_CR12","unstructured":"D. Molnar. The SETI@home Problem. ACM Crossroads Student Magazine, september 2000."},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"R. Rivest. RFC-1321 The MD5 Message-Digest Algorithm. Network Working Group, IETF, April 1992.","DOI":"10.17487\/rfc1321"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"L. Sarmenta. Sabotage-tolerance mechanisms for volunteer computing systems. In 1st International Symposium on Cluster Computing and the Grid, page 337, 2001.","DOI":"10.1109\/CCGRID.2001.923211"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"L. M. Silva and J. G. Silva. System-level versus user-defined checkpointing. In Symposium on Reliable Distributed Systems, pages 68\u201374, 1998.","DOI":"10.1109\/RELDIS.1998.740476"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"S. Son and M. Livny. Recovering Internet Symmetry in Distributed Computing. Cluster Computing and the Grid, 2003. Proceedings. CCGrid 2003. 3rd IEEE\/ACM International Symposium on, pages 542\u2013549, 2003.","DOI":"10.1109\/CCGRID.2003.1199412"},{"key":"2_CR17","first-page":"204","volume":"0","author":"M. Taufer","year":"2005","unstructured":"M. Taufer, P. J. Teller, D. P. Anderson, and I. Charles L. Brooks. Metrics for effective resource management in global computing environments. e-science, 0:204\u2013211, 2005.","journal-title":"e-science"},{"key":"2_CR18","unstructured":"XtremLab. http:\/\/xtremlab.lri.fr."}],"container-title":["Achievements in European Research on Grid Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-72812-4_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T11:35:45Z","timestamp":1737459345000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-72812-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387728117"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-72812-4_2","relation":{},"subject":[]}}