{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T17:58:14Z","timestamp":1648663094606},"reference-count":25,"publisher":"Elsevier BV","issue":"1-5","license":[{"start":{"date-parts":[[1988,8,1]],"date-time":"1988-08-01T00:00:00Z","timestamp":586396800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Microprocessing and Microprogramming"],"published-print":{"date-parts":[[1988,8]]},"DOI":"10.1016\/0165-6074(88)90152-4","type":"journal-article","created":{"date-parts":[[2003,9,3]],"date-time":"2003-09-03T17:14:48Z","timestamp":1062609288000},"page":"801-806","source":"Crossref","is-referenced-by-count":1,"title":["The design of distributed, software fault tolerant, real-time systems incorporating decision mechanisms"],"prefix":"10.1016","volume":"24","author":[{"given":"D.J","family":"Holding","sequence":"first","affiliation":[]},{"given":"M.R","family":"Hill","sequence":"additional","affiliation":[]},{"given":"G.F","family":"Carpenter","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"No. 4","key":"10.1016\/0165-6074(88)90152-4_BIB1","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1145\/356678.356681","article-title":"Fault tolerant software for real-time applications","volume":"Vol. 8","author":"Hecht","year":"1976","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/0165-6074(88)90152-4_BIB2","series-title":"Fault tolerance, principles and practice","author":"Anderson","year":"1981"},{"key":"10.1016\/0165-6074(88)90152-4_BIB3","series-title":"Resillient computing systems","year":"1987"},{"key":"10.1016\/0165-6074(88)90152-4_BIB4","series-title":"Prallel processing in control - the transputer and other architectures","article-title":"Software fault tolerance in real-time systems","author":"Holding","year":"1988"},{"key":"10.1016\/0165-6074(88)90152-4_BIB5","series-title":"Distributed databases, principles and systems","author":"Ceri","year":"1984"},{"key":"10.1016\/0165-6074(88)90152-4_BIB6","series-title":"Database system concepts","author":"Korth","year":"1986"},{"issue":"No. 12","key":"10.1016\/0165-6074(88)90152-4_BIB7","doi-asserted-by":"crossref","first-page":"1491","DOI":"10.1109\/TSE.1985.231893","article-title":"The N version approach to fault tolerant software","volume":"Vol SE-11","author":"Avienzis","year":"1985","journal-title":"IEEE Trans SE."},{"key":"10.1016\/0165-6074(88)90152-4_BIB8","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/TSE.1975.6312842","article-title":"System structure for software fault tolerance","volume":"Vol SE-1","author":"Randell","year":"1975","journal-title":"IEEE Trans. SE."},{"key":"10.1016\/0165-6074(88)90152-4_BIB9","article-title":"A calculus of total correctness for communicating processes","volume":"23","author":"Hoare","year":"1981"},{"key":"10.1016\/0165-6074(88)90152-4_BIB10","series-title":"Proc. Int. Conf. \u2018Safety of Computer Control Systems, Safecomp 83\u2019","first-page":"59","article-title":"Practical fault tolerant software for asynchronous systems","author":"Campbell","year":"1983"},{"key":"10.1016\/0165-6074(88)90152-4_BIB11","doi-asserted-by":"crossref","first-page":"921","DOI":"10.1109\/TSE.1986.6313047","article-title":"Design of reliable software in distributed systems using the conversation scheme","volume":"Vol. SE-12","author":"Tyrrell","year":"1986","journal-title":"IEEE Trans. SE"},{"key":"10.1016\/0165-6074(88)90152-4_BIB12_1","series-title":"Proc. Int. Conf. \u2018oftware engineering for real-time systems\u2019","first-page":"135","article-title":"Analysis and protection of Interprocess communications in real-time systems","volume":"77","author":"Carpenter","year":"1987"},{"key":"10.1016\/0165-6074(88)90152-4_BIB12_2","author":"Carpenter","year":"1988","journal-title":"Journal IERE"},{"issue":"No. 2","key":"10.1016\/0165-6074(88)90152-4_BIB13","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1145\/356842.356846","article-title":"Concurrency control in distributed database systems","volume":"Vol. 13","author":"Bernstein","year":"1981","journal-title":"ACM Computing Surveys"},{"issue":"No. 11","key":"10.1016\/0165-6074(88)90152-4_BIB14","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1145\/360363.360369","article-title":"The notions of consistency and predicate locks in a database system","volume":"Vol. 19","author":"Erswaren","year":"1976","journal-title":"Comm. ACM"},{"key":"10.1016\/0165-6074(88)90152-4_BIB15","first-page":"393","article-title":"Notes on database operating systems","volume":"Vol. 60","author":"Gray","year":"1978"},{"key":"10.1016\/0165-6074(88)90152-4_BIB16","series-title":"Proc. 9th Int. Symp. on \u2018Fault tolerant computing\u2019","first-page":"9","article-title":"Reliability issues in distributed information processing systems","author":"Svobodova","year":"1979"},{"issue":"No. 4","key":"10.1016\/0165-6074(88)90152-4_BIB17","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1145\/289.291","article-title":"Principles of transaction-oriented database recovery","volume":"Vol. 15","author":"Haerder","year":"1984","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/0165-6074(88)90152-4_BIB18","series-title":"IEEE Proc. 1st Symp. on \u2018Reliability in distributed software database systems\u2019","first-page":"21","article-title":"Selection of a commitment and recovery mechanism for a distributed transactional system","author":"Balter","year":"1981"},{"key":"10.1016\/0165-6074(88)90152-4_BIB19","author":"Inmos","year":"1984"},{"key":"10.1016\/0165-6074(88)90152-4_BIB20","series-title":"Communicating sequential processes","author":"Hoare","year":"1985"},{"key":"10.1016\/0165-6074(88)90152-4_BIB21","series-title":"Petri net theory and the modelling of systems","author":"Peterson","year":"1981"},{"key":"10.1016\/0165-6074(88)90152-4_BIB22","series-title":"Proc. UKSC Conf. on Computer Simulation","first-page":"30","article-title":"The use of Occam and Petri nets in the simulation of logic structures for the control of loosely coupled distributed systems","author":"Carpenter","year":"1987"},{"issue":"No. 3","key":"10.1016\/0165-6074(88)90152-4_BIB23","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1109\/TSE.1987.233170","article-title":"Safety analysis using Petri nets","volume":"Vol. SE-13","author":"Levenson","year":"1987","journal-title":"IEEE Trans. SE"},{"key":"10.1016\/0165-6074(88)90152-4_BIB24","doi-asserted-by":"crossref","first-page":"1036","DOI":"10.1109\/TCOM.1976.1093424","article-title":"Recoverability of communication protocols - implications of a theoretical study","volume":"Vol. COM-24","author":"Merlin","year":"1976","journal-title":"IEEE Trans. Com."}],"container-title":["Microprocessing and Microprogramming"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0165607488901524?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0165607488901524?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T09:53:17Z","timestamp":1551088397000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0165607488901524"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1988,8]]},"references-count":25,"journal-issue":{"issue":"1-5","published-print":{"date-parts":[[1988,8]]}},"alternative-id":["0165607488901524"],"URL":"https:\/\/doi.org\/10.1016\/0165-6074(88)90152-4","relation":{},"ISSN":["0165-6074"],"issn-type":[{"value":"0165-6074","type":"print"}],"subject":[],"published":{"date-parts":[[1988,8]]}}}