{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T11:57:55Z","timestamp":1648814275097},"reference-count":24,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[2002,4,1]],"date-time":"2002-04-01T00:00:00Z","timestamp":1017619200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2002,4]]},"DOI":"10.1016\/s0167-739x(01)00066-8","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T05:54:01Z","timestamp":1027576441000},"page":"613-625","source":"Crossref","is-referenced-by-count":0,"title":["Scalable and efficient fault-tolerant protocol for mobility agents in mobile IP-based systems"],"prefix":"10.1016","volume":"18","author":[{"given":"JinHo","family":"Ahn","sequence":"first","affiliation":[]},{"given":"Sung-Gi","family":"Min","sequence":"additional","affiliation":[]},{"given":"Chong-Sun","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-739X(01)00066-8_BIB1","unstructured":"J. Ahn, C. Hwang, Low-cost fault-tolerance for mobile nodes in mobile IP-based systems, in: Proceedings of the 21st ICDCS Workshop on Wireless Networks and Mobile Computing, 2001, pp. 508\u2013513."},{"key":"10.1016\/S0167-739X(01)00066-8_BIB2","doi-asserted-by":"crossref","unstructured":"L. Alvisi, B. Hoppe, K. Marzullo, Nonblocking and orphan-free message logging protocols, in: Proceedings of the 23rd Symposium on Fault-tolerant Computing, 1993, pp. 145\u2013154.","DOI":"10.1109\/FTCS.1993.627318"},{"key":"10.1016\/S0167-739X(01)00066-8_BIB3","unstructured":"J.R. Binkley, J. McHugh, Secure Mobile Networking: Sixth Quarterly Report\u2014Winter 1997, Portland State University, April 1997."},{"issue":"5","key":"10.1016\/S0167-739X(01)00066-8_BIB4","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/98.729719","article-title":"A network architecture for heterogeneous mobile computing","volume":"5","author":"Brewer","year":"1998","journal-title":"IEEE Personal Commun. Mag."},{"key":"10.1016\/S0167-739X(01)00066-8_BIB5","doi-asserted-by":"crossref","unstructured":"R. Droms, Dynamic Host Configuration Protocol, RFC 1541, October 1993.","DOI":"10.17487\/rfc1531"},{"key":"10.1016\/S0167-739X(01)00066-8_BIB6","unstructured":"E.N. Elnozahy, A low latency multicast protocol, in: Proceedings of the Fifth International Conference on Information Systems Analysis and Synthesis, August 1999."},{"key":"10.1016\/S0167-739X(01)00066-8_BIB7","unstructured":"E.N. Elnozahy, L. Alvisi, Y.M. Wang, D.B. Johnson, A Survey of Rollback-recovery Protocols in Message-passing Systems, Technical Report CMU-CS-99-148, Carnegie-Mellon University, 1999."},{"key":"10.1016\/S0167-739X(01)00066-8_BIB8","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1109\/12.142678","article-title":"Manetho: transparent rollback-recovery with low overhead, limited rollback and fast output commit","volume":"41","author":"Elnozahy","year":"1992","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/S0167-739X(01)00066-8_BIB9","unstructured":"R. Ghosh, G. Varghese, Fault-tolerant Mobile IP, Technical Report WUCS-98-11, Washington University, April 1998."},{"key":"10.1016\/S0167-739X(01)00066-8_BIB10","unstructured":"IBM Corporation and International Data Group, Survey says storage area networks may unclog future roadblocks to e-business, News Release, December 1999."},{"issue":"2","key":"10.1016\/S0167-739X(01)00066-8_BIB11","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1023\/A:1019097818667","article-title":"Design and analysis of a replicated server architecture for supporting IP-host mobility","volume":"1","author":"Jue","year":"1998","journal-title":"Cluster Comput."},{"key":"10.1016\/S0167-739X(01)00066-8_BIB12","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/BF01893145","article-title":"Hard real-time communication in multiple-access networks","volume":"8","author":"Malcom","year":"1995","journal-title":"Real-time Syst."},{"key":"10.1016\/S0167-739X(01)00066-8_BIB13","unstructured":"R. McNab, F.W. Howell, simjava: a discrete-event simulation package for Java with applications in computer systems modelling, in: Proceedings of the First International Conference on Web-based Modelling and Simulation, 1998."},{"key":"10.1016\/S0167-739X(01)00066-8_BIB14","doi-asserted-by":"crossref","unstructured":"C. Perkins, IP Encapsulation within IP, RFC 2003, October 1996.","DOI":"10.17487\/rfc2003"},{"key":"10.1016\/S0167-739X(01)00066-8_BIB15","doi-asserted-by":"crossref","unstructured":"C. Perkins, IP Mobility Support, RFC 2002, October 1996.","DOI":"10.17487\/rfc2002"},{"key":"10.1016\/S0167-739X(01)00066-8_BIB16","doi-asserted-by":"crossref","unstructured":"C. Perkins, Minimal Encapsulation with IP, RFC 2004, October 1996.","DOI":"10.17487\/rfc2004"},{"key":"10.1016\/S0167-739X(01)00066-8_BIB17","doi-asserted-by":"crossref","unstructured":"C. Perkins, D.B. Johnson, Route Optimization in Mobile IP, Mobile IP Working Group, Internet Draft, November 1997.","DOI":"10.1109\/35.592101"},{"key":"10.1016\/S0167-739X(01)00066-8_BIB18","doi-asserted-by":"crossref","unstructured":"D.C. Plummer, An Ethernet Address Resolution Protocol or Converting Network Protocol Address to 48 bit Ethernet Address for Transmission on Ethernet Hardware, STD 37, RFC 826, November 1982.","DOI":"10.17487\/rfc0826"},{"key":"10.1016\/S0167-739X(01)00066-8_BIB19","doi-asserted-by":"crossref","unstructured":"J.B. Postel, Internet Protocol, RFC 791, September 1981.","DOI":"10.17487\/rfc0791"},{"issue":"3","key":"10.1016\/S0167-739X(01)00066-8_BIB20","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1145\/357369.357371","article-title":"Fail\u2013stop processors: an approach to designing fault-tolerant distributed computing systems","volume":"1","author":"Schlichting","year":"1985","journal-title":"ACM Trans. Comput. Syst."},{"key":"10.1016\/S0167-739X(01)00066-8_BIB21","unstructured":"N. Sergent, Evaluating latency of distributed algorithms using Petri nets, in: Proceedings of the Fifth Euromicro Workshop on Parallel and Distributed Processing, January 1997."},{"key":"10.1016\/S0167-739X(01)00066-8_BIB22","doi-asserted-by":"crossref","unstructured":"W. Simpson, IP in IP Tunneling, RFC 1853, October 1995.","DOI":"10.17487\/rfc1853"},{"key":"10.1016\/S0167-739X(01)00066-8_BIB23","unstructured":"J.D. Solomon, Mobile IP, The Internet Unplugged, Prentice-Hall Series, Prentice-Hall, Englewood Cliffs, NJ, 1998."},{"issue":"3","key":"10.1016\/S0167-739X(01)00066-8_BIB24","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1145\/3959.3962","article-title":"Optimistic recovery in distributed systems","volume":"3","author":"Strom","year":"1985","journal-title":"ACM Trans. Comput. Syst."}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X01000668?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X01000668?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T19:23:46Z","timestamp":1578425026000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X01000668"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,4]]},"references-count":24,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2002,4]]}},"alternative-id":["S0167739X01000668"],"URL":"https:\/\/doi.org\/10.1016\/s0167-739x(01)00066-8","relation":{},"ISSN":["0167-739X"],"issn-type":[{"value":"0167-739X","type":"print"}],"subject":[],"published":{"date-parts":[[2002,4]]}}}