{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:49:15Z","timestamp":1742381355451},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/dsn.2003.1209926","type":"proceedings-article","created":{"date-parts":[[2004,6,22]],"date-time":"2004-06-22T20:27:43Z","timestamp":1087936063000},"page":"149-158","source":"Crossref","is-referenced-by-count":22,"title":["A preemptive deterministic scheduling algorithm for multithreaded replicas"],"prefix":"10.1109","author":[{"given":"C.","family":"Basile","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Z.","family":"Kalbarczyk","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R.","family":"Iyer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1029004"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1995.1060"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2003.1209926"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/32.588521"},{"key":"13","first-page":"55","author":"babaoglu","year":"1993","journal-title":"Distributed Systems"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/568522.568525"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1990.89386"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/71.774908"},{"key":"21","first-page":"225","article-title":"Validating the fail-silence assumption of the MARS architecture","author":"fuchs","year":"1998","journal-title":"Proc of 6th Dependable Computing for Critical Applications Conference"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/IPDS.2000.839467"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1994.315625"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1994.315655"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/12.544479"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/286942.286961"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/52.62934"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2001.941407"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/225535.225538"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.1998.740506"},{"key":"7","first-page":"169","article-title":"Transparent recovery of Mach applications","author":"goldberg","year":"1990","journal-title":"USENIX Mach Workshop"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2002.1180194"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/RELDI.2000.885404"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-9942(1998)4:2<81::AID-TAPO3>3.3.CO;2-M"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/58564.58565"},{"journal-title":"The ensemble system","year":"1997","author":"hayden","key":"8"}],"event":{"name":"2003 International Conference on Dependable Systems and Networks, 2003.","location":"San Francisco, CA, USA"},"container-title":["2003 International Conference on Dependable Systems and Networks, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8589\/27228\/01209926.pdf?arnumber=1209926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T17:23:10Z","timestamp":1489425790000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1209926\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/dsn.2003.1209926","relation":{},"subject":[]}}