{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T01:09:42Z","timestamp":1725412182685},"reference-count":48,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/hpdc.2002.1029919","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T22:14:31Z","timestamp":1056579271000},"page":"199-208","source":"Crossref","is-referenced-by-count":13,"title":["Error scope on a computational grid: theory and practice"],"prefix":"10.1109","author":[{"given":"D.","family":"Thain","sequence":"first","affiliation":[]},{"given":"M.","family":"Livny","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/356725.356729"},{"article-title":"Matchmaking Frameworks for Distributed Resource Management","year":"2000","author":"raman","key":"ref38"},{"journal-title":"Object-Oriented Software Construction","year":"1997","author":"meyer","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378858"},{"article-title":"Autoconf: Generating automatic configuration scripts","year":"1994","author":"mackenzie","key":"ref31"},{"key":"ref30","article-title":"High-throughput resource management","author":"livny","year":"1998","journal-title":"The Grid Blueprint for a New Computing Infrastructure"},{"key":"ref37","article-title":"Providing resource management services to parallel applications","author":"pruyne","year":"1994","journal-title":"Proc Workshop on Environments and Tools for Parallel Scientific Computing"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1142\/S0129626499000268"},{"article-title":"Integrating Fault-Tolerance Techniques in Grid Applications","year":"2002","author":"nguyen-tuong","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/566726.566749"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(99)00088-6"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/357401.357402"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/800001.811672"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/32206.32210"},{"journal-title":"The Annotated C++ Reference Manual","year":"1992","author":"ellis","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1177\/109434209701100205"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1145\/288090.288111","article-title":"A security architecture for computational grids","author":"foster","year":"1998","journal-title":"Proceedings of the 5th ACM Conference on Computer and Communications Security Conference"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-9128(199706)9:6<415::AID-CPE299>3.0.CO;2-V"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.2001.945176"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/311531.311532"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/337449.337524"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DCS.1988.12507"},{"journal-title":"The Java Programming Language","year":"1997","author":"arnold","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1979.230191"},{"key":"ref3","first-page":"161","article-title":"Protocols and services for distributed data-intensive science","author":"allcock","year":"2000","journal-title":"Proc Advanced Computing and Analysis Techniques (ACAT) in Physics Research"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2080.357392"},{"key":"ref29","first-page":"381","article-title":"Remote UNIX &#x2013; Turning idle workstations into cycle servers","author":"litzkow","year":"1987","journal-title":"USENIX Conference Proceedings"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1986.13527"},{"key":"ref8","article-title":"Netsolve: A network solver for solving computational science problems","author":"casanova","year":"1995","journal-title":"Technical Report CS-95-313"},{"key":"ref7","article-title":"Exception handling: The case against","author":"black","year":"1982","journal-title":"Technical Report TR 82-01-02"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-9128(199706)9:6<535::AID-CPE307>3.0.CO;2-1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.1996.546168"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/78949.78951"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2001.923182"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/361227.361230"},{"journal-title":"Structured Computer Organization","year":"1984","author":"tannenbaum","key":"ref45"},{"key":"ref48","article-title":"Cheap cycles from the desktop to the dedicated cluster: combining opportunisitc and dedicated scheduling with Condor","author":"wright","year":"2001","journal-title":"Conference on Linux Clusters The HPC Revolution"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/363235.363259"},{"key":"ref47","article-title":"A standard for the transmission of IP datagrams on avian carriers","author":"waitzman","year":"1990","journal-title":"Internet Engineering Task Force (IETF) Request For Comments (RFC) 1149"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/242857.242867"},{"key":"ref42","first-page":"283","article-title":"Supporting checkpointing and process migration outside the UNIX kernel","author":"solomon","year":"1992","journal-title":"USENIX Conference Proceedings"},{"key":"ref24","first-page":"320","article-title":"Making APL error messages kinder and gentler","year":"1989","journal-title":"ACM Conference on APL"},{"key":"ref41","first-page":"119","article-title":"Design and implementation of the Sun network filesystem","author":"sandberg","year":"1985","journal-title":"Proceedings of the summer 1985 USENIX conference"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/134494.134503"},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.1145\/347059.347561","article-title":"When the CRC and TCP checksum disagree","author":"stone","year":"2000","journal-title":"Proceedings of ACM SIGCOMM"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/775406.775408"},{"key":"ref43","first-page":"191","article-title":"Kerberos: An authentication service for open network systems","author":"steiner","year":"1988","journal-title":"USENIX Conference Proceedings"},{"key":"ref25","article-title":"How Java's floating-point hurts everyone everywhere","author":"kahan","year":"1998","journal-title":"Talk given at the ACM 1998 Workshop on Java for High-Performance Network Computing"}],"event":{"name":"11th IEEE International Symposium on High Performance Distributed Computing","acronym":"HPDC-02","location":"Edinburgh, UK"},"container-title":["Proceedings 11th IEEE International Symposium on High Performance Distributed Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7999\/22121\/01029919.pdf?arnumber=1029919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T07:01:15Z","timestamp":1623135675000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1029919\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/hpdc.2002.1029919","relation":{},"subject":[]}}