{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T05:16:32Z","timestamp":1734153392951,"version":"3.30.2"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T00:00:00Z","timestamp":1726790400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T00:00:00Z","timestamp":1726790400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,20]]},"DOI":"10.1109\/icis61260.2024.10778287","type":"proceedings-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T19:06:09Z","timestamp":1734030369000},"page":"203-208","source":"Crossref","is-referenced-by-count":0,"title":["Research on Concurrent Destruction of Embedded High-Availability Distributed Computing Platform"],"prefix":"10.1109","author":[{"given":"Qinhan","family":"He","sequence":"first","affiliation":[{"name":"School of Artificial intelligence, Xidian University,Xi&#x0027;an,China"}]},{"given":"Jinhui","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xidian University,Xi&#x0027;an,China"}]},{"given":"Lijun","family":"He","sequence":"additional","affiliation":[{"name":"Aeronautics Computing Technique Research Institute,Xi&#x0027;an,China"}]},{"given":"Guangfei","family":"Zhou","sequence":"additional","affiliation":[{"name":"Aeronautics Computing Technique Research Institute,Xi&#x0027;an,China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"50","article-title":"Research on Airborne Distributed Computing Method Based on Actor Model [J]","volume":"2","author":"Yueyao","year":"2023","journal-title":"Computer Programming Skills and Maintenance"},{"key":"ref2","first-page":"6","article-title":"Middleware and Distributed Computing [J]","volume":"4","author":"Xiongwei","year":"2002","journal-title":"Journal of Computer Applications"},{"volume-title":"Research on Some Key Technologies of Distributed data processing [D]","year":"2018","author":"Wu","key":"ref3"},{"volume-title":"Standard Data Encryption Algorithm [D]","year":"1983","author":"Katzian","key":"ref4"},{"key":"ref5","first-page":"76","article-title":"Research and implementation of key destruction technology for task management Computer [J]","volume":"5","author":"Bo","year":"2018","journal-title":"Technical Analysis"},{"issue":"10","key":"ref6","first-page":"62","article-title":"High-performance distributed XMPP server based on Actor model[J]","volume":"24","author":"Hao","year":"2015","journal-title":"Journal of Computer Systems and Applications"},{"issue":"06","key":"ref7","first-page":"12","article-title":"A Method of Software Destruction Key Design Based on discrete quantity Control [J]","author":"Duan","year":"2020","journal-title":"Digital World"},{"issue":"09","key":"ref8","first-page":"96","article-title":"Design and Implementation of Airborne Data Loading and Unloading Card [J]","volume":"29","author":"Zhengjun","year":"2010","journal-title":"Measurement and Control Technology"},{"key":"ref9","first-page":"2","article-title":"Evaluation and Analysis of key failure for electronic countermeasures warning [J]","volume":"6","author":"Zhiqiang","year":"2021","journal-title":"Electronic World"},{"volume-title":"2019 Aviation Equipment Service Support and Maintenance Technology Forum and Annual Meeting of China Aviation Industry Technical Equipment Engineering Association","author":"Xiaoyu","article-title":"Research on Avionics Information Loading and Integrated Management Design [C]","key":"ref10"},{"issue":"1","key":"ref11","first-page":"53","article-title":"Research on Evaluation method of key Destruction Capability of Aviation Data Memory Card [J]","volume":"54","author":"Yanshan","year":"2019","journal-title":"Avionics Technology"},{"key":"ref12","first-page":"16","article-title":"Design and Implementation of High-speed Storage Module with Emergency destruct Function [J]","volume":"1","author":"Jiayu","year":"2024","journal-title":"Wireless Internet Technology"}],"event":{"name":"2024 IEEE\/ACIS 24th International Conference on Computer and Information Science (ICIS)","start":{"date-parts":[[2024,9,20]]},"location":"Shanghai, China","end":{"date-parts":[[2024,9,22]]}},"container-title":["2024 IEEE\/ACIS 24th International Conference on Computer and Information Science (ICIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10778263\/10778307\/10778287.pdf?arnumber=10778287","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T07:02:28Z","timestamp":1734073348000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10778287\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,20]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icis61260.2024.10778287","relation":{},"subject":[],"published":{"date-parts":[[2024,9,20]]}}}