{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T08:08:33Z","timestamp":1772784513295,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,10,20]],"date-time":"2005-10-20T00:00:00Z","timestamp":1129766400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,10,20]]},"DOI":"10.1145\/1095810.1095833","type":"proceedings-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T12:34:39Z","timestamp":1131366879000},"page":"235-248","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":211,"title":["Rx"],"prefix":"10.1145","author":[{"given":"Feng","family":"Qin","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana Champaign"}]},{"given":"Joseph","family":"Tucek","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana Champaign"}]},{"given":"Jagadeesan","family":"Sundaresan","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana Champaign"}]},{"given":"Yuanyuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana Champaign"}]}],"member":"320","published-online":{"date-parts":[[2005,10,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/248052.248061"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/647881.737785"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231893"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 1st International Computer Software and Applications Conference","author":"Avizienis A.","year":"1977","unstructured":"A. Avizienis and L. Chen . On the implementation of N-version programming for software fault tolerance during execution . In Proceedings of the 1st International Computer Software and Applications Conference , Nov 1977 . A. Avizienis and L. Chen. On the implementation of N-version programming for software fault tolerance during execution. In Proceedings of the 1st International Computer Software and Applications Conference, Nov 1977."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/800216.806587"},{"key":"e_1_3_2_1_6_1","first-page":"29","article-title":"Building Secure and Reliable Network Applications, chapter 19","volume":"1","author":"Birman K. P.","year":"1996","unstructured":"K. P. Birman . Building Secure and Reliable Network Applications, chapter 19 . Manning ISBN : 1-884777 - 29 - 25 , 1996 . K. P. Birman. Building Secure and Reliable Network Applications, chapter 19. Manning ISBN: 1-884777-29-5, 1996.","journal-title":"Manning ISBN"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDS.1998.707704"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1078026.1078397"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/800217.806617"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/58564.58565"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/225535.225538"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/647883.738254"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251254.1251257"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/296806.296824"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251229.1251248"},{"key":"e_1_3_2_1_16_1","unstructured":"CERT\/CC. Advisories. http:\/\/www.cert.org\/advisories\/.  CERT\/CC. Advisories. http:\/\/www.cert.org\/advisories\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/647881.737775"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/851033.856300"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/509593.509626"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781157"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 7th USENIX Security Symposium","author":"Cowan C.","year":"1998","unstructured":"C. Cowan , C. Pu , D. Maier , J. Walpole , P. Bakke , S. Beattie , A. Grier , P. Wagle , Q. Zhang , and H. Hinton . StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks . In Proceedings of the 7th USENIX Security Symposium , Jan 1998 . C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Symposium, Jan 1998."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060309"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/568522.568525"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/151257.151259"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CMPASS.1997.613248"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 5th Symposium on Reliable Distributed Systems","author":"Gray J.","year":"1986","unstructured":"J. Gray . Why do computers stop and what can be done about it ? In Proceedings of the 5th Symposium on Reliable Distributed Systems , Jan 1986 . J. Gray. Why do computers stop and what can be done about it? In Proceedings of the 5th Symposium on Reliable Distributed Systems, Jan 1986."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 2003 International Conference on Dependable Systems and Networks","author":"Gu W.","year":"2003","unstructured":"W. Gu , Z. Kalbarczyk , R. K. Iyer , and Z.-Y. Yang . Characterization of Linux kernel behavior under errors . In Proceedings of the 2003 International Conference on Dependable Systems and Networks , Jun 2003 . W. Gu, Z. Kalbarczyk, R. K. Iyer, and Z.-Y. Yang. Characterization of Linux kernel behavior under errors. In Proceedings of the 2003 International Conference on Dependable Systems and Networks, Jun 2003."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the USENIX","author":"Hasting R.","year":"1992","unstructured":"R. Hasting and B. Joyce . Purify: Fast detection of memory leaks and access errors . In Proceedings of the USENIX Winter 1992 Technical Conference , Dec 1992. R. Hasting and B. Joyce. Purify: Fast detection of memory leaks and access errors. In Proceedings of the USENIX Winter 1992 Technical Conference, Dec 1992."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/874064.875631"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/62546.62575"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/0196-6774(90)90022-7"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/99163.99173"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251229.1251249"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266665"},{"key":"e_1_3_2_1_35_1","volume-title":"CSE-TR-410-99","author":"Lowell D. E.","year":"1998","unstructured":"D. E. Lowell and P. M. Chen . Discount checking: Transparent, low-overhead recovery for general applications. Technical report , CSE-TR-410-99 , University of Michigan , Jul 1998 . D. E. Lowell and P. M. Chen. Discount checking: Transparent, low-overhead recovery for general applications. Technical report, CSE-TR-410-99, University of Michigan, Jul 1998."},{"key":"e_1_3_2_1_36_1","volume-title":"John Willey & Sons","author":"Marcus E.","year":"2000","unstructured":"E. Marcus and H. Stern . Blueprints for High Availability . John Willey & Sons , 2000 . E. Marcus and H. Stern. Blueprints for High Availability. John Willey & Sons, 2000."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/306225.306235"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.730527"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.29"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1975.6312842"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/356725.356729"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251254.1251275"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502037"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/231379.231432"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319159"},{"key":"e_1_3_2_1_47_1","volume-title":"Gartner Group","author":"Scott D.","year":"1998","unstructured":"D. Scott . Assessing the costs of application downtime . Gartner Group , May 1998 . D. Scott. Assessing the costs of application downtime. Gartner Group, May 1998."},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the USENIX 2005 Annual Technical Conference","author":"Sidiroglou S.","year":"2005","unstructured":"S. Sidiroglou , M. E. Locasto , S. W. Boyd , and A. D. Keromytis . Building a reactive immune system for software services . In Proceedings of the USENIX 2005 Annual Technical Conference , Apr 2005 . S. Sidiroglou, M. E. Locasto, S. W. Boyd, and A. D. Keromytis. Building a reactive immune system for software services. In Proceedings of the USENIX 2005 Annual Technical Conference, Apr 2005."},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the USENIX 2004 Annual Technical Conference","author":"Srinivasan S.","year":"2004","unstructured":"S. Srinivasan , C. Andrews , S. Kandula , and Y. Zhou . Flashback: A light-weight extension for rollback and deterministic replay for software debugging . In Proceedings of the USENIX 2004 Annual Technical Conference , Jun 2004 . S. Srinivasan, C. Andrews, S. Kandula, and Y. Zhou. Flashback: A light-weight extension for rollback and deterministic replay for software debugging. In Proceedings of the USENIX 2004 Annual Technical Conference, Jun 2004."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720288"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)80582-6"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3959.3962"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1991.146625"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251254.1251255"},{"key":"e_1_3_2_1_55_1","volume-title":"Webstone: The first generation in http server benchmarking","author":"Trent G.","year":"1995","unstructured":"G. Trent and M. Sake . Webstone: The first generation in http server benchmarking , 1995 . G. Trent and M. Sake. Webstone: The first generation in http server benchmarking, 1995."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267202.1267204"},{"key":"e_1_3_2_1_57_1","volume-title":"Proceedings of the 28th Annual International Symposium on Fault-Tolerant Computing","author":"Vogels W.","year":"1998","unstructured":"W. Vogels , D. Dumitriu , K. Birman , R. Gamache , M. Massa , R. Short , J. Vert , J. Barrera , and J. Gray . The design and architecture of the Microsoft Cluster Service . In Proceedings of the 28th Annual International Symposium on Fault-Tolerant Computing , Jun 1998 . W. Vogels, D. Dumitriu, K. Birman, R. Gamache, M. Massa, R. Short, J. Vert, J. Barrera, and J. Gray. The design and architecture of the Microsoft Cluster Service. In Proceedings of the 28th Annual International Symposium on Fault-Tolerant Computing, Jun 1998."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA260075"},{"key":"e_1_3_2_1_59_1","volume-title":"Proceedings of the 25th Annual International Symposium on Fault-Tolerant Computing","author":"Wang Y.-M.","year":"1995","unstructured":"Y.-M. Wang , Y. Huang , K.-P. Vo , P.-Y. Chung , and C. M. R. Kintala . Checkpointing and its applications . In Proceedings of the 25th Annual International Symposium on Fault-Tolerant Computing , Jun 1995 . Y.-M. Wang, Y. Huang, K.-P. Vo, P.-Y. Chung, and C. M. R. Kintala. Checkpointing and its applications. In Proceedings of the 25th Annual International Symposium on Fault-Tolerant Computing, Jun 1995."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/305138.305215"}],"event":{"name":"SOSP05: ACM SIGOPS 20th Symposium on Operating Systems Principles 2005","location":"Brighton United Kingdom","acronym":"SOSP05","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the twentieth ACM symposium on Operating systems principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1095810.1095833","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1095810.1095833","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:27Z","timestamp":1750248507000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1095810.1095833"}},"subtitle":["treating bugs as allergies---a safe method to survive software failures"],"short-title":[],"issued":{"date-parts":[[2005,10,20]]},"references-count":59,"alternative-id":["10.1145\/1095810.1095833","10.1145\/1095810"],"URL":"https:\/\/doi.org\/10.1145\/1095810.1095833","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1095809.1095833","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2005,10,20]]},"assertion":[{"value":"2005-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}