{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:58Z","timestamp":1750307578959,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T00:00:00Z","timestamp":1259020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100005073","name":"Agency for Defense Development","doi-asserted-by":"publisher","award":["ADD-07-06-02"],"award-info":[{"award-number":["ADD-07-06-02"]}],"id":[{"id":"10.13039\/501100005073","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003626","name":"Defense Acquisition Program Administration","doi-asserted-by":"publisher","award":["ADD-07-06-02"],"award-info":[{"award-number":["ADD-07-06-02"]}],"id":[{"id":"10.13039\/501100003626","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,24]]},"DOI":"10.1145\/1655925.1656074","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T15:21:10Z","timestamp":1259076070000},"page":"819-823","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Localized Software-based approach for Fault-Tolerant Ethernet (LSFTE)"],"prefix":"10.1145","author":[{"given":"Huy Thao","family":"Vu","sequence":"first","affiliation":[{"name":"Engineering, Myongji University, Rep. of Korea"}]},{"given":"Minh Thiep","family":"Ha","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Rep. of Korea"}]},{"given":"Jong Myung","family":"Rhee","sequence":"additional","affiliation":[{"name":"Myongji University, Rep. of Korea"}]}],"member":"320","published-online":{"date-parts":[[2009,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1234741.1234767"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134320"},{"key":"e_1_3_2_1_3_1","first-page":"68","volume-title":"Dependability of Resilient Computers","author":"Cristian F.","year":"1989","unstructured":"F. Cristian . Exception handling . In Dependability of Resilient Computers . Blackwell Scientific Publications , pp. 68 -- 97 , 1989 . F. Cristian. Exception handling. In Dependability of Resilient Computers. Blackwell Scientific Publications, pp.68--97, 1989."},{"key":"e_1_3_2_1_4_1","first-page":"461","volume-title":"Computing and Communications Conference, IPCCC'99","author":"Huang J.","year":"1999","unstructured":"J. Huang , S. Song , L. Li , P. Kappler , R. Freimark , J. Gustin , and T. Kozlik . An open solution to fault-tolerant Ethernet: design, prototyping, and evaluation. In IEEE International Performance , Computing and Communications Conference, IPCCC'99 , pp. 461 -- 468 , 1999 . J. Huang, S. Song, L. Li, P. Kappler, R. Freimark, J. Gustin, and T. Kozlik. An open solution to fault-tolerant Ethernet: design, prototyping, and evaluation. In IEEE International Performance, Computing and Communications Conference, IPCCC'99, pp. 461--468, 1999."},{"key":"e_1_3_2_1_5_1","volume-title":"DSN","author":"Song S.","year":"2000","unstructured":"S. Song , J. Huang , P. Kappler , R. Freimark , J. Gustin , and T. Kozlik . Fault-tolerant Ethernet for IP-based process control: Ademonstration. In Dependable Systems and Networks , DSN , 2000 . S. Song, J. Huang, P. Kappler, R. Freimark, J. Gustin, and T. Kozlik. Fault-tolerant Ethernet for IP-based process control: Ademonstration. In Dependable Systems and Networks, DSN, 2000."},{"key":"e_1_3_2_1_6_1","unstructured":"PMC675\/RM675 family of next generation dual intelligent Ethernet Controllers http:\/\/gefanuc.com.  PMC675\/RM675 family of next generation dual intelligent Ethernet Controllers http:\/\/gefanuc.com."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCM.2008.12"}],"event":{"name":"ICIS '09: The 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","sponsor":["AICIT","ETRI","KISTI"],"location":"Seoul Korea","acronym":"ICIS '09"},"container-title":["Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656074","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1655925.1656074","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:12Z","timestamp":1750250472000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656074"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,24]]},"references-count":7,"alternative-id":["10.1145\/1655925.1656074","10.1145\/1655925"],"URL":"https:\/\/doi.org\/10.1145\/1655925.1656074","relation":{},"subject":[],"published":{"date-parts":[[2009,11,24]]},"assertion":[{"value":"2009-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}