{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:25Z","timestamp":1750307185660,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,3,25]],"date-time":"2012-03-25T00:00:00Z","timestamp":1332633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,3,25]]},"DOI":"10.1145\/2162110.2162112","type":"proceedings-article","created":{"date-parts":[[2012,3,27]],"date-time":"2012-03-27T15:17:28Z","timestamp":1332861448000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["What to do when things go wrong"],"prefix":"10.1145","author":[{"given":"Martin","family":"Rinard","sequence":"first","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,3,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"key":"e_1_3_2_1_2_1","first-page":"31","volume-title":"OSDI","author":"Candea G.","year":"2004","unstructured":"G. Candea , S. Kawamoto , Y. Fujiki , G. Friedman , and A. Fox . Microreboot - a technique for cheap recovery . In OSDI , pages 31 -- 44 , 2004 . G. Candea, S. Kawamoto, Y. Fujiki, G. Friedman, and A. Fox. Microreboot - a technique for cheap recovery. In OSDI, pages 31--44, 2004."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032497.2032537"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025131"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/949305.949314"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062499"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.122"},{"key":"e_1_3_2_1_8_1","first-page":"3","volume-title":"Symposium on Reliability in Distributed Software and Database Systems","author":"Gray J.","year":"1986","unstructured":"J. Gray . Why do computers stop and what can be done about it ? In Symposium on Reliability in Distributed Software and Database Systems , pages 3 -- 12 , 1986 . J. Gray. Why do computers stop and what can be done about it? In Symposium on Reliability in Distributed Software and Database Systems, pages 3--12, 1986."},{"key":"e_1_3_2_1_9_1","volume-title":"Transaction Processing: Concepts and Techniques. Morgan Kaufmann","author":"Gray J.","year":"1993","unstructured":"J. Gray and A. Reuter . Transaction Processing: Concepts and Techniques. Morgan Kaufmann , 1993 . ISBN 1--55860--190--2. J. Gray and A. Reuter. Transaction Processing: Concepts and Techniques. Morgan Kaufmann, 1993. ISBN 1--55860--190--2."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950390"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337233"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.65"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806808"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2041552.2041576"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095833"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/949344.949402"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183401.1183447"},{"key":"e_1_3_2_1_19_1","first-page":"303","volume-title":"OSDI","author":"Rinard M. C.","year":"2004","unstructured":"M. C. Rinard , C. Cadar , D. Dumitran , D. M. Roy , T. Leu , and W. S. Beebee . Enhancing server availability and security through failure-oblivious computing . In OSDI , pages 303 -- 316 , 2004 . M. C. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and W. S. Beebee. Enhancing server availability and security through failure-oblivious computing. In OSDI, pages 303--316, 2004."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1883978.1884015"},{"key":"e_1_3_2_1_21_1","first-page":"149","volume-title":"USENIX Annual Technical Conference, General Track","author":"Sidiroglou S.","year":"2005","unstructured":"S. Sidiroglou , M. E. Locasto , S. W. Boyd , and A. D. Keromytis . Building a reactive immune system for software services . In USENIX Annual Technical Conference, General Track , pages 149 -- 161 , 2005 . S. Sidiroglou, M. E. Locasto, S. W. Boyd, and A. D. Keromytis. Building a reactive immune system for software services. In USENIX Annual Technical Conference, General Track, pages 149--161, 2005."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508250"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025133"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.15"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1735223.1735249"},{"key":"e_1_3_2_1_26_1","first-page":"577","volume-title":"ECOOP","author":"Zaeem R. N.","year":"2010","unstructured":"R. N. Zaeem and S. Khurshid . Contract-based data structure repair using alloy . In ECOOP , pages 577 -- 598 , 2010 . R. N. Zaeem and S. Khurshid. Contract-based data structure repair using alloy. In ECOOP, pages 577--598, 2010."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103710"}],"event":{"name":"AOSD '12: Aspect-oriented Software Development","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGSOFT ACM Special Interest Group on Software Engineering","AOSA Aspect-Oriented Software Association"],"location":"Potsdam Germany","acronym":"AOSD '12"},"container-title":["Proceedings of the 11th annual international conference on Aspect-oriented Software Development Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2162110.2162112","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2162110.2162112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:05:43Z","timestamp":1750241143000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2162110.2162112"}},"subtitle":["recovery in complex (computer) systems"],"short-title":[],"issued":{"date-parts":[[2012,3,25]]},"references-count":27,"alternative-id":["10.1145\/2162110.2162112","10.1145\/2162110"],"URL":"https:\/\/doi.org\/10.1145\/2162110.2162112","relation":{},"subject":[],"published":{"date-parts":[[2012,3,25]]},"assertion":[{"value":"2012-03-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}