{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:32Z","timestamp":1750306532365,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,16]],"date-time":"2014-11-16T00:00:00Z","timestamp":1416096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,16]]},"DOI":"10.1145\/2666581.2666587","type":"proceedings-article","created":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T17:10:54Z","timestamp":1415380254000},"page":"11-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Enhanced n-version programming and recovery block techniques for web service systems"],"prefix":"10.1145","author":[{"given":"Kuan-Li","family":"Peng","sequence":"first","affiliation":[{"name":"National Tsing Hua University, Taiwan"}]},{"given":"Chin-Yu","family":"Huang","sequence":"additional","affiliation":[{"name":"National Tsing Hua University, Taiwan"}]},{"given":"Pin-Heng","family":"Wang","sequence":"additional","affiliation":[{"name":"Alpha Networks, Taiwan"}]},{"given":"Chao-Jung","family":"Hsu","sequence":"additional","affiliation":[{"name":"Altek, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2014,11,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"D. Booth H. Haas F. McCabe E. Newcomer M. Champion C. Ferris and D. Orchard. Web Services Architecture. W3C Working Group Note 2004.  D. Booth H. Haas F. McCabe E. Newcomer M. Champion C. Ferris and D. Orchard. Web Services Architecture. W3C Working Group Note 2004."},{"volume-title":"Artech House Publishers","year":"2001","author":"Pullum L. L.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/EURMIC.1997.617370"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/0165-6074(93)90231-9"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2008.60"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(98)00106-4"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/24.370232"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13067-0_44"},{"volume-title":"John Wiley & Sons Ltd.","year":"1995","author":"Lyu M. R.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526892"},{"key":"e_1_3_2_1_11_1","first-page":"79","volume-title":"Fault-Tolerant Programming. In The 2nd Annual International Symposium on Fault Tolerant Computing, FTCS-2","author":"Elmendorf W. R.","year":"1972"},{"key":"e_1_3_2_1_12_1","first-page":"149","volume-title":"On the Implementation of N-Version Programming for Software Fault-Tolerance During Execution. IEEE International Computer Software and Applications Conference, COMPSAC 1977","author":"Avizienis A.","year":"1977"},{"issue":"12","key":"e_1_3_2_1_13_1","first-page":"1183","volume":"36","author":"Dai Y. S.","year":"2004","journal-title":"A Model for Correlated Failures in N-Version Programming. IIE Transactions"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2010.16"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2008.42"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11560333_5"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/160608"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/24.229486"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218539394000052"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2002.801853"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/647641.733522"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1975.6312842"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/356678.356681"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.86"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1979.5220566"}],"event":{"name":"SIGSOFT\/FSE'14: 22nd ACM SIGSOFT Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Hong Kong China","acronym":"SIGSOFT\/FSE'14"},"container-title":["Proceedings of the International Workshop on Innovative Software Development Methodologies and Practices"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2666581.2666587","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2666581.2666587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:14Z","timestamp":1750227134000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2666581.2666587"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,16]]},"references-count":25,"alternative-id":["10.1145\/2666581.2666587","10.1145\/2666581"],"URL":"https:\/\/doi.org\/10.1145\/2666581.2666587","relation":{},"subject":[],"published":{"date-parts":[[2014,11,16]]},"assertion":[{"value":"2014-11-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}