iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/978-3-540-70592-5_21
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:03:56Z","timestamp":1725516236129},"publisher-location":"Berlin, Heidelberg","reference-count":58,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540705918"},{"type":"electronic","value":"9783540705925"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-70592-5_21","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T16:07:43Z","timestamp":1218557263000},"page":"490-515","source":"Crossref","is-referenced-by-count":9,"title":["Bristlecone: A Language for Robust Software Systems"],"prefix":"10.1007","author":[{"given":"Brian","family":"Demsky","sequence":"first","affiliation":[]},{"given":"Alokika","family":"Dash","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6 part 2","key":"21_CR1","doi-asserted-by":"crossref","first-page":"1385","DOI":"10.1002\/j.1538-7305.1985.tb00280.x","volume":"64","author":"G. Haugk","year":"1985","unstructured":"Haugk, G., Lax, F., Royer, R., Williams, J.: The 5ESS(TM) switching system: Maintenance capabilities. AT&T Technical Journal\u00a064(6 part 2), 1385\u20131416 (1985)","journal-title":"AT&T Technical Journal"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Mourad, S., Andrews, D.: On the reliability of the IBM MVS\/XA operating system. IEEE Transactions on Software Engineering (September 1987)","DOI":"10.1109\/TSE.1987.232855"},{"volume-title":"Transaction Processing: Concepts and Techniques","year":"1993","author":"J. Gray","key":"21_CR3","unstructured":"Gray, J., Reuter, A.: Transaction Processing: Concepts and Techniques. Morgan Kaufmann, San Francisco (1993)"},{"issue":"1","key":"21_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/bltj.2204","volume":"5","author":"W.O. Baker","year":"2000","unstructured":"Baker, W.O., Ross, I.M., Mayo, J.S., Stanzione, D.C.: Bell labs innovations in recent decades. Bell Labs Technical Journal\u00a05(1), 3\u201316 (2000)","journal-title":"Bell Labs Technical Journal"},{"issue":"3","key":"21_CR5","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.scico.2005.03.005","volume":"58","author":"T. Harris","year":"2005","unstructured":"Harris, T.: Exceptions and side-effects in atomic blocks. Science of Computer Programming\u00a058(3), 325\u2013343 (2005)","journal-title":"Science of Computer Programming"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Demsky, B., Cadar, C., Roy, D., Rinard, M.C.: Efficient specification-assisted error localization. In: Proceedings of the Second International Workshop on Dynamic Analysis (2004)","DOI":"10.1049\/ic:20040301"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Demsky, B., Rinard, M.: Data structure repair using goal-directed reasoning. In: Proceedings of the 2005 International Conference on Software Engineering (May 2005)","DOI":"10.1145\/1062455.1062499"},{"key":"21_CR8","unstructured":"Leavens, G.T., Leino, K.R.M., Poll, E., Ruby, C., Jacobs, B.: JML: notations and tools supporting detailed design in Java. In: OOPSLA 2000 Companion, pp. 105\u2013106 (2000)"},{"issue":"10","key":"21_CR9","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/2.161279","volume":"23","author":"B. Meyer","year":"1992","unstructured":"Meyer, B.: Applying Design by Contact. Computer\u00a023(10), 40\u201351 (1992)","journal-title":"Computer"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Demsky, B., Ernst, M.D., Guo, P.J., McCamant, S., Perkins, J.H., Rinard, M.: Inference and enforcement of data structure consistency specifications. In: Proceedings of the 2006 International Symposium on Software Testing and Analysis (2006)","DOI":"10.1145\/1146238.1146266"},{"issue":"3","key":"21_CR11","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/s10009-004-0167-4","volume":"7","author":"L. Burdy","year":"2005","unstructured":"Burdy, L., Cheon, Y., Cok, D., Ernst, M., Kiniry, J., Leavens, G.T., Leino, K.R.M., Poll, E.: An overview of JML tools and applications. International Journal on Software Tools for Technology Transfer\u00a07(3), 212\u2013232 (2005)","journal-title":"International Journal on Software Tools for Technology Transfer"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Ernst, M.D., Czeisler, A., Griswold, W.G., Notkin, D.: Quickly detecting relevant program invariants. In: Proceedings of the 22nd International Conference on Software Engineering (June 2000)","DOI":"10.1109\/ICSE.2000.870435"},{"key":"21_CR13","unstructured":"Demsky, B., Sundaramurthy, S.: Static analysis of task interactions in bristlecone for program understanding. Technical Report UCI-ISR-07-7, Institute for Software Research, University of California, Irvine (October 2007)"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Shavit, N., Touitou, D.: Software transactional memory. In: Proceedings of the 14th ACM Symposium on Principles of Distributed Computing (August 1995)","DOI":"10.1145\/224964.224987"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Ananian, C.S., Asanovi\u0107, K., Kuszmaul, B.C., Leiserson, C.E., Lie, S.: Unbounded transactional memory. In: 11th International Symposium on High Performance Computer Architecture (February 2005)","DOI":"10.1109\/HPCA.2005.41"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Harris, T., Plesko, M., Shinnar, A., Tarditi, D.: Optimizing memory transactions. In: Proceedings of the 2006 Conference on Programming Language Design and Implementation (June 2006)","DOI":"10.1145\/1133981.1133984"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Spear, M.F., Marathe, V.J., Schereer, W.N., Scott, M.L.: Conflict detection and validation strategies for software transactional memory. In: Proceedings of the Twentieth International Symposium on Distributed Computing (2006)","DOI":"10.1007\/11864219_13"},{"key":"21_CR18","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/1133981.1133984","volume-title":"Proceedings of the 2006 ACM SIGPLAN conference on Programming Language Design and Implementation","author":"T. Harris","year":"2006","unstructured":"Harris, T., Plesko, M., Shinnar, A., Tarditi, D.: Optimizing memory transactions. In: Proceedings of the 2006 ACM SIGPLAN conference on Programming Language Design and Implementation, pp. 14\u201325. ACM Press, New York (2006)"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Herlihy, M., Moss, J.E.B.: Transactional memory: Architectural support for lock-free data structures. In: Proceedings of the Twentieth Annual International Symposium on Computer Architecture (1993)","DOI":"10.1145\/165123.165164"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Kumar, S., Chu, M., Hughes, C.J., Kundu, P., Nguyen, A.: Hybrid transactional memory. In: Proceedings of the Eleventh ACM SIGPLAN symposium on Principles and Practice of Parallel Programming (2006)","DOI":"10.1145\/1122971.1123003"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Hammond, L., Wong, V., Chen, M., Hertzberg, B., Carlstrom, B., Prabhu, M., Wijaya, H., Kozyrakis, C., Olukotun, K.: Transactional memory coherence and consistency (tcc). In: Proceedings of the 11th Intl. Symposium on Computer Architecture (June 2004)","DOI":"10.1145\/1037947.1024395"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Boyapati, C., Khurshid, S., Marinov, D.: Korat: Automated testing based on java predicates (2002)","DOI":"10.1145\/566189.566191"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Ghiya, R., Hendren, L.J.: Is it a tree, a dag, or a cyclic graph? a shape analysis for heap-directed pointers in c. In: Proceedings of the 23rd ACM SIGPLAN-SIGACT symposium on Principles of Programming Languages (1996)","DOI":"10.1145\/237721.237724"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Wies, T., Kuncak, V., Lam, P., Podelski, A., Rinard, M.: Field constraint analysis. In: Proceedings of the International Conference on Verification, Model Checking, and Abstract Interpretation (2006)","DOI":"10.1007\/11609773_11"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Sagiv, M., Reps, T., Wilhelm, R.: Parametric shape analysis via 3\u2013valued logic. In: Symposium on Principles of Programming Languages, pp. 105\u2013118 (1999)","DOI":"10.1145\/292540.292552"},{"key":"21_CR26","doi-asserted-by":"crossref","unstructured":"Corbett, J.C., Dwyer, M.B., Hatcliff, J., Laubach, S., Pasareanu, C.S., Robby, Zheng, H.: Bandera: Extracting finite-state models from Java source code. In: Proceedings of the 2000 International Conference on Software Engineering (2000)","DOI":"10.1145\/337180.337234"},{"issue":"3","key":"21_CR27","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1109\/24.914544","volume":"49","author":"P.P. Shirvani","year":"2000","unstructured":"Shirvani, P.P., Saxena, N.R., McCluskey, E.J.: Software-implemented EDAC protection against SEUs. IEEE Transactions on Reliability\u00a049(3), 273\u2013284 (2000)","journal-title":"IEEE Transactions on Reliability"},{"key":"21_CR28","unstructured":"Accetta, M., Baron, R., Bolosky, W., Golub, D., Rashid, R., Tevanian, A., Young, M.: Mach: A new kernel foundation for UNIX development. In: Proceedings of the USENIX Summer Conference (1986)"},{"key":"21_CR29","doi-asserted-by":"crossref","unstructured":"Goodenough, J.B.: Structured exception handling. In: POPL 1975: Proceedings of the 2nd ACM SIGACT-SIGPLAN symposium on Principles of programming languages (1975)","DOI":"10.1145\/512976.512997"},{"key":"21_CR30","unstructured":"Anderson, T., Kerr, R.: Recovery blocks in action: A system supporting high reliability. In: Proceedings of the 2nd International Conference on Software Engineering, pp. 447\u2013457 (1976)"},{"issue":"3","key":"21_CR31","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/1075395.1075402","volume":"39","author":"Y. Zhang","year":"2005","unstructured":"Zhang, Y., Wong, D., Zheng, W.: User-level checkpoint and recovery for LAM\/MPI. ACM SIGOPS Operating Systems Review\u00a039(3), 72\u201381 (2005)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"21_CR32","unstructured":"Plank, J.S., Beck, M., Kingsley, G., Li, K.: Libckpt: Transparent checkpointing under Unix. In: Usenix Winter Technical Conference, January 1995, pp. 213\u2013223 (1995)"},{"issue":"2","key":"21_CR33","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1109\/TC.1972.5008918","volume":"C-21","author":"K.M. Chandy","year":"1972","unstructured":"Chandy, K.M., Ramamoorthy, C.: Rollback and recovery strategies. IEEE Transactions on Computers\u00a0C-21(2), 137\u2013146 (1972)","journal-title":"IEEE Transactions on Computers"},{"issue":"9","key":"21_CR34","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1145\/361147.361115","volume":"17","author":"J.W. Young","year":"1974","unstructured":"Young, J.W.: A first order approximation to the optimum checkpoint interval. Communications of the ACM\u00a017(9), 530\u2013531 (1974)","journal-title":"Communications of the ACM"},{"key":"21_CR35","doi-asserted-by":"crossref","unstructured":"Huang, K., Wu, J., Fernandez, E.B.: A generalized forward recovery checkpointing scheme. In: Proceedings of the 1998 Annual IEEE Workshop on Fault-Tolerant Parallel and Distributed Systems (April 1998)","DOI":"10.1007\/3-540-64359-1_732"},{"key":"21_CR36","unstructured":"Avizienis, A.: The methodology of n-version programming (1995)"},{"key":"21_CR37","unstructured":"Patterson, D., Brown, A., Broadwell, P., Candea, G., Chen, M., Cutler, J., Enriquez, P., Fox, A., Kcman, E., Merzbacher, M., Oppenheimer, D., Sastry, N., Tetzlaff, W., Traupman, J., Treuhaft, N.: Recovery-oriented computing (ROC): Motivation, definition, techniques, and case studies. Technical Report UCB\/\/CSD-02-1175, UC Berkeley Computer Science (March 15, 2002)"},{"key":"21_CR38","unstructured":"Candea, G., Fox, A.: Recursive restartability: Turning the reboot sledgehammer into a scalpel. In: HotOS-VIII, May 2001, pp. 110\u2013115 (2001)"},{"key":"21_CR39","unstructured":"Rinard, M., Cadar, C., Dumitran, D., Roy, D.M., Leu, T., William, S., Beebee, J.: Enhancing server availability and security through failure-oblivious computing. In: Proceedings of the 6th Symposium on Operating Systems Design and Implementation (December 2004)"},{"key":"21_CR40","doi-asserted-by":"crossref","unstructured":"Berger, E., Zorn, B.: Diehard: Probabilistic memory safety for unsafe languages. In: Proceedings of the ACM SIGPLAN 2006 Conference on Programming Language Design and Implementation (June 2006)","DOI":"10.1145\/1133981.1134000"},{"key":"21_CR41","doi-asserted-by":"crossref","unstructured":"Khurshid, S., Garc\u00eda, I., Suen, Y.L.: Repairing structurally complex data. In: Proceedings of the 12th International SPIN Workshop on Model Checking of Software (August 2005)","DOI":"10.1007\/11537328_12"},{"key":"21_CR42","doi-asserted-by":"crossref","unstructured":"Rinard, M.: Probabilistic accuracy bounds for fault-tolerant computations that discard tasks. In: Proceedings of the 20th ACM International Conference on Supercomputing (2006)","DOI":"10.1145\/1183401.1183447"},{"key":"21_CR43","doi-asserted-by":"crossref","unstructured":"Benton, N., Cardelli, L., Fournet, C.: Modern concurrency abstractions for C#. In: Proceedings of the 16th European Conference on Object-Oriented Programming (2002)","DOI":"10.1007\/3-540-47993-7_18"},{"key":"21_CR44","doi-asserted-by":"crossref","unstructured":"Johnston, W.M., Hanna, J.R.P., Millar, R.J.: Advances in dataflow programming languages. ACM Comput. Surv. 36(1) (2004)","DOI":"10.1145\/1013208.1013209"},{"issue":"1","key":"21_CR45","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/2363.2433","volume":"7","author":"D. Gelernter","year":"1985","unstructured":"Gelernter, D.: Generative communication in Linda. ACM Transactions on Programming Languages and Systems\u00a07(1), 80\u2013112 (1985)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"21_CR46","doi-asserted-by":"crossref","unstructured":"Cook, W.R., Patwardhan, S., Misra, J.: Workflow patterns in Orc. In: Proceedings of the 2006 International Conference on Coordination Models and Languages (2006)","DOI":"10.1007\/11767954_6"},{"key":"21_CR47","unstructured":"Hewitt, C., Baker, H.G.: Actors and continuous functionals. Technical report, Massachusetts Institute of Technology, Cambridge, MA, USA (1978)"},{"issue":"1","key":"21_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/S095679689700261X","volume":"7","author":"G. Agha","year":"1997","unstructured":"Agha, G., Mason, I.A., Smith, S.F., Talcott, C.L.: A foundation for actor computation. Journal of Functional Programming\u00a07(1), 1\u201372 (1997)","journal-title":"Journal of Functional Programming"},{"key":"21_CR49","unstructured":"Liskov, B., Day, M., Herlihy, M., Johnson, P., Leavens, G., Scheifler, R., Weihl, W.: Argus reference manual. Technical Report MIT-LCS-TR-400, Massachusetts Institute of Technology (November 1987)"},{"key":"21_CR50","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-61630-6_17","volume-title":"Proceedings of the European Workshop on Logics in Artificial Intelligence","author":"G. Smolka","year":"1996","unstructured":"Smolka, G.: The Oz programming model. In: Proceedings of the European Workshop on Logics in Artificial Intelligence, p. 251. Springer, London (1996)"},{"key":"21_CR51","unstructured":"Mehl, M.: The Oz Virtual Machine - Records, Transients, and Deep Guards. PhD thesis, Technische Fakult\u00e4t der Universit\u00e4t des Saarlandes (1999)"},{"issue":"3","key":"21_CR52","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1145\/72551.72555","volume":"21","author":"E. Shapiro","year":"1989","unstructured":"Shapiro, E.: The family of concurrent logic programming languages. ACM Computing Surveys\u00a021(3), 413\u2013510 (1989)","journal-title":"ACM Computing Surveys"},{"issue":"8","key":"21_CR53","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MC.1986.1663307","volume":"19","author":"E. Shapiro","year":"1986","unstructured":"Shapiro, E.: Concurrent Prolog: A progress report. Computer\u00a019(8), 44\u201358 (1986)","journal-title":"Computer"},{"key":"21_CR54","unstructured":"Armstrong, J.: Making Reliable Distributed Systems in the Presence of Software Errors. PhD thesis, Swedish Institute of Computer Science (November 2003)"},{"key":"21_CR55","doi-asserted-by":"crossref","unstructured":"DeLine, R., Fahndrich, M.: Typestates for objects. In: Proceedings of the 18th European Conference on Object-Oriented Programming (2004)","DOI":"10.1007\/978-3-540-24851-4_21"},{"key":"21_CR56","doi-asserted-by":"crossref","unstructured":"Bierhoff, K., Aldrich, J.: Modular typestate checking of aliased objects. In: Proceedings of the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems and Applications, pp. 301\u2013320 (2007)","DOI":"10.1145\/1297027.1297050"},{"key":"21_CR57","doi-asserted-by":"crossref","unstructured":"Puntigam, F.: Internal and external token-based synchronization in object-oriented languages. In: Modular Programming Languages, Proceedings of the 7th Joint Modular Languages Conference, pp. 251\u2013270 (2006)","DOI":"10.1007\/11860990_16"},{"key":"21_CR58","doi-asserted-by":"crossref","unstructured":"Welsh, M., Culler, D.E., Brewer, E.A.: SEDA: An architecture for well-conditioned, scalable internet services. In: Proceedings of the Eighteenth Symposium on Operating Systems Principles (October 2001)","DOI":"10.1145\/502034.502057"}],"container-title":["Lecture Notes in Computer Science","ECOOP 2008 \u2013 Object-Oriented Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-70592-5_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:08:25Z","timestamp":1605762505000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-70592-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540705918","9783540705925"],"references-count":58,"URL":"http:\/\/dx.doi.org\/10.1007\/978-3-540-70592-5_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}