Sciweavers

2214 search results - page 81 / 443
» Dynamic Protocol Recovery
Sort
View
NCA
2005
IEEE
14 years 3 months ago
Slingshot: Time-Critical Multicast for Clustered Applications
Datacenters are complex environments consisting of thousands of failure-prone commodity components connected by fast, high-capacity interconnects. The software running on such dat...
Mahesh Balakrishnan, Stefan Pleisch, Ken Birman
APLAS
2007
ACM
14 years 2 months ago
Timed, Distributed, Probabilistic, Typed Processes
This paper studies types and probabilistic bisimulations for a timed -calculus as an effective tool for a compositional analysis of probabilistic distributed behaviour. The types c...
Martin Berger, Nobuko Yoshida
EUROSYS
2006
ACM
14 years 1 months ago
Fireflies: scalable support for intrusion-tolerant network overlays
This paper describes and evaluates Fireflies, a scalable protocol for supporting intrusion-tolerant network overlays.1 While such a protocol cannot distinguish Byzantine nodes fro...
Håvard D. Johansen, André Allavena, R...
SIGCOMM
1995
ACM
14 years 1 months ago
Log-Based Receiver-Reliable Multicast for Distributed Interactive Simulation
Reliable multicast communication is important in large-scale distributed applications. For example, reliable multicast is used to transmit terrain and environmental updates in dis...
Hugh W. Holbrook, Sandeep K. Singhal, David R. Che...
CASCON
2004
110views Education» more  CASCON 2004»
13 years 11 months ago
Investigations in tree locking for compiled database applications
We report on initial experiments in tree locking schemes for compiled database applications. Such applications have a repository style of architecture in which a collection of sof...
Heng Yu, Grant E. Weddell