The increasing popularity of resource exchange through peerto-peer networks has encouraged the development of ways to support more complex commercial transactions over these netwo...
Assigning an application’s fault-tolerance properties (e.g., replication style, checkpointing frequency) statically, and in an arbitrary manner, can lead to the application not ...
In distributed database systems, tables are frequently fragmented and replicated over a number of sites in order to reduce network communication costs. How to fragment, when to rep...
Jon Olav Hauglid, Norvald H. Ryeng, Kjetil N&oslas...
Distributed intrusion detection systems are especially vulnerable to attacks because the components reside at a static location and are connected together into a hierarchical stru...
Initial deployment and subsequent dynamic reconfiguration of a software system is difficult because of the interplay of many interdependent factors, including cost, time, applicat...
Naveed Arshad, Dennis Heimbigner, Alexander L. Wol...