Sciweavers

10909 search results - page 4 / 2182
» Evaluating Backup Algorithms
Sort
View
EDCC
2008
Springer
14 years 11 months ago
Targeted Distribution of Resource Allocation for Backup LSP Computation
Under the hypothesis of single failures in the network, some backup paths cannot be active at the same time because they protect against the failure of different components. Hence...
Mohand Yazid Saidi, Bernard Cousin, Jean-Louis Le ...
ICC
2007
IEEE
146views Communications» more  ICC 2007»
15 years 3 months ago
A Delay-Constrained Shared Mesh Restoration Scheme
—We present a multi-constrained routing algorithm, called Delay-constrained Pool Sharing (DPS), in a survivable mesh network. The goal of this algorithm is to find a pair of link...
Hassan Naser, Ming Gong
SIGCOMM
2010
ACM
14 years 9 months ago
On-line consistent backup in transactional file systems
A consistent backup, preserving data integrity across files in a file system, is of utmost importance for the purpose of correctness and minimizing system downtime during the proc...
Lipika Deka, Gautam Barua
ATAL
2010
Springer
14 years 10 months ago
Point-based backup for decentralized POMDPs: complexity and new algorithms
Decentralized POMDPs provide an expressive framework for sequential multi-agent decision making. Despite their high complexity, there has been significant progress in scaling up e...
Akshat Kumar, Shlomo Zilberstein