We study consensus in a message-passing system where only some of the Ò¾ links exhibit some synchrony. This problem was previously studied for systems with process crashes; we n...
Protocol failures are presented for two timestamping schemes. These failures emphasize the importance and di culty of implementing a secure protocol even though there exist secure...
— Bandwidth constraint models have been a topic of intense discussions at the IETF meetings. Three conventional methods have been described in informational IETF RFCs and their p...
Joshua B. Goldberg, Sukrit Dasgupta, Jaudelice Cav...
We propose a novel method to measure the dependability of journaling file systems. In our approach, we build models of how journaling file systems must behave under different jo...
Vijayan Prabhakaran, Andrea C. Arpaci-Dusseau, Rem...
Complex systems researchers have looked to the Internet as a possible source of interesting emergent behaviour. Indeed, some high profile failures, and some low level phenomena, m...