Distributed systems require strategies to detect and recover from failures. Many protocols for distributed systems employ a strategy based on leases, which grant a leaseholder acc...
Scott Rose, Kevin Bowers, Stephen Quirolgico, Kevi...
—In typical home power-line communication (PLC) networks using contention-based access methods, providing Quality-of-service (QoS) to high-priority users often comes at the expen...
Aakanksha Chowdhery, Sumanth Jagannathan, John M. ...
Social networks on the web are growing dramatically in size and number. The huge popularity of sites like MySpace, Facebook, and others has drawn in hundreds of millions of users,...
After a long period when networking research seemed to be focused mainly on making the existing Internet work better, interest in "clean slate" approaches to network arc...
In response to regulatory focus on secure retention of electronic records, businesses are using magnetic disks configured as write-once read-many (WORM) compliance storage devices...