Sciweavers

682 search results - page 23 / 137
» Replicable Evaluation of Recommender Systems
Sort
View
EUROSYS
2010
ACM
15 years 3 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
AC
1999
Springer
15 years 2 months ago
Integrating Group Communication with Transactions for Implementing Persistent Replicated Objects
A widely used computational model for constructing fault-tolerant distributed applications employs atomic transactions for controlling operations on persistent objects. There has ...
Mark C. Little, Santosh K. Shrivastava
DEXA
2004
Springer
98views Database» more  DEXA 2004»
15 years 4 months ago
On Improving the Performance Dependability of Unstructured P2P Systems via Replication
Abstract. The ever-increasing popularity of peer-to-peer (P2P) systems provides a strong motivation for designing a dependable P2P system. Dependability in P2P systems can be viewe...
Anirban Mondal, Yi Lifu, Masaru Kitsuregawa
DSN
2008
IEEE
15 years 5 months ago
Byzantine replication under attack
Existing Byzantine-resilient replication protocols satisfy two standard correctness criteria, safety and liveness, in the presence of Byzantine faults. In practice, however, fault...
Yair Amir, Brian A. Coan, Jonathan Kirsch, John La...
SRDS
2006
IEEE
15 years 4 months ago
Adaptive Batching for Replicated Servers
This paper presents two novel generic adaptive batching schemes for replicated servers. Both schemes are oblivious to the underlying communication protocols. Our novel schemes ada...
Roy Friedman, Erez Hadad