Sciweavers

329 search results - page 8 / 66
» The Dangers of Replication and a Solution
Sort
View
SIGMOD
2007
ACM
167views Database» more  SIGMOD 2007»
15 years 9 months ago
Data currency in replicated DHTs
Distributed Hash Tables (DHTs) provide a scalable solution for data sharing in P2P systems. To ensure high data availability, DHTs typically rely on data replication, yet without ...
Reza Akbarinia, Esther Pacitti, Patrick Valduriez
GLOBECOM
2006
IEEE
15 years 3 months ago
QoS-aware Object Replication in Overlay Networks
Abstract— Many emerging applications for peer to peer overlays may require nodes to satisfy strict timing deadlines to access a replica of a given object. This includes multimedi...
Won Jong Jeon, Indranil Gupta, Klara Nahrstedt
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 1 months ago
Flow Digest: A State Replication Scheme for Stateful High Availability Cluster
Stateful tracking is a popular technique in firewall filtering and state replication is used to provide reliable connectivity. This paper proposes a new approach for improving exis...
Yi-Hsuan Feng, Nen-Fu Huang, Rong-Tai Liu, Meng-Hu...
WDAS
1998
14 years 11 months ago
Data Replication and Delay Balancing in Heterogeneous Disk Systems
Declustering and replication are well known techniques used to improve response time of queries in parallel disk environments. As data replication incurs a penalty for updates, da...
Doron Rotem, Sridhar Seshadri, Luis M. Bernardo
CSREAESA
2008
14 years 11 months ago
Security Observance throughout the Life-Cycle of Embedded Systems
- Embedded systems are an established part of life. Their security requirements underline the importance of properly formulated, implemented, and enforced security policies through...
S. Hasan Mirjalili, Arjen K. Lenstra