Filters








440 Hits in 3.6 sec

Improved Periodic Data Retrieval in Asynchronous Rings with a Faulty Host [chapter]

Evangelos Bampas, Nikos Leonardos, Euripides Markou, Aris Pagourtzis, Matoula Petrolia
2014 Lecture Notes in Computer Science  
On the positive side, we propose an optimal protocol for Periodic Data Retrieval in asynchronous rings with a gray hole, which solves the problem with only 4 agents.  ...  In a recent work, Královič and Miklík [SIROCCO 2010, LNCS 6058, pp. 157-167] considered various types of malicious host behavior in the context of the Periodic Data Retrieval problem in asynchronous ring  ...  Moreover, we proposed an optimal, with respect to the number of agents, protocol for Periodic Data Retrieval in asynchronous rings with a gray hole, improving the previous upper bound of 9 agents and settling  ... 
doi:10.1007/978-3-319-09620-9_27 fatcat:3vomwuzoqffrxp6vxr7vrvwdl4

Improved periodic data retrieval in asynchronous rings with a faulty host

Evangelos Bampas, Nikos Leonardos, Euripides Markou, Aris Pagourtzis, Matoula Petrolia
2015 Theoretical Computer Science  
On the positive side, we propose an optimal protocol for Periodic Data Retrieval in asynchronous rings with a gray hole, which solves the problem with only 4 agents.  ...  In a recent work, Královič and Miklík [SIROCCO 2010, LNCS 6058, pp. 157-167] considered various types of malicious host behavior in the context of the Periodic Data Retrieval problem in asynchronous ring  ...  Moreover, we proposed an optimal, with respect to the number of agents, protocol for Periodic Data Retrieval in asynchronous rings with a gray hole, improving the previous upper bound of 9 agents and settling  ... 
doi:10.1016/j.tcs.2015.09.019 fatcat:6hwbtigaknat7k3p4dywrojemq

Faulty Node Repair and Dynamically Spawned Black Hole Search [chapter]

Wei Shi, Mengfei Peng, Jean-Pierre Corriveau, William Lee Croft
2017 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
We continue by proposing an algorithm to solve this problem in an asynchronous ring network with only one whiteboard (which resides in a node called the homebase).  ...  This justifies protecting network assets and mitigating the risk associated with attacks. In a distributed environment, researchers aim, in particular, at eliminating faulty network entities.  ...  [29] research a periodic data retrieval problem using a whiteboard in asynchronous ring networks with a malicious host.  ... 
doi:10.1007/978-3-319-59608-2_8 fatcat:ercaxwwm3zb7nivqbbxivclygu

Building global and scalable systems with atomic multicast

Samuel Benz, Parisa Jalili Marandi, Fernando Pedone, Benoît Garbinato
2014 Proceedings of the 15th International Middleware Conference on - Middleware '14  
Here, replication plays a central role, as it contributes to improve the user experience by hiding failures and by providing acceptable latency.  ...  We substantiate our claim with the design of two modern online services atop atomic multicast, a strongly consistent keyvalue store and a distributed log.  ...  Our protocols ensure safety under both asynchronous and synchronous execution periods.  ... 
doi:10.1145/2663165.2663323 dblp:conf/middleware/BenzMPG14 fatcat:lpkjlqliejeabisndeig5cflti

Building global and scalable systems with Atomic Multicast [article]

Samuel Benz, Parisa Jalili Marandi, Fernando Pedone, Benoît Garbinato
2014 arXiv   pre-print
Here, replication plays a central role, as it contributes to improve the user experience by hiding failures and by providing acceptable latency.  ...  We substantiate our claim with the design of two modern online services atop atomic multicast, a strongly consistent key-value store and a distributed log.  ...  Our protocols ensure safety under both asynchronous and synchronous execution periods.  ... 
arXiv:1406.7540v1 fatcat:6deud2tgevh3to4st6zimop364

Toward a high availability cloud: Techniques and challenges

Cuong Pham, Phuong Cao, Zbigniew Kalbarczyk, Ravishankar K. Iyer
2012 IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)  
With its geographical spread and value proposition comes the need to provide guaranteed level of availability in the infrastructure and in its services.  ...  Multicore processing, virtualization, distributed storage systems and an overarching management framework that enable a Cloud, offer a plethora of possibilities to provide high availability using commodity  ...  ACKNOWLEDGMENT This work was supported in part by NSF grant CNS 10-18503 CISE, the Department of Energy under Award Number DE-OE0000097, the Air Force Office of Scientific Research, under agreement number  ... 
doi:10.1109/dsnw.2012.6264687 dblp:conf/dsn/PhamCKI12 fatcat:chins7svy5h2rihrlnqcsyhc7e

Design and Implementation of a Pluggable Fault-Tolerant CORBA Infrastructure

W. Zhao, L.E. Moser, P.M. Melliar-Smith
2004 Cluster Computing  
In this paper we present the design and implementation of a Pluggable Fault Tolerant CORBA Infrastructure that provides fault tolerance for CORBA applications by utilizing the pluggable protocols framework  ...  Moreover, it avoids the difficulty of retrieving and assigning the ORB state, by incorporating the fault tolerance mechanisms into the ORB.  ...  If Totem receives a response with a faulty indication, or if it does not receive a response from the object-level fault detector within a specified timeout period, it shuts down the faulty process and  ... 
doi:10.1023/b:clus.0000039492.80219.e5 fatcat:vmyfnvuubvecnlkcjol57nhlo4

Design and implementation of a pluggable fault tolerant CORBA infrastructure

W. Zhao, L. E. Moser, P. M. Melliar-Smith
2002 Proceedings 16th International Parallel and Distributed Processing Symposium  
In this paper we present the design and implementation of a Pluggable Fault Tolerant CORBA Infrastructure that provides fault tolerance for CORBA applications by utilizing the pluggable protocols framework  ...  Moreover, it avoids the difficulty of retrieving and assigning the ORB state, by incorporating the fault tolerance mechanisms into the ORB.  ...  If Totem receives a response with a faulty indication, or if it does not receive a response from the object-level fault detector within a specified timeout period, it shuts down the faulty process and  ... 
doi:10.1109/ipdps.2002.1015513 dblp:conf/ipps/ZhaoMM02 fatcat:2bhgm7nivrdjfbcvieema3ry6u

e-SAFE: An Extensible, Secure and Fault Tolerant Storage System

Sandip Agarwala, Arnab Paul, Umakishore Ramachandran, Karsten Schwan
2007 First International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2007)  
such as periodic repairs, and very high availability at an archival scale. e-SAFE is designed to provide a storage utility for environments such as large-scale data centers in enterprise networks where  ...  Consequently, the design goals of e-SAFE is to provide high load resilience in a seamlessly extensible way. e-SAFE is based on the simple principle: efficiently sprinkle data all over a distributed storage  ...  For a client issuing a read request therefore, data becomes practically unavailable if it is not retrieved within a threshold latency period.  ... 
doi:10.1109/saso.2007.21 dblp:conf/saso/AgarwalaPRS07 fatcat:77am2joajvbtfnxrrcqrfc4nle

Self-Organizing Fair Job Scheduling among Mobile Devices

Karin Anna Hummel, Harald Meyer
2008 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops  
In simulation runs, we achieved an improvement of fair load distribution which remained robust even in the presence of faults.  ...  Disconnections of wireless links can be masked from applications as proposed for reliable sockets in [21] on This paper is a preprint of the published work and restricted to personal use only.  ...  Acknowledgment The work described in this paper is partially supported by the Austrian Grid Project, funded under contract GZ BMWF-10.220/0002-II/10/2007.  ... 
doi:10.1109/sasow.2008.58 dblp:conf/saso/HummelM08 fatcat:a7fag4jjmnadta5i5s3wdacm6y

MPICH-V: Toward a Scalable Fault Tolerant MPI for Volatile Nodes

G. Bosilca, A. Bouteiller, F. Cappello, S. Djilali, G. Fedak, C. Germain, T. Herault, P. Lemarinier, O. Lodygensky, F. Magniette, V. Neri, A. Selikhov
2002 ACM/IEEE SC 2002 Conference (SC'02)  
This Volatility reduces the MTBF of the whole system in the range of hours or minutes.  ...  We present a detailed performance evaluation of every component of MPICH-V and its global performance for non-trivial parallel applications.  ...  Brigitte Rozoy for their help in the design of MPICH-V general protocol.  ... 
doi:10.1109/sc.2002.10048 dblp:conf/sc/BosilcaBCDFGHLLMNS02 fatcat:qjda5ip2znfc7c6disuqowd2mi

Computing in the RAIN: a reliable array of independent nodes

V. Bohossian, C.C. Fan, P.S. LeMahieu, M.D. Riedel, Lihao Xu, J. Bruck
2001 IEEE Transactions on Parallel and Distributed Systems  
The RAIN technology has been transfered to Rainfinity, a start-up company focusing on creating clustered solutions for improving the performance and availability of Internet data centers.  ...  The RAIN software components run in conjunction with operating system services and standard network protocols.  ...  an agreement with NASA/OSAT.  ... 
doi:10.1109/71.910866 fatcat:435kqmwsvvfdxahugu2cbktaee

Computing in the RAIN: A Reliable Array of Independent Nodes [chapter]

Vasken Bohossian, Charles C. Fan, Paul S. LeMahieu, Marc D. Riedel, Lihao Xu, Jehoshua Bruck
2000 Lecture Notes in Computer Science  
The RAIN technology has been transfered to Rainfinity, a start-up company focusing on creating clustered solutions for improving the performance and availability of Internet data centers.  ...  The RAIN software components run in conjunction with operating system services and standard network protocols.  ...  an agreement with NASA/OSAT.  ... 
doi:10.1007/3-540-45591-4_167 fatcat:iv3iuxxcsvh2hnd2qyemgggumq

AME Blockchain: An Architecture Design for Closed-Loop Fluid Economy Token System [article]

Lanny Z.N. Yuan, Huaibing Jian, Peng Liu, Pengxin Zhu, ShanYang Fu
2018 arXiv   pre-print
In this white paper, we propose a blockchain-based system, named AME, which is a decentralized infrastructure and application platform with enhanced security and self-management properties.  ...  We introduce all major technologies adopted in our system, including blockchain, distributed storage, P2P network, service application framework, and data encryption.  ...  With an optimized routing strategy, ABNN provides fast data retrieval and delivery within 2-3 hops, which significantly improves the efficiency of message broadcast in the network.  ... 
arXiv:1812.08017v1 fatcat:m2tgekvu2jcnnbhxssob4xgh7i

BFT-TO: Intrusion Tolerance with Less Replicas

M. Correia, N. F. Neves, P. Verissimo
2012 Computer journal  
However, most of these systems can tolerate at most f faulty servers out of a total of 3f + 1.  ...  Several performance metrics show that our algorithm, BFT-TO, fares well in comparison with others in the literature.  ...  In an asynchronous system this would require infinite buffers, but in practice message identifiers can be reused periodically, so this data can be stored in a circular buffer in each local TO wormhole.  ... 
doi:10.1093/comjnl/bxs148 fatcat:de2fz6f2xjhhlo2hrsut7sjx34
« Previous Showing results 1 — 15 out of 440 results