A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Improved Periodic Data Retrieval in Asynchronous Rings with a Faulty Host
[chapter]
2014
Lecture Notes in Computer Science
On the positive side, we propose an optimal protocol for Periodic Data Retrieval in asynchronous rings with a gray hole, which solves the problem with only 4 agents. ...
In a recent work, Královič and Miklík [SIROCCO 2010, LNCS 6058, pp. 157-167] considered various types of malicious host behavior in the context of the Periodic Data Retrieval problem in asynchronous ring ...
Moreover, we proposed an optimal, with respect to the number of agents, protocol for Periodic Data Retrieval in asynchronous rings with a gray hole, improving the previous upper bound of 9 agents and settling ...
doi:10.1007/978-3-319-09620-9_27
fatcat:3vomwuzoqffrxp6vxr7vrvwdl4
Improved periodic data retrieval in asynchronous rings with a faulty host
2015
Theoretical Computer Science
On the positive side, we propose an optimal protocol for Periodic Data Retrieval in asynchronous rings with a gray hole, which solves the problem with only 4 agents. ...
In a recent work, Královič and Miklík [SIROCCO 2010, LNCS 6058, pp. 157-167] considered various types of malicious host behavior in the context of the Periodic Data Retrieval problem in asynchronous ring ...
Moreover, we proposed an optimal, with respect to the number of agents, protocol for Periodic Data Retrieval in asynchronous rings with a gray hole, improving the previous upper bound of 9 agents and settling ...
doi:10.1016/j.tcs.2015.09.019
fatcat:6hwbtigaknat7k3p4dywrojemq
Faulty Node Repair and Dynamically Spawned Black Hole Search
[chapter]
2017
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
We continue by proposing an algorithm to solve this problem in an asynchronous ring network with only one whiteboard (which resides in a node called the homebase). ...
This justifies protecting network assets and mitigating the risk associated with attacks. In a distributed environment, researchers aim, in particular, at eliminating faulty network entities. ...
[29] research a periodic data retrieval problem using a whiteboard in asynchronous ring networks with a malicious host. ...
doi:10.1007/978-3-319-59608-2_8
fatcat:ercaxwwm3zb7nivqbbxivclygu
Building global and scalable systems with atomic multicast
2014
Proceedings of the 15th International Middleware Conference on - Middleware '14
Here, replication plays a central role, as it contributes to improve the user experience by hiding failures and by providing acceptable latency. ...
We substantiate our claim with the design of two modern online services atop atomic multicast, a strongly consistent keyvalue store and a distributed log. ...
Our protocols ensure safety under both asynchronous and synchronous execution periods. ...
doi:10.1145/2663165.2663323
dblp:conf/middleware/BenzMPG14
fatcat:lpkjlqliejeabisndeig5cflti
Building global and scalable systems with Atomic Multicast
[article]
2014
arXiv
pre-print
Here, replication plays a central role, as it contributes to improve the user experience by hiding failures and by providing acceptable latency. ...
We substantiate our claim with the design of two modern online services atop atomic multicast, a strongly consistent key-value store and a distributed log. ...
Our protocols ensure safety under both asynchronous and synchronous execution periods. ...
arXiv:1406.7540v1
fatcat:6deud2tgevh3to4st6zimop364
Toward a high availability cloud: Techniques and challenges
2012
IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)
With its geographical spread and value proposition comes the need to provide guaranteed level of availability in the infrastructure and in its services. ...
Multicore processing, virtualization, distributed storage systems and an overarching management framework that enable a Cloud, offer a plethora of possibilities to provide high availability using commodity ...
ACKNOWLEDGMENT This work was supported in part by NSF grant CNS 10-18503 CISE, the Department of Energy under Award Number DE-OE0000097, the Air Force Office of Scientific Research, under agreement number ...
doi:10.1109/dsnw.2012.6264687
dblp:conf/dsn/PhamCKI12
fatcat:chins7svy5h2rihrlnqcsyhc7e
Design and Implementation of a Pluggable Fault-Tolerant CORBA Infrastructure
2004
Cluster Computing
In this paper we present the design and implementation of a Pluggable Fault Tolerant CORBA Infrastructure that provides fault tolerance for CORBA applications by utilizing the pluggable protocols framework ...
Moreover, it avoids the difficulty of retrieving and assigning the ORB state, by incorporating the fault tolerance mechanisms into the ORB. ...
If Totem receives a response with a faulty indication, or if it does not receive a response from the object-level fault detector within a specified timeout period, it shuts down the faulty process and ...
doi:10.1023/b:clus.0000039492.80219.e5
fatcat:vmyfnvuubvecnlkcjol57nhlo4
Design and implementation of a pluggable fault tolerant CORBA infrastructure
2002
Proceedings 16th International Parallel and Distributed Processing Symposium
In this paper we present the design and implementation of a Pluggable Fault Tolerant CORBA Infrastructure that provides fault tolerance for CORBA applications by utilizing the pluggable protocols framework ...
Moreover, it avoids the difficulty of retrieving and assigning the ORB state, by incorporating the fault tolerance mechanisms into the ORB. ...
If Totem receives a response with a faulty indication, or if it does not receive a response from the object-level fault detector within a specified timeout period, it shuts down the faulty process and ...
doi:10.1109/ipdps.2002.1015513
dblp:conf/ipps/ZhaoMM02
fatcat:2bhgm7nivrdjfbcvieema3ry6u
e-SAFE: An Extensible, Secure and Fault Tolerant Storage System
2007
First International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2007)
such as periodic repairs, and very high availability at an archival scale. e-SAFE is designed to provide a storage utility for environments such as large-scale data centers in enterprise networks where ...
Consequently, the design goals of e-SAFE is to provide high load resilience in a seamlessly extensible way. e-SAFE is based on the simple principle: efficiently sprinkle data all over a distributed storage ...
For a client issuing a read request therefore, data becomes practically unavailable if it is not retrieved within a threshold latency period. ...
doi:10.1109/saso.2007.21
dblp:conf/saso/AgarwalaPRS07
fatcat:77am2joajvbtfnxrrcqrfc4nle
Self-Organizing Fair Job Scheduling among Mobile Devices
2008
2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops
In simulation runs, we achieved an improvement of fair load distribution which remained robust even in the presence of faults. ...
Disconnections of wireless links can be masked from applications as proposed for reliable sockets in [21] on This paper is a preprint of the published work and restricted to personal use only. ...
Acknowledgment The work described in this paper is partially supported by the Austrian Grid Project, funded under contract GZ BMWF-10.220/0002-II/10/2007. ...
doi:10.1109/sasow.2008.58
dblp:conf/saso/HummelM08
fatcat:a7fag4jjmnadta5i5s3wdacm6y
MPICH-V: Toward a Scalable Fault Tolerant MPI for Volatile Nodes
2002
ACM/IEEE SC 2002 Conference (SC'02)
This Volatility reduces the MTBF of the whole system in the range of hours or minutes. ...
We present a detailed performance evaluation of every component of MPICH-V and its global performance for non-trivial parallel applications. ...
Brigitte Rozoy for their help in the design of MPICH-V general protocol. ...
doi:10.1109/sc.2002.10048
dblp:conf/sc/BosilcaBCDFGHLLMNS02
fatcat:qjda5ip2znfc7c6disuqowd2mi
Computing in the RAIN: a reliable array of independent nodes
2001
IEEE Transactions on Parallel and Distributed Systems
The RAIN technology has been transfered to Rainfinity, a start-up company focusing on creating clustered solutions for improving the performance and availability of Internet data centers. ...
The RAIN software components run in conjunction with operating system services and standard network protocols. ...
an agreement with NASA/OSAT. ...
doi:10.1109/71.910866
fatcat:435kqmwsvvfdxahugu2cbktaee
Computing in the RAIN: A Reliable Array of Independent Nodes
[chapter]
2000
Lecture Notes in Computer Science
The RAIN technology has been transfered to Rainfinity, a start-up company focusing on creating clustered solutions for improving the performance and availability of Internet data centers. ...
The RAIN software components run in conjunction with operating system services and standard network protocols. ...
an agreement with NASA/OSAT. ...
doi:10.1007/3-540-45591-4_167
fatcat:iv3iuxxcsvh2hnd2qyemgggumq
AME Blockchain: An Architecture Design for Closed-Loop Fluid Economy Token System
[article]
2018
arXiv
pre-print
In this white paper, we propose a blockchain-based system, named AME, which is a decentralized infrastructure and application platform with enhanced security and self-management properties. ...
We introduce all major technologies adopted in our system, including blockchain, distributed storage, P2P network, service application framework, and data encryption. ...
With an optimized routing strategy, ABNN provides fast data retrieval and delivery within 2-3 hops, which significantly improves the efficiency of message broadcast in the network. ...
arXiv:1812.08017v1
fatcat:m2tgekvu2jcnnbhxssob4xgh7i
BFT-TO: Intrusion Tolerance with Less Replicas
2012
Computer journal
However, most of these systems can tolerate at most f faulty servers out of a total of 3f + 1. ...
Several performance metrics show that our algorithm, BFT-TO, fares well in comparison with others in the literature. ...
In an asynchronous system this would require infinite buffers, but in practice message identifiers can be reused periodically, so this data can be stored in a circular buffer in each local TO wormhole. ...
doi:10.1093/comjnl/bxs148
fatcat:de2fz6f2xjhhlo2hrsut7sjx34
« Previous
Showing results 1 — 15 out of 440 results