A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Implementing Trustworthy Services Using Replicated State Machines
[chapter]
2005
Lecture Notes in Computer Science
ivide and conquer" can be a powerful tool for disentangling complexity when designing a computing system. However, some aspects of system design are inseparable. Treating these as though they were independent leads to one interfering with the other, and "divide and be conquered" perhaps better characterizes the consequences. For some years, we have been investigating how to construct systems that continue functioning despite component failures and attacks. A question we have pondered is to what
doi:10.1007/978-3-642-11294-2_8
fatcat:pjsapx7n4fgv5ms7v2fhvg4yjq