Author:
Suzuki Tabito,Ohara Mamoru,Arai Masayuki,Fukumoto Satoshi,Iwasaki Kazuhiko
Publisher
Information Processing Society of Japan
Reference18 articles.
1. 1) Avizienis, A., Laprie, J.C., Randell, B. and Landwehr, C.: Basic Concepts and Taxonomy of Dependable and Secure Computing, IEEE Trans. on Dependable and Secure Computing, Vol.1, No.1, pp.11-33 (Jan.-Feb. 2004).
2. 2) Aguilera, M.K., Janakiraman, R. and Xu, L.: Using Erasure Codes Efficiently for Storage in a Distributed System, Int'l Conf. on Dependable Systems and Networks, pp.336-345 (June 2005).
3. 3) Bernstein, P.A., Hadzilacos, V. and Goodman, N.: Concurrency Control and Recovery in Database Systems, Addison-Wesly (1987).
4. Web search for a planet: the google cluster architecture
5. Conflict detection tradeoffs for replicated data