Message logging optimization for wireless networks
暂无分享,去创建一个
[1] B. R. Badrinath,et al. Checkpointing distributed applications on mobile computers , 1994, Proceedings of 3rd International Conference on Parallel and Distributed Information Systems.
[2] Michel Banâtre,et al. Ensuring data security and integrity with a fast stable storage , 1988, Proceedings. Fourth International Conference on Data Engineering.
[3] W. Kent Fuchs,et al. Proxy-based recovery for applications on wireless hand-held devices , 2000, Proceedings 19th IEEE Symposium on Reliable Distributed Systems SRDS-2000.
[4] Makoto Takizawa,et al. Checkpoint-recovery protocol for reliable mobile systems , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).
[5] W. Kent Fuchs,et al. Message logging in mobile computing , 1999, Digest of Papers. Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing (Cat. No.99CB36352).
[6] Leslie Lamport,et al. Time, clocks, and the ordering of events in a distributed system , 1978, CACM.
[7] David B. Johnson,et al. Sender-Based Message Logging , 1987 .
[8] LamportLeslie. Time, clocks, and the ordering of events in a distributed system , 1978 .
[9] Peter M. Chen,et al. The systematic improvement of fault tolerance in the Rio file cache , 1999, Digest of Papers. Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing (Cat. No.99CB36352).
[10] Lorenzo Alvisi,et al. Wrapping server-side TCP to mask connection failures , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[11] Wolfgang Graetsch,et al. Fault tolerance under UNIX , 1989, TOCS.
[12] Dhiraj K. Pradhan,et al. Recoverable mobile environment: design and trade-off analysis , 1996, Proceedings of Annual Symposium on Fault Tolerant Computing.