Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices
暂无分享,去创建一个
[1] John Kubiatowicz,et al. Erasure Coding Vs. Replication: A Quantitative Comparison , 2002, IPTPS.
[2] Brian D. Noble,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Pastiche: Making Backup Cheap and Easy , 2022 .
[3] Elena Paslaru Bontas Simperl,et al. OWL2Jess: A Transformational Implementation of the OWL Semantics , 2005, ISPA Workshops.
[4] Ben Y. Zhao,et al. OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.
[5] David Powell,et al. A Survey of Cooperative Backup Mechanisms , 2006 .
[6] David Powell,et al. Security Rationale for a Cooperative Backup Service for Mobile Devices , 2007, LADC.
[7] Antoine Vernois,et al. Data durability in peer to peer storage systems , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..
[8] Valérie Issarny,et al. AdHocFS: sharing files in WLANs , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..
[9] Edgar R. Weippl,et al. Security Ontology: Simulating Threats to Corporate Assets , 2006, ICISS.
[10] Jehoshua Bruck,et al. Low density MDS codes and factors of complete graphs , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[11] Lihao Xu,et al. Hydra: a platform for survivable and secure data storage systems , 2005, StorageSS '05.
[12] Guohong Cao,et al. Supporting Cooperative Caching in Ad Hoc Networks , 2006, IEEE Trans. Mob. Comput..
[13] Craig A. N. Soules,et al. Survivable storage systems , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[14] Charles L. Forgy,et al. Rete: A Fast Algorithm for the Many Patterns/Many Objects Match Problem , 1982, Artif. Intell..
[15] Michael Mitzenmacher,et al. Digital fountains: a survey and look forward , 2004, Information Theory Workshop.
[16] Edgar R. Weippl,et al. Security Ontologies: Improving Quantitative Risk Analysis , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[17] David Powell,et al. Storage Tradeoffs in a Collaborative Backup Service for Mobile Devices , 2006, 2006 Sixth European Dependable Computing Conference.
[18] Kavitha Ranganathan,et al. Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities , 2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).
[19] Zhensheng Zhang,et al. Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: overview and challenges , 2006, IEEE Communications Surveys & Tutorials.
[20] Yves Deswarte,et al. Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[21] H. D. Miller,et al. The Theory Of Stochastic Processes , 1977, The Mathematical Gazette.
[22] John G. Kemeny,et al. Finite Markov chains , 1960 .
[23] Stefan Savage,et al. Total Recall: System Support for Automated Availability Management , 2004, NSDI.
[24] Michel Banâtre,et al. Collaborative backup for dependable mobile applications , 2004, MPAC '04.
[25] Henning Schulzrinne,et al. Seven degrees of separation in mobile ad hoc networks , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).
[26] Spyros Lalis,et al. OmniStore: a system for ubiquitous personal storage management , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).