Scalable and Secure Resource Location
暂无分享,去创建一个
[1] Baruch Awerbuch,et al. Online tracking of mobile users , 1995, JACM.
[2] Carl Lagoze,et al. The Networked Computer Science Technical Report Library , 1996 .
[3] Sara Radicati,et al. X.500 directory services: Technology and deployment , 1994 .
[4] Paul V. Mockapetris. The domain name system , 1984 .
[5] Yvo Desmedt,et al. Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.
[6] N. Bailey,et al. The mathematical theory of infectious diseases and its applications. 2nd edition. , 1975 .
[7] C. H. Moore,et al. FORTH: a new Way to Program a Mini Computer , 1974 .
[8] J. Nunamaker,et al. Proceedings of the 32nd Hawaii International Conference on System Sciences , 1999 .
[9] Franz J. Hauck,et al. Locating objects in wide-area systems , 1998, IEEE Commun. Mag..
[10] Richard A. Golding. A Weak-Consistency Architecture for Distributed Information Services , 1992, Comput. Syst..
[11] Doug Terry,et al. Epidemic algorithms for replicated database maintenance , 1988, OPSR.
[12] Marvin Theimer,et al. Flexible update propagation for weakly consistent replication , 1997, SOSP.
[13] Robbert van Renesse,et al. A Gossip-Style Failure Detection Service , 2009 .
[14] Kenneth P. Birman,et al. Bimodal multicast , 1999, TOCS.