Offsite 2-Way Data Replication towards Improving Data Refresh Performance
暂无分享,去创建一个
Nazia Azim | Fazlullah Khan | Syed Roohullah Jan | Adnan Khan | A. Khan | Nazia Azim | F. Khan | Abdul Majid | Muhammad Tahir | Abdul Majid | Muhammad Tahir | Fazlullah Khan | Syed Abdul Majid | Roohullah Jan
[1] Syed Roohullah Jan,et al. Issues In Global Software Development (Communication, Coordination and Trust) - A Critical Review , 2016 .
[2] Darrell D. E. Long,et al. Quorum-oriented multicast protocols for data replication , 1992, [1992] Eighth International Conference on Data Engineering.
[3] Gustavo Alonso,et al. Database replication techniques: a three parameter classification , 2000, Proceedings 19th IEEE Symposium on Reliable Distributed Systems SRDS-2000.
[4] Nazia Azim,et al. EEC : Evaluation of Energy Consumption in Wireless Sensor Networks , 2016 .
[5] Peter L. Reiher,et al. Roam: A Scalable Replication System for Mobility , 2004, Mob. Networks Appl..
[6] Iftikhar Ahmad,et al. A New Robust Video Watermarking Technique Using H.264/AAC Codec Luma Components Based On DCT , 2016 .
[7] Muhammad Tahir,et al. PSOFuzzySVM-TMH: identification of transmembrane helix segments using ensemble feature space by incorporated fuzzy support vector machine. , 2015, Molecular bioSystems.
[8] Fazlullah Khan,et al. An Innovative Approach to Investigate Various Software Testing Techniques and Strategies , 2016 .
[9] Jinjun Chen,et al. A dynamic prime number based efficient security mechanism for big sensing data streams , 2017, J. Comput. Syst. Sci..
[10] Kenji Nakagawa,et al. Comparative study of spectrum sensing techniques in cognitive radio networks , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).
[11] Geoffrey H. Kuenning,et al. Measuring the Quality of Service of Optimistic Replication , 1998, ECOOP Workshops.
[12] Deepak Puthal,et al. Effective Machine to Machine Communications in Smart Grid Networks , 2012 .
[13] Sameerchand Pudaruth,et al. PEOPLE FACTORS IN AGILE SOFTWARE DEVELOPMENT AND PROJECT MANAGEMENT , 2012 .
[14] Mahadev Satyanarayanan,et al. Disconnected Operation in the Coda File System , 1999, Mobidata.
[15] Fazlullah Khan,et al. Secure communication and routing architecture in wireless sensor networks , 2014, 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE).
[16] Daniel J. Abadi,et al. Calvin: fast distributed transactions for partitioned database systems , 2012, SIGMOD Conference.
[17] Qun Li,et al. Research on the Backup Mechanism of Oracle Database , 2009, 2009 International Conference on Environmental Science and Information Application Technology.
[18] Bruce Walker,et al. The LOCUS distributed operating system , 1983, SOSP '83.
[19] Deepak Puthal,et al. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN: Secure and Energy efficient data collection technique , 2012 .
[20] Xiangjian He,et al. Cryptography-based secure data storage and sharing using HEVC and public clouds , 2017, Inf. Sci..
[21] Shahzad Khan,et al. Performance improvement in wireless sensor and actor networks based on actor repositioning , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).
[22] Mohamed Ziauddin,et al. Materialized Views in Oracle , 1998, VLDB.
[23] Fahim Arif,et al. Fairness improvement in long chain multihop wireless ad hoc networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).
[24] Guoqiong Liao,et al. Data Synchronization and Resynchronization for Heterogeneous Databases Replication in Middleware-based Architecture , 2012, J. Networks.
[25] Jinjun Chen,et al. A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream , 2015, WISE.
[26] Mian Ahmad Jan,et al. Energy-efficient routing and secure communication in wireless sensor networks , 2016 .
[27] Xiangjian He,et al. PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..
[28] Mian Ahmad Jan,et al. A Survey of Cluster-based Hierarchical Routing Protocols , 2013 .
[29] Shahzad,et al. RECOMMENDER SYSTEM ON STRUCTURED DATA , 2016 .
[30] YED,et al. SURVEY: DEALING NON-FUNCTIONAL REQUIREMENTS AT ARCHITECTURE LEVEL , 2016 .
[31] Xiangjian He,et al. PASCCC: Priority-based application-specific congestion control clustering protocol , 2014, Comput. Networks.
[32] Jinjun Chen,et al. DPBSV -- An Efficient and Secure Scheme for Big Sensing Data Stream , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[33] Farman Ullah,et al. A Survey: Embedded Systems Supporting By Different Operating Systems , 2016, ArXiv.
[34] F. Chanchary. Data Migration : Connecting Databases in the Cloud , 2012 .
[35] Michael J. Fischer,et al. Sacrificing serializability to attain high availability of data in an unreliable network , 1982, PODS.
[36] B. Pokharel. Power Shortage, its impacts and the Hydropower Sustainability Assessment Protocol: in the context of South Asia , 2010 .
[37] Ioan Filip,et al. Considerations about an Oracle database multi-master replication , 2009, 2009 5th International Symposium on Applied Computational Intelligence and Informatics.
[38] F. Khan,et al. Dual head clustering scheme in wireless sensor networks , 2012, 2012 International Conference on Emerging Technologies.
[39] Xiangjian He,et al. Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN , 2013, WWIC.
[40] Xiangjian He,et al. A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[41] Xiangjian He,et al. Enhancing Lifetime and Quality of Data in Cluster-Based Hierarchical Routing Protocol for Wireless Sensor Network , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.
[42] Muhammad Babar,et al. Applications and Challenges Faced by Internet of Things - A Survey , 2016 .
[43] Xiangjian He,et al. A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[44] Peter L. Reiher,et al. A simulation evaluation of optimistic replicated filing in mobile environments , 1999, 1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305).
[45] Philippe Jacquet,et al. Comparative Study of Routing Protocols for Mobile Ad-hoc NETworks , 2002 .
[46] Gustavo Alonso,et al. Database replication , 2010, Proc. VLDB Endow..
[47] Hakik Paci,et al. Adding a new site in an existing Oracle Multimaster replication without quiescing the replication , 2011, ArXiv.
[48] Xiangjian He,et al. A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..
[49] Miron Livny,et al. Conflict detection tradeoffs for replicated data , 1991, TODS.
[50] Marvin Theimer,et al. Managing update conflicts in Bayou, a weakly connected replicated storage system , 1995, SOSP.