Using virtual links for reliable information retrieval across point-to-point networks
暂无分享,去创建一个
[1] Yechiam Yemini,et al. Controlling window protocols for time-constrained communication in multiple access networks , 1988, IEEE Trans. Commun..
[2] John P. Hayes,et al. A Graph Model for Fault-Tolerant Computing Systems , 1976, IEEE Transactions on Computers.
[3] William McCuaig,et al. A simple proof of Menger's theorem , 1984, J. Graph Theory.
[4] Kang G. Shin,et al. A multiple copy approach for delivering messages under deadline constraints , 1991, [1991] Digest of Papers. Fault-Tolerant Computing: The Twenty-First International Symposium.
[5] Hector Garcia-Molina,et al. Aggressive Transmissions of Short Messages Over Redundant Paths , 1994, IEEE Trans. Parallel Distributed Syst..
[6] Dhiraj K. Pradhan,et al. Flip-Trees: Fault-Tolerant Graphs with Wide Containers , 1988, IEEE Trans. Computers.
[7] Danny Dolev,et al. The Byzantine Generals Strike Again , 1981, J. Algorithms.
[8] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[9] Dhiraj K. Pradhan,et al. Consensus With Dual Failure Modes , 1991, IEEE Trans. Parallel Distributed Syst..
[10] Ariel Orda,et al. Routing with packet duplication and elimination in computer networks , 1988, IEEE Trans. Commun..
[11] Yechiam Yemini,et al. Multiple-access protocols and time-constrained communication , 1984, CSUR.