ACM SIGACT news distributed computing column 34: distributed computing in the clouds
暂无分享,去创建一个
[1] Idit Keidar,et al. Group communication specifications: a comprehensive study , 2001, CSUR.
[2] Eliezer Dekel,et al. Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware , 2008 .
[3] Brett D. Fleisch,et al. The Chubby lock service for loosely-coupled distributed systems , 2006, OSDI '06.
[4] Ravi Kumar,et al. Pig latin: a not-so-foreign language for data processing , 2008, SIGMOD Conference.
[5] Maurice Herlihy,et al. Linearizability: a correctness condition for concurrent objects , 1990, TOPL.
[6] Scott Shenker,et al. Attested append-only memory: making adversaries stick to their word , 2007, SOSP.
[7] Yoav Tock,et al. Gravity: An Interest-Aware Publish/Subscribe System Based on Structured Overlays , 2008, DEBS 2008.
[8] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[9] Robbert van Renesse,et al. Astrolabe: A robust and scalable technology for distributed system monitoring, management, and data mining , 2003, TOCS.
[10] Yair Amir,et al. Paxos for System Builders: an overview , 2008, LADIS '08.
[11] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[12] Nancy A. Lynch,et al. Rambo II: rapidly reconfigurable atomic memory for dynamic networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[13] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[14] Michael K. Reiter,et al. Low-overhead byzantine fault-tolerant storage , 2007, SOSP.
[15] Flaviu Cristian,et al. Fail-awareness in timed asynchronous systems , 1996, PODC '96.
[16] Idit Keidar,et al. Fork sequential consistency is blocking , 2009, Inf. Process. Lett..
[17] David Mazières,et al. Beyond One-Third Faulty Replicas in Byzantine Fault Tolerant Systems , 2007, NSDI.
[18] Michael K. Reiter,et al. Byzantine quorum systems , 1997, STOC '97.
[19] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[20] Michael Dahlin,et al. A scalable distributed information management system , 2004, SIGCOMM.
[21] Wilson C. Hsieh,et al. Bigtable: A Distributed Storage System for Structured Data , 2006, TOCS.
[22] Gene Tsudik,et al. Authentication and integrity in outsourced databases , 2006, TOS.
[23] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[24] Hans-Arno Jacobsen,et al. PNUTS: Yahoo!'s hosted data serving platform , 2008, Proc. VLDB Endow..
[25] Michael K. Reiter,et al. On Consistency of Encrypted Files , 2006, DISC.
[26] Ramakrishna Kotla,et al. Zyzzyva , 2007, SOSP.
[27] GhemawatSanjay,et al. The Google file system , 2003 .
[28] Marcos K. Aguilera,et al. Sinfonia: a new paradigm for building scalable distributed systems , 2007, SOSP.
[29] Hagit Attiya,et al. Sharing memory robustly in message-passing systems , 1990, PODC '90.
[30] James R. Hamilton,et al. On Designing and Deploying Internet-Scale Services , 2007, LISA.
[31] Hovav Shacham,et al. SiRiUS: Securing Remote Untrusted Storage , 2003, NDSS.
[32] Leslie Lamport,et al. The part-time parliament , 1998, TOCS.
[33] Idit Keidar,et al. Fail-Aware Untrusted Storage , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[34] Jim Gray,et al. Scalability Terminology: Farms, Clones, Partitions, Packs, RACS and RAPS , 1999, ArXiv.
[35] Radek Vingralek,et al. How to build a trusted database system on untrusted storage , 2000, OSDI.
[36] Wolf-Dietrich Weber,et al. Power provisioning for a warehouse-sized computer , 2007, ISCA '07.
[37] Robbert van Renesse,et al. Efficient reconciliation and flow control for anti-entropy protocols , 2008, LADIS '08.
[38] Edward Bortnikov,et al. Open-source grid technologies for web-scale computing , 2009, SIGA.
[39] BirmanKen,et al. Toward a cloud computing research agenda , 2009 .
[40] Randy H. Katz,et al. Improving MapReduce Performance in Heterogeneous Environments , 2008, OSDI.
[41] Roberto Tamassia,et al. Authenticated hash tables , 2008, CCS.
[42] Yoav Tock,et al. SpiderCast: a scalable interest-aware overlay for topic-based pub/sub communication , 2007, DEBS '07.
[43] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.
[44] Yuan Yu,et al. Dryad: distributed data-parallel programs from sequential building blocks , 2007, EuroSys '07.
[45] Edmund L. Wong,et al. BFT: the time is now , 2008, LADIS '08.
[46] Maurice Herlihy,et al. Wait-free synchronization , 1991, TOPL.
[47] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[48] Petr Kuznetsov,et al. Zeno: Eventually Consistent Byzantine-Fault Tolerance , 2009, NSDI.
[49] Michael Isard,et al. DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language , 2008, OSDI.
[50] Mustaque Ahamad,et al. Slow memory: weakening consistency to enhance concurrency in distributed shared memories , 1990, Proceedings.,10th International Conference on Distributed Computing Systems.
[51] Dennis Shasha,et al. Secure Untrusted Data Repository (SUNDR) , 2004, OSDI.
[52] Werner Vogels,et al. Dynamo: amazon's highly available key-value store , 2007, SOSP.
[53] Dennis Gannon,et al. Cloud computing architecture and application programming: DISC'09 tutorial, half day, Sept. 22nd 2009 , 2009, SIGA.
[54] Abhi Shelat,et al. Efficient fork-linearizable access to untrusted shared memory , 2007, PODC '07.
[55] Jeffrey S. Chase,et al. Strong accountability for network storage , 2007, TOS.
[56] Dennis Shasha,et al. Building secure file systems out of byzantine storage , 2002, PODC '02.
[57] Marc Najork,et al. Boxwood: Abstractions as the Foundation for Storage Infrastructure , 2004, OSDI.
[58] Idit Keidar,et al. Byzantine disk paxos: optimal resilience with byzantine shared memory , 2004, PODC '04.
[59] Benjamin Reed,et al. A simple totally ordered broadcast protocol , 2008, LADIS '08.
[60] Andreas Reuter,et al. Transaction Processing: Concepts and Techniques , 1992 .
[61] Petr Kuznetsov,et al. Defining weakly consistent Byzantine fault-tolerant services , 2008, LADIS '08.
[62] Christopher Olston,et al. Interactive Analysis of Web-Scale Data , 2009, CIDR.
[63] Manuel Blum,et al. Checking the correctness of memories , 2005, Algorithmica.
[64] Leslie Lamport,et al. How to Make a Multiprocessor Computer That Correctly Executes Multiprocess Programs , 2016, IEEE Transactions on Computers.
[65] Marvin Theimer,et al. Managing update conflicts in Bayou, a weakly connected replicated storage system , 1995, SOSP.