Reclaiming space from duplicate files in a serverless distributed file system - Trang 617-624
J.R. Douceur, A. Adya, W.J. Bolosky, P. Simon, M. Theimer
The Farsite distributed file system provides availability by replicating each
file onto multiple desktop computers. Since this replication consumes
significant storage space, it is important to reclaim used space where possible.
Measurement of over 500 desktop file systems shows that nearly half of all
consumed space is occupied by duplicate files. We present a mechanism to reclaim
space from this... hiện toàn bộ
#File systems #Cryptography #Extraterrestrial measurements #Databases #Large-scale systems #File servers #Availability #Fault diagnosis #Secure storage #Distributed computing
Fast Collect in the absence of contention - Trang 537-543
B. Englert, E. Gafni
We present a generic module, called Fast Collect. Fast Collect is an
implementation of single-writer multi-reader (SWMR) shared-memory in an
asynchronous system in which a processor updates its cell and then reads in any
order all the other cells. Our simple implementation of Fast Collect uses some
multiwriter multi-reader (MWMR) variables and one local Boolean per processor,
such that eventually,... hiện toàn bộ
#Concurrent computing #Costs #Software algorithms #Adaptive algorithm #Chromium #Distributed algorithms #Computer bugs #Mathematics #Computer science #Steady-state
Partial database replication using epidemic communication - Trang 485-493
J. Holliday, D. Agrawal, A. El Abbadi
Data replication in distributed databases has been investigated extensively with
the hope that it will improve performance, reliability, and availability.
However the growth of the Internet has shown us that current replica management
do not work well when the replicas are connected by an unreliable network,
subject to congestion and dynamic topology changes. In this paper we present a
replica upd... hiện toàn bộ
#Distributed databases #Transaction databases #Protocols #Network topology #Network servers #Distributed computing #Computer science #Availability #IP networks #Joining processes
Author index - Trang 566-568 - 2002
The author index contains an entry for each author and coauthor included in the
proceedings record.
Improving search in peer-to-peer networks - Trang 5-14
B. Yang, H. Garcia-Molina
Peer-to-peer systems have emerged as a popular way to share huge volumes of
data. The usability of these systems depends on effective techniques to find and
retrieve data; however current techniques used in existing P2P systems are often
very inefficient. We present three techniques for efficient search in P2P
systems. We present the design of these techniques, and then evaluate them using
a combi... hiện toàn bộ
#Intelligent networks #Peer to peer computing #Usability #Information retrieval #Computer science #Multimedia systems #Costs #Bandwidth #Fault tolerant systems #Network topology
Dynamic behaviour of the distributed tree quorum algorithm - Trang 517-524
N. Kafri, J. Janecek
Mechanisms that ensure mutual access, replication and resilience to failures in
large distributed systems can be based on quorum consensus. Effectiveness and
scalability of the method selected are crucial. The aim of this paper is to
present a message/time cost analysis of a distributed algorithm based on the
tree quorum, which needs no global information, and has message complexity
independent of... hiện toàn bộ
#Costs #Scalability #Distributed algorithms #Delay #Computer science #Resilience #Information analysis #Algorithm design and analysis #Middleware #Availability
RICA: a receiver-initiated approach for channel-adaptive on-demand routing in ad hoc mobile computing networks - Trang 84-91
Xiao-Hui Lin, Yu-Kwong Kwok, V.K.N. Lau
To support truly peer-to-peer applications in ad hoc wireless mobile computing
networks, a judicious and efficient ad hoc routing protocol is needed. Much
research has been done on designing ad hoc routing protocols and some well known
protocols are also being implemented in practical situations. However, one major
drawback in existing state-of-the-art protocols, such as the AODV routing
protocol,... hiện toàn bộ
#Mobile computing #Computer networks #Routing protocols #Peer to peer computing #Throughput #Wireless application protocol #Channel coding #Modulation coding #Protection #Delay
ControlWare: a middleware architecture for feedback control of software performance - Trang 301-310
Ronghua Zhang, Chenyang Lu, T.F. Abdelzaher, J.A. Stankovic
Attainment of software performance assurances in open, largely unpredictable
environments has recently become an important focus for real-time research.
Unlike closed embedded systems, many contemporary distributed real-time
applications operate in environments where offered load and available resources
suffer considerable random fluctuations, thereby complicating the performance
assurance problem... hiện toàn bộ
#Middleware #Computer architecture #Feedback control #Software performance #Embedded system #Real time systems #Application software #Fluctuations #Control system analysis #Performance analysis
From total order to database replication - Trang 494-503
Y. Amir, C. Tutu
This paper presents in detail an efficient and provably correct algorithm for
database replication over partitionable networks. Our algorithm avoids the need
for end-to-end acknowledgments for each action while supporting network
partitions and merges and allowing dynamic instantiation of new replicas. One
round of end-to-end acknowledgments is required only upon a membership change
event such as ... hiện toàn bộ
#Partitioning algorithms #Transaction databases #Engines #Computer science #Availability #Computer crashes #Throughput #Delay #Distributed computing #Prototypes
Migratory TCP: connection migration for service continuity in the Internet - Trang 469-470
F. Sultan, K. Srinivasan, D. Iyer, L. Iftode
Today's Internet services are commonly built over TCP, the standard Internet
connection-oriented reliable transport protocol. The endpoint naming scheme of
TCP, based on network layer (IP) addresses, creates an implicit binding between
a service and the IP address of a server providing it, throughout the lifetime
of a client connection. This makes a TCP client prone to all adverse conditions
that ... hiện toàn bộ
#Web and internet services #Network servers #Web server #TCPIP #IP networks #Transport protocols #Computer crime #Stability #Availability #Communication system traffic control