Information Technology Reference
In-Depth Information
43. W. Stallings, “SNMP and SNMPv2: The infrastructure for network manage-
ment,” IEEE Communications Magazine , 36 (3), 37-43, March 1998.
44. M. Ripeanu, “Peer-to-Peer architecture case study: Gnutella network,” in
Proceedings of International Conference on Peer-to-peer Computing , Sweden, 2001.
45. I. Stoica, R. Morris, D. Karger, M. Kaashoek, and H. Balakrishnan, “Chord: A
scalable peer-to-peer lookup service for internet applications,” in Proceedings
of ACM SIGCOMM , San Diego, CA, 2001, pp. 149-160.
46. R. Buyya, D. Abramson, and J. Giddy, “Nimrod/G: An architecture for a
resource management and scheduling system in a global computational
grid,” in Proceedings of International Conference on High Performance Computing
in Asia-Pacii c Region (HPC Asia 2000) , Beijing, 2000.
47. F. Berman, R. Wolski, S. Figueira, J. Schopf, and G. Shao, “Application-level
scheduling on distributed heterogeneous networks,” in Proceedings of
Supercomputing '96 , Pittsburgh, PA, 1996, pp. 39-39.
48. K. Czajkowski, S. Fitzgerald, I. Foster, and C. Kesselman, “Grid information
services for distributed resource sharing,” in Proceedings of the 10th IEEE
International Symposium on High-Performance Distributed Computing (HPDC-10) ,
Washington, DC, 2001, pp. 181-194.
49. J. Howell and D. Kotz, “End-to-End authorization,” in Proceedings of the
2000 Symposium on Operating Systems Design and Implementation , San Diego,
CA, 2000, pp. 151-164.
50. P. Felber, X. D'efago, R. Guerraoui, and P. Oser, “Failure detector as i rst class
objects,” in Proceedings of the 9th IEEE International Symposium on Distributed
Objects and Applications (DOA'99) , Vilamoura, Algarve, September 1999,
pp. 132-141.
51. M. Bertier, O. Marin, and P. Sens, “Implementation and performance evalua-
tion of an adaptable failure detector,” in Proceedings of the International
Conference on Dependable Systems and Networks , Washington DC, June 2002,
pp. 354-363.
52. R. van Renesse, Y. Minsky, and M. Hayden, “A gossip-style failure detection
service,” in Proceedings of Middleware '98 , The Lake District, England, 1998,
pp. 55-70.
53. T.D. Chandra and S. Toueg, “Unreliable failure detectors for reliable
distributed systems,” Journal of the ACM , 43 (2), 225-267, 1996.
54. X. D'efago, N. Hayashibara, and T. Katayama, “On the design of a failure
detection service for large scale distributed systems,” in Proceedings of the
International Symposium toward Peta-Bit Ultra-Networks (PBit) , Ishikawa,
Japan, September 2003, pp. 88-95.
55. N. Hayashibara, A. Cherif, and T. Katayama, “Failure detectors for large-
scale distributed systems,” in Proceedings of the 21st IEEE Symposium on
Reliable Distributed Systems , Suita, Japan, October 2002, pp. 404-409.
56. W. Chen, S. Toueg, and M.K. Aguilera, “On the quality of service of failure
detectors,” IEEE Transactions on Computers , 51 (2), 13-32, 2002.
57. A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson, S. Shenker, H. Sturgis,
D. Swinehart, and D. Terry, “Epidemic algorithms for replicated database
maintenance,” Operating Systems Review , 22 (1), 8-32, January 1988.
58. Marin Bertier, Olivier Marin, and Pierre Sens, “Performance analysis of a
hierarchical failure detector,” in Proceedings of the International Conference on
Search WWH ::




Custom Search