Databases Reference
In-Depth Information
22. McDermott, J., Goldschlag, D.: Towards a model of storage jamming. In: the
IEEE Computer Security Foundations Workshop, Kenmare, Ireland (June 1996)
176-185
23. Barbara, D., Goel, R., Jajodia, S.: “Using Checksums to Detect Data Corrup-
tion”. In: Int'l Conf. on Extending Data Base Technology. (Mar 2000)
24. Maheshwari, U., Vingralek, R., Shapiro, W.: How to build a trusted database
system on untrusted storage. In: 4th Symposium on Operating System Design
and Implementation, San Diego, CA (October 2000)
25. Lee, P., Anderson, T.:
Fault Tolerance: Principles and Practice. 2nd edn.
Springer-Verlag (1990)
26. Mohan, C., Haderle, D., Lindsay, B., Pirahesh, H., Schwarz, P.: Aries: A trans-
action recovery method supporting fine-granularity locking.
ACM Trans. on
Database Systems 17 (1) (1992) 94-162
27. Borg, A., Blau, W., Graetsch, W., Herrmann, F., Oberle, W.: Fault Tolerance
Under UNIX. ACM Transactions on Computer Systems 7 (1) (1989) 1-24
28. Muller, G., Banatre, M., Peyrouze, N., Rochat, R.: Lessons from FTM: An Ex-
periment in the Design & Implementation of a Low-Cost Fault-Tolerant System.
IEEE Transactions on Reliability 45 (2) (1996) 332-340
29. Elnozahy, E.N.M., Alvisi, L., Wang, Y.M., Johnson, D.B.: A survey of rollback-
recovery protocols in message-passing systems. ACM Computing Surveys 34 (3)
(September 2002) 375-408
30. Lin, J.L., Dunham, M.H.: A survey of distributed database checkpointing. Dis-
tributed and Parallel Databases 5 (3) (1997) 289-319
31. Lin, J.L., Dunham, M.H.: A low-cost checkpointing technique for distributed
databases. Distributed and Parallel Databases 10 (3) (2001) 241-268
32. Jefferson, D.R.: Virtual time. ACM Transaction on Programming Languages
and Systems 7 (3) (July 1985) 404-425
33. Lin, Y., Lazowska, E.D.: A study of time warp rollback machanisms. ACM
Transactions on Modeling and Computer Simulations 1 (1) (January 1991) 51-
72
34. Siewiorek, D.P., Swarz, R.S.: Reliable Computer Systems: Design and Evalua-
tion. 3rd edn. A K Peters (1998)
35. Patterson, D., Brown, A., Broadwell, P., Candea, G., Chen, M., Cutler, J.,
Enriquez, P., Fox, A., Kycyman, E., Merzbacher, M., Oppenheimer, D., Sastry,
N., Tetzlaff, W., Traupman, J., Treuhaft, N.: Recovery-oriented computing
(roc): Motivation, definition, techniques, and case studies.
Technical report,
UC Berkeley Computer Science (2002) CSD-02-1175.
36. Candea, G., Fox, A.: Recursive restartability: Turning the reboot sledgehammer
into a scalpel. In: Proceedings of the Eighth IEEE HOTOS. (2001)
37. Swift, M.M., Bershad, B.N., Levy, H.M.: Improving the Reliability of Commod-
ity Operating Systems. In: ACM SOSP. (2003)
38. Ammann, P., Jajodia, S., Mavuluri, P.: On the fly reading of entire databases.
IEEE Trans. on Knowledge and Data Engineering 7 (5) (October 1995) 834-838
39. Mohan, C., Pirahesh, H., Lorie, R.: Ecient and flexible methods for transient
versioning of records to avoid locking by read-only trans. In: ACM SIGMOD
International Conference on Management of Data, San Diego, CA (June 1992)
124-133
40. Pu, C.: On-the-fly, incremental, consistent reading of entire databases. Algo-
rithmica 1 (3) (October 1986) 271-287
Search WWH ::




Custom Search