Voting protocols guarantee the consistency of replicated data objects by disallowing all access requests that cannot gather a sufficient quorum of replicas. The performance of voting protocols can be greatly enhanced by adding to the replicas small independent entities that hold no data but can attest to the state of the replicated data object. It has been recently proposed to store these witnesses in volatile storage. Volatile witnesses repond faster to write requests than those stored in stable storage. They can also be more easily regenerated as many local area net-works contain a majority of diskless sites. We present a simulation study of the availability afforded by two voting protocols using volatile witnesses and investigate the imp...
Data collection in a hostile environment requires dealing with malicious failures in the sensing dev...
Voting protocols are widely used to provide mutual exclusion in distributed systems and to guarantee...
Abstract: Data are often replicated in distributed systems to protect them against site fail-ures an...
We propose a highly available replication control protocol tailored to environments where network pa...
Voting protocols ensure the consistency of replicated objects by requiring all read and write reques...
We present a replication control protocol that provides excellent data availabilities while guarante...
Data are often replicated in distributed systems to protect them against site failures and network m...
Data are often replicated in distributed systems to protect them against site failures and network m...
Many distributed systems maintain multiple replicas of their critical data to protect these data aga...
In a replicated database, a data item may have copies residing on several sites. A replica control ...
In this paper we examine the effects of replication on the availability of data in a large network. ...
The accessibility of vital information can be enhanced by replicating the data on several sites, and...
Improved fault tolerance of many applications can be achieved by replicating data at several sites. ...
Data is often replicated in distributed systems to improve availability and performance. This replic...
Data replication is a useful technique for improving the performance and availability in distributed...
Data collection in a hostile environment requires dealing with malicious failures in the sensing dev...
Voting protocols are widely used to provide mutual exclusion in distributed systems and to guarantee...
Abstract: Data are often replicated in distributed systems to protect them against site fail-ures an...
We propose a highly available replication control protocol tailored to environments where network pa...
Voting protocols ensure the consistency of replicated objects by requiring all read and write reques...
We present a replication control protocol that provides excellent data availabilities while guarante...
Data are often replicated in distributed systems to protect them against site failures and network m...
Data are often replicated in distributed systems to protect them against site failures and network m...
Many distributed systems maintain multiple replicas of their critical data to protect these data aga...
In a replicated database, a data item may have copies residing on several sites. A replica control ...
In this paper we examine the effects of replication on the availability of data in a large network. ...
The accessibility of vital information can be enhanced by replicating the data on several sites, and...
Improved fault tolerance of many applications can be achieved by replicating data at several sites. ...
Data is often replicated in distributed systems to improve availability and performance. This replic...
Data replication is a useful technique for improving the performance and availability in distributed...
Data collection in a hostile environment requires dealing with malicious failures in the sensing dev...
Voting protocols are widely used to provide mutual exclusion in distributed systems and to guarantee...
Abstract: Data are often replicated in distributed systems to protect them against site fail-ures an...