-
2
-
-
0000574238
-
An asymptotically optimal multiversion b-tree
-
B. Becker, S. Gschwind, T. Ohler, P. Widmayer, and B. Seeger. An asymptotically optimal multiversion b-tree. VLDB Journal, 5(4):264-275, 1996.
-
(1996)
VLDB Journal
, vol.5
, Issue.4
, pp. 264-275
-
-
Becker, B.1
Gschwind, S.2
Ohler, T.3
Widmayer, P.4
Seeger, B.5
-
3
-
-
85084161619
-
Heuristic cleaning algorithms in log-structured file systems
-
USENIX Association
-
T. Blackwell, J. Harris, and M. Seltzer. Heuristic cleaning algorithms in log-structured file systems. USENIX Annual Technical Conference, pages 277-288. USENIX Association, 1995.
-
(1995)
USENIX Annual Technical Conference
, pp. 277-288
-
-
Blackwell, T.1
Harris, J.2
Seltzer, M.3
-
5
-
-
33749387051
-
Brief announcement: Optimal resilience for erasure-coded Byzantine distributed storage
-
Springer
-
C. Cachin and S. Tessaro. Brief announcement: Optimal resilience for erasure-coded Byzantine distributed storage. International Symposium on Distributed Computing. Springer, 2005.
-
(2005)
International Symposium on Distributed Computing
-
-
Cachin, C.1
Tessaro, S.2
-
6
-
-
0345757358
-
Practical Byzantine fault tolerance and proactive recovery
-
November
-
M. Castro and B. Liskov. Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems, 20(4):398-461, November 2002.
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.4
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
8
-
-
0023538330
-
A practical scheme for non-interactive verifiable secret sharing
-
IEEE
-
P. Feldman. A practical scheme for non-interactive verifiable secret sharing. IEEE Symposium on Foundations of Computer Science, pages 427-437. IEEE, 1987.
-
(1987)
IEEE Symposium on Foundations of Computer Science
, pp. 427-437
-
-
Feldman, P.1
-
9
-
-
0000557691
-
Idleness is not sloth
-
USENIX Association
-
R. Golding, P. Bosch, C. Staelin, T. Sullivan, and J. Wilkes. Idleness is not sloth. Winter USENIX Technical Conference, pages 201-212. USENIX Association, 1995.
-
(1995)
Winter USENIX Technical Conference
, pp. 201-212
-
-
Golding, R.1
Bosch, P.2
Staelin, C.3
Sullivan, T.4
Wilkes, J.5
-
10
-
-
0024682847
-
Securely replicating authentication services
-
IEEE Computer Society Press
-
L. Gong. Securely replicating authentication services. International Conference on Distributed Computing Systems, pages 85-91. IEEE Computer Society Press, 1989.
-
(1989)
International Conference on Distributed Computing Systems
, pp. 85-91
-
-
Gong, L.1
-
12
-
-
4544243711
-
-
Technical report CMU-PDL-03-105. Parallel Data Laboratory, Carnegie Mellon University, Pittsburgh, PA, March
-
G. R. Goodson, J. J. Wylie, G. R. Ganger, and M. K. Reiter. The safety and liveness properties of a protocol family for versatile survivable storage infrastructures. Technical report CMU-PDL-03-105. Parallel Data Laboratory, Carnegie Mellon University, Pittsburgh, PA, March 2004.
-
(2004)
The Safety and Liveness Properties of a Protocol Family for Versatile Survivable Storage Infrastructures
-
-
Goodson, G.R.1
Wylie, J.J.2
Ganger, G.R.3
Reiter, M.K.4
-
16
-
-
84976699318
-
The Byzantine generals problem
-
ACM, July
-
[ 16] L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3):382-401. ACM, July 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
17
-
-
0033719035
-
An architecture for survivable coordination in large distributed systems
-
IEEE, April
-
D. Malkhi and M. K. Reiter. An architecture for survivable coordination in large distributed systems. IEEE Transactions on Knowledge and Data Engineering, 12(2): 187-202. IEEE, April 2000.
-
(2000)
IEEE Transactions on Knowledge and Data Engineering
, vol.12
, Issue.2
, pp. 187-202
-
-
Malkhi, D.1
Reiter, M.K.2
-
19
-
-
84982943258
-
Non-interactive and informationtheoretic secure verifiable secret sharing
-
SpringerVerlag
-
T. P. Pedersen. Non-interactive and informationtheoretic secure verifiable secret sharing. Advances in Cryptology - CRYPTO, pages 129-140. SpringerVerlag, 1991.
-
(1991)
Advances in Cryptology - CRYPTO
, pp. 129-140
-
-
Pedersen, T.P.1
-
20
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
ACM, April
-
M. O. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM, 36(2):335-348. ACM, April 1989.
-
(1989)
Journal of the ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
21
-
-
84948956297
-
The Rampart toolkit for building high-integrity services
-
Lecture Notes in Computer Science 938
-
M. K. Reiter. The Rampart toolkit for building high-integrity services. Theory and Practice in Distributed Systems (Lecture Notes in Computer Science 938), pages 99-110, 1995.
-
(1995)
Theory and Practice in Distributed Systems
, pp. 99-110
-
-
Reiter, M.K.1
-
22
-
-
0026812659
-
The design and implementation of a log-structured file system
-
ACM Press, February
-
M. Rosenblum and J. K. Ousterhout. The design and implementation of a log-structured file system. ACM Transactions on Computer Systems, 10(1):2652. ACM Press, February 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.1
, pp. 2652
-
-
Rosenblum, M.1
Ousterhout, J.K.2
-
25
-
-
84885648386
-
Metadata efficiency in versioning file systems
-
USENIX Association
-
C. A. N. Soules, G. R. Goodson, J. D. Strunk, and G. R. Ganger. Metadata efficiency in versioning file systems. Conference on File and Storage Technologies, pages 43-58. USENIX Association, 2003.
-
(2003)
Conference on File and Storage Technologies
, pp. 43-58
-
-
Soules, C.A.N.1
Goodson, G.R.2
Strunk, J.D.3
Ganger, G.R.4
-
26
-
-
84978374045
-
Sell-securing storage: Protecting data in compromised systems
-
USENIX Association
-
J. D. Strunk, G. R. Goodson, M. L. Scheinholtz, C. A. N. Soules, and G. R. Ganger. Sell-securing storage: protecting data in compromised systems. Symposium on Operating Systems Design and Implementation, pages 165-180. USENIX Association, 2000.
-
(2000)
Symposium on Operating Systems Design and Implementation
, pp. 165-180
-
-
Strunk, J.D.1
Goodson, G.R.2
Scheinholtz, M.L.3
Soules, C.A.N.4
Ganger, G.R.5
|