-
2
-
-
50149110105
-
-
Apple Corporation
-
Apple Corporation. Bonjour. http://developer.apple.com/networking/ bonjour/.
-
Bonjour
-
-
-
4
-
-
78549282010
-
PRACTI replication
-
May
-
Belaramani, N., M. Dahlin, L. Gao, A. Nayate, A. Venkataramani, P. Yalagandula, J. Zheng. PRACTI replication. Proceedings USENIX Symposium on Networked Systems Design and Implementation (NSDI), May 2006.
-
(2006)
Proceedings USENIX Symposium on Networked Systems Design and Implementation (NSDI)
-
-
Belaramani, N.1
Dahlin, M.2
Gao, L.3
Nayate, A.4
Venkataramani, A.5
Yalagandula, P.6
Zheng, J.7
-
5
-
-
0014814325
-
Space/time tradeoffs in hash coding with allowable errors
-
Bloom, B. Space/time tradeoffs in hash coding with allowable errors. Communications of the ACM 13(7), pp. 422-426, 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
6
-
-
70450232823
-
Network applications of Bloom filters: A survey
-
Broder, A. and Mitzenmacher, M. Network applications of Bloom filters: A survey. Internet Mathematics 1(4), pp. 485-509, 2004.
-
(2004)
Internet Mathematics
, vol.1
, Issue.4
, pp. 485-509
-
-
Broder, A.1
Mitzenmacher, M.2
-
8
-
-
85076769385
-
Persistent personal names for globally connected mobile devices
-
Seattle, WA, November
-
Ford, B., Strauss, J., Lesniewski-Laas, C., Rhea, S., Kaashoek, F., and Morris, R. Persistent personal names for globally connected mobile devices. Proceedings of the 7th Symposium on Operating Systems Design and Implementation, Seattle, WA, November 2006, pp. 233-248.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation
, pp. 233-248
-
-
Ford, B.1
Strauss, J.2
Lesniewski-Laas, C.3
Rhea, S.4
Kaashoek, F.5
Morris, R.6
-
9
-
-
0002152011
-
Implementation of the Ficus replicated file system
-
June
-
Guy, R. G., Heidemann, J. S., Mak, W., Page, T. W., Popek, G. J., and Rothmeier, D. Implementation of the Ficus replicated file system. Proceedings of the Summer USENIX Conference, June 1990, pp. 63-71.
-
(1990)
Proceedings of the Summer USENIX Conference
, pp. 63-71
-
-
Guy, R.G.1
Heidemann, J.S.2
Mak, W.3
Page, T.W.4
Popek, G.J.5
Rothmeier, D.6
-
12
-
-
33646394316
-
Concise version vectors in WinFS
-
Cracow, Poland, September
-
Malkhi, D., and Terry, D. Concise version vectors in WinFS. Proceedings Symposium on Distributed Computing, Cracow, Poland, September 2005, pp. 339-353.
-
(2005)
Proceedings Symposium on Distributed Computing
, pp. 339-353
-
-
Malkhi, D.1
Terry, D.2
-
13
-
-
0019563173
-
Detection of mutual inconsistencies in distributed systems
-
May
-
Parker, D. S., Popek, G. J., Rudisin, G., Stoughton, A., Walker, B. J., Walton, E., Chow, J. M., Edwards, D., Kiser, S., and Kline, C. Detection of mutual inconsistencies in distributed systems. IEEE Transactions on Software Engineering SE-9(3), pp. 240-247, May 1983.
-
(1983)
IEEE Transactions on Software Engineering
, vol.SE-9
, Issue.3
, pp. 240-247
-
-
Parker, D.S.1
Popek, G.J.2
Rudisin, G.3
Stoughton, A.4
Walker, B.J.5
Walton, E.6
Chow, J.M.7
Edwards, D.8
Kiser, S.9
Kline, C.10
-
14
-
-
84874802830
-
EnsemBlue: Integrating consumer electronics and distributed storage
-
Seattle, WA, November
-
Peek, D., and Flinn, J. EnsemBlue: Integrating consumer electronics and distributed storage. Proceedings of the 7th Symposium on Operating Systems Design and Implementation, Seattle, WA, November 2006, pp. 219-232.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation
, pp. 219-232
-
-
Peek, D.1
Flinn, J.2
-
15
-
-
3042838573
-
Peer replication with selective control
-
Hong Kong, December
-
Ratner, D., Popek, G. J., Reiher, P., and Guy, R. Peer replication with selective control. Proceedings MDA '99, First International Conference on Mobile Data Access, Hong Kong, December 1999.
-
(1999)
Proceedings MDA '99, First International Conference on Mobile Data Access
-
-
Ratner, D.1
Popek, G.J.2
Reiher, P.3
Guy, R.4
-
16
-
-
35148891972
-
Unilateral version vector pruning using loosely synchronized clocks
-
Technical Report HPL-2002
-
Saito, Y. Unilateral version vector pruning using loosely synchronized clocks. Technical Report HPL-2002.
-
-
-
Saito, Y.1
-
17
-
-
19944413478
-
Using visual tags to bypass Bluetooth device discovery
-
January
-
Scott, D., Sharp, R., Madhavapeddy, A., and Upton, E. Using visual tags to bypass Bluetooth device discovery. ACM SIGMOBILE Mobile Computing and Communications Review 9(1), pp. 41-53, January 2005.
-
(2005)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.9
, Issue.1
, pp. 41-53
-
-
Scott, D.1
Sharp, R.2
Madhavapeddy, A.3
Upton, E.4
-
18
-
-
33845192207
-
Managing update conflicts in Bayou, a weakly connected replicated storage system
-
Cooper Mountain, Colorado, December
-
Terry, D. B., M. M. Theimer, K. Petersen, A. J. Demers, M. J. Spreitzer, and C. Hauser. Managing update conflicts in Bayou, a weakly connected replicated storage system. Proceedings 15th Symposium on Operating Systems Principles (SOSP), Cooper Mountain, Colorado, December 1995, pp. 172-183.
-
(1995)
Proceedings 15th Symposium on Operating Systems Principles (SOSP)
, pp. 172-183
-
-
Terry, D.B.1
Theimer, M.M.2
Petersen, K.3
Demers, A.J.4
Spreitzer, M.J.5
Hauser, C.6
|