-
1
-
-
9444279581
-
Protection of simple series and parallel systems with components of different values
-
V. M. Bier, A. Nagaraj, and V. Abhichandani. Protection of simple series and parallel systems with components of different values. Reliability Engineering & System Safety, 87(3):315-323, 2005.
-
(2005)
Reliability Engineering & System Safety
, vol.87
, Issue.3
, pp. 315-323
-
-
Bier, V.M.1
Nagaraj, A.2
Abhichandani, V.3
-
2
-
-
0023436788
-
A weighted voting algorithm for replicated directories
-
Oct.
-
J. J. Bloch, D. S. Daniels, and A. Z. Spector. A weighted voting algorithm for replicated directories. J. ACM, 34:859-909, Oct. 1987.
-
(1987)
J. ACM
, vol.34
, pp. 859-909
-
-
Bloch, J.J.1
Daniels, D.S.2
Spector, A.Z.3
-
4
-
-
0004116989
-
-
McGraw-Hill Higher Education, 2nd edition
-
T. H. Cormen, C. Stein, R. L. Rivest, and C. E. Leiserson. Introduction to Algorithms. McGraw-Hill Higher Education, 2nd edition, 2001.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.H.1
Stein, C.2
Rivest, R.L.3
Leiserson, C.E.4
-
5
-
-
0024479720
-
A dynamic voting scheme in distributed systems
-
Jan.
-
D. Davcev. A dynamic voting scheme in distributed systems. Software Engineering, IEEE Transactions on, 15(1):93-97, Jan. 1989.
-
(1989)
Software Engineering IEEE Transactions on
, vol.15
, Issue.1
, pp. 93-97
-
-
Davcev, D.1
-
6
-
-
33747061192
-
Fundamental differences in the reliability of n-modular redundancy and redundancy and n-version programming
-
D. E. Eckhardt and L. D. Lee. Fundamental differences in the reliability of n-modular redundancy and redundancy and n-version programming. J. Syst. Softw., 8(4):313-318, 1988.
-
(1988)
J. Syst. Softw.
, vol.8
, Issue.4
, pp. 313-318
-
-
Eckhardt, D.E.1
Lee, L.D.2
-
7
-
-
0003585085
-
-
(5th ed.). McGraw-Hill, Inc., New York, NY, USA
-
S. I. Gass. Linear programming: methods and applications (5th ed.). McGraw-Hill, Inc., New York, NY, USA, 1984.
-
(1984)
Linear Programming: Methods and Applications
-
-
Gass, S.I.1
-
8
-
-
0018684956
-
Weighted voting for replicated data
-
SOSP '79, New York, NY, USA. ACM
-
D. K. Gifford. Weighted voting for replicated data. In Proceedings of the seventh ACM symposium on Operating systems principles, SOSP '79, pages 150-162, New York, NY, USA, 1979. ACM.
-
(1979)
Proceedings of the Seventh ACM Symposium on Operating Systems Principles
, pp. 150-162
-
-
Gifford, D.K.1
-
11
-
-
78751622107
-
Analysis of binary voting algorithms for use in fault-tolerant and secure computing
-
K. Kwiat, A. Taylor, W. Zwicker, D. Hill, S. Wetzonis, and S. Ren. Analysis of binary voting algorithms for use in fault-tolerant and secure computing. In Computer Engineering and Systems (ICCES), 2010 International Conference on, pages 269 -273, 2010.
-
(2010)
Computer Engineering and Systems (ICCES), 2010 International Conference on
, pp. 269-273
-
-
Kwiat, K.1
Taylor, A.2
Zwicker, W.3
Hill, D.4
Wetzonis, S.5
Ren, S.6
-
12
-
-
2442465295
-
A taxonomy for software voting algorithms used in safety-critical systems
-
Sep.
-
G. Latif-Shabgahi, J. Bass, and S. Bennett. A taxonomy for software voting algorithms used in safety-critical systems. Reliability, IEEE Transactions on, 53(3):319-328, Sep. 2004.
-
(2004)
Reliability IEEE Transactions on
, vol.53
, Issue.3
, pp. 319-328
-
-
Latif-Shabgahi, G.1
Bass, J.2
Bennett, S.3
-
13
-
-
0038520175
-
Optimal multilevel protection in series-parallel systems
-
G. Levitin. Optimal multilevel protection in series-parallel systems. Reliability Engineering & System Safety, 81(1):93-102, 2003.
-
(2003)
Reliability Engineering & System Safety
, vol.81
, Issue.1
, pp. 93-102
-
-
Levitin, G.1
-
14
-
-
0043031379
-
Optimizing survivability of multi-state systems with multi-level protection by multi-processor genetic algorithm
-
G. Levitin, Y. Dai, M. Xie, and K. L. Poh. Optimizing survivability of multi-state systems with multi-level protection by multi-processor genetic algorithm. Reliability Engineering & System Safety, 82(1):93-104, 2003.
-
(2003)
Reliability Engineering & System Safety
, vol.82
, Issue.1
, pp. 93-104
-
-
Levitin, G.1
Dai, Y.2
Xie, M.3
Poh, K.L.4
-
15
-
-
43249094557
-
Protection vs. redundancy in homogeneous parallel systems
-
G. Levitin and K. Hausken. Protection vs. redundancy in homogeneous parallel systems. Reliability Engineering & System Safety, 93(10):1444-1451, 2008.
-
(2008)
Reliability Engineering & System Safety
, vol.93
, Issue.10
, pp. 1444-1451
-
-
Levitin, G.1
Hausken, K.2
-
17
-
-
63149134856
-
Redundancy vs. protection vs. false targets for systems under attack
-
March
-
G. Levitin and K. Hausken. Redundancy vs. protection vs. false targets for systems under attack. Reliability, IEEE Transactions on, 58(1):58-68, March 2009.
-
(2009)
Reliability IEEE Transactions on
, vol.58
, Issue.1
, pp. 58-68
-
-
Levitin, G.1
Hausken, K.2
-
18
-
-
0035399553
-
Optimal separation of elements in vulnerable multi-state systems
-
G. Levitin and A. Lisnianski. Optimal separation of elements in vulnerable multi-state systems. Reliability Engineering & System Safety, 73(1):55-66, 2001.
-
(2001)
Reliability Engineering & System Safety
, vol.73
, Issue.1
, pp. 55-66
-
-
Levitin, G.1
Lisnianski, A.2
-
19
-
-
0037363335
-
Optimizing survivability of vulnerable series-parallel multi-state systems
-
G. Levitin and A. Lisnianski. Optimizing survivability of vulnerable series-parallel multi-state systems. Reliability Engineering & System Safety, 79(3):319-331, 2003.
-
(2003)
Reliability Engineering & System Safety
, vol.79
, Issue.3
, pp. 319-331
-
-
Levitin, G.1
Lisnianski, A.2
-
22
-
-
84882594747
-
Timeto- compromise model for cyber risk reduction estimation
-
M. A. McQueen, W. F. Boyer, M. A. Flynn, and G. A. Beitel. Timeto- compromise model for cyber risk reduction estimation. Quality of Protection, 23:49-64, 2006.
-
(2006)
Quality of Protection
, vol.23
, pp. 49-64
-
-
McQueen, M.A.1
Boyer, W.F.2
Flynn, M.A.3
Beitel, G.A.4
-
23
-
-
21244466146
-
Zur theorie der gesellschaftsspiele
-
J. V. Neumann. Zur theorie der gesellschaftsspiele. Mathematische Annalen, 100(1):295-320, 1928.
-
(1928)
Mathematische Annalen
, vol.100
, Issue.1
, pp. 295-320
-
-
Neumann, J.V.1
-
25
-
-
70350123267
-
Zero-sum two-person games
-
R. Aumann and S. Hart, editors. Elsevier, May
-
T. Raghavan. Zero-sum two-person games. In R. Aumann and S. Hart, editors, Handbook of Game Theory with Economic Applications, volume 2, pages 735-768. Elsevier, May 1994.
-
(1994)
Handbook of Game Theory with Economic Applications
, vol.2
, pp. 735-768
-
-
Raghavan, T.1
-
26
-
-
0018480001
-
A majority consensus approach to concurrency control for multiple copy databases
-
June
-
R. H. Thomas. A majority consensus approach to concurrency control for multiple copy databases. ACM Trans. Database Syst., 4:180-209, June 1979.
-
(1979)
ACM Trans. Database Syst.
, vol.4
, pp. 180-209
-
-
Thomas, R.H.1
-
27
-
-
0026151577
-
Vote assignments in weighted voting mechanisms
-
May
-
Z. Tong and R. Kain. Vote assignments in weighted voting mechanisms. Computers, IEEE Transactions on, 40(5):664-667, May 1991.
-
(1991)
Computers IEEE Transactions on
, vol.40
, Issue.5
, pp. 664-667
-
-
Tong, Z.1
Kain, R.2
-
29
-
-
77954693847
-
Improving complex distributed software system availability through information hiding
-
SAC '10, New York, NY, USA. ACM
-
L. Wang, Y. Leiferman, S. Ren, K. Kwiat, and X. Li. Improving complex distributed software system availability through information hiding. In Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, pages 452-456, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 2010 ACM Symposium on Applied Computing
, pp. 452-456
-
-
Wang, L.1
Leiferman, Y.2
Ren, S.3
Kwiat, K.4
Li, X.5
-
30
-
-
79957543221
-
Optimal resource allocation for protecting system availability against random cyber attacks
-
March
-
L. Wang, S. Ren, K. Yue, and K. Kwiat. Optimal resource allocation for protecting system availability against random cyber attacks. In Computer Research and Development (ICCRD), 2011 3rd International Conference on, volume 1, pages 477 -482, March 2011.
-
(2011)
Computer Research and Development (ICCRD), 2011 3rd International Conference on
, vol.1
, pp. 477-482
-
-
Wang, L.1
Ren, S.2
Yue, K.3
Kwiat, K.4
|