Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
RELDIS
RELDIS 1988
Generate Citations
Proceedings Seventh Symposium on Reliable Distributed Systems
Oct. 10 1988 to Oct. 12 1988
Columbus, OH, USA
Table of Contents
Proceedings. Seventh Symposium on Reliable Distributed Systems (IEEE Cat. No.88CH2612-0)
Freely available from IEEE.
pp. 0_1-0_1
Independent checkpointing and concurrent rollback for recovery in distributed systems-an optimistic approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 3,4,5,6,7,8,9,10,11,12
by
B. Bhargava
,
Shu-Renn Lian
Checkpointing and rollback recovery in a distributed system using common time base
Full-text access may be available. Sign in or learn about subscription options.
pp. 13,14,15,16,17,18,19,20,21
by
P. Ramanathan
,
K.G. Shin
A commit protocol for checkpointing transactions
Full-text access may be available. Sign in or learn about subscription options.
pp. 22,23,24,25,26,27,28,29,30,31
by
Pui Ng
Pessimistic protocols for quasi-partitioned distributed database systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 35,36,37,38,39,40,41,42,43
by
L. Lilien
,
T.M. Chung
Quorum consensus algorithms for secure and reliable data
Full-text access may be available. Sign in or learn about subscription options.
pp. 44,45,46,47,48,49,50,51,52,53
by
D. Agrawal
,
A. El Abbadi
A robust, distributed election protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 54,55,56,57,58,59,60
by
J.L. Kim
,
G.G. Belford
An experimental investigation of software diversity in a fault-tolerant avionics application
Full-text access may be available. Sign in or learn about subscription options.
pp. 63,64,65,66,67,68,69,70
by
A.K. Caglayan
,
P.R. Lorczak
,
D.E. Eckhardt
An analysis of the performance impacts of lookahead execution in the conversation scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 71,72,73,74,75,76,77,78,79,80,81
by
K.H. Kim
,
S.M. Yang
Task allocation for optimized system reliability
Full-text access may be available. Sign in or learn about subscription options.
pp. 82,83,84,85,86,87,88,89,90
by
Jia-Ping Wang
,
S.M. Shatz
Interactive consistency with multiple failure modes
Full-text access may be available. Sign in or learn about subscription options.
pp. 93,94,95,96,97,98,99,100
by
P. Thambidurai
,
You-keun Park
An implementation of reliable broadcast using an unreliable multicast facility
Full-text access may be available. Sign in or learn about subscription options.
pp. 101,102,103,104,105,106,107,108,109,110,111
by
H. Garcia-Molina
,
B. Kogan
A fault-tolerant protocol for atomic broadcast
Full-text access may be available. Sign in or learn about subscription options.
pp. 112,113,114,115,116,117,118,119,120,121,122,123,124,125,126
by
Shyh-Wei Luan
,
V.D. Gligor
A realistic evaluation of optimistic dynamic voting
Full-text access may be available. Sign in or learn about subscription options.
pp. 129,130,131,132,133,134,135,136,137
by
D.D.E. Long
,
J.-F. Paris
Vote assignments in weighted voting mechanisms
Full-text access may be available. Sign in or learn about subscription options.
pp. 138,139,140,141,142,143
by
Zhijun Tong
,
R.Y. Kain
On the diagnosis of Byzantine faults
Full-text access may be available. Sign in or learn about subscription options.
pp. 144,145,146,147,148,149,150,151,152,153
by
K.V.S. Ramarao
,
J.C. Adams
Implementation of RAID
Full-text access may be available. Sign in or learn about subscription options.
pp. 157,158,159,160,161,162,163,164,165,166
by
B. Bhargava
,
J. Riedl
Recovery in the Clouds kernel
Full-text access may be available. Sign in or learn about subscription options.
pp. 167,168,169,170,171,172,173,174,175,176
by
D.V. Pitts
Transaction management in a distributed database system for local area networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 177,178,179,180,181,182
by
M. Rusinkiewicz
,
D. Georgakopoulos
Recovering imprecise transactions with real-time constraints
Full-text access may be available. Sign in or learn about subscription options.
pp. 185,186,187,188,189,190,191,192,193
by
S.V. Vrbsky
,
Kwei-Jay Lin
Distributed locking: a mechanism for constructing highly available objects
Full-text access may be available. Sign in or learn about subscription options.
pp. 194,195,196,197,198,199,200,201,202,203
by
C.T. Wilkes
,
R.J. LeBlanc
The commit/abort problem in type-specific locking
Full-text access may be available. Sign in or learn about subscription options.
pp. 204,205,206,207,208,209,210,211,212,213
by
J.D. Noe
,
J. Kaiser
,
R. Kroeger
,
E. Nett
Showing 22 out of 22