IEEE Transactions on Parallel and Distributed Systems, Vol. 13

نویسندگان

  • M. C. Pinotti
  • V. Scarano
چکیده

data types; cf. Persistent objects Access control access control mechanisms in distributed, persistent memory syst. . Lopriore, L., T-PDS Oct 02 1066-1083 + Check author entry for coauthors IEEE TRANSACTIONS ON PARALLEL AN DISTRIBUTED SYSTEMS, VOL. 13, NO. 12, DECEMBER 2002 1335

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mean Field Approximation for BSS of images with a compound hierarchical Gauss-Markov-Potts model

In this paper we consider the Blind Source Separation (BSS) of images whose prior distributions are modeled through a compound Gauss-Markov modeling with a hidden classification labels modeled with a Potts distribution. This model is a powerful tool for modeling the images which are composed of homogeneous regions. The joint estimation of the sources, classification labels, the mixing matrix an...

متن کامل

Distributed Deadlock Detection using Fault Informing Probes

Pei-yu Li and Bruce McMillin, "Fault-tolerant Distributed Deadlock Detection/ Resolution", IEEE Transactions on parallel and distributed systems, pp 224-230, 1993. M. Tamer Ozsu and Patrick Valduriez, "Principles of Distributed Database Systems", Pearson Education, 1999. Chowdhary, A. N. , Kohler, W. H. , Stankovic, J. A. and Towsley, D. , "A modified priority based pro...

متن کامل

Optimization of majority protocol for controlling transactions concurrency in distributed databases by multi-agent systems

In this paper, we propose a new concurrency control algorithm based on multi-agent systems which is an extension of majority protocol. Then, we suggest a clustering approach to get better results in reliability, decreasing message passing and algorithm’s runtime. Here, we consider n different transactions working on non-conflict data items. Considering execution efficiency of some different...

متن کامل

The Power of P2P beyond File Sharing

Peer-to-peer (P2P) model has been actively and widely used for file sharing in Internet. While many research efforts have been made to improve its performance, some organizations have expressed their serious concerns to P2P applications in Internet, such as copyright violations, information leaking, and inefficient usage of Internet resources. Instead of presenting my subjective views to these ...

متن کامل

An Index-Based Checkpointing Algorithm for Autonomous Distributed Systems

This paper presents an index based checkpointing algorithm for distributed systems with the aim of reducing the total number of checkpoints while ensuring that each checkpoint belongs to at least one consistent global checkpoint or recovery line The algorithm is based on an equivalence relation de ned between pairs of successive checkpoints of a process which allows in some cases to advance the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002