Computer, 29(2):49–56, Feb. 1996. Cited on 275
Reiter M. How to Securely Replicate Services. ACM Transactions on Programming Languages and Systems, 16(3):986–1009, May 1994. Cited on 446, 447
Reiter M., Birman K., and Renesse R.van . A Security Architecture for Fault-Tolerant Systems. ACM Transactions on Computer Systems, 12(4):340–371, Nov. 1994. Cited on 472
Rescorla E. and Schiffman A. The Secure HyperText Transfer Protocol. RFC 2660, Aug. 1999. Cited on 611
Reynolds J. and Postel J. Assigned Numbers. RFC 1700, Oct. 1994. Cited on 110 Ricart G. and Agrawala A. An Optimal Algorithm for Mutual Exclusion in Computer
Networks. Communications of the ACM, 24(1):9–17, Jan. 1981. Cited on 285
Risson J. and Moors T. Survey of Research towards Robust Peer-to-Peer Networks: Search Methods. Computer Networks, 50(17):3485–3521, 2006. Cited on 66, 256, 569
Rivest R. The MD5 Message Digest Algorithm. RFC 1321, Apr. 1992. Cited on 430 Rivest R., Shamir A., and Adleman L. A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM, 21(2):120–126, Feb.
1978. Cited on 429
Rizzo L. Effective Erasure Codes for Reliable Computer Communication Protocols.
ACM Computer Communications Review, 27(2):24–36, Apr. 1997. Cited on 399 Rodrigues L. and others . A Transparent Light-Weight Group Service. In 15th
Symposium on Reliable Distributed Systems, pages 130–139, Niagara-on-the-Lake, Canada, Oct. 1996. IEEE. Cited on 345
Rodrigues R. and Liskov B. High Availability in DHTs: Erasure Coding vs. Repli- cation. In 4th International Workshop on Peer-to-Peer Systems, Feb. 2005. Cited on 575
Rodriguez P., Spanner C., and Biersack E. Analysis of Web Caching Architecture: Hierarchical and Distributed Caching. IEEE/ACM Transactions on Networking, 21 (4):404–418, Aug. 2001. Cited on 618
Rosenblum M. and Garfinkel T. Virtual Machine Monitors: Current Technology and Future Trends. Computer, 38(5):39–47, May 2005. Cited on 102
Roussos G., Marsh A. J., and Maglavera S. Enabling Pervasive Computing with Smart Phones. IEEE Pervasive Computing, 4(2):20–26, Apr. 2005. Cited on
Rowstron A. Run-time Systems for Coordination. In Omicini A., Zambonelli F., Klusch M., and Tolksdorf R., editors, Coordination of Internet Agents: Models, Technologies and Applications, pages 78–96. Springer-Verlag, Berlin, 2001. Cited on 655
Rowstron A. and Druschel P. Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems. In Middleware 2001, volume 2218 of Lecture Notes in Computer Science, pages 329–350, Berlin, Nov. 2001. Springer-Verlag. Cited on 193, 218, 244
Rowstron A. and Wray S. A Run-Time System for WCL. In Bal H., Belkhouche B., and Cardelli L., editors, Internet Programming Languages, volume 1686 of Lecture Notes in Computer Science, pages 78–96. Springer-Verlag, Berlin, 1998. Cited on 658 Russello G., Chaudron M., and Steen M.van . Dynamic Adaptation of Data Dis- tribution Policies in a Shared Data Space System. In International Symposium
on Distributed Objects and Applications (DOA), volume 3291 of Lecture Notes in Computer Science, pages 1225–1242, Berlin, Oct. 2004. Springer-Verlag. Cited on 659, 660
Russello G., Chaudron M., Steen M.van , and Bokharouss I. An Experimental Eval- uation of Self-managing Availability in Shared Data Spaces. Science of Computer Programming, 64(2):246–262, Jan. 2007. Cited on 659, 664
Sadjadi S. and McKinley P. A Survey of Adaptive Middleware. Technical Report MSU-CSE-03-35, Michigan State University, Computer Science and Engineering, Dec. 2003. Cited on 75
Saltzer J. and Schroeder M. The Protection of Information in Computer Systems.
Do'stlaringiz bilan baham: |