replica consistency
Recently Published Documents


TOTAL DOCUMENTS

47
(FIVE YEARS 8)

H-INDEX

8
(FIVE YEARS 1)

2020 ◽  
Vol 11 (1) ◽  
Author(s):  
Robson A. Campêlo ◽  
Marco A. Casanova ◽  
Dorgival O. Guedes ◽  
Alberto H. F. Laender

Author(s):  
Pratik Shrivastava

The demand for scalability in replicated distributed real-time database systems (RDRTDBS) is still explorative and, despite an increase in real-time applications, many challenges and issues remain in designing a more scalable system. The objective is to improve the scalability of the system during system scale up with new replica sites. Existing research has been mainly conducted in maintaining replica consistency between different replicas via replication protocol. However, very little research has been conducted towards improving scalability and maintaining mutual consistency and timeliness. Consequently, the ultimate aim of this chapter is to improve scalability in RDRTDBS such that performance of the system does not degrade even though new replica sites are added.


2019 ◽  
Vol 101 ◽  
pp. 590-604 ◽  
Author(s):  
Chunlin Li ◽  
Chengyi Wang ◽  
Hengliang Tang ◽  
Youlong Luo

Author(s):  
Priyanka Vashisht ◽  
Vijay Kumar ◽  
Rajesh Kumar ◽  
Anju Sharma

Data replication is widely used mechanism aiming at ensuring efficient access, improving performance and providing quality data in data grids. The properties of file and their replicas can vary with time resulting to inconsistency. In this paper, an agent-based replica consistency approach, namely, Replica Consistency and Conflict Resolution (RCCR) has been proposed to improve the efficiency of the system. RCCR is hybrid approach which is used to address the problem of inconsistency in multi master environment. Additionally, the conflict resolution approach is introduced based on vector clock and version of the replica. Finally, simulated results are presented and compared with existing consistency approaches such as Pessimistic, Optimistic and One-way Replica Consistency (ORCS). The simulated results depicts that proposed RCCR approach performs better when writeable replicas are more likely to occur.


Author(s):  
Wenbing Zhao

In this chapter, the authors point out the threats to online gaming applications and present two strategies that can be used to build secure and dependable online gaming applications. These strategies not only seek the solution for gathering entropy to seed the PRNG used in such applications but also intend to eliminate malicious intrusions to protect the seed and to maintain replica consistency. By applying these techniques, the online gaming applications can ensure service integrity (both the service providers and the innocent players are protected) and guarantee high availability despite the presence of Byzantine faults. Finally, the authors outline some open research issues in this field.


Author(s):  
Wenbing Zhao

In this article, we point out the threats to online gaming applications and present two strategies that can be used to build secure and dependable online gaming applications. These strategies not only seek the solution for gathering entropy to seed the PRNG used in such applications, but also intend to eliminate malicious intrusions to protect the seed and to maintain replica consistency. By applying these techniques, the online gaming applications can ensure its service integrity (both the service providers and the innocent players are protected) and guarantee high availability despite the presence of Byzantine faults. Finally, we outline some open research issues in this field.


Sign in / Sign up

Export Citation Format

Share Document