Skip to main content

Part of the book series: Texts in Computer Science ((TCS))

  • 3146 Accesses

Abstract

In this chapter, we drill down on some of the major issues that a cloud computing client system must handle.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    We say that parallelism is embarrassing if the method of subdividing the computation and performing it is extremely simple. This is in contrast to methods of achieving parallelism that employ complex algorithms and are correspondingly complex to reason about.

References

  • Birman, K., Cantwell, J., Freedman, D., Huang, Q., Nikolov, P., Ostrowski, K.: Edge mashups for service-oriented collaboration. IEEE Comput. 42(5) (2010)

    Google Scholar 

  • Clarke, R., Knake, R.: Cyber War: The Next Threat to National Security and What to Do About It. HarperCollins e-books (April 20, 2010)

    Google Scholar 

  • Diffie, W., Landau, S.: Privacy on the Line: The Politics of Wiretapping and Encryption. MIT Press, Cambridge (2007). Updated and expanded edition. ISBN-10: 0262042401

    Google Scholar 

  • Garbinato, B., Guerraoui, R.: Using the strategy pattern to compose reliable distributed protocols. In: Proceedings of 3rd USENIX COOTS, Portland, Oregon, June 1997

    Google Scholar 

  • Guerraoui, G., Felber, P., Garbinato, B., Mazouni, K.: System support for object groups. In: OOPSLA ’98: Proceedings of the 13th ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications, October 1998

    Google Scholar 

  • Hunker, J.: Creeping Failure: How We Broke the Internet and What We Can Do to Fix It. McClelland and Stewart, Toronto (2011). Reprint edition (September 27). ISBN-10: 0771040245

    Google Scholar 

  • Lee, E., Seshia, S.: Introduction to Embedded Systems, A Cyber-Physical Systems Approach. http://LeeSeshia.org. ISBN 978-0-557-70857-4 (2011)

  • Lessig, L.: Code and Other Laws of Cyberspace. Basic Books, New York (1999). ISBN 046503912X

    Google Scholar 

  • Ostrowski, K., Birman, K.: Storing and accessing live mashup content in the cloud. SIGOPS Oper. Syst. Rev. 44(2) (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag London Limited

About this chapter

Cite this chapter

Birman, K.P. (2012). Client Perspective. In: Guide to Reliable Distributed Systems. Texts in Computer Science. Springer, London. https://doi.org/10.1007/978-1-4471-2416-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-2416-0_3

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-2415-3

  • Online ISBN: 978-1-4471-2416-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics