Fuzzy Group Membership
Hand-held and palm-held computing devices are becoming increasingly strong. For example, today’s high-end devices have the same (theoretical) computing power and memory capacity as high-end desktops of merely five years ago. Judging from the development of laptops, this trend is likely to continue at an even faster paste in the next few years. These powerful computing devices come equipped with commodity operating systems, such as Linux and Windows CE, which will progressively resemble their desktop OS counterparts as the devices become even more powerful. At the same time, hand-held and palm-held computing devices are being equipped with wireless and cellular communication capabilities, whose bandwidth is gradually approaching standard LAN speeds. Of particular interest to us is wireless communication, due to its hardware broadcast nature, as well as its relative high bandwidth, low cost, and low power consumption when compared to cellular communication.
Unable to display preview. Download preview PDF.
- 21.1S. Adve and M. Hill. Sufficient Conditions for Implementing the Data-Race-Free-1Memory Model. Technical Report 1107, Computer Science Department, University of Wisconsin, Wisconsin-Madison, September 1992.Google Scholar
- 21.2Y. Amir, D. Dolev, S. Kramer, and D. Malki. Transis: A Communication Sub-System for HighAvailability. In Proc. of the 22nd Annual International Symposium on Fault-Tolerant Computing, pages 76–84, July 1992.Google Scholar
- 21.3Y. Amir and J. Stanton. The Spread Wide Area Group Communication System. Technical Report CNDS-98-2, The Center for Networking and Distributed Systems, Computer Science Department, John Hopkins University, 1998.Google Scholar
- 21.4Ö. Babaoğlu, R. Davoli, L. Giachini, and M. Baker. Relacs:A Communication Infrastructure for Constructing Reliable Applications in Large-Scale Distributed Systems. Technical Report UBLCS-94-15, Department of Computer Science, University of Bologna, June 1994. Revised January 1995.Google Scholar
- 21.6K. Birman and T. Joseph. Exploiting Virtual Synchrony in Distributed Systems. In Proc. of the 11th ACMSymp. on Operating Systems Principles, pages 123–138, December 1987.Google Scholar
- 21.7D. Braginsky and D. Estrin. Rumor Routing Algorithm For Sensor Networks. http://lecs.cs.ucla.edu/daveey/work/lecs/rumorroute.pdf.
- 21.9F. Cosquer, L. Rodrigues, and P. Verissimo. Using Tailord Failure Suspectors to Support Distributed Cooperative Applications. In Proc. of the 7th International Conference on Parallel and Distributed Computing and Systems, October 1995.Google Scholar
- 21.10R. Friedman, S. Manor, and K. Guo. Scalable Hypercube Based Stability Detection. In Proc. of the 18th Symposium on Reliable Distributed Systems, October 1999.Google Scholar
- 21.11R. Friedman and R. van Renesse. Strong andWeak Virtual Synchrony in Horus. In Proc. of the 15th Symposium on Reliable Distributed Systems, pages 140–149, October 1996.Google Scholar
- 21.12K. Gharachorloo, D. Lenoski, J. Laudon, P. Gibbons, A. Gupta, and J. Hennessy. Memory Consistency and Event Ordering in Scalable Shared-Memory Multiprocessors. In Proc. of the 17th International Symposium on Computer Architecture, pages 15–26, May 1990.Google Scholar
- 21.13M. Hayden. The Ensemble System. Technical Report TR98-1662, Department of Computer Science, Cornell University, January 1998.Google Scholar
- 21.15C. Intanagonwiwat, R. Govindan, and D. Estrin. Direct Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networks, August 2000.Google Scholar
- 21.16I. Keidar and D. Dolev. Increasing the Resilience of Atomic Commit, at No Additional Cost. In Proc. of ACM Symposium on Principles of Database Systems, pages 245–254, May 1995.Google Scholar
- 21.18C. Malloth, P. Felber, A. Schiper, and U. Wilhelm. Phoenix: A Toolkit for Building Fault-Tolerant Distributed Application in Large Scale. Technical report, Department d’Informatique, Ecole Polytechnique Federale de Lausanne, July 1995.Google Scholar
- 21.19A. Rowstron, A-M. Kermarrec, M. Castro, and P. Druschel. SCRIBE: The Design of a Large Scale Event Notification Infrastructure. In Proceedings of 3rd International Workshop on Networked Group Communication, November 2001.Google Scholar
- 21.20E.M. Royer and C.E. Perkins. Multicast Operation of the Ad-Hoc On-Demand Distance Vector Routing Protocol. In Proceedings of the 5th Annual International Conference on Mobile Computing and Networks, pages 207–218, August 1999.Google Scholar
- 21.22P. Sinha, R. Sivakumar, and V. Bhargavan. MCEDAR: Multicast Core-Extraction Distributed Ad-Hoc Routing. In Proceedings of the IEEE Wireless Communication and Networking Conference, September 1999.Google Scholar
- 21.23D. Skeen. A Quorum-Based Commit Protocol. Technical Report TR82-483, Department of Computer Science, Cornell University, February 1982.Google Scholar
- 21.25C. Wu and Y.C. Tay. AMRIS: A Multicast Protocol for Ad-Hoc Wireless Networks. In Proceedings of the MILCOMM’ 99, November 1999.Google Scholar
- 21.26B.Y. Zhao, J.D. Kubiatowicz, and A.D. Joseph. Tapestry: An Infrastructure for Fault-Tolerant Wide-Area Location and Routing. Technical Report UCB/CSD-01-1141, Computer Science Department, U.C. Berkeley, April 2001.Google Scholar