How to assign votes in a distributed system
Journal of the ACM (JACM)
Reliable communication in the presence of failures
ACM Transactions on Computer Systems (TOCS)
Conflict detection tradeoffs for replicated data
ACM Transactions on Database Systems (TODS)
ACM SIGOPS Operating Systems Review
Locking Primitives in a Database System
Journal of the ACM (JACM)
Quorum-Based Replication of Objects
DEXA '00 Proceedings of the 11th International Workshop on Database and Expert Systems Applications
Weighted voting for replicated data
SOSP '79 Proceedings of the seventh ACM symposium on Operating systems principles
A message system supporting fault tolerance
SOSP '83 Proceedings of the ninth ACM symposium on Operating systems principles
Object Replication Using Version Vector
ICPADS '98 Proceedings of the 1998 International Conference on Parallel and Distributed Systems
Distributed lock management for mobile transactions
ICDCS '95 Proceedings of the 15th International Conference on Distributed Computing Systems
Constructing reliable distributed communication systems with CORBA
IEEE Communications Magazine
Mobile Agent Model for Transaction Processing in Distributed Database Systems
ICOIN '02 Revised Papers from the International Conference on Information Networking, Wireless Communications Technologies and Network Applications-Part II
Hi-index | 0.00 |
Objects are replicated in order to increase reliability and availability of an object-based system.We discuss how to invoke methods on replicas of objects in a nested manner. If a method t is invoked on multiple replicas and eachinstance of t on the replicas invokes a method u on another object y, u may be performed multiple times on some replica of y and then the replica gets inconsistent, i.e. redundant invocations. In addition, if eachinstance of t issues a request to a quorum, more number of the replicas are manipulated than the quorum number of the method u, i.e. quorum explosion. We discuss an invocation protocol to resolve the redundant invocation and quorum explosion. We evaluate the protocol on how many replicas are manipulated and requests are issued.