[1] |
Bao Han, Wang Yijie, Xu Fangliang.
A Cross-Datacenter Erasure Code Writing Method Based on Generator Matrix Transformation
[J]. Journal of Computer Research and Development, 2020, 57(2): 291-305.
|
[2] |
Yang Hongzhang, Yang Yahui, Tu Yaofeng, Sun Guangyu, Wu Zhonghai.
Proactive Fault Tolerance Based on “Collection—Prediction—Migration—Feedback” Mechanism
[J]. Journal of Computer Research and Development, 2020, 57(2): 306-317.
|
[3] |
Wang Jiang, Zhang Mingxing, Wu Yongwei, Chen Kang, Zheng Weimin.
Paxos-like Consensus Algorithms: A Review
[J]. Journal of Computer Research and Development, 2019, 56(4): 692-707.
|
[4] |
Pan Fengfeng, Xiong Jin.
NV-Shuffle: Shuffle Based on Non-Volatile Memory
[J]. Journal of Computer Research and Development, 2018, 55(2): 229-245.
|
[5] |
Li Junfei, Hu Yuxiang, Wu Jiangxing.
Research on Improving the Control Plane’s Reliability in SDN Based on Byzantine Fault-Tolerance
[J]. Journal of Computer Research and Development, 2017, 54(5): 952-960.
|
[6] |
Xiao Zhongzheng, Chen Ningjiang, Jia Jionghao, Zhang Wenbo.
A Dynamic Replica Management Mechanism Based on File Support Degree
[J]. Journal of Computer Research and Development, 2016, 53(2): 431-442.
|
[7] |
Bi Yahui, Jiang Suyang, Wang Zhigang, Leng Fangling, Bao Yubin, Yu Ge, Qian Ling.
A Multi-Level Fault Tolerance Mechanism for Disk-Resident Pregel-Like Systems
[J]. Journal of Computer Research and Development, 2016, 53(11): 2530-2541.
|
[8] |
Wu Yihan, Huang Gang, Zhang Ying, Xiong Yingfei.
A Model-Based Fault Tolerance Mechanism Development Approach for Cloud Computing
[J]. Journal of Computer Research and Development, 2016, 53(1): 138-154.
|
[9] |
Yi Huizhan, Wang Feng, Zuo Ke, Yang Canqun, Du Yunfei, and Ma Yaqing.
Asynchronous Checkpoint/Restart Based on Memory Buffer
[J]. Journal of Computer Research and Development, 2014, 51(6): 1229-1239.
|
[10] |
Song Wei, and Yang Xuejun.
Error Detection by Redundant Transaction in Transactional Memory System
[J]. , 2013, 50(5): 1085-1099.
|
[11] |
Luo Xianghong and Shu Jiwu.
Summary of Research for Erasure Code in Storage System
[J]. Journal of Computer Research and Development, 2012, 49(1): 1-11.
|
[12] |
Wang Yongjian,, Pei Xiang, Li Tao, Luan Zhongzhi, and Qian Depei,.
Nova-BFT: A Replicated State Machine Protocol Supporting Multiple Fault Models
[J]. , 2011, 48(7): 1134-1145.
|
[13] |
Zhao Gang, Kuang Xiaohui, Li Jin, and Zheng Weimin.
A Structural Vulnerability Analysis Algorithm for LargeScale Distributed System
[J]. , 2011, 48(5): 906-912.
|
[14] |
Wu Yanxia, Gu Guochang, Dai Kui, Liu Haibo, and Shen Jing.
A Hard/Soft Integrated Control Flow Checking Method at Assembly Level
[J]. , 2010, 47(8): 1481-1489.
|
[15] |
Huang Yongqin, Jin Lifeng, and Liu Yao.
Current Situation and Trend of Reliability Technology in High Performance Computers
[J]. , 2010, 47(4): 589-594.
|