{"title":"An interface to support lazy replicated file service","authors":"D. Duchamp, Carl D. Tait","doi":"10.1109/MRD.1992.242629","DOIUrl":null,"url":null,"abstract":"The authors argue that, if they are going to assume low-sharing workloads, then it is possible to build more efficient implementations that provide the same (or stronger) semantics by making fullest use of the assumption. Accordingly, they take an extreme point on the spreading/searching tradeoff: the searcher is made responsible for all the work. Thus, spreading can be made asynchronous and hence very fast from the caller's viewpoint. They employ an important optimization to eliminate most of the searching work when there is little sharing. Their technique carries other advantages as well: simple and flexible recovery algorithms, and suitability for mobile computing.<<ETX>>","PeriodicalId":314844,"journal":{"name":"[1992 Proceedings] Second Workshop on the Management of Replicated Data","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1992 Proceedings] Second Workshop on the Management of Replicated Data","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MRD.1992.242629","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
The authors argue that, if they are going to assume low-sharing workloads, then it is possible to build more efficient implementations that provide the same (or stronger) semantics by making fullest use of the assumption. Accordingly, they take an extreme point on the spreading/searching tradeoff: the searcher is made responsible for all the work. Thus, spreading can be made asynchronous and hence very fast from the caller's viewpoint. They employ an important optimization to eliminate most of the searching work when there is little sharing. Their technique carries other advantages as well: simple and flexible recovery algorithms, and suitability for mobile computing.<>