2016
DOI: 10.1007/978-3-319-30843-2_21
|View full text |Cite
|
Sign up to set email alerts
|

Redundant Distribution of Requests Through the Network by Transferring Them Over Multiple Paths

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0
2

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(8 citation statements)
references
References 7 publications
0
6
0
2
Order By: Relevance
“…Optimizing the system of protection implies finding the distribution of the number of nodes of each type, which provides the minimum ARTRS, assuming that there are cost constraints C on the implementation of the system and the conditions of stationarity of the maintenance mode are met [11], [12], [13], [14], [15].…”
Section: Advances In Computer Science Research (Acsr) Volume 72mentioning
confidence: 99%
“…Optimizing the system of protection implies finding the distribution of the number of nodes of each type, which provides the minimum ARTRS, assuming that there are cost constraints C on the implementation of the system and the conditions of stationarity of the maintenance mode are met [11], [12], [13], [14], [15].…”
Section: Advances In Computer Science Research (Acsr) Volume 72mentioning
confidence: 99%
“…Рассматриваемый случай применим для анализа готовности компьютерных систем кластерной архитектуры [13][14][15], в том числе при перераспределении запросов в кластерах и между кластерами [16][17][18][19][20][21] Предложены модели надежности программно-аппаратных комплексов, учитывающие одноэтапное восстановление процессорного оборудования и двухэтапное восстановление па-мяти, которое включает первоначальное восстановление аппаратуры, а затем информации (программ и данных). Предложенные модели учитывают, что при восстановлении про-граммного обеспечения и данных под управлением процессора возможны отказы процессо-ра и модуля памяти.…”
Section: рисunclassified
“…High reliability, fault tolerance, performance and security [1][2][3][4][5] of the distributed computing systems and networks [6] of various purposes [7][8][9] are achieved by reserving and consolidating the resources of computing nodes and communication channels [10][11][12][13][14][15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%
“…The researches of the redundant transmission efficiency were carried out in the articles [12][13][14][15][16][17][18][19][20][21][22] on the basis of the analytical modeling limited to the simplest queuing models and did not allow to take into account the influence of multiple access on the redundant transmission efficiency.…”
Section: Introductionmentioning
confidence: 99%