F B Schneider.Replication Management Using the State-Machine Approach[M].New York:ACM Press/Addison-Wesley Publishing Corporation.By Sape Mullender,editor,Distributed systems,Second Edition,ACM Press Books,Chapter 7,1993.169-198.
[2]
P A Bernstein,V Hadzilacos,N Goodman.Concurrency Control and Recovery in Database Systems[M].Boston,MA:Addison Wesley Longman Publishing Co,Inc,Chapter 8,1987.265-294.
[3]
S Y Cheung,M Ahamad,M H Ammar.The grid protocol:a high performance scheme for maintaining replicated Data[J].IEEE Transactions on Knowledge and Data Engineering,1992,4(6):582-592.
[4]
D Zhao,S Yao,M Zhou.Research and design of a middleware for supporting wide-area distributed applications[DB/OL].http://www.computer.org/proceedings/ipdps/1573/workshops/15730217abs.htm.2002:217.
[5]
R Jimenez-Peris,M Patino-Martinez,G Alonso,B Kemme.How to select a replication protocol according to scalability,availability and communication overhead[DB/OL].http://citeseer.nj.nec.com/cache/papers/cs/22836/http:zSzzSzwww.inf.ethz.chzSzpersonalzSzalonsozSzPAPERSzSzSRDS01-Proceedings.pdf/jimenez-peris01how.pdf.2001:24-35.
[6]
N Budhiraja,K Marzullo,F B Schneider,S Toueg.The Primary-Backup Approach[M].New York:ACM Press/Addison-Wesley Publishing Corporation.By Sape Mullender,editor,Distributed Systems,Second Edition,ACM Press Books,Chapter 8,1993.199-216.
[7]
R H Thomos.A majority consenus approach to concurrency control for multiple copy databases[J].ACM Transactions on Database Systems,1979,4(9):180-209.
[8]
Y Amir,L E Moser,P M Melliar-Smith,D A Agarwal,P Ciarfella.Fast message ordering and membership using a logical token-passing ring[A].Proceedings of the 13th International Conference on Distributed Computing Systems[C].Pittsburgh:PA,1993.551-560.
[9]
C Karamanolis,J Magee.Client-access protocols for replicated services[J].IEEE Transactions on Software Engineering,1999,25(1):3-21.