[1]
|
T. Ward, “Security of Backup Data,” Information Systems Security, Vol. 15, No. 1, 2006, pp. 31-34.
doi:10.1201/1086.1065898X/45926.15.1.20060301/92683.6
|
[2]
|
T. Haerder and J. Muckstadt, “Optimal Policy for Batch Operations: Backup, Checkpointing, Reorganization, and Updating,” ACM Transactionson Database Systems, Vol. 2, No. 3, 1977, pp. 209-222. doi:10.1145/320557.320558
|
[3]
|
I. Lazaridis, et al., “Fault Tolerant Evaluation of Continuous Selection Queries over Sensor Data,” International Journal of Distributed Sensor Networks, Vol. 5, No. 4, 2009, pp. 338-360. doi:10.1080/15501320701585600
|
[4]
|
H. Jarraya and M. Laurent, “A Secure Peer-to-Peer Backup Service Keeping Great Autonomy While under the Supervision of a Provider,” Computers & Security, Vol. 29, No. 2, 2010, pp. 180-195.
doi:10.1016/j.cose.2009.10.003
|
[5]
|
M. Gramaglia, M. Urue?a and I. Martinez-Yelmo, “Off-Line Incentive Mechanism for Long-term P2P Backup Storage,” Computer Communications, Vol. 35, No. 12, 2012, pp. 1516-1526. doi:10.1016/j.comcom.2012.04.017
|
[6]
|
M. Fesci-Sayita, E. TurhanTunalib and A. Murat Tekalpc, “Resilient Peer-to-Peer Streaming of Scalable Video over Hierarchical Multicast Trees with Backup Parent Pools,” Signal Processing: Image Communication,Vol. 27, No. 2, 2012, pp. 113-125. doi:10.1016/j.image.2011.11.004
|
[7]
|
G. Bella, C. Pistagna and S. Riccobene, “Distributed Backup through Information Dispersal,” Electronic Notes in Theoretical Computer Science, Vol. 142, No. 3, 2006, pp. 63-77. doi:10.1016/j.entcs.2004.11.046
|
[8]
|
J. Ma, et al., “A Novel Adaptive Current Protection Scheme for Distribution Systems with Distributed Generation,” International Journal of Electrical Power & Energy Systems, Vol. 43, No. 1, 2012, pp. 1460-1466.
|
[9]
|
http://www.backup4all.com/.
|
[10]
|
K. Suzuki and K. Nakajima, “Storage Management Software,” FUJITSU, Vol.48, No. 4, 1997, pp. 389-397.
|
[11]
|
G. Lohman and A. Reuter, “Principles of Transaction Oriented Database Recovery,” ACM Computing Surveys, Vol. 15, No. 4, 1983, pp. 287-317. doi:10.1145/289.291
|
[12]
|
C. Qian, S. Nakamura and T. Nakagawa, “Cumulative Damage Model with Two Kinds of Shocks and Its Application to the Backup Policy,” Journal of the Operations Research Society of Japan, Vol. 42, No. 4, 1999, pp. 501-511. doi:10.1016/S0453-4514(00)87116-1
|
[13]
|
S. Nakamura, C. Qian, S. Fukumoto and T. Nakagawa, “Optimal Backup Policy for a Database System with Incremental and Full Backups,” Mathematical and Computer Modelling, Vol. 38, No. 11-13, 2003, pp. 1373-1379. doi:10.1016/S0895-7177(03)90140-3
|
[14]
|
C. Qian, Y. Huang, X. Zhao and T. Nakagawa, “Optimal Backup Interval for a Database System with Full and Periodic Increment Backup,” Journal of Computers, Vol. 5, No. 4, 2010, pp. 557-564. doi:10.4304/jcp.5.4.557-564
|
[15]
|
T. Nakagawa, “Shock and Damage Models in Reliability Theory,” Springer, London, 2007.
|
[16]
|
S. Nakamura and T. Nakagawa, “Stochastic Reliability Modeling, Optimization and Applications,” World Scientific, Singapore, 2010.
|
[17]
|
X. Zhao, S. Nakamura and T. Nakagawa, “Two Generational Garbage Collection Models with Major Collection Time,” IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, Vol. E94-A, No. 7, 2011, pp.1558-1566.
|
[18]
|
X. Zhao, S. Nakamura and T. Nakagawa, “Optimal Tenuring and Major Collection Times for a Generation Garbage Collector,” Asia-Pacific Journal of Operational Research, Vol. 29, No. 3, 2012, p. 1240018 (17 pages).
|