{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:17:09Z","timestamp":1771701429326,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,12,30]],"date-time":"2010-12-30T00:00:00Z","timestamp":1293667200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1007\/s11227-010-0536-6","type":"journal-article","created":{"date-parts":[[2010,12,29]],"date-time":"2010-12-29T15:21:46Z","timestamp":1293636106000},"page":"1289-1311","source":"Crossref","is-referenced-by-count":17,"title":["Dynamic hybrid replication effectively combining tree and grid topology"],"prefix":"10.1007","volume":"59","author":[{"given":"Sung Chune","family":"Choi","sequence":"first","affiliation":[]},{"given":"Hee Yong","family":"Youn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,12,30]]},"reference":[{"key":"536_CR1","first-page":"459","volume-title":"Proc int\u2019l conf on dependable systems and networks (DSN)","author":"C Amza","year":"2000","unstructured":"Amza C, Cox AL, Zwaenepoel W (2000) Data replication strategies for fault tolerance and availability on commodity clusters. In: Proc int\u2019l conf on dependable systems and networks (DSN), pp 459\u2013467"},{"key":"536_CR2","doi-asserted-by":"crossref","first-page":"211","DOI":"10.4018\/978-1-59904-180-3.ch009","volume-title":"Enterprise service computing: from concept to deployment","author":"S Goel","year":"2006","unstructured":"Goel S, Buyya R (2006) Data replication strategies in wide area distributed systems. In: Qiu RG (ed) Enterprise service computing: from concept to deployment. Idea Group Inc, Hershey, pp 211\u2013241. ISBN 1-599044181-2"},{"key":"536_CR3","first-page":"57","volume-title":"Proc int\u2019l conf on parallel and distributed systems","author":"K Arai","year":"2000","unstructured":"Arai K, Tanaka K, Takizawa M (2000) Group protocol for quorum-based replication. In: Proc int\u2019l conf on parallel and distributed systems, pp 57\u201364"},{"key":"536_CR4","first-page":"171","volume-title":"Proc the 2nd European research seminar on advances in distributed systems (ERSADS\u201997)","author":"G Alonso","year":"1997","unstructured":"Alonso G (1997) Partial database replication and group communication primitives. In: Proc the 2nd European research seminar on advances in distributed systems (ERSADS\u201997), pp 171\u2013176"},{"issue":"10","key":"536_CR5","doi-asserted-by":"crossref","first-page":"1066","DOI":"10.3844\/jcssp.2010.1095.1098","volume":"6","author":"N Ahmad","year":"2010","unstructured":"Ahmad N, Abdalla AN, Sidek RM (2010) Data replication using read-one-write-all monitoring synchronization transaction system in distributed environment. J Comput Sci 6(10):1066\u20131069","journal-title":"J Comput Sci"},{"issue":"10","key":"536_CR6","doi-asserted-by":"crossref","first-page":"1026","DOI":"10.1109\/71.539734","volume":"7","author":"D Saha","year":"1996","unstructured":"Saha D, Rangarajan S, Tripathi SK (1996) An analysis of the average message overhead in replica control protocols. IEEE Trans Parallel Distrib Syst 7(10):1026\u20131034","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"536_CR7","first-page":"56","volume-title":"Proc int\u2019l conf on European dependable computing conference (EDCC)","author":"C Storm","year":"2008","unstructured":"Storm C, Warns T (2008) Deriving highly available quorum systems from structural failure models. In: Proc int\u2019l conf on European dependable computing conference (EDCC), pp 56\u201365"},{"key":"536_CR8","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/ARES.2007.50","volume-title":"Proc int\u2019l conf on availability, reliability and security (ARES)","author":"J Osrael","year":"2007","unstructured":"Osrael J, Froihofer L, Chlaupek N, Goeschka KM (2007) Availability and performance of the adaptive voting replication. In: Proc int\u2019l conf on availability, reliability and security (ARES), pp 53\u201360"},{"key":"536_CR9","first-page":"409","volume-title":"Proc int\u2019l conf on dependable systems and networks (DSN)","author":"F Oprea","year":"2007","unstructured":"Oprea F, Reiter MK (2007) Minimizing response time for quorum-system protocols over wide-area networks. In: Proc int\u2019l conf on dependable systems and networks (DSN), pp 409\u2013418"},{"key":"536_CR10","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/MDM.2006.50","volume-title":"Proc int\u2019l conf on mobile data management (MDM)","author":"Y Sawai","year":"2006","unstructured":"Sawai Y, Shinohara M, Kanzaki A, Hara T, Nishio S (2006) Consistency management among replicas using a quorum system in ad hoc networks. In: Proc int\u2019l conf on mobile data management (MDM), pp 128\u2013132"},{"key":"536_CR11","first-page":"82","volume-title":"Proc int\u2019l symposium on parallel and distributed computing (ISPDC)","author":"I Frain","year":"2006","unstructured":"Frain I, M\u2019zoughi A, Bahsoun JP (2006) How to achieve high throughput with dynamic tree-structured coterie. In: Proc int\u2019l symposium on parallel and distributed computing (ISPDC), pp 82\u201389"},{"key":"536_CR12","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1007\/978-3-540-79721-0_53","volume-title":"Quorum based data replication in grid environment, rough sets and knowledge technology","author":"R Latip","year":"2008","unstructured":"Latip R, Ibrahim H, Othman M, Sulaiman MN, Abdullah A (2008) Quorum based data replication in grid environment, rough sets and knowledge technology. Lecture notes in computer science, pp 379\u2013386"},{"key":"536_CR13","first-page":"34","volume-title":"Proc int\u2019l conf on distributed computing systems (ICDCS)","author":"B Liskov","year":"2006","unstructured":"Liskov B, Rodrigues R (2006) Tolerating byzantine faulty clients in a quorum system. In: Proc int\u2019l conf on distributed computing systems (ICDCS), pp 34\u201343"},{"key":"536_CR14","first-page":"955","volume-title":"Proc int\u2019l symposium on applied computing (SAC) of ACM","author":"Y Sawai","year":"2007","unstructured":"Sawai Y, Shinohara M, Kanzaki A, Hara T, Nishio S (2007) Quorum based consistency management among replicas in ad hoc networks with data update. In: Proc int\u2019l symposium on applied computing (SAC) of ACM, pp 955\u2013956"},{"key":"536_CR15","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/NCA.2005.17","volume-title":"Proc int\u2019l symposium on network computing and applications (NCA)","author":"R Baldoni","year":"2005","unstructured":"Baldoni R, Jimenez-Peris R, Patino-Martinez M, Querzoni L, Virgil-lito A (2005) Dynamic quorums for DHT-based P2P networks. In: Proc int\u2019l symposium on network computing and applications (NCA), pp 91\u2013100"},{"key":"536_CR16","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/ISPAN.1999.778941","volume-title":"Proc int\u2019l symposium on parallel architectures, algorithms, and networks (I-SPAN)","author":"W Zhou","year":"1999","unstructured":"Zhou W, Holmes R (1999) The design and simulation of a hybrid replication control protocol. In: Proc int\u2019l symposium on parallel architectures, algorithms, and networks (I-SPAN), pp 210\u2013215"},{"key":"536_CR17","first-page":"219","volume-title":"Proc on twelfth UK computer and telecommunications performance engineering workshop (UKPEW)","author":"R McNab","year":"1996","unstructured":"McNab R, Howell FW (1996) Using java for discrete event simulation. In: Proc on twelfth UK computer and telecommunications performance engineering workshop (UKPEW), pp 219\u2013228"},{"key":"536_CR18","first-page":"55","volume-title":"Proc int\u2019l conf on web-based modelling and simulation","author":"F Howell","year":"1998","unstructured":"Howell F, McNab R (1998) simjava: a discrete event simulation package for Java with applications in computer systems modeling. In: Proc int\u2019l conf on web-based modelling and simulation, pp 55\u201364"},{"issue":"4","key":"536_CR19","first-page":"378","volume":"12","author":"YJ Lee","year":"2009","unstructured":"Lee YJ, Kim HY, Lee CH (2009) Cell approximation method in quorum systems for minimizing access time. Cluster Comput 12(4):378\u2013398","journal-title":"Cluster Comput"},{"key":"536_CR20","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1109\/PRDC.2004.1276565","volume-title":"Proc int\u2019l symposium on Pacific Rim dependable computing (PRDC)","author":"M Arai","year":"2004","unstructured":"Arai M, Suzuki T, Ohara M, Fukumoto S, Iwasaki K, Youn HY (2004) Analysis of read and write availability for generalized hybrid data replication protocol. In: Proc int\u2019l symposium on Pacific Rim dependable computing (PRDC), pp 143\u2013150"},{"issue":"3","key":"536_CR21","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1145\/937598.937601","volume":"28","author":"R Jim\u00e9nez-peris","year":"2003","unstructured":"Jim\u00e9nez-peris R, Pati\u00f1o-mart\u00ednez M, Alonso G, Kemme B (2003) Are quorums an alternative for data replication. ACM Trans Database Syst 28(3):257\u2013294","journal-title":"ACM Trans Database Syst"},{"key":"536_CR22","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/3-540-37795-6_31","volume-title":"Proc int\u2019l conf on future directions in distributed computing (FuDiCo)","author":"R Bhagwan","year":"2003","unstructured":"Bhagwan R, Moore D, Savage S, Voelker G (2003) Replication strategies for highly available peer-to-peer storage. In: Proc int\u2019l conf on future directions in distributed computing (FuDiCo), pp 153\u2013158"},{"issue":"1","key":"536_CR23","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/1057977.1057980","volume":"37","author":"Y Saito","year":"2005","unstructured":"Saito Y, Shapiro M (2005) Optimistic replication. Comput Surv 37(1):42\u201381","journal-title":"Comput Surv"},{"key":"536_CR24","first-page":"19","volume-title":"Proc int\u2019l workshop on data management in peer-to-peer systems","author":"D Klan","year":"2008","unstructured":"Klan D, Sattler K, Hose K, Karnstedt M (2008) Decentralized managing of replication objects in massively distributed systems. In: Proc int\u2019l workshop on data management in peer-to-peer systems, pp 19\u201326"},{"key":"536_CR25","first-page":"349","volume-title":"Proc int\u2019l conf on distributed computing and networking","author":"C Storm","year":"2009","unstructured":"Storm C, Theel O (2009) A general approach to analyzing quorum-based heterogeneous dynamic data replication schemes. In: Proc int\u2019l conf on distributed computing and networking, pp 349\u2013361"},{"key":"536_CR26","first-page":"183","volume-title":"Proc int\u2019l conf on cooperative information systems (CoopIS)","author":"K Henry","year":"2009","unstructured":"Henry K, Swanson C, Xie Q, Daudjee K (2009) Efficient hierarchical quorums in unstructured peer-to-peer networks. In: Proc int\u2019l conf on cooperative information systems (CoopIS), pp 183\u2013200"},{"key":"536_CR27","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1007\/978-3-642-11322-2_42","volume-title":"Proc int\u2019l conf on distributed computing and networking","author":"KK Iakab","year":"2010","unstructured":"Iakab KK, Storm C, Theel O (2010) Consistency-driven probabilistic quorum system construction for improving operation availability. In: Proc int\u2019l conf on distributed computing and networking, pp 446\u2013458"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0536-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-010-0536-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0536-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:24:03Z","timestamp":1559384643000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-010-0536-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,30]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["536"],"URL":"https:\/\/doi.org\/10.1007\/s11227-010-0536-6","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,12,30]]}}}