Exploiting Replication
dc.contributor.author | Birman, Kenneth P. | en_US |
dc.contributor.author | Joseph, Thomas A. | en_US |
dc.date.accessioned | 2007-04-23T17:32:52Z | |
dc.date.available | 2007-04-23T17:32:52Z | |
dc.date.issued | 1988-06 | en_US |
dc.description.abstract | NO ABSTRACT AVAILABLE | en_US |
dc.format.extent | 5535761 bytes | |
dc.format.extent | 4561354 bytes | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/postscript | |
dc.identifier.citation | http://techreports.library.cornell.edu:8081/Dienst/UI/1.0/Display/cul.cs/TR88-917 | en_US |
dc.identifier.uri | https://hdl.handle.net/1813/6757 | |
dc.language.iso | en_US | en_US |
dc.publisher | Cornell University | en_US |
dc.subject | computer science | en_US |
dc.subject | technical report | en_US |
dc.title | Exploiting Replication | en_US |
dc.type | technical report | en_US |