|
1. T. Erl, R. Puttini, and Z. Mahmood, “Cloud Computing Concepts, Technology & Architecture,” The Prentice Hall Service Technology Series, Prentice Hall, 2013
|
|
2. J. Deng, S. C. H. Huang, Y. S. Han, and J. H. Deng, “Fault Tolerant and Reliable Computation in Cloud Computing,” Proc. of IEEE Globecom workshops, pp. 1601-1605, December 2010
|
|
3. C. Wang, L. Xing, H. Wang, Y. Dai, and Z. Zhang, “Performance Analysis of Media Cloud-Based Multimedia Systems with Retrying Fault-Tolerance Technique,” IEEE Systems Journal, Special Issue on Recent Advances in Cloud-based Multimedia Systems, vol. 8, no. 1, pp. 313-321, 2014
|
|
4. G. Robinson, A. Narin, and C. Elleman, “Using Amazon Web Services for Disaster Recovery,” Amazon web services, 2013
|
|
5. R. Zhang, C. Lin, K. Meng, and L. Zhu, “A modeling reliability analysis technique for cloud storage system,” Proc. of 15th IEEE Intl. Conf. on Communication Technology, pp. 32-36, November 2013
|
|
6. W. Li, Y. Yang, and J. Chen, “A cost-effective mechanism for cloud data reliability management based on proactive replica checking,” IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 564–571, May 2012
|
|
7. C. Y. Lin, and W. G. Tzeng, “Game-Theoretic Strategy Analysis for Data Reliability Management in Cloud Storage Systems,” Intl. Conf. on Software Security and Reliability, pp. 187-195, July 2014
|
|
8. Y. Lu, and S. Xia, “Novel erasure codes with repair optimality for cloud storage,” International Conference on Information and Communications Technologies, pp. 1-5, April 2015
|
|
9. R. Zhang, C. Lin, K. Meng, and L. Zhu, “BEC: A reliable and efficient mechanism for cloud storage service,” IEEE Intl. Conf. on Communication Technology, pp. 717-721, November 2013
|
|
10. D. Fitch, and H. Xu, “A RAID-based secure and fault-tolerant model for cloud information storage,” Intl. J. of Software Engineering and Knowledge Engineering, vol. 23, pp. 627-654, April 2013
|
|
11. Q. Liu, and L. Xing, “Reliability Modeling of Cloud-RAID-6 Storage System,” International Journal of Future Computer and Communication, vol. 4, no. 6, pp. 415-420, December 2015
|
|
12. F. Bausch, Cloud-RAID Concept, available at http://blog.fbausch.de/cloudraid-3-concept/, accessed in April 2017
|
|
13. T. Jin, Y. Yu, and L. Xing, “Reliability Analysis of RAID Systems using Repairable k-out-of-n Modeling Techniques,” Intl. Conf. on Interface between Statistics & Engineering, pp. 13-15, 2009
|
|
14. Q. Liu, and L. Xing, “Hierarchical Reliability Analysis of Multi-state Cloud-RAID Storage System,” Proc. of Intl. Conf. on Quality, Reliability, Risk, Maintenance, & Safety Eng., July 2015
|
|
15. A. Myers, “Complex System Reliability,” Springer Series in Reliability Engineering, 2nd edition, September 23, 2010
|
|
16. T. Jin, L. Xing, and Y. Yu, “A hierarchical Markov reliability model for data storage systems with media self-recovery,” International Journal of Reliability, Quality and Safety Engineering, vol. 18, pp. 25-41, November 2011
|
|
17. D. Patterson, P. Chen, G. Gibson, and R. H. Katz, “Introduction to Redundant Arrays of Inexpensive Disks (RAID),” Proceedings of Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage, Digest of Papers, pp. 112-117, February-March 1989
|
|
18. S. V. Amari, A. Myers, and A. Rauzy, “An Efficient Algorithm to Analyze New Imperfect Fault Coverage Models,” Proc. of Annual Reliability and Maintainability Symposium, pp. 420-426, January 2007
|
|
19. S. V. Amari, A. Myers, A. Rauzy, and K. Trivedi, “Imperfect coverage models: status and trends,” Handbook of Performability Engineering, Editor: K. B. Misra, Springer, 2008
|
|
20. A. Myers, “k-out-of-n: G system reliability with imperfect fault coverage,” IEEE Transactions on Reliability, vol. 56, no. 3, pp. 464-473, September 2007
|
|
21. A. Myers, and A. Rauzy, “Assessment of redundant systems with imperfect coverage by means of binary decision diagrams,” Reliability Eng. & System Safety, vol. 93, pp. 1025-1035, 2008
|
|
22. L. Xing, and S. V. Amari, “Binary Decision Diagrams and Extensions for System Reliability Analysis,” Wiley-Scrivener, MA, ISBN: 978-1-118-54937-7, 2015
|
|
23. L. Xing, H. Wang, C. Wang, and Y. Wang, “BDD-Based Two-Party Trust Sensitivity Analysis for Social Networks,” Intl. Journal of Security and Networks, vol. 7, no. 4, pp. 242 – 251, 2012
|
|
24. S. V. Amari, J. B. Dugan, and R.B. Misra, “A separable method for incorporating imperfect fault-coverage into combinatorial models,” IEEE Trans. on Reliability, vol. 48, no. 3, pp. 267-274, 1999
|
|
25. L. Xing, and J. B. Dugan, “Analysis of Generalized Phased Mission System Reliability, Performance and Sensitivity,” IEEE Transactions on Reliability, vol. 51, no. 2, pp. 199-211, 2002
|