dblp.uni-trier.dewww.uni-trier.de

Jichiang Tsai

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
17EEJichiang Tsai, Yi-Min Wang: Communication-Induced Checkpointing Protocols and Rollback-Dependency Trackability: A Survey. Wiley Encyclopedia of Computer Science and Engineering 2008
2007
16EEJenn-Wei Lin, Ming-Feng Yang, Jichiang Tsai: Fault Tolerance for Super-Peers of P2P Systems. PRDC 2007: 107-114
15EEJichiang Tsai, Chia-Yang Chen, Ming-Fa Hu, Jenn-Wei Lin: Self-Adjusting Indexing Techniques for Communication-Induced Checkpointing Protocols. PRDC 2007: 306-313
14EEJichiang Tsai: Applying the Fully-Informed Checkpointing Protocol to the Lazy Indexing Strategy. J. Inf. Sci. Eng. 23(5): 1611-1621 (2007)
2005
13EEJichiang Tsai, Jenn-Wei Lin: On the Fully-Informed Communication-Induced Checkpointing Protocol. PRDC 2005: 151-158
12EEJenn-Wei Lin, Jichiang Tsai, Chao-Ying Chiu: An Efficient Approach to Tolerating Route Errors in Mobile Ad Hoc Networks. PRDC 2005: 250-257
11 Wu-Hong Chen, Jichiang Tsai, Di Tarn, Yen-Chian Chen: Implementation of a Remote Checkpointing System for Windows NT Applications. SEKE 2005: 671-676
10EEJichiang Tsai: An Efficient Index-Based Checkpointing Protocol with Constant-Size Control Information on Messages. IEEE Trans. Dependable Sec. Comput. 2(4): 287-296 (2005)
9EEJichiang Tsai, Sy-Yen Kuo, Yi-Min Wang: More Properties of Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability. J. Inf. Sci. Eng. 21(2): 239-257 (2005)
2004
8EEJichiang Tsai: Systematic Comparisons of RDT Communication-Induced Checkpointing Protocols. PRDC 2004: 66-75
7EEJichiang Tsai, Chi-Yi Lin, Sy-Yen Kuo: Adaptive Communication-Induced Checkpointing Protocols with Domino-Effect Freedom. J. Inf. Sci. Eng. 20(5): 885-901 (2004)
2003
6EEJichiang Tsai: On Properties of RDT Communication-Induced Checkpointing Protocols. IEEE Trans. Parallel Distrib. Syst. 14(8): 755-764 (2003)
2002
5EEDeron Liang, Chen-Liang Fang, Jichiang Tsai: A Nested Invocation Suppression Framework for Active Replication Fault-Tolerant CORBA. COMPSAC 2002: 757-762
4EEJichiang Tsai, Jenn-Wei Lin: On Characteristics of DEF Communication-Induced Checkpointing Protocols. PRDC 2002: 29-36
2000
3 Chi-Yi Lin, Jichiang Tsai, Sy-Yen Kuo, Yennun Huang: Communication-Induced Checkpointing Protocols with K-Bounded Domino-Effect Freedom. ICDCS Workshop on Distributed Real-Time Systems 2000: B7-B13
1999
2EEJichiang Tsai, Yi-Min Wang, Sy-Yen Kuo: Evaluations of Domino-Free Communication-Induced Checkpointing Protocols. Inf. Process. Lett. 69(1): 31-37 (1999)
1998
1EEJichiang Tsai, Sy-Yen Kuo, Yi-Min Wang: Theoretical Analysis for Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability. IEEE Trans. Parallel Distrib. Syst. 9(10): 963-971 (1998)

Coauthor Index

1Chia-Yang Chen [15]
2Wu-Hong Chen [11]
3Yen-Chian Chen [11]
4Chao-Ying Chiu [12]
5Chen-Liang Fang [5]
6Ming-Fa Hu [15]
7Yennun Huang [3]
8Sy-Yen Kuo [1] [2] [3] [7] [9]
9Deron Liang (De-Ron Liang) [5]
10Chi-Yi Lin [3] [7]
11Jenn-Wei Lin [4] [12] [13] [15] [16]
12Di Tarn [11]
13Yi-Min Wang [1] [2] [9] [17]
14Ming-Feng Yang [16]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)