Team for Research in
Ubiquitous Secure Technology

Implementing Reliable Event Streams in Large Systems via Distributed Data Flows and Recursive Delegation.
Ken Birman, Krzysztof Ostrowski

Citation
Ken Birman, Krzysztof Ostrowski. "Implementing Reliable Event Streams in Large Systems via Distributed Data Flows and Recursive Delegation.". 3rd ACM International Conference on Distributed Event-Based Systems (DEBS 2009)., July, 2009.

Abstract
(No abstract.)

Electronic downloads

Citation formats  
  • HTML
    Ken Birman, Krzysztof Ostrowski. <a
    href="http://www.truststc.org/pubs/719.html"
    >Implementing Reliable Event Streams in Large Systems via
    Distributed Data Flows and Recursive Delegation.</a>,
    3rd ACM International Conference on Distributed Event-Based
    Systems (DEBS 2009)., July, 2009.
  • Plain text
    Ken Birman, Krzysztof Ostrowski. "Implementing Reliable
    Event Streams in Large Systems via Distributed Data Flows
    and Recursive Delegation.". 3rd ACM International
    Conference on Distributed Event-Based Systems (DEBS 2009).,
    July, 2009.
  • BibTeX
    @inproceedings{BirmanOstrowski09_ImplementingReliableEventStreamsInLargeSystemsViaDistributed,
        author = {Ken Birman and Krzysztof Ostrowski},
        title = {Implementing Reliable Event Streams in Large
                  Systems via Distributed Data Flows and Recursive
                  Delegation.},
        booktitle = {3rd ACM International Conference on Distributed
                  Event-Based Systems (DEBS 2009).},
        month = {July},
        year = {2009},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/719.html}
    }
    

Posted by Amy Finch Seely on 7 Apr 2010.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.