[2] Comprehensive test ban treaty organization (ctbto).
https://www.
org/.
gov/DMF/.
[6] National ecological observatory network.
[12] D. J. Abadi, Y. Ahmad, M. Balazinska, U. Cetintemel, M. Cherni-
ack, J.-H. Hwang, W. Lindner, A. S. Maskey, A. Rasin, E. Ryvk-
ina, N. Tatbul, Y. Xing, and S. Zdonik. The Design of the Borealis
Stream Processing Engine. In Second Biennial Conference on Inno-
vative Data Systems Research (CIDR 2005), Asilomar, CA, January
2005.
[13] M. Balazinska, H. Balakrishnan, S. Madden, and M. Stonebraker.
Fault-tolerance in the borealis distributed stream processing system.
In ACM SIGMOD Conf., Baltimore, MD, June 2005.
[14] J. Bartlett, J. Gray, and B. Horst. Fault tolerance in tandem computer
systems. In A. Avizienis, H. Kopetz, and J.-C. Laprie, editors, The
Evolution of Fault-Tolerant Systems, pages 55–76. Springer-Verlag,
Vienna, Austria, 1987.
[15] J. Campbell, P. B. Gibbons, S. Nath, P. Pillai, S. Seshan, and R. Suk-
thankar. Irisnet: an internet-scale architecture for multimedia sen-
sors. In Proc. the 13th annual ACM international conference on
Multimedia, November 2005.
[16] O. Cooper, A. Edakkunni, M. J. Franklin, W. Hong, S. R. Jeffery,
S. Krishnamurthy, F. Reiss, and E. Wu. Hifi: A unified architecture
for high fan-in systems. In Proc. the 30th International Conference
on Very Large Data Bases, August 2004.
[17] A. Fox and E. A. Brewer. Harvest, yield and scalable tolerant sys-
tems. In Proc. the 1999 Workshop on Hot Topics in Operating Sys-
tems, Rio Rico, Arizona, March 1999.
[18] J. Gray. Why do computers stop and what can be done about it?
In Symposium on Reliability in Distributed Software and Database
Systems, pages 3–12, 1986.
[19] Haifeng Yu and Amin Vahdat. The Costs and Limits of Availability
for Replicated Services. In Proceedings of the 18th ACM Symposium
on Operating Systems Principles (SOSP), October 2001.
[20] R. Huebsch, B. Chun, J. M. Hellerstein, B. T. Loo, P. Maniatis,
T. Roscoe, S. Shenker, I. Stoica, and A. R. Yumerefendi. The ar-
chitecture of pier: an internet-scale query processor. In Proc. the
Second Biennial Conference on Innovative Data Systems Research,
January 2005.
[21] Hyang-Ah Kim and Brad Karp. Autograph: Toward Automated,
Distributed Worm Signature Detection. In 13th Usenix Security
Symposium (Security 2004), August 2004.
[22] D. Moore, C. Shannon, G. M. Voelker, and S. Savage. Network
telescopes: Technical report. Technical Report UCB/CSD-00-1096,
Cooperative Association for Internet Data Analysis, April 2004.
[23] C. Olston and J. Widom. Offering a precision-performance tradeoff
for aggregation queries over replicated data. In The VLDB Journal,
pages 144–155, 2000.
[24] K. Petersen, M. J. Spreitzer, D. B. Terry, M. M. Theimer, and A. J.
Demers. Flexible update propagation for weakly consistent repli-
cation. In Proceedings of the 16th ACM Symposium on Operating
SystemsPrinciples (SOSP-16), Saint Malo, France, 1997.
[25] P. Pietzuch, J. Ledlie, J. Shneidman, M. Roussopoulos, M. Welsh,
and M. Seltzer. Network-aware operator placement for stream-
processing systems. In Proc. the 22nd International Conference on
Data Engineering (ICDE’06), August 2006.
[26] A. Ray. Oracle data guard: Ensuring disaster recovery for the enter-
prise. Technical report, An Oracle white paper, March 2002.
[27] G. Simon et al. Sensor network-based countersniper system. In
Proc. ACM SenSys ’04, November 2004.
[28] R. Szewczyk, A. Mainwaring, J. Polastre, and D. Culler. An analy-
sis of a large scale habitat monitoring application. In Proc. Second
ACM Conference on Embedded Networked Sensor Systems (Sen-
Sys), 2004.
[29] G. Tolle, J. Polastre, R. Szewczyk, D. Culler, N. Turner, K. Tu,
S. Burgess, T. Dawson, P. Buonadonna, D. Gay, and W. Hong. A
macroscope in the redwoods. In Proc. the Third ACM Conference
on Embedded Networked Sensor Systems (SenSys 2005), November
2005.
[30] R. van Renesse, K. Birman, and W. Vogels. Astrolabe: A robust
and scalable technology for distributed system monitoring, manage-
ment, and data mining. In ACM Transactions on Computer Systems,
volume 21, pages 164–206, May 2003.
[31] M. Vrable, J. Ma, J. Chen, D. Moore, E. Vandekieft, A. C. Snoeren,
G. M. Voelker, and S. Savage. Scalability, fidelity, and containment
in the Potemkin virtual honeyfarm. In SOSP ’05: Proceedings of the
twentieth ACM symposium on Operating systems principles, pages
148–162, New York, NY, USA, 2005. ACM Press.
[32] H. Wang, D. Estrin, and L. Girod. Preprocessing in a tiered sensor
network for habitat monitoring, 2002.
[33] G. Werner-Allen, K. Lorincz, M. Ruiz, O. Marcillo, J. Johnson,
J. Lees, and M. Welsh. Deploying a wireless sensor network on an
active volcano. IEEE Internet Computing, Special Issue on Data-
Driven Applications in Sensor Networks, March/April 2006.