By Topic

Proceedings of 15th International Conference on Distributed Computing Systems

May 30 1995-June 2 1995

Filter Results

Displaying Results 1 - 25 of 67
  • Proceedings of 15th International Conference on Distributed Computing Systems

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (378 KB)
    Freely Available from IEEE
  • Future distributed embedded and real-time applications will be adaptive - meanings, challenges and research paradigms [panel session]

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • Implementing sequentially consistent shared objects using broadcast and point-to-point communication

    Publication Year: 1995, Page(s):439 - 449
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1024 KB)

    A distributed algorithm that implements a sequentially consistent collection of shared read/update objects using a combination of broadcast and point-to-point communication is presented and proved correct. This algorithm is a generalization of one used in the Orca shared object system. The algorithm caches objects in the local memory of processors according to application needs; each read operatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterizing and detecting the set of global states seen by all observers of a distributed computation

    Publication Year: 1995, Page(s):431 - 438
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB)

    A consistent observation of a given distributed computation is a sequence of global states that could be produced by executing that computation on a monoprocessor system. Therefore a distributed execution generally accepts several consistent observations. This paper concentrates on what all these observations have in common. An abstraction called common global state is defined. A necessary and suf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed algorithms for detecting conjunctive predicates

    Publication Year: 1995, Page(s):423 - 430
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB)

    This paper discusses efficient distributed detection of global conjunctive predicates in a distributed program. Our methods correctly detect the first consistent cut in which the predicate is true, even if the predicate is unstable. Previous work in detection of such predicates is based on a centralized checker process. In this paper we introduce algorithms which distribute the computation and spa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specifying weak sets

    Publication Year: 1995, Page(s):414 - 421
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB)

    We present formal specifications of a new abstraction, weak sets, which can be used to alleviate high latencies when retrieving data from a wide-area information system like the World Wide Web. In the presence of failures, concurrency, and distribution, clients performing queries may observe behavior that is inconsistent with the stringent semantic requirements of mathematical sets. For example, a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multiversion concurrent object model for distributed and multiuser environments

    Publication Year: 1995, Page(s):271 - 278
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (840 KB)

    In this paper, we describe the design and implementation of an extended concurrent object model for distributed and multiuser systems called the Multiversion Concurrent Object (MCO). In this model, an object executes multiple methods concurrently within itself, but is handled as a concurrent object. Each MCO makes a copy of its own state, called a version, for executing a method that is not interl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating visualization support into distributed computing systems

    Publication Year: 1995, Page(s):19 - 26
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB)

    Visualization and animation tools may become extremely important aids in the understanding, verification, and performance tuning of parallel computations. Presently, however, the use of visualization has had only a limited use for enhancing parallel computation. We hypothesize that one of the primary reasons for the limited use of visualization tools in parallel program development is the difficul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maintaining consistency of data in mobile distributed environments

    Publication Year: 1995, Page(s):404 - 413
    Cited by:  Papers (47)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1088 KB)

    To deal with the frequent, foreseeable and variable disconnections that occur in a mobile environment, we introduce a flexible, two-level consistency model. Semantically related or closely located data are grouped together to form a cluster. While all data inside a cluster are mutually consistent, degrees of inconsistency are allowed among data at different clusters. To take advantage of the predi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An object-based distributed computing environment based on a reflective architecture

    Publication Year: 1995, Page(s):263 - 270
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB)

    This paper presents an object-based distributed computing environment based on a reflective architecture for industrial large-scale distributed systems. This distributed computing environment uses a compiler-based reflection technique to realize industrial distributed systems with standard workstations. A multiple-world model is also presented, in which a distributed system consists of hierarchica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selective broadcast data distribution systems

    Publication Year: 1995, Page(s):317 - 324
    Cited by:  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    This paper describes a two tier architecture for high speed data distribution. The architecture consists of a database interface network which distributes information from a central database to a number of servers, and a user interface network which distributes information from the servers to the user terminals. The database interface network uses the selective broadcast technique to distribute da... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A tool for monitoring software-heterogeneous distributed object applications

    Publication Year: 1995, Page(s):11 - 18
    Cited by:  Patents (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (752 KB)

    The next decade will bring radical changes to the way we do information processing, as applications composed of many cooperating distributed subsystems, exploiting different computational paradigms, become more common. This situation increases substantially demands in the area of system management, correctness analysis, understanding, debugging and performance evaluation. Managed Object-based Dist... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • General design of grid-based data replication schemes using graphs and a few rules

    Publication Year: 1995, Page(s):395 - 403
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (828 KB)

    Grid-based data replication protocols have been proven to be extremely efficient due to the high availability and the low cost of read and write operations they offer. However, although each grid protocol uses logical grids, the semantics and interpreting algorithms vary from scheme to scheme. This has the disadvantage that switching from one protocol to another, results in a re-implementation of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient failure discovery with limited authentication

    Publication Year: 1995, Page(s):78 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    Solutions for agreement problems in distributed systems can generally be divided into two classes: authenticated protocols and non-authenticated protocols. Authenticated protocols make use of authenticated messages, i.e., the messages can be signed in a way that a signed message can be assigned unambiguously to the signer. Little has been said about how to achieve this kind of authentication; in s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A thread-based interface for collective communication on ATM networks

    Publication Year: 1995, Page(s):254 - 261
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    This paper presents the results of an investigation of collective communication operations for distributed computing across asynchronous transfer mode (ATM) networks. Several collective operations have been implemented and studied on a three-switch ATM network testbed at Michigan State University. The methods use virtual topologies constructed from ATM virtual channels. A particular type of virtua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Configuration-level optimization of RPC-based distributed programs

    Publication Year: 1995, Page(s):307 - 315
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (840 KB)

    Many strategies for improving performance of distributed programs can be described abstractly in terms of an application's overall configuration. But previously those techniques would need to be implemented manually, and the resulting programs, though yielding good performance, are more expensive to build and much less easy to reuse. This paper describes research towards an automatic system for in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probing and fault injection of protocol implementations

    Publication Year: 1995, Page(s):351 - 359
    Cited by:  Papers (8)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (852 KB)

    Ensuring that a distributed system with strict dependability constraints meets its prescribed specification is a growing challenge that confronts software developers and system engineers. This paper presents a technique for probing and fault injection of fault-tolerant distributed protocols. The proposed technique, called script-driven probing and fault injection, can be used for studying the beha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synthesis of protocol entities specifications from service specifications in a Petri net model with registers

    Publication Year: 1995, Page(s):510 - 517
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (780 KB)

    In general, the services of a distributed system are provided by some cooperative protocol entities. The protocol entities must exchange some data values and synchronization messages in order to ensure the temporal ordering of the events which are described in a service specification of the distributed system. It is desirable that a correct protocol entity specification for each node can be derive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed pipeline scheduling: end-to-end analysis of heterogeneous, multi-resource real-time systems

    Publication Year: 1995, Page(s):204 - 211
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    This paper presents an hierarchical end-to-end analysis technique that decomposes the very complex heterogeneous multi-resource scheduling problem into a set of single resource scheduling problems with well defined interactions. We define heterogeneity both in resource types, e.g., CPU, and in scheduling policies, e.g., rate-monotonic scheduling. This analysis technique is one phase of our systems... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coterie templates: a new quorum construction method

    Publication Year: 1995, Page(s):92 - 99
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    One approach to distributed mutual exclusion algorithms is the use of quorums. Quorum-based algorithms offer the advantage of protocol symmetry, spreading effort and responsibility uniformly across the distributed system. In this paper, we present an O(logn) algorithm to generate coterie templates of near-optimal O(n0.63) size. Coterie templates are generic quorum structures that exhibi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic techniques for minimizing the intrusive effect of monitoring actions

    Publication Year: 1995, Page(s):368 - 376
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (932 KB)

    Programs written in distributed programming languages are often non-deterministic in nature and hence the execution of such programs is not only dependent upon the program input, but also on the timing of the execution. Thus, an attempt to monitor the run-time behavior of a non-deterministic program through code instrumentation, such as during debugging, can potentially alter the program's behavio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software tool evaluation methodology

    Publication Year: 1995, Page(s):3 - 10
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB)

    The recent development of parallel and distributed computing software has introduced a variety of software tools that support several programming paradigms and languages. This variety of tools makes the selection of the best tool to run a given class of applications on a parallel or distributed system a non-trivial task that requires some investigation. We expect tool evaluation to receive more at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification of a secured multi-server MMS protocol

    Publication Year: 1995, Page(s):526 - 533
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    We present a complete specification of a new architecture for the Manufacturing Message Specification (MMS) protocol. This architecture is based on a client/multi-server model adopted by the MMS standard. A client invokes a service request that implies the cooperation of many servers to execute the requested service and satisfies the client demand. This architecture permits the definition of distr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical technique for asynchronous transaction processing

    Publication Year: 1995, Page(s):110 - 117
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (940 KB)

    Asynchronous transaction processing extends traditional on-line transaction processing (TP) to improve performance of distributed systems by alleviating the serializability (SR) bottleneck. For example, epsilon serializability (ESR) uses divergence control algorithms to allow more concurrency by permitting limited non-SR interleavings. In a distributed environment, ESR relaxes commit and abort dep... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.