By Topic

Distributed Computing Systems, 1995., Proceedings of the Fifth IEEE Computer Society Workshop on Future Trends of

Date 28-30 Aug. 1995

Filter Results

Displaying Results 1 - 25 of 67
  • Proceedings of the Fifth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems

    Publication Year: 1995
    Request Permissions | PDF file iconPDF (294 KB)  
    Freely Available from IEEE
  • Distributing virtual worlds in a teleteaching environment

    Publication Year: 1995 , Page(s): 66 - 75
    Cited by:  Patents (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (848 KB)  

    This paper discusses the future trends on teleteaching applications. These include remote access to distributed virtual reality resources, information on demand teleservices and multimedia telecommunication environments across high speed multicast networks for teleteaching scenarios. A teleteaching session held by a lecturer in Berlin is multicasted across the regional metropolitan area network. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The reliable distributed network management platform

    Publication Year: 1995 , Page(s): 439 - 445
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (452 KB)  

    Outgrowth of the development of distributed computer environment has caused local resources to be connected and shared by means of networks. A user can utilize far much efficiently way through the networks. Without effective network management, a user can not user them efficiently. It will lead to inefficient computing work. Currently, SNMP (Simple Network Management Protocol) and CMIP (Common Man... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal timing verification techniques for distributed system

    Publication Year: 1995 , Page(s): 454 - 460
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (544 KB)  

    Formal specification and timing verification of distributed system are important. As concerns formal specification and verification of distributed system, SDL and LOTOS, Estelle have been standardized and studied. But we can nor formally specify and verify timing conditions and fairness by these methods. In this paper, we propose formal timing specification and verification including strong fairne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural issues in adopting distributed shared memory for distributed object management systems

    Publication Year: 1995 , Page(s): 294 - 300
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (644 KB)  

    Distributed shared memory (DSM) provides transparent network interface based on the memory abstraction. Furthermore, DSM gives us the ease of programming and portability. Also the advantages offered by DSM include low network overhead, with no explicit operating system intervention to move data over network. With the advent of high-bandwidth networks and wide addressing, adopting DSM for distribut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed techniques in software systems integration

    Publication Year: 1995 , Page(s): 252 - 256
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (412 KB)  

    Many aspects of software development use varieties of distributed computing techniques. We focus on a specific phase known generally as testing but more appropriately as iterative test and integration. Traditional software development is mandated by methodologies. These methodologies follow from the waterfall model of software development, and provide automation support via software tools for codi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The impact of group communication paradigms on groupware support

    Publication Year: 1995 , Page(s): 207 - 214
    Request Permissions | Click to expandAbstract | PDF file iconPDF (692 KB)  

    Group Communication Paradigms play an important role in the management of group activities, such as reliable information diffusion in support of replication and cooperation. They consequently provide an appropriate framework for groupware applications support. To meet the new challenges posed by large scale distributed settings like the Internet, a new generation of group communication systems has... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Video-on-demand: experience with protocols and their implementation

    Publication Year: 1995 , Page(s): 446 - 451
    Cited by:  Patents (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (464 KB)  

    This paper summarizes some observations made during our research project aiming at investigating the practical problems encountered during the implementation of interactive multimedia information systems. The prototype deals with digitally compressed information encoded in MPEG-2 formats. We have opted for the use of a set of standard protocols. In this paper we give a brief description and critiq... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operating system support for the trader in distributed real-time environments

    Publication Year: 1995 , Page(s): 194 - 199
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (516 KB)  

    As the communication technology evolves, it will become possible to run real-time applications in distributed environments. To support such applications, it is desirable for middleware such as ODP, CORBA or OSF/DCE to run on real-time operating systems with real-time communication facilities. In this environment, the real-time trader which can perform trading service under time constraints is requ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed computing using autonomous objects

    Publication Year: 1995 , Page(s): 160 - 168
    Cited by:  Papers (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (944 KB)  

    Autonomous objects is a new computing and coordination paradigm for distributed systems, based on the concept of intelligent messages that carry their own behavior and that propagate autonomously through the underlying computational network. We survey and classify several existing systems that fall into this general category of autonomous objects and present a unifying view of the paradigm by desc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BVPN (Broadband Virtual Private Network): a flexible, high-speed, enterprise network architecture

    Publication Year: 1995 , Page(s): 420 - 424
    Request Permissions | Click to expandAbstract | PDF file iconPDF (428 KB)  

    The implementation of ATM and Intelligent Network (IN) in communications networks is coming. ATM, the technology for transmitting and switching multimedia information over broadband network, requires a highly functional system for controlling highspeed communications services. IN, the technology for providing advanced network services, requires highspeed transmission of service control signals. Al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Executable specifications for distributed software systems

    Publication Year: 1995 , Page(s): 257 - 265
    Request Permissions | Click to expandAbstract | PDF file iconPDF (692 KB)  

    The front-end life cycle or upper CASE aspects of software development for distributed systems is driven by the components of applications, management, and techniques/tools. The applications component seeks taxonomies of application domains in distributed computing and the identification of core software requirements. The management component concerns the twofold aspects of developing distributed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deadlocks in distributed systems: request models and definitions

    Publication Year: 1995 , Page(s): 186 - 193
    Request Permissions | Click to expandAbstract | PDF file iconPDF (696 KB)  

    The paper addresses the problem of deadlock detection in asynchronous distributed systems for system model that covers unspecified receptions and non-FIFO channels. It presents a hierarchy of deadlock models considered till now, and then abstracts away their differences to define a single, general deadlock model. This general model is used to introduce abstract formulation of basic deadlock detect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences with the Bay Area Gigabit Network Testbed

    Publication Year: 1995 , Page(s): 26 - 32
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (632 KB)  

    The Bay Area Gigabit Network Testbed (BAGNet) is a high-performance ATM (155 Mbps) testbed located within the San Francisco Bay Area in northern California. BAGNet is a metropolitan-area network, spanning an area of approximately 50 square miles. There are fifteen sites participating in the testbed, with up to four hosts per site. Although BAGNet is an applications-oriented testbed, much of our ef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to information security in distributed systems

    Publication Year: 1995 , Page(s): 384 - 394
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (980 KB)  

    Information flow control mechanisms detect and prevent illegal transfers of information within a computer system. In this paper, we give an overview of a programming language based approach to information flow control in a system of communicating processes. The language chosen to present the approach is CSP. We give the security semantics of CSP and show, with the aid of examples, how the semantic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable linear algebra software libraries for distributed memory concurrent computers

    Publication Year: 1995 , Page(s): 170 - 177
    Request Permissions | Click to expandAbstract | PDF file iconPDF (656 KB)  

    This paper discusses the core factorization routines included in the ScaLAPACK library. These routines allow the factorization and solution of a dense system of linear equations via LU, QR, and Cholesky. They are implemented using a block cyclic data distribution, and are built using de facto standard kernels for matrix and vector operations (BLAS and its parallel counterpart PBLAS) and message pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic load balancing in distributed computer systems with star topology

    Publication Year: 1995 , Page(s): 514 - 517
    Request Permissions | Click to expandAbstract | PDF file iconPDF (284 KB)  

    We consider sender-initiated dynamic load balancing policies in distributed computer system with star topology. In this system, the processing power of central node may be greater than that of peripheral nodes and the job arrival rate of each node may be different. The performance of load balancing may be very different according to the selection of sender criteria and receiver criteria for job tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enforcing management policies in distributed systems

    Publication Year: 1995 , Page(s): 474 - 480
    Cited by:  Patents (10)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (568 KB)  

    The objective of our work is to develop a platform independent management architecture for open distributed systems. We describe one component of this architecture which enforces the observance of formally definable management policies and executes clerical management tasks automatically. Management components are defined in terms of on object-oriented class structure and policies are represented ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Garbage collection in the Larchant persistent distributed shared store

    Publication Year: 1995 , Page(s): 461 - 467
    Request Permissions | Click to expandAbstract | PDF file iconPDF (648 KB)  

    We study tracing garbage collection (GC) for a distributed shared memory (DSM) in order to provide persistence by reachability (PBR), in a large-scale distributed system. Within a general model of DSM, we specify a distributed tracing GC algorithm that scales, collects cycles, and is orthogonal to coherence. Its main features are: (i) piecewise collection of opportunistically-chosen subsets of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicast routing algorithms in high speed networks

    Publication Year: 1995 , Page(s): 495 - 501
    Cited by:  Patents (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (624 KB)  

    We propose two multicast routing algorithms. One is a delay-constrained multicast algorithm that finds a multicast tree between one source node and multiple destination nodes. The other is a dynamic multicast algorithm that allows multiple nodes to dynamically join or leave a multicast group during a session. The first algorithm, which provides multicasting and guaranteed QoS (Quality-of-Service) ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible manufacturing and high performance system for steel plants

    Publication Year: 1995 , Page(s): 112 - 119
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (636 KB)  

    The requirement for the steel production is achieving more varieties and smaller lot of products with higher quality and low cost. In the circumstance, the process computer system has to be designed to achieve a more flexible system, which has high expandability and maintainability, and capability to increase the software productivity. Then Japanese steel companies have regularly introduced leadin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • One service management architecture for distributed systems using DCE

    Publication Year: 1995 , Page(s): 412 - 417
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (588 KB)  

    This paper presents one architecture for distributed system management. In the distributed environment, management functions are one of the most important functions. Without an appropriate management mechanism, we cannot use various distributed resources efficiently. Through this proposed architecture, issues of the distributed system management are supported. This architecture is especially usefu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MANDAS: management of distributed applications and systems

    Publication Year: 1995 , Page(s): 200 - 206
    Cited by:  Papers (1)  |  Patents (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (728 KB)  

    Many challenging issues and problems exist in the management of distributed applications and systems in distributed computing environments. The broad goals of the MANDAS (Management of Distributed Applications and Systems) project are to identify and solve problems arising in the development of a management framework and architecture, in the design, modeling and management of distributed applicati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A leader election algorithm in a distributed computing system

    Publication Year: 1995 , Page(s): 481 - 485
    Cited by:  Papers (7)  |  Patents (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (348 KB)  

    A leader election algorithm based on the performance and the operation rate of nodes and links as proposed. The performance of the existing leader election algorithms should be improved because a distributed system pauses until a node becomes a unique leader among all nodes in the system. The pre-election algorithm that elects a provisional leader while the leader is executing is also introduced View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A network channel buffer scheduling algorithm for an interactive VOD server

    Publication Year: 1995 , Page(s): 509 - 513
    Request Permissions | Click to expandAbstract | PDF file iconPDF (384 KB)  

    A VOD server handles various types of media such as continuous media (CM) and non-continuous media (NM). Conventional VOD server buffer scheduling algorithms like Round Robin (RR) and Earliest Deadline First (EDF) have tradeoffs between guaranteeing the deadline of CM and getting a fast response time of NM. The former performs well in a NM environment while the latter is suitable for CM. In this p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.