By Topic

11th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS'07)

Date 21-23 March 2007

Filter Results

Displaying Results 1 - 25 of 38
  • 11th IEEE International Workshop on Future Trends of Distributed Computing Systems - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (328 KB)
    Freely Available from IEEE
  • 11th IEEE International Workshop on Future Trends of Distributed Computing Systems-Title

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • 11th IEEE International Workshop on Future Trends of Distributed Computing Systems-Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • 11th IEEE International Workshop on Future Trends of Distributed Computing Systems - TOC

    Publication Year: 2007, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • Message from the Workshop Chair and Steering Committee Chair

    Publication Year: 2007, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (25 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Co-Chairs

    Publication Year: 2007, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (24 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2007, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2007, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • OptIPuter--A High Performance SOA LambdaGrid Enabling Scientific Applications

    Publication Year: 2007, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (106 KB) | HTML iconHTML

    Summary form only given. During the last few years, a radical restructuring of optical networks supporting e-Science projects is beginning to occur around the world. U.S. universities are beginning to acquire access to private, high bandwidth light pipes (termed "lambdas") through the National LambdaRail and the Global Lambda Integrated Facility, providing direct access to global data repositories... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Web Service-Enabled Distributed Workflow System for Scientific Data Processing

    Publication Year: 2007, Page(s):7 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (366 KB) | HTML iconHTML

    This paper presents the design and implementation of a distributed data-driven workflow system on top of the TeraGrid infrastructure. The workflow system is based on a data management architecture that provides easy access to scientific data collections via the TeraGrid network. The workflow system allows researchers to construct scientific workflows for data discovery, access, transformation, and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reaching Semantic Interoperability through Semantic Association of Domain Standards

    Publication Year: 2007, Page(s):15 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (201 KB) | HTML iconHTML

    The vision of semantic interoperability has led much research on ontology matching. Research in this area primarily focuses on discovering similarity between entities of ontologies. The performance of proposed approaches relies on the existence of such similarity relationship and sufficient data for inferring it. However, in reality, many distributed systems do not have such presumptions. This pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent-Based Design of Load Balancing System for RFID Middlewares

    Publication Year: 2007, Page(s):21 - 30
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    RFID middleware technology has been applied to various applications such as retail, health care, logistics, etc, due to its competitive business value. In order to get a stable and reliable working environment, load balancing should be considered for RFID middlewares. In the past several years, agent technology has played a central role in many application areas. Agent technology also provides a d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Service-Oriented Approach to Security--Concepts and Issues

    Publication Year: 2007, Page(s):31 - 40
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Various mechanisms for authentication and access control have been developed over time. Operating systems and DBMS implement such mechanisms and support quite rich access control models. A major limitation, however, of such mechanisms is that they are not extensible; thus whenever an application domain requires more sophisticated access controls or authentication, the applications must include log... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Information Model for Security Integration

    Publication Year: 2007, Page(s):41 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    Research on security systems has typically focused on improving the performance and reliability of a single technique, algorithm or mechanism. There is also significant potential, however, in studying security as the product of a few key systems and then analyzing how those systems can best be integrated to achieve better overall system security. Most approaches that examine integrating one or mor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access Control Strategies for Virtualized Environments in Grid Computing Systems

    Publication Year: 2007, Page(s):48 - 54
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    The development of adequate security solutions and in particular of authentication and authorization techniques for grid computing systems is a challenging task. Challenges arise from the heterogeneity of users, the presence of multiple security administration entities, the heterogeneity of security techniques used at the various grid hosts, the scalability requirements, and the need for high-leve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concurrency Control Based on Subject and Purpose Concepts

    Publication Year: 2007, Page(s):55 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    A subject doing a job function plays a role in an enterprise. In the role-based access control model, a role is a set of access rights. A subject granted a role can issue an access request in the role. In addition, objects are required to be consistent even if multiple transactions concurrently manipulate an object in a conflicting way. Here, a subject playing more significant roles should take th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User Behavior Identification for Trust Management in Pervasive Computing Systems

    Publication Year: 2007, Page(s):65 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    Pervasive computing systems are becoming widespread as the next generation of computing systems. In pervasive computing systems, the users are frequently hopping from one computing space to another, which makes user profile management an essential component of the system. Because such a dynamic-populated computing system has to be new corner-friendly, malicious users with bad reputation to a syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Simulation of Trust Management Techniques for a Coalition Data Sharing Environment

    Publication Year: 2007, Page(s):73 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    Effective communication among agents in large teams is crucial because the members share a common goal but only have partial views of the environment. Information sharing is difficult in a large team because, a team member may have a piece of valuable information but not know who needs the information, since it is infeasible to know what each other agent is doing. Information sharing is a main par... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Economic-Inspired Truthful Reputation Feedback Mechanism in P2P Networks

    Publication Year: 2007, Page(s):80 - 88
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    Cross-disciplinary efforts involving economics and computer security have proliferated. And peer-to-peer (P2P) reputation systems are essential to evaluate the trustworthiness of participating peers and to combat the selfish, dishonest and malicious behaviors of peers. But reputation feedback is special kind of information, and it is not free. Based on those above consideration, in this paper, VCG... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Beyond the Future Internet--Requirements of Autonomic Networking Architectures to Address Long Term Future Networking Challenges

    Publication Year: 2007, Page(s):89 - 98
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (135 KB) | HTML iconHTML

    We present in this paper an overview of current problems with the Internet from the architectural view point, and we identify and forecast trends for future developments. Our study includes perspectives from different stakeholders of the Internet as well as from the technological development point of view. We conclude that current and future requirements vary greatly between, and even within, diff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conflict Resolution Model Based on Weight in Situation Aware Collaboration System

    Publication Year: 2007, Page(s):99 - 106
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    In ubiquitous environments, situation-awareness is a desirable property to support adaptive and personalized services. To describe situation-awareness effectively, a situation-aware interface description language (SA-IDL) which can express a collaboration system with various contexts and actions is researched. However, conflicts can occur when services expressed in SA-IDL collaborate with each oth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring Adaptive Data Centers through Cooperative Symbiotic Networking

    Publication Year: 2007, Page(s):107 - 118
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (457 KB) | HTML iconHTML

    This paper describes a biologically-inspired architecture, called SymbioticSphere, which allows large-scale data centers to autonomously adapt to dynamic environmental changes. SymbioticSphere follows biological principles such as decentralization, natural selection and symbiosis to design data centers (application services and middleware platforms). Each application service and middleware platfor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Environment of Intellect: 7 Issues We Need to Think about for the Future

    Publication Year: 2007, Page(s): 119
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (54 KB) | HTML iconHTML

    "Environment of intellect" implies that we need different kinds of intellect to consider the future from an environmental viewpoint. The author proposes 7 issues we should think about for the future: (1) ICT as key environment; (2) macroscopic view; (3) human-conscious technology; (4) a sound mind with a sound technology; (5) essential solutions; (6) fault tolerance; and (7) harmony in diversity View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Transactional Framework for Programming Wireless Sensor/Actor Networks

    Publication Year: 2007, Page(s):123 - 129
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (162 KB) | HTML iconHTML

    Effectively managing concurrent execution is one of the biggest challenges for future wireless sensor/actor networks (WSANs): for safety reasons concurrency needs to be tamed to prevent unintentional nondeterministic executions, on the other hand, for real-time guarantees concurrency needs to be boosted to achieve timeliness. We propose a transactional, optimistic concurrency control framework for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WTMR--A New Fault Tolerance Technique for Wireless and Mobile Computing Systems

    Publication Year: 2007, Page(s):130 - 137
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (163 KB) | HTML iconHTML

    Much research has been done to evolve cost-effective techniques for fault tolerance of applications running on static distributed systems. With the advent of technology, wireless systems emerged by the end of the last decade, and received considerable attention as useful environments for mobile distributed systems. The requirements for designing fault tolerant techniques for the mobile computing s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.