By Topic

Distributed Computing Systems, 1997., Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of

Date 31-31 Oct. 1997

Filter Results

Displaying Results 1 - 25 of 55
  • Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems

    Publication Year: 1997
    Request permission for commercial reuse | PDF file iconPDF (309 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1997, Page(s):345 - 346
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Performance analysis of a dynamic control policy for PRMA protocols

    Publication Year: 1997, Page(s):168 - 173
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    PRMA (Packet Reservation Multiple Access) represents a class of packet-contention access protocols for wireless microcellular networks that handles both voice and data traffic. We consider a dynamic control procedure for the operation of PRMA systems and analyze it by means of a Markov model of the PRMA systems. The model gives indications of some margins for performance improvement under the hypo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Portable memory

    Publication Year: 1997, Page(s):162 - 167
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    Migrating applications is necessary to provide fault tolerance in a distributed environment. In this paper, we present a new design that enables the heterogeneous migration of a general class of applications. Our approach can handle applications that use pointers. Our design is tailored for the C programming language, but can be adapted for other languages. We chose the C language because it is mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of cache coherency schemes in a shared disks transaction environment

    Publication Year: 1997, Page(s):154 - 161
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (820 KB)

    In a shared disks environment (SDE), the computing nodes are locally coupled via a high-speed network and share a common database at the disk level. To reduce the amount of expensive and slow disk I/O, each node caches database pages in its main memory buffer. This paper focuses on SDE that uses record-level locking as a concurrency control. While the record-level locking can guarantee higher conc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptographic key recovery

    Publication Year: 1997, Page(s):34 - 37
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    Internet/intranet security has witnessed an explosive and exciting growth in the past two years. Under the surface of excitement lies a mine of technical and commercial challenges. Without solving these challenges, secure systems will not reach their expected potential. Security can be achieved via encryption. Encryption uses “keys” to encrypt and decrypt the information. Without havin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent handling of communication media

    Publication Year: 1997, Page(s):144 - 150
    Cited by:  Papers (2)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB)

    Personal communication support enhances control over reachability in telecommunication. Conversion and screening technologies of communication media, combined with QoS evaluation, allow to focus on the semantics of the information instead of the carriage. The paper considers how a CORBA-based implementation allows scaling from Java clients to IN service nodes and TINA integration View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Causality between nonatomic poset events in distributed computations

    Publication Year: 1997, Page(s):276 - 282
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    Recently, a set of causality relations between distributed nonatomic events was proposed to provide a fine level of granularity in the specification of synchronization conditions between the events. This set of causality relations is complete in first-order predicate logic. The author examines a set of axioms on the proposed causality relations. The axioms provide a mechanism for reasoning with th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intrusion ripple analysis in distributed information systems

    Publication Year: 1997, Page(s):28 - 33
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    Security is a very important aspect of distributed computing systems, especially in distributed information environments involving wide-area networks, such as internets. This paper addresses how a security breach, such as intrusion, propagates through a distributed or networked information system. In particular, the issue of how an intrusion, once it occurrs, propagates through a distributed syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Migrating state information in mobile environments

    Publication Year: 1997, Page(s):138 - 143
    Cited by:  Papers (2)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    Several studies point out the deficiencies of the transport protocol TCP in wireless scenarios. Falsely, TCP's congestion avoidance mechanisms are triggered by packets that are destroyed due to the high bit error probability of wireless channels or loss due to disruptions caused by handoffs. This can be avoided, if the indirect transport protocol model approach is applied. It subdivides the end-to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparison of scheduling algorithms for real time distributed transactional systems

    Publication Year: 1997, Page(s):257 - 261
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    Real time distributed transactional systems allow users to update databases which may be geographically dispersed using transactions. In addition to maintaining database consistency, these requests must terminate before their deadlines. Thus, scheduling algorithms need to enforce concurrency control and timeliness. This work studies through simulation three scheduling algorithms for real dime dist... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hierarchical mapping scheme for mobile agent systems

    Publication Year: 1997, Page(s):66 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    MESSENGERS is a system for general-purpose distributed computing based on the principles of mobile agents. Its underlying infrastructure consists of a collection of daemon processes, whose task it is to receive incoming agents, provide the necessary environment for their execution, and send them on to their next destinations as dictated by their behaviors. The structure of the daemon processes and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocols versus objects: can models for telecommunications and distributed processing coexist?

    Publication Year: 1997, Page(s):8 - 13
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    This paper identifies two paradigms that influence the design of telematics systems nowadays: the protocol-centred and the object-centred paradigms. Both paradigms have been introduced to cope with interoperability, each in their own way. The coexistence of these paradigms can have an enormous impact on the design of telematics systems. This paper identifies some combined uses of both paradigms an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of scheduling algorithm in a real-time distributed transactional system

    Publication Year: 1997, Page(s):290 - 295
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    In a real-time distributed transactional system, transactions which should be scheduled to be executed on different servers. To schedule these transactions the circulating multisequencer algorithm has been considered to obtain a global view of the system. A mathematical model is developed to obtain the average stay time of a transaction within the system, when no transaction misses its deadline. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient causal order algorithm for message delivery in distributed system

    Publication Year: 1997, Page(s):270 - 275
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    Though causal order of message delivery simplifies the design and development of distributed applications, the overhead of enforcing it is not negligible. A causal order algorithm which does not send any redundant information is efficient in the sense of communication overhead. The authors characterize and classify redundant information into four categories: information regarding just delivered, a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Entry consistency versus lazy release consistency in DSM systems: analytical comparison and a new hybrid solution

    Publication Year: 1997, Page(s):78 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    Entry consistency (EC), implemented in Midway, and lazy release consistency (LRC), implemented in TreadMarks, are two promising relaxed memory consistency models which tend to minimize communication costs. This is an important goal of software-based distributed shared memory (DSM) solutions built on workstation networks. While Midway uses a fine-grain update-based coherence protocol, TreadMarks im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A software platform for secure applications based on CORBA

    Publication Year: 1997, Page(s):22 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    Shows an architecture for providing security services in a CORBA-based environment. We design it to follow the CORBA security specification and implement a prototype using a commercial product. The platform provides common security mechanisms such as authentication and access control for CORBA-based applications. It also has the security context management function, which is responsible for protec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A temporal model for fault-tolerant parallel programs

    Publication Year: 1997, Page(s):304 - 309
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    The authors present the technical issues of a temporal model for fault-tolerant parallel programs. They present successively the formal aspects of this temporal model, and an algorithm that they have developed to detect errors in parallel programs running on a parallel architecture with shared memory. A simple example is given to illustrate the model and the algorithm View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the role of time in distributed systems

    Publication Year: 1997, Page(s):316 - 321
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    The role of time in distributed systems has been neglected for a long time. Outside the real-time arena, time has been ignored, mostly because of the asynchronous nature of the models currently used in distributed systems research. Even in real-time systems, time provision has stayed in the realm of centralised, unique system clocks. The situation is changing, though. The author presents an overvi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nomadic computing and CDMA

    Publication Year: 1997, Page(s):132 - 137
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    This paper shows how reliable data services can be provided in an error prone wireless environment using CDMA and a link layer retransmission protocol. A CDMA encoder using Walsh codes for 1.85 to 1.99 GHz PCS applications is simulated under various error conditions with varying packet size to determine minimum acceptable QOS relative to error templates. The error templates and data rates of 16, 3... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward globally optimal resource management in large-scale real-time distributed computer systems

    Publication Year: 1997, Page(s):248 - 256
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (892 KB)

    This paper discusses the issues and promising approaches in obtaining rigorous specifications of the quality-of-service (QoS) requirements associated with application functions and using such specifications as the main driver for cost-effective resource allocation. The application environments in which component failures must be handled with sufficient efficiency in order not to miss the applicati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet security despite untrustworthy agents and components

    Publication Year: 1997, Page(s):218 - 219
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    As an Internet user, the security of your communications relies on a large number of agents: your own computer, its operating system, its Internet software (e.g. your web browser), your modem, telephone line, telephone company, ISP and their operators, computers, software, the DNS infrastructure, the links interconnecting the ISPs and the companies operating these links, the ISP of your correspond... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A solution to atomic commitment based on an extended consensus protocol

    Publication Year: 1997, Page(s):98 - 103
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    Chandra and Toueg (1996) have proposed a new approach to overcome the impossibility of deterministically reaching consensus in asynchronous systems subject to crash failures. They augment the asynchronous model with unreliable failure detectors. We present an extension of an algorithm that they proposed to solve consensus using □S failure detectors. We argue that this extension is a simple ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative concurrency control on the Web

    Publication Year: 1997, Page(s):118 - 123
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    Sharing of data in collaborative environments requires mechanisms that ensure the consistency of data in spite of concurrency and failures. This is traditionally handled by transactions or extended transaction mechanisms. The World Wide Web, although originally designed as an information storage and retrieval system, is being extended to serve as a vehicle for collaboration. However, the proposed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed transaction processing as a reliability concept for mobile agents

    Publication Year: 1997, Page(s):59 - 64
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    Mobile agents offer a new possibility for the development of applications in distributed systems and are no longer a theoretical issue since different architectures for their implementations have been proposed. With the increasing market of electronic commerce it becomes an interesting idea to use autonomous mobile agents for electronic business transactions. Being involved in money transactions, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.