By Topic

Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems

31-31 Oct. 1997

Filter Results

Displaying Results 1 - 25 of 55
  • Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems

    Publication Year: 1997
    Request permission for commercial reuse | PDF file iconPDF (309 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1997, Page(s):345 - 346
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • A temporal model for fault-tolerant parallel programs

    Publication Year: 1997, Page(s):304 - 309
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    The authors present the technical issues of a temporal model for fault-tolerant parallel programs. They present successively the formal aspects of this temporal model, and an algorithm that they have developed to detect errors in parallel programs running on a parallel architecture with shared memory. A simple example is given to illustrate the model and the algorithm View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent handling of communication media

    Publication Year: 1997, Page(s):144 - 150
    Cited by:  Papers (2)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB)

    Personal communication support enhances control over reachability in telecommunication. Conversion and screening technologies of communication media, combined with QoS evaluation, allow to focus on the semantics of the information instead of the carriage. The paper considers how a CORBA-based implementation allows scaling from Java clients to IN service nodes and TINA integration View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Saga Security System: a security architecture for open distributed systems

    Publication Year: 1997, Page(s):53 - 58
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    We present an overview of the Saga Security System. An agent in the Saga Security System is called a Saga Agent. The authorization model in the Saga Security System (the Saga authorization model) supports the novel concept of a service path and provides uniform and flexible protection appropriate for advanced computational models such as object-oriented systems and cooperative agent systems. The k... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scheduling algorithm for aperiodic groups of tasks in distributed real-time systems and its holistic analysis

    Publication Year: 1997, Page(s):296 - 301
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    The paper deals with the problem of scheduling aperiodic groups of tasks in distributed systems. It proposes two contributions, namely: (i) a distributed scheduling algorithm to be included, together with a set of aperiodic servers to deal with the processor utilisation and the network bandwidth local to the system nodes, in a distributed aperiodic server, and (ii) an extensive analysis of the beh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Migrating state information in mobile environments

    Publication Year: 1997, Page(s):138 - 143
    Cited by:  Papers (2)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    Several studies point out the deficiencies of the transport protocol TCP in wireless scenarios. Falsely, TCP's congestion avoidance mechanisms are triggered by packets that are destroyed due to the high bit error probability of wireless channels or loss due to disruptions caused by handoffs. This can be avoided, if the indirect transport protocol model approach is applied. It subdivides the end-to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time constraint verification methods based on time Petri nets

    Publication Year: 1997, Page(s):262 - 267
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    The study is concerned with the development of real time distributed applications and more precisely with the verification of temporal properties in a distributed context (taking into account the characteristics of the real architecture). We show how to use a time Petri net based model of the application in order to prove that a communication system (networks, protocols) and a mapping of tasks mee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interdomain access control with policy routing

    Publication Year: 1997, Page(s):46 - 52
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    An internetwork consists of heterogeneous domains managed under different administrative authorities. For secure interdomain resource sharing, it is necessary to implement an interdomain access control (IAC) protocol to regulate traffic flow between end-to-end domains and among transit domains. Control of traffic flow in transit domains is closely related to network packet routing protocols. There... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Future trends in Internet security

    Publication Year: 1997, Page(s):216 - 217
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB)

    The Internet is, by far, one of the most significant achievements in recent history. When it was designed and started as Arpanet in the 1970s, the Internet was never intended to be secure or open for commercial use. In the 1980s, the Internet was structured to accommodate 43 billion potential network addresses. It afforded roughly one address for every person on earth. Yet today, with more than 50... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of scheduling algorithm in a real-time distributed transactional system

    Publication Year: 1997, Page(s):290 - 295
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    In a real-time distributed transactional system, transactions which should be scheduled to be executed on different servers. To schedule these transactions the circulating multisequencer algorithm has been considered to obtain a global view of the system. A mathematical model is developed to obtain the average stay time of a transaction within the system, when no transaction misses its deadline. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nomadic computing and CDMA

    Publication Year: 1997, Page(s):132 - 137
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    This paper shows how reliable data services can be provided in an error prone wireless environment using CDMA and a link layer retransmission protocol. A CDMA encoder using Walsh codes for 1.85 to 1.99 GHz PCS applications is simulated under various error conditions with varying packet size to determine minimum acceptable QOS relative to error templates. The error templates and data rates of 16, 3... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an efficient probabilistic deadlock detection method for multidatabase systems

    Publication Year: 1997, Page(s):84 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    Deadlock detection is an important issue in multidatabase systems. Due to the autonomy of the local systems, the visibility of the state of local transactions and the contention on items is not available. The well known PCG method exploits a weaker mean condition to detect potential global deadlock, that does not necessarily correspond to a real one. We present a probabilistic analysis of PCG usin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysing the behaviour of distributed software architectures: a case study

    Publication Year: 1997, Page(s):240 - 245
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    A software architecture is the overall structure of a system in terms of its constituent components and their interconnections. We describe work to associate behavioural specifications with the components of a distributed software architecture and an approach to analysing the behaviour of systems composed from these components. The approach is based on the use of labelled transition systems to spe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the role of time in distributed systems

    Publication Year: 1997, Page(s):316 - 321
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    The role of time in distributed systems has been neglected for a long time. Outside the real-time arena, time has been ignored, mostly because of the asynchronous nature of the models currently used in distributed systems research. Even in real-time systems, time provision has stayed in the realm of centralised, unique system clocks. The situation is changing, though. The author presents an overvi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Portable memory

    Publication Year: 1997, Page(s):162 - 167
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    Migrating applications is necessary to provide fault tolerance in a distributed environment. In this paper, we present a new design that enables the heterogeneous migration of a general class of applications. Our approach can handle applications that use pointers. Our design is tailored for the C programming language, but can be adapted for other languages. We chose the C language because it is mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparison of scheduling algorithms for real time distributed transactional systems

    Publication Year: 1997, Page(s):257 - 261
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    Real time distributed transactional systems allow users to update databases which may be geographically dispersed using transactions. In addition to maintaining database consistency, these requests must terminate before their deadlines. Thus, scheduling algorithms need to enforce concurrency control and timeliness. This work studies through simulation three scheduling algorithms for real dime dist... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Firewall placement in a large network topology

    Publication Year: 1997, Page(s):40 - 45
    Cited by:  Papers (14)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    Network security is an integral component of a multi-user distributed information environment. Firewall (FW) technology is a popular approach to build secure networks, and a plethora of FWs have been designed. Our research focuses on the placement of FWs (i.e. an operations research approach) in a large, complex network system, or a system of systems. A key contribution of this research is to prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extended connection models for advanced applications

    Publication Year: 1997, Page(s):208 - 213
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    We define a model that extends the notion of session in an OSI-like architecture in order to provide a system that can cope with the requirements of sophisticated applications such as hypermedia, and the Internet. This model allows the existence of hierarchy and inter-dependency relationships among sessions, authorises multiple connections to a remote node, and introduces nesting and flexibility a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intrusion ripple analysis in distributed information systems

    Publication Year: 1997, Page(s):28 - 33
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    Security is a very important aspect of distributed computing systems, especially in distributed information environments involving wide-area networks, such as internets. This paper addresses how a security breach, such as intrusion, propagates through a distributed or networked information system. In particular, the issue of how an intrusion, once it occurrs, propagates through a distributed syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed fault management over ATM networks

    Publication Year: 1997, Page(s):196 - 201
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    Experience with the development and application of a distributed problem-solving paradigm over local ATM networks is reported. The paradigm consists of a collection of problem-solving agents that autonomously execute and coordinately cooperate each other to achieve a goal. It is implemented based on the Java Expert System Shell (Jess) and SUN's Remote Procedure Call (RPC). However, communication b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Replicating objects using the CORBA Event Service?

    Publication Year: 1997, Page(s):14 - 19
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    The Common Object Request Broker Architecture (CORBA) is becoming a standard for distributed application middleware, but no support is currently provided to handle object replication. In this paper, we discuss the relevance of using the Object Management Group's Event Service for replicating objects in a CORBA environment and compare it to other approaches View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling for distributed computing

    Publication Year: 1997, Page(s):284 - 289
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    A typical model for distributed computing is to have a main program thread that runs on one processor. This thread spawns a number of tasks from time-to-time. When tasks are spawned, they are sent to other processors for completion and the main thread waits till the results of all task are received from the remote processors. This is the typical fork join paradigm. This paradigm results in an inte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of rollback recovery to program locality of reference and page replacement policies

    Publication Year: 1997, Page(s):104 - 109
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    We study the impact of checkpointing-based fault tolerance on the program locality of reference and memory page (or cache block) replacement policies. We demonstrate that the current research in page/block replacement algorithms may not operate well with fault-tolerant programs. We include the identification of this critical research topic, and the development of an analytical model for fault prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards support for heterogeneous multimedia communications

    Publication Year: 1997, Page(s):336 - 341
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (652 KB)

    Today, we are faced with a huge variety of multimedia and collaborative applications, networks and end-systems. The resulting heterogeneous environment imposes new challenges on transport systems. To meet the requirements of heterogeneous receivers in multi-point communication, a communication framework based on a so-called group mediator is outlined. Group mediators are located within the network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.