By Topic

Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183)

29-29 May 1998

Filter Results

Displaying Results 1 - 25 of 70
  • Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183)

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (950 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1998, Page(s):630 - 631
    Request permission for commercial reuse | PDF file iconPDF (229 KB)
    Freely Available from IEEE
  • A framework for dependability driven software integration

    Publication Year: 1998, Page(s):406 - 415
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    The integration of system and SW functions for efficiency, performance and especially dependability is of interest from a research and system design perspective. We propose a framework for directing the process of integration of SW functions, with the objective of designing and maintaining desired dependability attributes of the system over the integration process. Rules of composition for integra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low-cost checkpointing with mutable checkpoints in mobile computing systems

    Publication Year: 1998, Page(s):464 - 471
    Cited by:  Papers (11)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    Mobile computing raises many new issues, such as lack of stable storage, low bandwidth of wireless channel, high mobility, and limited battery life. These new issues make traditional checkpointing algorithms unsuitable. We introduce the concept of mutable checkpoint, which is neither a tentative checkpoint nor a permanent checkpoint. Mutable checkpoints can be saved anywhere; e.g., the memory or l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience with secure multi-processing in Java

    Publication Year: 1998, Page(s):398 - 405
    Cited by:  Papers (4)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    As the JavaTM platform is the preferred environment for the deployment of network computers, it is appealing to run multiple applications on a single Java enabled desktop. We experimented with using the Java platform as a multiprocessing, multi user environment. Although the Java Virtual Machine (JVM) is not inherently a single application design, we have found that the implementation o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Khazana: an infrastructure for building distributed services

    Publication Year: 1998, Page(s):562 - 571
    Cited by:  Papers (8)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB)

    Essentially all distributed systems, applications, and services at some level boil down to the problem of managing distributed shared state. Unfortunately, while the problem of managing distributed shared state is shared by many applications, there is no common means of managing the data-every application devises its own solution. We have developed Khazana, a distributed service exporting the abst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible protocol composition in BAST

    Publication Year: 1998, Page(s):22 - 29
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    The paper presents BAST, an object-oriented library of reliable distributed protocols. The authors show how BAST can be used to build fault-tolerant distributed applications, and how new protocols can be added to it. They discuss some distributed protocol design issues and the way these issues are circumvented in BAST. They briefly describe their Smalltalk and Java implementations of BAST, togethe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward transparent selective sequential consistency in distributed shared memory systems

    Publication Year: 1998, Page(s):572 - 581
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    This paper proposes a transparent selective sequential consistency approach to distributed shared memory (DSM) systems. First, three basic techniques-time selection, processor selection, and data selection-are analyzed for improving the performance of strictly sequential consistency DSM systems, and a transparent approach to achieving these selections is proposed. Then, this paper focuses on the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time primary-backup (RTPB) replication with temporal consistency guarantees

    Publication Year: 1998, Page(s):48 - 56
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB)

    The paper presents a real-time primary-backup (RTPB) replication scheme for supporting fault-tolerant real-time applications. It formally defines two types of temporal consistency, namely external temporal consistency and inter-object temporal consistency. By introducing a key concept called phase variance, the authors are able to build temporal consistency models and derive necessary and sufficie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-organizing cooperative WWW caching

    Publication Year: 1998, Page(s):74 - 83
    Cited by:  Papers (6)  |  Patents (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    A distributed, self-organizing cooperative caching mechanism for WWW is proposed. The servers maintain a cooperative cache without a centralized server, adapt themselves to the change of network speed and server addition and failure, and need little manual administration. A performance study shows that the proposed mechanism improves the user's response time by 34.0% over conventional proxies View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detectors and correctors: a theory of fault-tolerance components

    Publication Year: 1998, Page(s):436 - 443
    Cited by:  Papers (23)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB)

    Two primitive components, namely detectors and correctors, provide a basis for achieving the different types of fault tolerance properties required in computing systems. We develop the theory of these primitive tolerance components, characterizing precisely their role in achieving the different types of fault tolerance. Also, we illustrate how they can be used to formulate extant design methods an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic load distribution using anti-tasks and load state vectors

    Publication Year: 1998, Page(s):212 - 221
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    We propose a new load distribution (LD) algorithm which is based on anti-tasks and load state vectors. Anti-tasks are composite agents which travel around a distributed system to facilitate the pairing up of task senders and receivers, as well as the collection and dissemination of load information. Time-stamped load information of processing nodes is stored in load state vectors which, when used ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved lightpath (wavelength) routing in large WDM networks

    Publication Year: 1998, Page(s):516 - 523
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB)

    We address the problem of efficient circuit switching in wide area networks. The solution provided is based on finding optimal routes for lightpaths and semilightpaths. A lightpath is a fully optical transmission path, while a semilightpath is a transmission path constructed by chaining several lightpaths together, using wavelength conversion at their junctions. The problem thus is to find an opti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structuring remote object systems for mobile hosts with intermittent connectivity

    Publication Year: 1998, Page(s):250 - 257
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB)

    In distributed object systems, remote method invocation attempts to abstract communication between different machines to the level of object method invocation. Link failure in such systems often appears as a failed method invocation, which must be explicitly handled outside the remote object infrastructure. This usually implies that techniques to handle the effects of link failure are embedded wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CLIQUES: a new approach to group key agreement

    Publication Year: 1998, Page(s):380 - 387
    Cited by:  Papers (58)  |  Patents (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    The paper considers the problem of key agreement in a group setting with highly dynamic group member population. A protocol suite, called CLIQUES, is developed by extending the well known Diffie-Hellman key agreement method to support dynamic group operations. Constituent protocols are provably secure and efficient View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coordinated exception handling in distributed object systems: from model to system implementation

    Publication Year: 1998, Page(s):12 - 21
    Cited by:  Papers (7)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    Exception handling in concurrent and distributed programs is a difficult task though it is often necessary. In many cases traditional exception mechanisms for sequential programs are no longer appropriate. One major difficulty is that the process of handling an exception may need to involve multiple concurrent components that are cooperating in pursuit of some global goal. Another complication is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A feedback based scheme for improving TCP performance in ad-hoc wireless networks

    Publication Year: 1998, Page(s):472 - 479
    Cited by:  Papers (45)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB)

    Ad-hoc networks are completely wireless networks of mobile hosts, in which the topology rapidly changes due to the movement of mobile hosts. This frequent topology may lead to sudden packet losses and delays. Transport protocols like TCP have been built mainly for reliable, fixed networks. Hence, when used in ad-hoc networks, TCP misinterprets this loss as congestion and invokes congestion control... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Group communication protocol for real-time applications

    Publication Year: 1998, Page(s):40 - 47
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB)

    In distributed applications, a group of multiple processes cooperate by exchanging messages. It is critical to support the group of application processes with enough quality of service (QoS) including the ordered delivery of messages. The delay time and the message loss ratio are significant QoS parameters. In Internet applications, the delay time and the loss ratio are significantly different in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Methodologies for distributed information retrieval

    Publication Year: 1998, Page(s):66 - 73
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB)

    Text collections have traditionally been located at a single site and managed as a monolithic whole. However, it is now common for a collection to be spread over several hosts and for these hosts to be geographically separated. The authors examine several alternative approaches to distributed text retrieval. They report on their experience with a full implementation of these methods, and give retr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low-overhead protocols for fault-tolerant file sharing

    Publication Year: 1998, Page(s):452 - 461
    Cited by:  Papers (2)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB)

    We quantify the adverse effect of file sharing on the performance of reliable distributed applications. We demonstrate that file sharing incurs significant overhead, which is likely to triple over the next five years. We present a novel approach that eliminates this overhead. Our approach: tracks causal dependencies resulting from file sharing using determinants; efficiently replicates the determi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Granularity control for distributed execution of logic programs

    Publication Year: 1998, Page(s):230 - 237
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    Distributed execution of logic programs requires a match of granularity between a program and the distributed multiprocessor it runs on to exploit its potential for performance fully. This paper presents methods to control the granularity of tasks on distributed heterogeneous processors effectively. It considers the characteristics of such platforms and relates the amount of local computation with... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible batching and consistency mechanisms for building interactive groupware applications

    Publication Year: 1998, Page(s):388 - 395
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    The paper presents our state sharing support for building object oriented interactive groupware in wide area distributed environments. We motivate and present an asynchronous model for updating replicated state, which supports atomicity of updates across multiple shared objects. Coupled with our flexible marshalling framework, this model allows existing application data structure classes to be eas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust state sharing for wide area distributed applications

    Publication Year: 1998, Page(s):554 - 561
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    We present the Mocha wide area computing infrastructure we are developing. Mocha provides support for robust shared objects on heterogeneous platforms, and utilizes advanced distributed shared memory techniques for maintaining consistency of shared objects that are replicated at multiple nodes to improve performance. In addition, our system handles failures that we feel will be common in wide area... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Signalling adaptors between distributed systems and telecommunication networks

    Publication Year: 1998, Page(s):138 - 145
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    Conventional telecommunication software components are mainly developed using message passing as the underlying communication mechanisms. Recent standards on modern distributed systems, exemplified by CORBA and DCE, however, have converged to a new programming paradigm based on the client/server architecture, object-oriented model, and remote procedure calls (RPCs). In the near future, we envision... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adapting to bandwidth variations in wide-area data combination

    Publication Year: 1998, Page(s):498 - 505
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    Efficient data combination over wide area networks is hard as these networks have large variations in available bandwidth. We examine the utility of changing the location of combination operations as a technique to adapt to variations in network bandwidth. We try to answer the following questions. First, does relocation of operators provide a significant performance improvement? Second, is online ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.