By Topic

Reliable Distributed Systems, 1998. Proceedings. Seventeenth IEEE Symposium on

Date 20-23 Oct. 1998

Filter Results

Displaying Results 1 - 25 of 71
  • Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281)

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (301 KB)
    Freely Available from IEEE
  • Security in mobile systems

    Publication Year: 1998, Page(s):407 - 412
    Cited by:  Papers (1)  |  Patents (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1055 KB)

    Mobile computing has become popular over the last few years. Users need to have continuous access to information even when they are mobile, e.g., a doctor may need to constantly monitor a patient's health or a stock broker may need periodic information about the stock market, etc. Communication in such cases is typically over wireless links and it becomes critical to ensure secure message exchange... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 1998, Page(s):493 - 494
    Request permission for commercial reuse | PDF file iconPDF (262 KB)
    Freely Available from IEEE
  • Consensus in asynchronous systems where processes can crash and recover

    Publication Year: 1998, Page(s):280 - 286
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB)

    The consensus problem is now well identified as being one of the most important problems encountered in the design and the construction of fault-tolerant distributed systems. This problem is defined as follows: processes have to reach a common decision, which depends on their inputs, despite failures. We consider the consensus problem in asynchronous distributed systems augmented with unreliable f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security in the large: is Java's sandbox scalable?

    Publication Year: 1998, Page(s):387 - 392
    Cited by:  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    Using Java security as an example, this paper tries to draw attention to the various issues of security in large scale distributed systems, some of which are often ignored when the security mechanisms are designed. Even though a lot of work has been done on Java security, we argue in this paper that due to weaknesses inherent in the Java approach to building sandboxes, Java security is not suitabl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolving distributed software engineering environments

    Publication Year: 1998, Page(s):151 - 157
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1432 KB)

    For a software engineering environment to be useful for the development process, it must provide a complete set of tools to assist the software development tasks. The tools focus on separate issues of a highly integrated problem and, in general, must be capable of assisting one another in the midst of intelligently pursuing their own goals for improving the software products. These tools must addr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fragmentation scheme for multimedia traffic in active networks

    Publication Year: 1998, Page(s):437 - 442
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    Multimedia data are usually very large. Fragmentation of multimedia data units is inevitable when they are transmitted through networks. Active networks are becoming popular, and active technologies are being applied to various interesting problems. When applying active technologies to multimedia data, however, the problem of fragmenting large packets still exists. Furthermore, new issues emerge w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient MPEG video encryption algorithm

    Publication Year: 1998, Page(s):381 - 386
    Cited by:  Papers (51)  |  Patents (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1064 KB)

    Multimedia data security is important for multimedia commerce. Previous cryptography studies have focused on text data. The encryption algorithms developed to secure text data may not be suitable to multimedia applications because of large data sizes and real time constraints. For multimedia applications, light weight encryption algorithms are attractive. We present an efficient MPEG video encrypt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed version of the SequenceL language

    Publication Year: 1998, Page(s):295 - 301
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    This paper introduces a new computational model for SequenceL. The model is extended through the addition of a notion of the VRAM model. The computational model introduced together with the SequenceL language provides for a good expression of distributed behaviour View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integration of the primary-shadow TMO replication scheme with a supervisor-based network surveillance scheme and its recovery time bound analysis

    Publication Year: 1998, Page(s):168 - 176
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    The time-triggered message-triggered object (TMO) scheme was formulated a few years ago (K.H. Kim et al., 1994; K.H. Kim and C. Subbaraman, 1997), as a major extension of the conventional object structuring schemes with the idealistic goal of facilitating general form design and timeliness-guaranteed design of complex real time application systems. Recently, as a new scheme for realizing TMO-struc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of filtering mechanisms for MPEG video communications

    Publication Year: 1998, Page(s):449 - 454
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    In this paper, we evaluate two video filtering mechanisms for MPEG-1 video, namely low-pass filtering and selective frame dropping. The evaluation provides tradeoffs between the reduction achieved in bandwidth requirements and the perceptual quality of the video sequences delivered to the client. Extensive experiments revealed that these filtering mechanisms result in a significant reduction in ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A VP-accordant checkpointing protocol preventing useless checkpoints

    Publication Year: 1998, Page(s):61 - 67
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    A useless checkpoint corresponds to the occurrence of a checkpoint and communication pattern called Z-cycle. A recent result shows that ensuring a computation without Z-cycles is a particular application of a property, namely Virtual Precedence (VP), defined on an interval-based abstraction of a computation. We first propose a taxonomy of communication-induced checkpointing protocols based on the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource-usage prediction for demand-based network-computing

    Publication Year: 1998, Page(s):372 - 377
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    This paper reports on an application of artificial intelligence to achieve demand-based scheduling within the context of a network-computing infrastructure. The described AI system uses tool-specific, run-time input to predict the resource-usage characteristics of runs. Instance-based learning with locally weighted polynomial regression is employed because of the need to simultaneously learn multi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An active transcoding proxy to support mobile web access

    Publication Year: 1998, Page(s):118 - 123
    Cited by:  Papers (36)  |  Patents (53)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    In this paper, we present a proxy based system (MOWSER) to support web browsing from mobile clients over wireless networks. Mowser is a proxy agent between the mobile host and the web server, which performs active transcoding of data on both upstream and downstream traffic to present web information to the mobile user according to the QoS parameters set by the user. Active transcoding is defined a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Off-line diagnosis of parallel systems

    Publication Year: 1998, Page(s):360 - 365
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    This paper presents an off-line diagnosis strategy for parallel message-passing systems. This strategy, called host-diagnosis, allows an external observer, i.e. the host system, to perform centralized diagnosis of the system state, given results of distributed tests performed among the system processors. Three algorithms that use the host-diagnosis strategy are proposed. The performance of the thr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive image retrieval over the Internet

    Publication Year: 1998, Page(s):461 - 466
    Cited by:  Papers (3)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2448 KB)

    An efficient image database system is developed. The most important features of the proposed system include compressed domain indexing, searching by using scalable features, and progressive image transmission. User interaction is involved both at the search refinement stage and in the display of the query results. The most important query types include query by color layout and query by wavelet-co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Legal reliability in large-scale distributed systems

    Publication Year: 1998, Page(s):416 - 421
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (940 KB)

    The “legal reliability” of an information system is the extent to which it is able to produce robust evidence upon which legal proceedings can be based. As such it is an essential feature of all information systems operating in the commercial and social domain. The legal test of reliability is not scientific proof or extent of assessment of quality of engineering but compliance with ad... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pixel level interleaving schemes for robust image communication

    Publication Year: 1998, Page(s):455 - 460
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    Interleaving schemes have proven to be an important mechanism in reducing the effect of network errors on image transmission. Current interleaving schemes spatially decorrelate neighboring image blocks by putting them into packets that are a long way apart from each other in the transmission sequence. Most of the existing schemes, while achieving good performance on random packet losses, do not wo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure and scalable replication in Phalanx

    Publication Year: 1998, Page(s):51 - 58
    Cited by:  Papers (30)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    Phalanx is a software system for building a persistent, survivable data repository that supports shared data abstractions (e.g., variables, mutual exclusion) for clients. Phalanx implements data abstraction that ensures useful properties without trusting the servers supporting these abstractions or the clients accessing them, i.e., Phalanx can survive even the arbitrarily malicious corruption of c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A data allocation algorithm for distributed hypermedia documents

    Publication Year: 1998, Page(s):473 - 478
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    A major cost in executing queries in a distributed database system is the data transfer cost incurred in transferring relations (fragments) accessed by a query from different sites to the site where the query is initiated. The objective of a data allocation algorithm is to locate the fragments at different sites so as to minimize the total data transfer cost incurred in executing a set of queries.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and verification of a secure electronic auction protocol

    Publication Year: 1998, Page(s):204 - 210
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    Auctions are an important and common form of commerce today. A difficult aspect of auctions is that the bidder must be present at the site of the auction. This reduces the appeal of auction and restricts the number of people who would otherwise participate in it. An auction over an electronic network is therefore an attractive way of conducting business. The author proposes a protocol for electron... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High throughput networks for petaflops computing

    Publication Year: 1998, Page(s):312 - 317
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    The smallest networks that can connect eight thousand processing elements and memory interfaces in a petaflops cryocomputer contain hundreds of thousands of 2×2 switching nodes. We have determined circuit costs, maximal throughput and average latency for feasible multistage banyan and multidimensional pruned ring mesh networks. Each can deliver 20000 single-word packets every 30 picoseconds,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cyber-intrusion response

    Publication Year: 1998, Page(s):413 - 415
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB)

    Cyber response technologies are a relatively new area of research. This paper provides a high level description of the hard problems associated with responding to a cyber intrusion, identifies several questions that need to be addressed in order to solve these hard problems, provides a few examples of current response technologies, and describes an approach that can be taken to fill the gaps betwe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A secure auction-like negotiation protocol for agent-based Internet trading

    Publication Year: 1998, Page(s):197 - 203
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB)

    We propose a secure auction-like negotiation protocol for agent based Internet trading, which not only retains the agent's mobility and flexibility, but also takes secure measures to prevent attacks from malicious hosts during the negotiation process. The particular features of the proposed protocol are: (1) negotiation for agent based trading is performed through a novel pattern of electronic auc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements for a true enterprise-wide security infrastructure: the play's the thing

    Publication Year: 1998, Page(s):403 - 406
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (24 KB)

    Business has certain requirements that must be met if the enterprise is to thrive; some of these requirements are affected by security systems. The relationship of these requirements and supporting business has been well illustrated by the success of enterprise resource planning (ERP) systems and the initial failure and subsequent transformational impact of tools such as spreadsheets. If designed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.