Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281)

20-23 Oct. 1998

Filter Results

Displaying Results 1 - 25 of 71
  • Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281)

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (301 KB)
    Freely Available from IEEE
  • Programming the grid: component systems for distributed applications

    Publication Year: 1998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (42 KB)

    Summary form only given. The traditional model of software design for large scale scientific problem solving is outdated. The emphasis is now on large teams that must build simulation software that integrates physical systems from multiple scientific disciplines. In addition to the problem of multi-disciplinary physics, the computational environment is now a grid of distributed resources consistin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security in mobile systems

    Publication Year: 1998, Page(s):407 - 412
    Cited by:  Papers (1)  |  Patents (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1055 KB)

    Mobile computing has become popular over the last few years. Users need to have continuous access to information even when they are mobile, e.g., a doctor may need to constantly monitor a patient's health or a stock broker may need periodic information about the stock market, etc. Communication in such cases is typically over wireless links and it becomes critical to ensure secure message exchange... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 1998, Page(s):493 - 494
    Request permission for commercial reuse | PDF file iconPDF (262 KB)
    Freely Available from IEEE
  • ROI: an invocation mechanism for replicated objects

    Publication Year: 1998, Page(s):29 - 35
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (24 KB)

    The reliable object invocation mechanism provided by HIDRA for the coordinator-cohort and the passive replication models offers support to ensure that all the replicas of the object being invoked are correctly updated before such an invocation is terminated. This mechanism also ensures that if a primary or coordinator replica crashes, the client is able to reconnect to the previously initiated inv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization of a real-time primary-backup replication service

    Publication Year: 1998, Page(s):177 - 185
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    The primary-backup replication model is one of the commonly adopted approaches to providing fault tolerant data services. Its extension to the real time environment, however, imposes the additional constraint of timing predictability, which requires a bounded overhead for managing redundancy. The paper discusses the trade-off between reducing system overhead and increasing (temporal) consistency b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing network security-a pragmatic approach

    Publication Year: 1998, Page(s):398 - 402
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    An efficient management is needed to make use of different security mechanisms in large networks. All mechanisms have to be configured consistently according to the security policy. To reduce complexity, the administrator should not have to cope with details not important for him. In the presented concept the network is divided into several administrative domains which are managed rather independe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CORBA evaluation of video streaming w.r.t. QoS provisioning

    Publication Year: 1998, Page(s):443 - 448
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB)

    Describes the design, implementation and evaluation of CORBA- and socket-based continuous media (CM) systems. TCP/IP is not suitable for distributed applications which require high network bandwidth and timing criticality. UDP/IP is one of the alternatives. However, due to the fact that UDP is a lossy protocol, many issues arise when implementing distributed CM applications. Most of the QoS (quali... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient algorithm for causal message logging

    Publication Year: 1998, Page(s):19 - 25
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    Causal message logging has many good properties such as nonblocking message logging and no rollback propagation. However, it requires a large amount of information to be piggybacked on each message, which may incur severe performance degradation. This paper presents an efficient causal logging algorithm based on the new message log structure, LogOn, which represents the causal interprocess depende... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Load balancing of dynamic and adaptive mesh-based computations

    Publication Year: 1998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    One ingredient which is viewed as vital to the successful conduct of many large-scale numerical simulations is the ability to dynamically repartition the underlying adaptive finite element mesh among the processors so that the computations are balanced and interprocessor communication is minimized. We present two new schemes for adaptive repartitioning: Locally-Matched Multilevel Scratch-Remap (or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A metaobject protocol for fault-tolerant CORBA applications

    Publication Year: 1998, Page(s):127 - 134
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB)

    The use of metalevel architectures for the implementation of fault-tolerant systems is today very appealing. Nevertheless, all such fault-tolerant systems have used a general-purpose metaobject protocol (MOP) or are based on restricted reflective features of some object-oriented language. According to our past experience, we define in this paper a suitable metaobject protocol, called FT-MOP for bu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cyber-intrusion response

    Publication Year: 1998, Page(s):413 - 415
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB)

    Cyber response technologies are a relatively new area of research. This paper provides a high level description of the hard problems associated with responding to a cyber intrusion, identifies several questions that need to be addressed in order to solve these hard problems, provides a few examples of current response technologies, and describes an approach that can be taken to fill the gaps betwe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Failure handling in an optimized two-safe approach to maintaining primary-backup systems

    Publication Year: 1998, Page(s):161 - 167
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB)

    In a primary backup database system, transaction processing takes place at the primary and the log records generated are propagated to the backup which uses them to reconstruct the database state at the primary. If the primary fails, the backup takes over to provide continued service. Most existing designs of primary backup database systems have concentrated on techniques to tolerate complete fail... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enforcing security policies in large scale communication networks

    Publication Year: 1998, Page(s):393 - 397
    Cited by:  Papers (1)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    Due to unexpected network interconnection growth, the security of technological and information infrastructures is becoming difficult to be managed and controlled. In addition, security is becoming more and more crucial for an organisation's information systems operation. The management of an organisation has to establish rules and regulations in order to face the threats that its information syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tolerating client and communication failures in distributed groupware systems

    Publication Year: 1998, Page(s):221 - 227
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    If a groupware system is to be effectively used, especially over a wide area network such as the Internet, where the quality of networking and computing resources are unpredictable, it should allow clients to tolerate client, link, and server failures. In particular, clients should be able to join groups and transfer groups' current state in the presence of most client and link failures. In order ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fragmentation scheme for multimedia traffic in active networks

    Publication Year: 1998, Page(s):437 - 442
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    Multimedia data are usually very large. Fragmentation of multimedia data units is inevitable when they are transmitted through networks. Active networks are becoming popular, and active technologies are being applied to various interesting problems. When applying active technologies to multimedia data, however, the problem of fragmenting large packets still exists. Furthermore, new issues emerge w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The cost of recovery in message logging protocols

    Publication Year: 1998, Page(s):10 - 18
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    Past research in message logging has focused on studying the relative overhead imposed by pessimistic, optimistic, and causal protocols during failure-free executions. We give the first experimental evaluation of the performance of these protocols during recovery. We discover that, if a single failure is to be tolerated, pessimistic and causal protocols perform best, because they avoid rollbacks o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing join index based join processing: a graph partitioning approach

    Publication Year: 1998, Page(s):302 - 308
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    The cost of join computation, which uses a join index in a sequential system with limited buffer space, depends primarily on the page access sequence used to fetch the pages of the base relations. We introduce a graph partitioning model that will minimize the length of the page access sequence thus minimizing the redundant I/O, given a fixed buffer. Experiments with Sequoia 2000 data sets show tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An active transcoding proxy to support mobile web access

    Publication Year: 1998, Page(s):118 - 123
    Cited by:  Papers (40)  |  Patents (55)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    In this paper, we present a proxy based system (MOWSER) to support web browsing from mobile clients over wireless networks. Mowser is a proxy agent between the mobile host and the web server, which performs active transcoding of data on both upstream and downstream traffic to present web information to the mobile user according to the QoS parameters set by the user. Active transcoding is defined a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Look-ahead traffic distribution in wormhole-routed networks

    Publication Year: 1998, Page(s):318 - 323
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    A new approach, look-ahead traffic distribution, is proposed in this paper to improve the performance of adaptive routing algorithms in wormhole routed networks. In most adaptive routing algorithms, a packet changes its forwarding direction only if its requesting channel is not available, i.e., the routing decision is based only on the traffic information (buffer availability) in adjacent nodes. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On patterns for practical fault tolerant software in Java

    Publication Year: 1998, Page(s):144 - 150
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    Fault tolerance is important for both sequential and distributed software, and particularly so for long-running applications. The ability to stop an application and restart it, with minimal lost work, is especially useful. If components of the application can be restarted on arbitrary hosts, so much the better. In this paper, we explore Java's potential to support fault tolerant software design. W... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integration of the primary-shadow TMO replication scheme with a supervisor-based network surveillance scheme and its recovery time bound analysis

    Publication Year: 1998, Page(s):168 - 176
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    The time-triggered message-triggered object (TMO) scheme was formulated a few years ago (K.H. Kim et al., 1994; K.H. Kim and C. Subbaraman, 1997), as a major extension of the conventional object structuring schemes with the idealistic goal of facilitating general form design and timeliness-guaranteed design of complex real time application systems. Recently, as a new scheme for realizing TMO-struc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault-tolerant Total Order Multicast to asynchronous groups

    Publication Year: 1998, Page(s):228 - 234
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    While Total Order Broadcast (or Atomic Broadcast) primitives have received a lot of attention, the paper concentrates on Total Order Multicast to Multiple Groups in the context of asynchronous distributed systems in which processes may suffer crash failures. “Multicast to Multiple Groups” means that each message is sent to a subset of the process groups composing the system, distinct m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security in the large: is Java's sandbox scalable?

    Publication Year: 1998, Page(s):387 - 392
    Cited by:  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    Using Java security as an example, this paper tries to draw attention to the various issues of security in large scale distributed systems, some of which are often ignored when the security mechanisms are designed. Even though a lot of work has been done on Java security, we argue in this paper that due to weaknesses inherent in the Java approach to building sandboxes, Java security is not suitabl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource-usage prediction for demand-based network-computing

    Publication Year: 1998, Page(s):372 - 377
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    This paper reports on an application of artificial intelligence to achieve demand-based scheduling within the context of a network-computing infrastructure. The described AI system uses tool-specific, run-time input to predict the resource-usage characteristics of runs. Instance-based learning with locally weighted polynomial regression is employed because of the need to simultaneously learn multi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.