By Topic

Reliable Distributed Systems, 1999. Proceedings of the 18th IEEE Symposium on

Date 22-22 Oct. 1999

Filter Results

Displaying Results 1 - 25 of 57
  • Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 1999, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • Workshop on Reliable Middleware (Wremi) Foreward

    Publication Year: 1999, Page(s): 309
    Request permission for commercial reuse | PDF file iconPDF (14 KB)
    Freely Available from IEEE
  • Workshop on Electronic Commerce (Welcom) Foreward

    Publication Year: 1999, Page(s): 329
    Request permission for commercial reuse | PDF file iconPDF (13 KB)
    Freely Available from IEEE
  • Index of authors

    Publication Year: 1999, Page(s):401 - 402
    Request permission for commercial reuse | PDF file iconPDF (8 KB)
    Freely Available from IEEE
  • Trust and electronic commerce-more than a technical problem

    Publication Year: 1999, Page(s):360 - 365
    Cited by:  Papers (4)  |  Patents (72)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    It is argued that the building of trust in electronic commerce depends only partly on technical security, and the knowledge of security gaps and ways of closing them. It is not only a technical system which is trusted but rather a socio-technical system, including users, business practices and related institutions. We take a closer look at the concept of trust and its relation to knowledge, descri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approaching a formal definition of fairness in electronic commerce

    Publication Year: 1999, Page(s):354 - 359
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    The notion of fairness is a very general concept and can be used to coin terms in many different application areas. Recently the term fairness has appeared in the context of electronic commerce. Here, the term fair exchange refers to the problem that two parties want to swap some distinct items in a way which ensures that no participant can gain advantage over the other. Many protocols for fair ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The usability risk

    Publication Year: 1999, Page(s):396 - 400
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    The article has two basic premises: why good user interface design matters more for e-commerce than for most online endeavors; and why-despite lots of corporate head-nodding and murmurs of assent-it's still very hard to achieve. The author is working on an e-commerce “wallet” project and struggling with two UI issues. One is minor, the type of wrangle designers and engineers bicker ove... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive checkpointing protocol to bound recovery time with message logging

    Publication Year: 1999, Page(s):244 - 252
    Cited by:  Papers (6)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    Numerous mathematical approaches have been proposed to determine the optimal checkpoint interval for minimizing total execution time of an application in the presence of failures. These solutions are often not applicable due to the lack of accurate data on the probability distribution of failures. Most current checkpoint libraries require application users to define a fixed time interval for check... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security mechanisms for using mobile agents in electronic commerce

    Publication Year: 1999, Page(s):378 - 383
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    In order for mobile agents to be accepted as a basic technology for enabling electronic commerce, proper security mechanisms must be developed. Hosts must be protected from malicious agents, agents must be protected from other agents and also agents must be protected from malicious hosts. For solving the first three problems, existing technology from operating systems and distributed systems resea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal hazard analysis of hybrid systems in cTLA

    Publication Year: 1999, Page(s):68 - 77
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    Hybrid systems like computer-controlled chemical plants are typical safety critical distributed systems. In present practice, the safety of hybrid systems is guaranteed by hazard analysis which is performed according to procedures (e.g., Ha2Op) where experts discuss a series of informal argumentations. Each argumentation considers a specific required system property. Formal property pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing a semi-active replication strategy in CHORUS/ClassiX, a distributed real-time executive

    Publication Year: 1999, Page(s):90 - 101
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    The paper reports a practical implementation of a strategy to support semi-active replication of real-time software components (i.e. sets of tasks) running on the Chorus/ClassiX distributed operating system. The main property of the replication strategy developed in this paper is to solve the major difficulty of replica determinism. The semi-active replication scheme consists of a leader software ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safecharts for specifying and designing safety critical systems

    Publication Year: 1999, Page(s):78 - 87
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    This paper proposes a novel variant of Statecharts, called Safecharts, especially for use in the specification and the design of safety critical systems. The objective is to provide a sharper focus on safety issues and a systematic approach to deal with them. This is achieved by making a clear separation between functional and safety requirements. A novel feature of Safecharts is the safety annota... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The mainframe as a high-available, highly scalable CORBA platform

    Publication Year: 1999, Page(s):310 - 315
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    The increasing demand for interoperable systems requires the integration of traditional mainframe-based transaction processing (TP) monitors with CORBA-based middleware infrastructures. We discuss various integration approaches. The integration of IBM's IMS-TM (Information Management System Transaction Manager) and CORBA is discussed in detail, and up-to-date performance and scalability results ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality of service in business-to-business e-commerce applications

    Publication Year: 1999, Page(s):342 - 347
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    Electronic commerce has attracted a great deal of attention recently. Among the different types of electronic commerce, business-to-business is the one most widespread in terms of turnover. An important aspect in business-to-business e-commerce scenarios is how to meet the response time and throughput requirements of applications in spite of execution taking place across corporate boundaries and, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach for fault-tolerance in hard real-time distributed systems

    Publication Year: 1999, Page(s):292 - 293
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    The presence of hard timing constraints makes the design of fault tolerant systems difficult because when tasks are replicated to treat errors, both the task replicas and the fault tolerance building blocks (e.g., consensus) must be taken into account in the feasibility tests. This paper is devoted to the description of an approach for managing failures in hard real time distributed systems. Our a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of the circulating multisequencer and the consensus algorithms in a real-time distributed transactional system

    Publication Year: 1999, Page(s):302 - 303
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (24 KB)

    In a real-time distributed transactional system, customers generate transactions, which should be scheduled to be executed on different servers. The transactions must be executed before their deadlines. To schedule these transactions the circulating multisequencer and the consensus algorithms have been considered to obtain a global view of the system. Mathematical models are developed to obtain th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Group multicast in distributed mobile systems with unreliable wireless network

    Publication Year: 1999, Page(s):14 - 23
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (132 KB)

    We propose a multicast protocol for a distributed system that includes mobile hosts. The protocol guarantees reliable delivery, i.e. delivery of every multicast and absence of duplicates. The sender of each multicast may select among three increasingly strong delivery ordering guarantees: FIFO, causal, total. We make loose assumptions on the underlying computing system: (i) we consider an unreliab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The “QoS query service” for improved quality-of-service decision making in CORBA

    Publication Year: 1999, Page(s):274 - 285
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB)

    We present the quality-of-service query service (QQS) a CORBA service which provides quality-of-service-related “decisions” for the configuration and parameterization of CORBA applications. Applications and services query QQS for those QoS-related decisions, and input data into QQS, so that evaluators have the necessary information to execute their decision-making algorithms. QQS consi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A component-based approach to reliability analysis of distributed systems

    Publication Year: 1999, Page(s):158 - 167
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    This paper proposes a reliability analysis technique for distributed software systems. The technique is based on scenarios that are modeled as sequence diagrams. Using scenarios, we construct component-dependency graphs (CDG). CDGs have been introduced for reliability analysis of component-based systems. They are extended to serve the complex nature of distributed systems by applying nesting and h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML documents production for an electronic platform of requests for proposals

    Publication Year: 1999, Page(s):330 - 335
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    Addresses the problem of document production in the context of an electronic market application, namely a platform dealing with requests for proposals (RFP). Our project relies on XML as the leading technology, in accordance with a general trend in electronic commerce. The consequences of the RFP workflow on the document publishing requirements are motivated. Various aspects of the XML technology ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Highly available process support systems: implementing backup mechanisms

    Publication Year: 1999, Page(s):112 - 121
    Cited by:  Papers (4)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    Availability in process support systems (PSS) can be achieved by using standby mechanisms that allow a backup server to take over in case a primary server fails. These mechanisms, resembling the process pair approach used in operating systems, require the primary to send information about state changes to the backup on a regular basis. In PSS where all relevant state information is stored in a dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tolerating transient faults in statically scheduled safety-critical embedded systems

    Publication Year: 1999, Page(s):212 - 221
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    Static off-line scheduling ensures predictability of worst-case behavior and high resource utilization for safety-critical applications but lacks the flexibility needed to deal with run-time fault-tolerance. We present a temporal redundancy-based recovery technique that tolerates transient task failures in statically scheduled distributed embedded systems where tasks have timing, resource, and pre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimistic recovery in multi-threaded distributed systems

    Publication Year: 1999, Page(s):234 - 243
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    The problem of recovering distributed systems from crash failures has been widely studied in the context of traditional non-threaded processes. However, extending those solutions to the multi-threaded scenario presents new problems. We identify and address these problems for optimistic logging protocols. There are two natural extension to optimistic logging protocols in the multi-threaded scenario... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enforcing determinism for the consistent replication of multithreaded CORBA applications

    Publication Year: 1999, Page(s):263 - 273
    Cited by:  Papers (24)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    In CORBA-based applications that depend on object replication for fault tolerance, inconsistencies in the states of the replicas of an object can arise when concurrent threads within those replicas perform updates in different orders. By imposing a single logical thread of control on every replicated multithreaded CORBA client or server object, and by providing deterministic scheduling of threads ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.