Proceedings 7th IEEE Workshop on Future Trends of Distributed Computing Systems

20-22 Dec. 1999

Filter Results

Displaying Results 1 - 25 of 47
  • Proceedings 7th IEEE Workshop on Future Trends of Distributed Computing Systems

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (234 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1999, Page(s):295 - 296
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Delivering QoS in open distributed systems

    Publication Year: 1999, Page(s):185 - 190
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    This paper describes an architecture that provides support for quality of service (QoS) in open systems. The Quartz QoS architecture aims to avoid the dependency on specific platforms that limits the application of most existing QoS architectures in open, heterogeneous and distributed systems. Quartz adopts a flexible and extensible platform-independent design that allows its internal components t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of dynamic load balanced join algorithms in shared disk parallel database systems

    Publication Year: 1999, Page(s):176 - 181
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    Parallel database systems are the key to high performance database processing. In this paper, we propose parallel join algorithms in shared disk parallel database systems, where all coupled nodes are connected via a high-speed network and share a common database at the disk level. The proposed algorithms are novel in the sense that they can provide a higher potential for dynamic load balancing wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PODC: Paradigm-oriented distributed computing

    Publication Year: 1999, Page(s):169 - 175
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    We describe an environment for distributed computing that uses the concept of well-known paradigms. The main advantage of paradigm-oriented distributed computing is that the user only needs to specify application-specific sequential code, while the underlying infrastructure takes care of the parallelization and distribution. The main features of the proposed approach, called PODC, are the followin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simulation model of task cluster scheduling in distributed systems

    Publication Year: 1999, Page(s):163 - 168
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    This paper addresses issues of task clustering-the coalition of several fine grain tasks into single coarser grain tasks called task clusters-and task cluster scheduling on distributed processors. The performance of various scheduling schemes is studied and compared for a variety of workloads. Simulation results indicate that the scheduling policy that gives priority to the cluster with the smalle... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From remote objects to physically distributed objects

    Publication Year: 1999, Page(s):47 - 52
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    Present-day object-oriented middleware provides little support for the distribution, replication and caching of the state of a distributed object. This makes these platforms unsuitable for the development of large-scale distributed applications. We argue that the model of distributed objects on which these middleware platforms are based hinders the addition of comprehensive distribution and replic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model-based approach to service creation

    Publication Year: 1999, Page(s):102 - 110
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB)

    This paper presents a model-based approach to support service creation. In this approach, services are assumed to be created from (available) software components. The creation process may involve multiple design steps in which the requested service is repeatedly decomposed into more detailed functional parts, until these parts can be mapped onto software components. A modelling language is used to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting real world security models in Java

    Publication Year: 1999, Page(s):155 - 159
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    The Java Security Model has undergone considerable evolution since its initial implementation. However, due to its historical focus on securing machines against attack from hostile Java applications, it has neglected support for securing “Real World” applications. We suggest that in order to support “Real World” security the ability to insert checks into compiled code in a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Priority scheduling and buffer management for ATM traffic shaping

    Publication Year: 1999, Page(s):36 - 43
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    The impact of buffer management and priority scheduling is examined in stressful scenarios when the aggregate incoming traffic is higher than the output link capacity of an Asynchronous Transfer Mode (ATM) traffic shaper. To simultaneously reduce cell loss and extreme delay behavior for two or more classes of service, we show that a dynamic priority scheme is required. We propose a scheduling algo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed information systems tailorability: a component approach

    Publication Year: 1999, Page(s):95 - 101
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    Distributed software systems need to evolve according to the ever-changing requirements on which they were built. Software systems' tailorability can be achieved in terms of component software. Atoms and molecules the basic constructs of the ATOMA framework are the building blocks for distributed tailorable component-based software systems. These constructs can be considered as independent agents,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mapping user-level QoS to system-level QoS and resources in a distributed lecture-on-demand system

    Publication Year: 1999, Page(s):197 - 203
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB)

    Information repositories and database systems that combine time-independent and time-dependent data will be an integral element of the future information infrastructure. A seamless integration-especially with respect to QoS-of (multimedia) database systems is of central importance. Furthermore, response times are very important for these systems, but the particular QoS to be supported and the amou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Next generation middleware: requirements, architecture, and prototypes

    Publication Year: 1999, Page(s):60 - 65
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    Middleware technologies such as CORBA or Java RMI have proved their suitability for “standard” client-server applications. However, challenges from existing and new types of applications, including support for multimedia real-time requirements and mobility seems to indicate the need for defining a new architecture for open distributed systems. The new architecture should be designed fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent-based framework for nomadic computing

    Publication Year: 1999, Page(s):213 - 218
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    Nomadic computing can greatly benefit from the integration of personal mobility and program mobility technologies. This paper describes how to enhance a mobile agents platform with a set of facilities that provide mobile users with global access to agent-based applications, regardless of user location and terminal capabilities. We exploited the idea of making it possible for users to keep in touch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental security in open, untrusted networks

    Publication Year: 1999, Page(s):151 - 154
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    In this paper we identify a number of security problems encountered in open, untrusted networks and motivate why some of these problems are going to remain with us for the foreseeable future. In order to reduce system vulnerability in such environments, we suggest that network services should provide a second line of defense to catch those attackers who are not excluded by the first line-the conve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rule-mitigated collaboration technology

    Publication Year: 1999, Page(s):137 - 142
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    The design of an appropriate paradigm for collaboration ultimately stands or falls on the question of whether human users are able to cooperate effectively with it. In this work, we begin with a paradigm of interaction in which human collaborators have shown themselves facile. This paradigm is based on the formal meeting protocol commonly known as parliamentary procedure or Robert's Rules of Order... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and practice of a dispatch server architecture

    Publication Year: 1999, Page(s):246 - 251
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    Due to the rapid growth of World Wide Web applications on the Internet, a web server may encounter the situation that a huge number of connection requests coming in within a very short period of time. We call it the “connections explosion”, which usually causes the web server system overload or even to crash if the problem were not prevented in advance. This article presents a dispatch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing a class of concatenated omega networks

    Publication Year: 1999, Page(s):29 - 35
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    Benes networks are known to be nonblocking rearrangeable networks which can realize arbitrary permutations. Topological equivalence extends the nonblocking rearrangeability to a class of multistage interconnection networks (MIN), which has the same topology as Benes networks. There is another class of well-known multistage interconnection networks, which is not yet known as either nonblocking rear... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coordinating open distributed systems

    Publication Year: 1999, Page(s):125 - 130
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    Open Distributed Systems are the dominating intellectual issue of the end of this century. Figuring out how to build those systems will become a central issue in distributed system research in the next future. Although CORBA seems to provide all the necessary support to construct those systems, it provides a very limited support to the evolution of requirements in those systems. The main problem i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of a decentralised virtual service redirector for Internet applications

    Publication Year: 1999, Page(s):235 - 241
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    An ongoing project of the Highly Dependable Systems Research Programme (PHDS) at the University of the Witwatersrand is the development of a dependable distributed system and its application in supporting Internet services. The current research related to this project includes the design, specification, verification and implementation of a virtual service redirector for critical internet applicati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Curricula 2001: a brief summary

    Publication Year: 1999, Page(s):290 - 291
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    Model curricula are important resources for curricula planning and design. A joint task force between IEEE-CS and ACM was formed to undertake the responsibility of revising the 1991 model curricula. The effort is now underway, and the result will be known as Curricula 2001 View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Internet based virtual trading communities

    Publication Year: 1999, Page(s):15 - 20
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    Today, we face a growing interest in distributed business-to-business applications using the Internet as communication media. However, the involved security threats are often neglected in the design of such systems. In this paper we present our security architecture for an Internet based virtual trading community. Our solution has been designed for an heterogeneous, distributed workflow management... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic architectures and architectural styles for distributed programs

    Publication Year: 1999, Page(s):89 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    In this paper we introduce JWire, a new component model for Java. JWire is designed for building dynamic architectures of components that use an open set of binding and communication protocols, and supports the use of architectural styles in assembling components. Using JWire, a system is composed of “wireable” components that each encapsulate state and behaviour behind an interface de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous information fading by mobile agents for improving user's access time and fault tolerance

    Publication Year: 1999, Page(s):279 - 283
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    Information Services on the Internet have been rapidly changing. New information services have been added, modified, and diversified, while legacy services have been abandoned. Users' requirements for the services have been changed day-by-day and person-by-person. It is becoming very difficult to find required information services in the Internet with extremely huge information base, especially fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed, configurable memory management in an operating system supporting quality of service

    Publication Year: 1999, Page(s):191 - 196
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    Ongoing work is presented that takes advantage of several key trends in computing science to provide a novel, flexible, extensible, distributed, user-level virtual memory management hierarchy offering quality of service (QoS) to applications. The increasing disparity between CPU memory and hard disks has made on-line compression more viable than it was only a few years ago. The new hierarchy takes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.