Proceedings 7th IEEE Workshop on Future Trends of Distributed Computing Systems

20-22 Dec. 1999

Filter Results

Displaying Results 1 - 25 of 47
  • Proceedings 7th IEEE Workshop on Future Trends of Distributed Computing Systems

    Publication Year: 1999
    Request permission for commercial reuse | |PDF file iconPDF (234 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1999, Page(s):295 - 296
    Request permission for commercial reuse | |PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Routing a class of concatenated omega networks

    Publication Year: 1999, Page(s):29 - 35
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (468 KB)

    Benes networks are known to be nonblocking rearrangeable networks which can realize arbitrary permutations. Topological equivalence extends the nonblocking rearrangeability to a class of multistage interconnection networks (MIN), which has the same topology as Benes networks. There is another class of well-known multistage interconnection networks, which is not yet known as either nonblocking rear... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying computational intelligence for congestion avoidance of high-speed networks

    Publication Year: 1999, Page(s):23 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (440 KB)

    Congestion avoidance is one of the key issues for the effectiveness and reliability of high-speed networks. The design of congestion avoidance mechanisms is usually based on some assumptions of the traffic model and the performance is strongly influenced by the related parameters. Such parameters are usually initialized subjectively and adjusted by applying some predefined linear transformation to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CORBA fault-tolerance: why it does not add up

    Publication Year: 1999, Page(s):229 - 234
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (528 KB)

    Many industries are taking CORBA seriously and envisage the development of critical distributed applications following this standard. We examine the utility of using the CORBA transaction and replication services to provide end-to-end reliability and high-availability in three-tier applications. We document issues in using the individual services. Perhaps more importantly, we point out difficultie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Internet based virtual trading communities

    Publication Year: 1999, Page(s):15 - 20
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (480 KB)

    Today, we face a growing interest in distributed business-to-business applications using the Internet as communication media. However, the involved security threats are often neglected in the design of such systems. In this paper we present our security architecture for an Internet based virtual trading community. Our solution has been designed for an heterogeneous, distributed workflow management... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent platform and related issues

    Publication Year: 1999, Page(s):219 - 225
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (524 KB)

    Implementing an agent platform is based on the supporting language and underline OO library. Currently, the most popular Internet language is JAVA and the library for Internet related software is JDK1.2. We designed and implemented an agent platform based on JAVA and JDK1.2. In this paper we present our design architecture of agent platform with UML and discuss a series of problems related to agen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting real world security models in Java

    Publication Year: 1999, Page(s):155 - 159
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (332 KB)

    The Java Security Model has undergone considerable evolution since its initial implementation. However, due to its historical focus on securing machines against attack from hostile Java applications, it has neglected support for securing “Real World” applications. We suggest that in order to support “Real World” security the ability to insert checks into compiled code in a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ephemeral Java source code

    Publication Year: 1999, Page(s):9 - 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (400 KB)

    In an object oriented, distributed environment, program maintenance, which has never been the most predictable task, becomes even more uncertain. Java's dynamic loading mechanism was developed to tackle some of the uncertainties. In doing so, it shifts the focus from the state of the sources to that of the binaries. This paper discusses some of the implications of that move View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Curricula 2001: a brief summary

    Publication Year: 1999, Page(s):290 - 291
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (144 KB)

    Model curricula are important resources for curricula planning and design. A joint task force between IEEE-CS and ACM was formed to undertake the responsibility of revising the 1991 model curricula. The effort is now underway, and the result will be known as Curricula 2001 View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Markup meets middleware

    Publication Year: 1999, Page(s):261 - 266
    Cited by:  Papers (2)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (476 KB)

    We describe a distributed system architecture that supports the integration of different front-office trading systems with middle and back-office systems, each of which have been procured from different vendors. The architecture uses a judicious combination of object-oriented middleware and markup languages. In this combination an object request broker implements reliable trade data transport. Mar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent-based framework for nomadic computing

    Publication Year: 1999, Page(s):213 - 218
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (580 KB)

    Nomadic computing can greatly benefit from the integration of personal mobility and program mobility technologies. This paper describes how to enhance a mobile agents platform with a set of facilities that provide mobile users with global access to agent-based applications, regardless of user location and terminal capabilities. We exploited the idea of making it possible for users to keep in touch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rule-mitigated collaboration technology

    Publication Year: 1999, Page(s):137 - 142
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (560 KB)

    The design of an appropriate paradigm for collaboration ultimately stands or falls on the question of whether human users are able to cooperate effectively with it. In this work, we begin with a paradigm of interaction in which human collaborators have shown themselves facile. This paradigm is based on the formal meeting protocol commonly known as parliamentary procedure or Robert's Rules of Order... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From remote objects to physically distributed objects

    Publication Year: 1999, Page(s):47 - 52
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (504 KB)

    Present-day object-oriented middleware provides little support for the distribution, replication and caching of the state of a distributed object. This makes these platforms unsuitable for the development of large-scale distributed applications. We argue that the model of distributed objects on which these middleware platforms are based hinders the addition of comprehensive distribution and replic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PODC: Paradigm-oriented distributed computing

    Publication Year: 1999, Page(s):169 - 175
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (616 KB)

    We describe an environment for distributed computing that uses the concept of well-known paradigms. The main advantage of paradigm-oriented distributed computing is that the user only needs to specify application-specific sequential code, while the underlying infrastructure takes care of the parallelization and distribution. The main features of the proposed approach, called PODC, are the followin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The use of a Java implementation of SLP in a tele-teaching application

    Publication Year: 1999, Page(s):273 - 278
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (484 KB)

    One of the areas that is of primary importance in distributed applications is that of the name server and directory service. This area is one that the Service Location Protocol (SLP) addresses. The requirements for a name server differ in performance from the high speed needs of a transaction processing system to the more reasonable needs of a video-conferencing system. It is in this later area th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental security in open, untrusted networks

    Publication Year: 1999, Page(s):151 - 154
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (288 KB)

    In this paper we identify a number of security problems encountered in open, untrusted networks and motivate why some of these problems are going to remain with us for the foreseeable future. In order to reduce system vulnerability in such environments, we suggest that network services should provide a second line of defense to catch those attackers who are not excluded by the first line-the conve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Next generation middleware: requirements, architecture, and prototypes

    Publication Year: 1999, Page(s):60 - 65
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (516 KB)

    Middleware technologies such as CORBA or Java RMI have proved their suitability for “standard” client-server applications. However, challenges from existing and new types of applications, including support for multimedia real-time requirements and mobility seems to indicate the need for defining a new architecture for open distributed systems. The new architecture should be designed fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security issues in mobile agent technology

    Publication Year: 1999, Page(s):3 - 8
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (568 KB)

    The Mobile Agent (MA) paradigm seems to be a promising technology for developing applications in open, distributed and heterogeneous environments, such us the Internet. Many application areas, such as electronic commerce, mobile computing, network management and information retrieval can benefit from the application of the MA technology. The exploitation of mobile agents offer several peculiar adv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some perspectives on network centric distance learning and software engineering

    Publication Year: 1999, Page(s):288 - 289
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (160 KB)

    Network-centric computing involves fundamental changes at many levels that amount to a substantial paradigm shift in computing. Creative approaches and competent strategies to manage the network-centric environment at both the instructional design and user levels need to be established and understood in order to ensure a degree of quality comparable to what we had before. A few perspectives on som... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Group communication in real-time computing systems: issues and directions

    Publication Year: 1999, Page(s):252 - 258
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (592 KB)

    Group communication in real-time computing systems has been a subject of research for almost two decades but it is not yet a mature technological field. The purpose of this paper is to review the main goals of developing group communication protocols and establish a practical framework of protocols toward meeting the goals. As a part of this, an attempt is made to clarify the relationship between ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic architectures and architectural styles for distributed programs

    Publication Year: 1999, Page(s):89 - 94
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (420 KB)

    In this paper we introduce JWire, a new component model for Java. JWire is designed for building dynamic architectures of components that use an open set of binding and communication protocols, and supports the use of architectural styles in assembling components. Using JWire, a system is composed of “wireable” components that each encapsulate state and behaviour behind an interface de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location transparent routing in mobile agent systems merging name lookups with routing

    Publication Year: 1999, Page(s):207 - 212
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (420 KB)

    Telecommunication systems these days are moving from static wide area component structures towards highly dynamic mobile infrastructures. This shift requires new algorithms to interconnect these mobile entities/components and route messages between them. In this paper we describe a naming and routing algorithm which can be used in fine-grained mobile component systems. As a case we use a homogenou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Beyond the Whiteboard: synchronous collaboration in shared object spaces

    Publication Year: 1999, Page(s):131 - 136
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (488 KB)

    Synchronous collaboration via a network of distributed workstations requires concurrency awareness within a relaxed WYSIWIS model (What You See is What I See). Many applications let users navigate within highly structured object spaces, such as documents, multimedia courses, graphs, or nested tables, which can be distributed asynchronously. To support their manipulation through distributed teams, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Priority scheduling and buffer management for ATM traffic shaping

    Publication Year: 1999, Page(s):36 - 43
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (552 KB)

    The impact of buffer management and priority scheduling is examined in stressful scenarios when the aggregate incoming traffic is higher than the output link capacity of an Asynchronous Transfer Mode (ATM) traffic shaper. To simultaneously reduce cell loss and extreme delay behavior for two or more classes of service, we show that a dynamic priority scheme is required. We propose a scheduling algo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.