Proceedings 20th IEEE Symposium on Reliable Distributed Systems

31-31 Oct. 2001

Filter Results

Displaying Results 1 - 25 of 37
  • Proceedings 20th IEEE Symposium on Reliable Distributed Systems

    Publication Year: 2001
    Request permission for commercial reuse | |PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2001, Page(s): 267
    Request permission for commercial reuse | |PDF file iconPDF (13 KB)
    Freely Available from IEEE
  • A microkernel middleware architecture for distributed embedded real-time systems

    Publication Year: 2001, Page(s):218 - 226
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (212 KB) | HTML iconHTML

    Today more and more embedded real-time systems are implemented in a distributed way. These distributed embedded systems consist of a few controllers up to several hundreds. Distribution and parallelism in the design of embedded real-time systems increase the engineering challenges and require new methodological framework based on middleware. Our research work focuses on the development of a middle... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using the timely computing base for dependable QoS adaptation

    Publication Year: 2001, Page(s):208 - 217
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (180 KB) | HTML iconHTML

    In open and heterogeneous environments, where an unpredictable number of applications compete for a limited amount of resources, executions can be affected by also unpredictable delays, which may not even be bounded. Since many of these applications have timeliness requirements, they can only be implemented if they are able to adapt to the existing conditions. We present a novel approach, called d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incorporation of security and fault tolerance mechanisms into real-time component-based distributed computing systems

    Publication Year: 2001, Page(s):74 - 75
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (126 KB) | HTML iconHTML

    The volume and size of real-time (RT) distributed computing (DC) applications are now growing faster than in the last century. The mixture of application tasks running on such systems is growing as well as the shared use of computing and communication resources for multiple applications including RT and non-RT applications. The increase in use of shared resources accompanies with it the need for e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient recovery information management schemes for the fault tolerant mobile computing systems

    Publication Year: 2001, Page(s):202 - 205
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (110 KB) | HTML iconHTML

    This paper presents region-based storage management schemes, which support the efficient implementation of checkpointing and message logging for fault tolerant mobile computing systems. In the proposed schemes, a recovery manager assigned for a group of cells takes care of the recovery for the mobile hosts within the region. As a result, the recovery information of a mobile host, which may be disp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying fault-tolerance principles to security research

    Publication Year: 2001, Page(s):68 - 69
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (25 KB) | HTML iconHTML

    There has been much focus on building secure distributed systems. The CERIAS center has been established at Purdue along with 14 other such centers in USA. We note that many of the ideas, concepts, algorithms being proposed in security have many common threads with reliability. We need to apply the science and engineering of reliability research to the research in security and vice versa. We brief... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing a robust namespace for distributed file services

    Publication Year: 2001, Page(s):162 - 171
    Cited by:  Papers (7)  |  Patents (51)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (144 KB) | HTML iconHTML

    A number of ongoing research projects follow a partition-based approach to provide highly scalable distributed storage services. These systems maintain namespaces that reference objects distributed across multiple locations in the system. Typically, atomic commitment protocols, such as 2-phase commit, are used for updating the namespace, in order to guarantee its consistency even in the presence o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient TDMA synchronization for distributed embedded systems

    Publication Year: 2001, Page(s):198 - 201
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (139 KB) | HTML iconHTML

    A desired attribute in safety critical embedded real-time systems is a system time/event synchronization capability on which predictable communication can be established. Focusing on bus-based communication protocols in TDMA environments, we present a novel, efficient, and low-cost synchronization approach with bounded start-up time. This approach utilizes information about each node's unique mess... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable real-time cooperation of mobile autonomous systems

    Publication Year: 2001, Page(s):238 - 246
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (168 KB) | HTML iconHTML

    Autonomous systems are expected to provide increasingly complex and safety-critical services that will, sooner or later, require the cooperation of several autonomous systems for their fulfillment. In particular, coordinating the access to shared physical and information technological resources will become a general problem. Scheduling these resources is subject to strong real-time and reliability... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can reliability and security be joined reliably and securely?

    Publication Year: 2001, Page(s):72 - 73
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (39 KB) | HTML iconHTML

    The combined topics of reliability and security are briefly traced in relation to the past and present endeavors of the Air Force Research Laboratory's Information Directorate. It is concluded that in the realm of information assurance, system features created to tolerate benign failures and to respond to attack must be stressed and tested beforehand and their effectiveness predicted, otherwise th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compiler-assisted heterogeneous checkpointing

    Publication Year: 2001, Page(s):56 - 65
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (142 KB) | HTML iconHTML

    We consider the problem of heterogeneous checkpointing in distributed systems. We propose a new solution to the problem that is truly heterogeneous in that it can support new architectures without any information about the architecture. The ability to support new architectures without additional knowledge or custom configuration is an important contribution of this work. This ability is particular... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of commercial-grade digital equipment in nuclear power plant safety systems

    Publication Year: 2001, Page(s):176 - 178
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (295 KB) | HTML iconHTML

    Due to obsolescence, increasing maintenance costs, and the lack of qualified spare parts for the equipment and components of the analog instrumentation and control (I&C) systems in operating domestic nuclear power plants, nuclear utilities are replacing equipment and upgrading certain I&C systems. These activities generally involve changing from analog to digital technology. In many cases ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Continental Pronto

    Publication Year: 2001, Page(s):46 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (299 KB) | HTML iconHTML

    Continental Pronto unifies high availability and disaster resilience at the specification and implementation levels. At the specification level, Continental Pronto formalizes the client's view of a system addressing local-area and wide-area data replication within a single framework. At the implementation level, Continental Pronto makes data highly available and disaster resilient. The algorithm p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Primary-backup replication: from a time-free protocol to a time-based implementation

    Publication Year: 2001, Page(s):14 - 23
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (177 KB) | HTML iconHTML

    Fault-tolerant control systems can be built by replicating critical components. However replication raises the issue of inconsistency. Multiple protocols for ensuring consistency have been described in the literature. PADRE (Protocol for Asymmetric Duplex REdundancy) is such a protocol, and an interesting case study of a complex and sensitive problem: the management of replicated traffic controlle... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessing inter-modular error propagation in distributed software

    Publication Year: 2001, Page(s):152 - 161
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (368 KB) | HTML iconHTML

    With the functionality of most embedded systems based on software (SW), interactions amongst SW modules arise, resulting in error propagation across them. During SW development, it would be helpful to have a framework that clearly demonstrates the error propagation and containment capabilities of the different SW components. In this paper, we assess the impact of inter-modular error propagation. A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Polynomial time synthesis of Byzantine agreement

    Publication Year: 2001, Page(s):130 - 139
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (225 KB) | HTML iconHTML

    We present a polynomial time algorithm for automatic synthesis of fault-tolerant distributed programs, starting from fault-intolerant versions of those programs. Since this synthesis problem is known to be NP-hard, our algorithm relies on heuristics to reduce the complexity. We demonstrate that our algorithm is able to synthesize an agreement program that tolerates a Byzantine fault View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Consensus with written messages under link faults

    Publication Year: 2001, Page(s):194 - 197
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (78 KB) | HTML iconHTML

    This paper shows that deterministic consensus with written messages is possible in presence of link faults and compromised signatures. Relying upon a suitable perception-based hybrid fault model that provides different categories for both node and link faults, we prove that the authenticated Byzantine agreement algorithms OMHA and ZA of Gong, Lincoln and Rushby (1995) can be made resilient to f View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of the CORBA notification service

    Publication Year: 2001, Page(s):227 - 236
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (241 KB) | HTML iconHTML

    As CORBA (Common Object Request Broker Architecture) gains popularity as a standard for portable, distributed, object-oriented computing, the need for a CORBA messaging solution is being increasingly felt. This led the Object Management Group (OMQ) to specify a Notification Service that aims to provide a more flexible and robust messaging solution than the earlier Event Service. The Notification S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The challenge of creating productive collaborating information assurance communities via Internet research and standards

    Publication Year: 2001, Page(s):70 - 71
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (15 KB) | HTML iconHTML

    Overviews the challenging 5-year process leading to the design, specification, and implementation of the Internet, Engineering Task Force (IETF) Intrusion Detection Working Group (IDWQ) Intrusion Exchange Protocol (IDXP). IDXP seeks to facilitate the ubiquitous interoperability of intrusion detection components across Internet enterprises. This capability is a critical enabler of successful intrus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research in high-confidence distributed information systems

    Publication Year: 2001, Page(s):76 - 77
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (12 KB) | HTML iconHTML

    A high-confidence system is one in which the designers, implementers, and users have a high degree of assurance that the system will not fail or misbehave due to errors in the system, faults in the environment, or hostile attempts to compromise the system. Consequences of such system behavior are well understood and are predictable under an operational context envisioned by its creators. High-conf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to select a replication protocol according to scalability, availability and communication overhead

    Publication Year: 2001, Page(s):24 - 33
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (315 KB) | HTML iconHTML

    Data replication is playing an increasingly important role in the design of parallel information systems. In particular, the widespread use of cluster architectures in high-performance computing has created many opportunities for applying data replication techniques in new areas. For instance, as part of work related to cluster computing in bioinformatics, we have been confronted with the problem ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High-quality customizable embedded software from COTS components

    Publication Year: 2001, Page(s):174 - 175
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (20 KB) | HTML iconHTML

    Dramatic advances in computer and communication technologies have greatly promoted the growth of embedded telecommunication systems. More and more critical applications, such as banking and financial services, remote patient monitoring systems, transportation, etc., are being developed. The software for these applications is becoming increasingly sophisticated and complex and this trend will accel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the effectiveness of a counter-based cache invalidation scheme and its resiliency to failures in mobile environments

    Publication Year: 2001, Page(s):247 - 256
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (185 KB) | HTML iconHTML

    Caching frequently accessed data items on the client side is an effective technique to improve the performance of data dissemination in mobile environments. Classical cache invalidation strategies are not suitable for mobile environments due to the disconnection and mobility of the mobile clients. One attractive cache invalidation technique is based on invalidation reports (IRs). However, IR-based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Why is it so hard to predict software system trustworthiness from software component trustworthiness?

    Publication Year: 2001
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (14 KB) | HTML iconHTML

    When software is built from components, nonfunctional properties such as security, reliability, fault-tolerance, performance, availability, safety, etc. are not necessarily composed. The problem stems from our inability to know a priori, for example, that the security of a system composed of two components can be determined from knowledge about the security of each. This is because the security of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.