By Topic

Proceedings 22nd International Conference on Distributed Computing Systems

2-5 July 2002

Filter Results

Displaying Results 1 - 25 of 77
  • Proceedings 22nd International Conference on Distributed Computing Systems

    Publication Year: 2002
    Request permission for commercial reuse | PDF file iconPDF (363 KB)
    Freely Available from IEEE
  • Geometric spanners for wireless ad hoc networks

    Publication Year: 2002, Page(s):171 - 178
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (415 KB) | HTML iconHTML

    We propose a new geometric spanner, for wireless ad hoc networks, which can be constructed efficiently in a distributed manner. It combines the connected dominating set and the local Delaunay graph to form the backbone of a wireless network. This new spanner has the following attractive properties: (1) the backbone is a planar graph; (2) the node degree of the backbone is bounded from above by a p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2002, Page(s):566 - 568
    Request permission for commercial reuse | PDF file iconPDF (166 KB)
    Freely Available from IEEE
  • A pluggable service-to-service communication mechanism for VNA architecture

    Publication Year: 2002, Page(s):459 - 460
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    This paper proposes a middleware for home networks, called Virtual Networked Appliance (VNA) architecture, in which the service description method and the Service to Service (S2S) communication mechanism are separated in an orthogonal way. Through the separation, VNA architecture solved the following two problems of existing middleware technologies: aspect violation and middleware fragmentation. I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of network density on data aggregation in wireless sensor networks

    Publication Year: 2002, Page(s):457 - 458
    Cited by:  Papers (207)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    In-network data aggregation is essential for wireless sensor networks where energy resources are limited. In a previously proposed data dissemination scheme (directed diffusion with opportunistic aggregation), data is opportunistically aggregated at intermediate nodes on a low-latency tree. In this paper, we explore and evaluate greedy aggregation, a novel approach that adjusts aggregation points ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling real-time data items in multiple channels and multiple receivers environments

    Publication Year: 2002, Page(s):455 - 456
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    The problem of transmitting data items with timing constraint in the multiple broadcast channels where clients equipped with multiple receivers is studied. In our approach, the data items are divided into two sets, the broadcast data set and the on-demand data set. The data items in the broadcast data set is periodically broadcast on the broadcast channels while the data items in the on-demand dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On peer-to-peer media streaming

    Publication Year: 2002, Page(s):363 - 371
    Cited by:  Papers (73)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB) | HTML iconHTML

    In this paper, we study a peer-to-peer media streaming system with the following characteristics: (1) its streaming capacity grows dynamically; (2) peers do not exhibit server-like behavior; (3) peers are heterogeneous in their bandwidth contribution; and (4) each streaming session may involve multiple supplying peers. Based on these characteristics, we investigate two problems: (1) how to assign ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-demand multicasting in ad-hoc networks:comparing AODV and ODMRP

    Publication Year: 2002, Page(s):453 - 454
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    Multicasting can efficiently support a wide variety of applications that are characterized by a close degree of collaboration, typical for many mobile ad-hoc network (MANET) applications currently envisioned. To deal with the specific characteristics of MANETs, new multicast protocols that operate in an on-demand manner are being proposed and investigated. Our results show that a tree-based on-dem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The transition from asynchronous to synchronous system operation: an approach for distributed fault-tolerant systems

    Publication Year: 2002, Page(s):329 - 336
    Cited by:  Papers (9)  |  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB) | HTML iconHTML

    Immediately after power-up, synchronous distributed systems need some time until essential timing properties, which are required to operate correctly, are established. We say that synchronous systems are initially in asynchronous operation. In this paper, we present an algorithm and architectural guidelines that assure the transition from asynchronous to synchronous operation within a bounded dura... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-blocking transactional mobile agent execution

    Publication Year: 2002, Page(s):443 - 444
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    Mobile agents are computer programs that act autonomously on behalf of a user and travel through a network of heterogeneous machines. To enable mobile agent technology for e-business, transaction support needs to be provided, in particular execution atomicity. Execution atomicity ensures that either all operations of the agent succeed, or none at all, and needs to be ensured also in the face of in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A working-set approach to reduce the download-execution time of mobile programs

    Publication Year: 2002, Page(s):239 - 248
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB) | HTML iconHTML

    The on-demand downloading of application code over a wireless network is an emerging paradigm for the distributed environment of mobile computing devices. In this environment, a user must wait while a mobile computing device fetches the application code over the network prior to execution. To reduce this downloading latency, we have developed a download approach based on working sets, and have des... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conditional messaging: extending reliable messaging with application conditions

    Publication Year: 2002, Page(s):123 - 132
    Cited by:  Papers (2)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    Standard messaging middleware guarantees the delivery of messages to intermediary destinations like message queues, but does not guarantee the receipt or the processing of a message by final recipients. Conditional messaging is an extension to standard messaging middleware that addresses this shortcoming by allowing an application to define, monitor, and evaluate various conditions on messages, su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key trees and the security of interval multicast

    Publication Year: 2002, Page(s):467 - 468
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    A key tree is a distributed data structure of security keys that can be used by a group of users. In this paper we describe how any user in the group can use the different keys in the key tree to securely multicast data to different subgroups within the group. The cost of securely multicasting data to a subgroup whose users are "consecutive" is O(log n) encryptions, where n is the total number of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OS support for P2P programming: a case for TPS

    Publication Year: 2002, Page(s):355 - 362
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (399 KB) | HTML iconHTML

    Just as the remote procedure call (RPC) turned out to be a very effective OS abstraction in building client-server applications over LANs, type-based publish-subscribe (TPS) can be viewed as a high-level candidate abstraction for building peer-to-peer (P2P) applications over WANs. This paper relates our preliminary, though positive, experience of implementing and using TPS over JXTA, which can be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Universal interaction with networked home appliances

    Publication Year: 2002, Page(s):451 - 452
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    We propose universal interaction for networked home appliances, which is a simple mechanism to fill the gap between traditional user interface systems and advanced user interaction devices. Our system enables us to control appliances in a uniform way at any place, and the system allows us to select suitable input and output devices according to our preferences and situations. Also, the devices can... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Convergence refinement

    Publication Year: 2002, Page(s):589 - 597
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    Refinement tools such as compilers do not necessarily preserve fault-tolerance. That is, given a fault-tolerant program in a high-level language as input, the output of a compiler in a lower-level language will not necessarily be fault-tolerant. We identify a type of refinement, namely "convergence refinement", that preserves the fault-tolerance property of stabilization. We illustrate the use of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed bandwidth broker for QoS multicast traffic

    Publication Year: 2002, Page(s):319 - 326
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB) | HTML iconHTML

    The differentiated services model is the emerging standard to provide Quality-of-Service (QoS) support for multimedia applications in the future Internet. This model involves bandwidth broker agents performing admission control and network configuration functionalities. A great deal of effort has been recently devoted to investigate viable approaches to the implementation of mechanisms that automa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A reliable multicast algorithm for mobile ad hoc networks

    Publication Year: 2002, Page(s):563 - 570
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    A reliable multicast algorithm, called RMA, for mobile ad hoc networks is presented that is based on a new cost criterion, called link lifetime, for determining the optimal path between a pair of nodes. The algorithm has the characteristics of using an undirected graph for its routing operations rather than a fixed structure like a tree or a mesh. Previously proposed routing metrics for mobile ad ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributing MPEG movies over the Internet using programmable networks

    Publication Year: 2002, Page(s):161 - 170
    Cited by:  Papers (5)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    Distributing video over the Internet is an increasingly important application. Nevertheless, the real-time and high bandwidth requirements of video make video distribution over today's Internet a challenge. Adaptive approaches can be used to respond to changes in bandwidth availability while limiting the effect of such changes on perceptual quality and resource consumption. Nevertheless, most exis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anthill: a framework for the development of agent-based peer-to-peer systems

    Publication Year: 2002, Page(s):15 - 22
    Cited by:  Papers (73)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    Recent peer-to-peer (P2P) systems are characterized by decentralized control, large scale and extreme dynamism of their operating environment. As such, they can be seen as instances of complex adaptive systems (CAS) typically found in biological and social sciences. We describe Anthill, a framework to support the design, implementation and evaluation of P2P applications based on ideas such as mult... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using predeclaration for efficient read-only transaction processing in wireless data broadcast

    Publication Year: 2002, Page(s):441 - 442
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    Wireless data broadcast allows a large number of users to retrieve data simultaneously in mobile databases, resulting in an efficient way of using the scarce wireless bandwidth. The efficiency of data access methods, however, is limited by an inherent property that data can only be accessed strictly sequentially by users. The paper addresses the issue of ensuring consistency and currency of data i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unification of replication and transaction processing in three-tier architectures

    Publication Year: 2002, Page(s):290 - 297
    Cited by:  Papers (9)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    In this paper we describe a software infrastructure that unifies replication and transaction processing in three-tier architectures and, thus, provides high availability and fault tolerance for enterprise applications. The infrastructure is based on the Fault Tolerant CORBA and CORBA Object Transaction Service standards, and works with commercial-off-the-shelf application servers and database syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative computing for distributed embedded systems

    Publication Year: 2002, Page(s):227 - 236
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (391 KB) | HTML iconHTML

    The next generation of computing systems will be embedded, in a virtually unbounded number, and dynamically connected. The current software, network architectures, and their associated programming models are not suitable for this scenario. This paper presents a distributed computing model, Cooperative Computing, and the Smart Messages architecture for programming large networks of embedded systems... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic data broadcasting with traffic awareness

    Publication Year: 2002, Page(s):112 - 119
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (399 KB) | HTML iconHTML

    Data dissemination has significantly served as a scalable data delivery mechanism in wireless networks. However, even though the broadcast traffic has the nature of dynamic changes, most previous research efforts were elaborated upon the premise of static workloads and access patterns without having proper traffic awareness. In this paper, we address the existence of client impatience and accordin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture of a large-scale location service

    Publication Year: 2002, Page(s):465 - 466
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    Location-aware services are a promising way of exploiting the special possibilities created by ubiquitous mobile devices and wireless communication. Advanced location-aware applications will require highly accurate information about the geographic location of mobile objects and functionality that goes beyond simply querying the user's position, for example determining all mobile objects inside a c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.