Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

Proceedings 22nd International Conference on Distributed Computing Systems Workshops

2-5 July 2002

Filter Results

Displaying Results 1 - 25 of 132
  • Proceedings 22nd International Conference on Distributed Computing Systems Workshops

    Publication Year: 2002
    Request permission for commercial reuse | PDF file iconPDF (316 KB)
    Freely Available from IEEE
  • A physically grounded approach to coordinate movements in a team

    Publication Year: 2002, Page(s):373 - 378
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    Focuses on the problem of coordinating the movements of a cooperative team in an environment, and proposes an approach that takes inspiration from the laws of physics. The idea is to have the movements of team members driven by abstract force fields, generated by team members themselves and propagated via some embedded infrastructure. A globally coordinated and self-organized behavior in team memb... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Separation of concerns in agent applications by roles

    Publication Year: 2002, Page(s):430 - 435
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    In the development of agent applications, interactions are an important issue, which must be faced with appropriate methodologies and tools. A separation of concerns between the agents and their interaction needs is helpful in the designing and the implementation phases of the life cycle. In this paper we propose XRole, a system that helps in dealing with interactions. It is based on the definitio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A versatile event-based communication model for generic distributed interactions

    Publication Year: 2002, Page(s):503 - 510
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    Event-based communication models provide interesting properties for distributed systems such as asynchronism and type-based selection mechanisms. The Comet middleware we developed proposes such an event-based communication model as foundation. From this canonical model, we show how to build more conventional bidirectional and synchronous interactions with extended features such as implicit type-ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2002, Page(s):831 - 835
    Request permission for commercial reuse | PDF file iconPDF (172 KB)
    Freely Available from IEEE
  • Exploiting logical mobility in mobile computing middleware

    Publication Year: 2002, Page(s):385 - 386
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    We consider the following forms of mobile interactions: client/server interactions, whereby the request of a client triggers the execution of a unit of code in a server and returns the results to the client; remote evaluation, where a device can send code to another host, have it executed and retrieve the result; code on demand, where a host can request a unit of code from another device to be ret... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicate matching and subscription matching in Publish/Subscribe systems

    Publication Year: 2002, Page(s):539 - 546
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (361 KB) | HTML iconHTML

    An important class of publish/subscribe matching algorithms work in two stages. First, predicates are matched and then matching subscriptions are derived. We observe that in practice, the domain types over which predicates are defined are often of fixed enumerable cardinality. Based on this observation we propose a table-based look-up scheme for fast predicate evaluation that finds all matching pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture of an agent-based negotiation mechanism

    Publication Year: 2002, Page(s):379 - 384
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    One of the central issues in facilitating mobile teamwork is the creation and establishment of teams from autonomous agents. It is widely accepted that team building assumes an expression of and agreement on, common interests. The paper describes an approach to the provision of mechanisms to facilitate the creation of teams and to help resolve conflict through automated negotiation. The negotiatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Switchboard: secure, monitored connections for client-server communication

    Publication Year: 2002, Page(s):660 - 665
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    Prolonged secure communication requires trust relationships that extend throughout a connection's life cycle. Current tools to establish secure connections such as SSL/TLS and SSH authenticate PKI identities, validate credentials and authorize a trust relationship at the time a connection is established, but do not monitor the trust relationship thereafter To maintain security over the duration of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Whoops!: a clustered Web cache for DSM systems using memory mapped networks

    Publication Year: 2002, Page(s):806 - 811
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (431 KB) | HTML iconHTML

    We present Whoops!, a clustered Web cache prototype based on SciFS, a distributed shared memory (DSM) that benefits from the high performances and the remote addressing capabilities of memory mapped networks like Scalable Coherent Interface (SCI). Whoops! uses the DSM for all Web cache management and cache storage. Using a memory mapped network and a DSM programming model allows us to investigate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Textual information dissemination in distributed event-based systems

    Publication Year: 2002, Page(s):533 - 538
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    We define formally the data models WP and AWP especially designed for the dissemination of textual information in distributed event-based systems. We also define the problems of satisfiability, satisfaction, filtering and entailment, and point out that these problems are fundamental for the deployment of models like the ones presented here in distributed event-based systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Superphony: towards ubiquitous audio communication services

    Publication Year: 2002, Page(s):728 - 731
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    With the expansion of mobility in communication technologies, the increasing individual audio solicitations require a definition of priorities in audio information. A new concept called superphony is identified which improves communication abilities by reconstructing an audio sphere around each user and filtering audio information based on user and environment profiles. Requirements and elements f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributing objects with multiple aspects

    Publication Year: 2002, Page(s):459 - 464
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    The separation of concerns, as a conceptual tool, enables us to manage the complexity of the software systems that we develop. Such was the intent behind the OORAM. When the idea is taken further to software packaging, greater reuse and maintainability are achieved. There have been a number of approaches aimed at modularizing software around the natural boundaries of the various concerns, includin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A collaborative infrastructure for scalable and robust news delivery

    Publication Year: 2002, Page(s):655 - 659
    Cited by:  Papers (4)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    In this paper we describe the model used for the NewsWire collaborative content delivery system. The system builds on the robustness and scalability of Astrolabe to weave a peer-to-peer infrastructure for real time delivery of news items. The goal of the system is to deliver news updates to hundreds of thousands of subscribers within tens of seconds of the moment of publishing. The system signific... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Class-based delta-encoding: a scalable scheme for caching dynamic Web content

    Publication Year: 2002, Page(s):799 - 805
    Cited by:  Papers (6)  |  Patents (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (405 KB) | HTML iconHTML

    Web-caching performance is hard to increase further due to the growing number of non-cachable dynamic Web-documents. Delta-encoding is a promising technique that exploits temporal correlation among different snapshots of a dynamic document, and renders dynamic traffic cachable. However, it has not yet been deployed due to the significant scalability concerns related to the storage requirements for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient distribution-based event filtering

    Publication Year: 2002, Page(s):525 - 532
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    Event notification services are used in various applications, for example, stock tickers, environmental monitoring, and facility management. Several filtering algorithms for such services have been proposed. The best performance results are achieved by tree-based algorithms. However to our knowledge existing algorithms do not consider the influence of event and profile distribution on the filter p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Progressive HTML for proximate and automatic interactions

    Publication Year: 2002, Page(s):723 - 727
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Development and projections in the field of PDAs and wireless communication architectures let us consider new applications which exploit short range and direct exchanges. In a close future we may imagine mobile users equipped with wireless PDAs dynamically and spontaneously exchanging rich information in an ad hoc manner In such a context, a connection between two PDAs may be broken at any time be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed supervisory system with cooperative multi-agent FEP

    Publication Year: 2002, Page(s):633 - 638
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (391 KB) | HTML iconHTML

    A large-scale distributed supervisory system that services a large area should ideally be capable of performing automatically optimal control based on various types of data provided by the controlled equipment. However, conventional systems have generally been configured so that pre-ordained transmission and reception processes are the input to the FEP (front end processor) unit according to vario... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and implementation of mobile ad hoc network emulation system

    Publication Year: 2002, Page(s):749 - 754
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    Emulation is an efficient method in mobile ad hoc network research, which provides a good approach to accurately evaluate the MANET routing protocol large scale. In this paper, we describe the modeling and implementation of a new low cost MANET emulator called NE based on Ethernet environment. NE provides mobile multi-hop wireless emulation including incomplete connectivity, random frame loss, ban... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic support for distributed auto-adaptive applications

    Publication Year: 2002, Page(s):451 - 456
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    This work presents an infrastructure that simplifies the development of distributed applications that can adapt automatically to nonfunctional properties of their components and of their execution environment. This infrastructure, based on the programming language Lua and on CORBA, allows applications to select dynamically the components that best suit their requirements, to verify whether the sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing interaction concerns in Web-service systems

    Publication Year: 2002, Page(s):424 - 429
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB) | HTML iconHTML

    Web services dramatically increase the reach of E-business. A homogeneous model that spans internal as well as external resources enables uniform solutions to complex business problems. Yet, the complexity of Web-service-based systems increases exponentially with their scope. Separation of crosscutting concerns and active management of aspects are fundamental in Web-service-based solutions. In thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spy: a method to secure clients for network services

    Publication Year: 2002, Page(s):23 - 28
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    A fundamental problem in security is guaranteeing correct program behavior on an untrusted computer regardless of a user's actions. The problem appears in digital rights management, secure boot, e-appliances, etc. All existing approaches are either partial or unreliable. Today, dependable security is necessary not only for e-commerce, but also to ensure that, under critical conditions of informati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey of transport layer protocols suited for real-time data delivery over Diffserv-capable networks

    Publication Year: 2002, Page(s):305 - 310
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (507 KB) | HTML iconHTML

    As the Internet evolves toward the global multiservice network of the future, a key consideration is the support for services with guaranteed quality of service (QoS). The current Internet has a number of barriers to QoS support for real-time data delivery. The proposed differentiated services (Diffserv) framework is seen as the key technology to achieve this. This paper examines standard transpor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Content-based trademark retrieval system using a new region based shape description method: the distance-angle pair-wise histogram

    Publication Year: 2002, Page(s):191 - 195
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (773 KB) | HTML iconHTML

    Due to the increasing number of registered trademarks, it is more and more difficult to design and register a new trademark without a good retrieval method Thus, we propose a new region based shape description method: the distance-angle pair wise histogram, as the trademark shape feature vector to retrieve similar trademarks Experiments have been conducted on about 1000 trademark images. Some mome... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The numeric indexing for music data

    Publication Year: 2002, Page(s):258 - 263
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    The management of large collections of music data in a multimedia database has received much attention in the past few years. In most current work, researchers extract features from the music data and develop indices that will help to retrieve the relevant music quickly. Several reports have pointed out that these features of music can be transformed and represented in the form of music feature st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.