Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004.

26-28 May 2004

Filter Results

Displaying Results 1 - 25 of 62
  • Mapping Web services specifications to process ontology: opportunities and limitations

    Publication Year: 2004, Page(s):229 - 235
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1039 KB) | HTML iconHTML

    There are many XML based workflow and process modeling languages like XPDL, BPEL4WS etc. that can be used to define workflow and business processes in the Web services world. However, the use of XML makes the meaning of the processes ambiguous with limited capability to describe the relationships (semantics, schemas or ontologies) with respect to objects. Put into action, it becomes obvious that t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CA-PLAN, an inter-organizational workflow model

    Publication Year: 2004, Page(s):154 - 162
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (536 KB) | HTML iconHTML

    Workflow management systems (WfMS) are accepted worldwide due to their ability in modeling and controlling business processes. In the past, we defined an intra-organizational workflow specification model, Process Language Plan. Plan, with the associated tools, allows user to describe the graph specification for processes, artifacts and participants' organization. PLAN has been successfully impleme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a fully distributed P2P Web search engine

    Publication Year: 2004, Page(s):332 - 338
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (324 KB) | HTML iconHTML

    Most centralized Web search engines currently find it harder to catch up with the growth in information needs. Here, we present a fully distributed, collaborative peer-to-peer Web search engine named Coopeer. The goal of the work is to complement centralized search engines to provide more humanized and personalized results by utilizing users' collaboration. Towards this goal, three main ideas are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A complexity measure for ontology based on UML

    Publication Year: 2004, Page(s):222 - 228
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (294 KB) | HTML iconHTML

    UML is a good tool to represent ontologies. When using UML for ontology development, one of the principal goals is to assure the quality of ontologies. UML class diagrams provide a static modeling capability that is well suited for representing ontologies, so the structural complexity of a UML class diagram is one of the most important measures to evaluate the quality of the ontologies. This paper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed systems design using function-class decomposition with aspects

    Publication Year: 2004, Page(s):148 - 153
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (265 KB) | HTML iconHTML

    Object-oriented methods are known for their capabilities to encapsulate and manage core concerns of complex software systems. However, they are inadequate in discerning and separating a variety of other cross-cutting concerns. In particular, for distributed systems, a number of important concerns such as synchronization, logging, and security, should be sufficiently treated in the design phase of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Panel session: Current state and future trends of distributed computing systems in Asia

    Publication Year: 2004, Page(s): 200
    Request permission for commercial reuse | |PDF file iconPDF (173 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The power of DHT as a logical space

    Publication Year: 2004, Page(s):325 - 331
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (273 KB) | HTML iconHTML

    P2P DHT has fast become a rather "classical" research field. The currently popular mindsets are mostly routing-centric, or storage-centric. In this paper, we argue that it maybe more interesting to simply view DHT as a logical space that can dynamically size itself with potentially unlimited amount resources. This is in someway analogous to the virtual memory in any contemporary operating system. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Current state and future trends in high performance computing and communications (HPCC) research in India

    Publication Year: 2004, Page(s):217 - 220
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (226 KB) | HTML iconHTML

    High performance computing and communications (HPCC) plays an important role in the advancement and overall development of a country. The Centre for Development of Advanced Computing (C-DAC) was set up by the government of India in 1988 to carry out research and development in this area. This article presents a brief overview of the major HPCC initiatives taken by C-DAC since its inception and its... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pervasive communication: a human-centered service architecture

    Publication Year: 2004, Page(s):140 - 146
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (726 KB) | HTML iconHTML

    In the last few years, a variety of concepts for user-centered systems have gained momentum. The vision of I-centric communications and the according reference model are good examples for this development. This reference model represents a first approach of human-centered telecommunication systems, which is based on service adaptation, service integration, and IP-based reachability. The integrated... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fuzzy data mining based intrusion detection model

    Publication Year: 2004, Page(s):191 - 197
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (273 KB) | HTML iconHTML

    With explosively increasing information, data mining techniques are frequently employed to identify trends in the warehouse that may not be readily apparent. In this paper we apply fuzzy data mining techniques to a security system and build a fuzzy data mining based intrusion detection model. Through normalizing the data set and building a fuzzy similar matrix of the network connections in the dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Container based framework for self-healing software system

    Publication Year: 2004, Page(s):306 - 310
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (239 KB) | HTML iconHTML

    Software "self-healing" is an approach to detect improper operations of software applications, transactions and business processes, and then to initiate corrective action without disrupting users. The software engineering literature contains many studies on software error detection and error correction. In this paper, we introduce a "container based self-healing" framework and provide an outline o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable, structured data placement over P2P storage utilities

    Publication Year: 2004, Page(s):244 - 251
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (633 KB) | HTML iconHTML

    P2P overlays offer a convenient way to host an infrastructure that can scale to the size of the Internet and yet be manageable. Current proposals, however, do not offer support for structuring data, other than assuming a distributed hash table. In reality, both applications and users typically organize data in a structured form. One such popular structure is the tree as employed in a file system, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Grid computing in Hong Kong: research and development

    Publication Year: 2004, Page(s):205 - 208
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (223 KB) | HTML iconHTML

    Grid is a new exciting arena for re-application of many distributed computing techniques from the past as well as brand new ideas because of new requirements imposed upon by a form of computing that was never possible before. We present the Hong Kong Grid which is a major Grid platform for local institutions to conduct their R and D projects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Random landmarking in mobile, topology-aware peer-to-peer networks

    Publication Year: 2004, Page(s):319 - 324
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (373 KB) | HTML iconHTML

    DHT can locate objects in a peer-to-peer network within an efficient amount of overlay hops. Since an overlay hop is likely to consist of multiple physical hops, the ratio between the number of physical hops induced by the overlay routing process and the number of physical hops on a direct physical path is often significantly lopsided. Recently, some approaches have been suggested to optimize that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trend of autonomous decentralized systems

    Publication Year: 2004, Page(s):213 - 216
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (258 KB) | HTML iconHTML

    Markets and the technologies have been rapidly changing and advancing. User requirements have been diversified and unpredictable. Under these evolving situations, an autonomous decentralized system (ADS) was proposed for resolving the on-line property to achieve step-by-step expansion, maintenance/test and fault-propagation prevention without stopping the entire system. Research and development ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CNGrid: a test-bed for Grid technologies in China

    Publication Year: 2004, Page(s):135 - 139
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (226 KB) | HTML iconHTML

    The rapid expansion of the Internet and ever increasing of critical applications on the Internet are stimulating the research on the new information infrastructure. The Grid, that is supposed to be the new generation information infrastructure, is attracting more and more attention in both academic and industrial communities. A test-bed for Grid technologies, the China National Grid (CNGrid), is c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enterprise computing in the on demand era

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (194 KB) | HTML iconHTML

    Web-based distributed computing is the vital technology enabler for today's most important e-business opportunities. However, a complex enterprise e-business system poses several technology challenges. Some of the key components that would enable the growth of an e-business are service-oriented architectures, understanding the use of data across businesses, application integration, and reduction o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The vMatrix: server switching

    Publication Year: 2004, Page(s):110 - 118
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1076 KB) | HTML iconHTML

    Today most Internet services are pre-assigned to servers statically, hence preventing us from doing real-time sharing of a pool of servers across as group of services with dynamic load. Fluidly copying services in and out of servers remains a challenge due to the many dependencies that such services have on software, hardware, and most importantly, people. In this paper we present a novel solution... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introducing compositionality in Web service descriptions

    Publication Year: 2004, Page(s):14 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (343 KB) | HTML iconHTML

    Web services are essentially black box components from a composer's or a mediator's perspective. The behavioural description of any service can be asserted by the composer only through interface predicates exposed by the service provider Normally for proving properties of service compositions, pre/post conditions are found to be sufficient. However these properties are assertions only on the initi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed buffer management approach supporting IPv6 mobility

    Publication Year: 2004, Page(s):270 - 276
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (466 KB) | HTML iconHTML

    In wireless local area networks (WLAN), mobility support is essential for providing seamless services. The current Mobile IP standard suffers several problems, especially for accommodating real-time media applications. Most of the existing studies focus on improving the performance between the home agent (HA) and foreign agent (FA). In this work, we propose a buffer management approach to enhance ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An architecture for EventWeb

    Publication Year: 2004, Page(s):95 - 101
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (4222 KB) | HTML iconHTML

    While the volume and diversity of multimedia permeating the world around us increases, our chances of making sense of the available information do the opposite. This environment poses a number of challenges which include achieving scalability while accessing all the available media, live and archived, inferring its context, and delivering media to all interested parties with its context attached. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new perspective in defending against DDoS

    Publication Year: 2004, Page(s):186 - 190
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (265 KB) | HTML iconHTML

    Distributed denial of service (DDoS) is a major threat to the availability of Internet services. The anonymity allowed by IP networking, together with the distributed, large scale nature of the Internet, makes DDoS attacks stealthy and difficult to counter. As various attack tools become widely available and require minimum knowledge to operate, automated anti-DDoS systems are increasingly importa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous decentralized community construction technology to assure quality of services

    Publication Year: 2004, Page(s):299 - 305
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (604 KB) | HTML iconHTML

    Recent advances in wireless communication and mobile telecommunications have made mobile commerce possible. In the retail business under the evolving market, the users solicit continuously to utilize the appropriate services based on their preferences and situations. In addition, the service providers insist on seizing the current requirements of the majority of the users in the local service area... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fundamental research challenges in real-time distributed computing

    Publication Year: 2004, Page(s):2 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (822 KB) | HTML iconHTML

    The author presents a personal perspective on where research efforts are most urgently needed to advance the fundamental foundation for real-time distributed computing. At the top level the biggest fundamental research challenge is to enable high-level high-precision real-time distributed software design and programming accompanied by cost-effective guaranteeing of acceptable response times. This ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IPSec-based delegation protocol and its application

    Publication Year: 2004, Page(s):74 - 79
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (247 KB) | HTML iconHTML

    In this paper, we present a key-management protocol for delegated trust between the user and a set of entities. The protocol is based on IPSec architecture. We draw a mapping from SPI in IPSec architecture to users requesting a service spread across multiple hosts potentially in different administrative domains. We also outline the application and implementation of the protocol. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.