By Topic

Distributed Systems Online, IEEE

Issue 5 • Date 2004

Filter Results

Displaying Results 1 - 5 of 5
  • Optimized management of large-scale data sets stored on tertiary storage systems

    Publication Year: 2004
    Cited by:  Papers (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (256 KB) |  | HTML iconHTML  

    We focus on extending RasDaMan's multidimensional query language using a new concept called object framing. With this extension, users no longer are restricted to performing range queries in the shape of multidimensional hypercubes. It can be able to formulate range queries by indicating complex frames. Thus, object framing represents a generalization of geometric operations. A new system, optimized toward high-performance computing, extends the RasDaMan (Raster Data Management) database management system to allow flexible management of multidimensional spatiotemporal data and to reduce tertiary storage access time. View full abstract»

    Open Access
  • On the complexity of simple distributed systems

    Publication Year: 2004
    Cited by:  Papers (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (160 KB) |  | HTML iconHTML  

    Computer systems that consist of millions of nodes, span the entire Internet, change continuously, and are managed by many different people and organizations. These types of systems have a natural habit of exhibiting exceedingly complex behavior, yet keeping their design simple is crucial. Various research groups started concentrating on computer systems that qualify as self-managing, self-organizing, self-healing, and so forth. Perhaps the most intriguing aspect of these self- systems is that they're designed to exhibit behavior. This behavior is often called complex. View full abstract»

    Open Access
  • Digital postmark helps fight spam, virus attacks

    Publication Year: 2004
    Cited by:  Papers (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (160 KB) |  | HTML iconHTML  

    Researchers at Penn State have developed a method to trace Internet messages' regions of origin. By marking only the messages' region, not the specific source site, the technique alleviates some privacy concerns while enable to trace the origins of spam, virus attacks, or illegally copyrighted materials. Any tracing process immediately raises privacy concerns. However, because the digital postmark doesn't identify individuals, it identifies only region. View full abstract»

    Open Access
  • Artificial Intelligence Profits from Biological Lessons

    Publication Year: 2004 , Page(s): 5
    Save to Project icon | Request Permissions | PDF file iconPDF (176 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • A Good Wireless Technologies Reference

    Publication Year: 2004 , Page(s): 6
    Save to Project icon | Request Permissions | PDF file iconPDF (160 KB) |  | HTML iconHTML  
    Freely Available from IEEE

Aims & Scope

IEEE DS Online provides constantly updated, expert-moderated material in such areas as cluster computing, grid computing, security, and middleware.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Jean Bacon
Univ. of Cambridge
Computer Laboratory