By Topic

Distributed Systems Online, IEEE

Issue 7 • Date July 2005

Filter Results

Displaying Results 1 - 5 of 5
  • NeCoMan: middleware for safe distributed-service adaptation in programmable networks

    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (384 KB)  

    NeCoMan middleware customizes dynamic adaptation of point-to-point-based network services in programmable networks, taking into account the properties of the network services involved as well as the reconfiguration semantics. This article focuses on safe runtime adaptation of point-to-point-based network services in programmable networks. Many network services such as compression, fragmentation, reliability, and encryption conform to a point-to-point-based distributed-service model. This model represents a pair of tightly coupled components (not necessarily situated on neighboring nodes) that must cooperate to offer a distributed service. To prevent the runtime addition, replacement, or removal of these network services from jeopardizing a programmable network's correct functioning, the network programmer must coordinate the adaptation of the protocol stacks accommodating the service components. View full abstract»

    Open Access
  • Computational sociology for systems "in the wild": the case of BitTorrent

    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (176 KB)  

    An approach, often adopted in the multiagent-systems community, is to start from scratch, designing agents and platforms with provable properties using specialized logics and/or sophisticated simulation models. However, this approach is particularly difficult when dealing with open systems containing adaptive agents. This is because the designer can't be sure how other agents will behave in future states of the system. Worse, much of the desirable behavior of the system as a whole, such as high levels of altruism or cooperation, often result from emergent properties that are little understood and not easily reducible to individual behaviors. However, researchers are making progress with this approach. View full abstract»

    Open Access
  • Who-and where-are the new media gatekeepers?

    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (144 KB)  

    The questions surrounding who will ensure that online information remains accessible and authoritative have received much attention. Concerns range from European unease that a new book digitization partnership might result in an American-skewed repository of digital books, to apprehension over the Chinese government's near-ubiquitous control of its country's search engines and Web sites. This debate over ensuring freedom of access and accuracy of information - and who will assume the role of gatekeeper - has raised old problems in new technological contexts. View full abstract»

    Open Access
  • EU-funded consortium looks beyond 3G

    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (136 KB)  

    A project to facilitate European and international collaboration regarding future wireless systems research has released a new report on user expectations and requirements in developing countries. The project, called MOCCA (Mobile Cooperation and Coordination Action), established a special "think tank" committee of representatives from developing countries in South America and Africa as well as India to develop the report. View full abstract»

    Open Access
  • The pros and cons of cyberspying

    Save to Project icon | Request Permissions | PDF file iconPDF (160 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE DS Online provides constantly updated, expert-moderated material in such areas as cluster computing, grid computing, security, and middleware.

Full Aims & Scope

Meet Our Editors

Jean Bacon
Univ. of Cambridge
Computer Laboratory