Proceedings 7th IEEE Workshop on Future Trends of Distributed Computing Systems

20-22 Dec. 1999

Filter Results

Displaying Results 1 - 25 of 47
  • Proceedings 7th IEEE Workshop on Future Trends of Distributed Computing Systems

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (234 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1999, Page(s):295 - 296
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • CORBA fault-tolerance: why it does not add up

    Publication Year: 1999, Page(s):229 - 234
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    Many industries are taking CORBA seriously and envisage the development of critical distributed applications following this standard. We examine the utility of using the CORBA transaction and replication services to provide end-to-end reliability and high-availability in three-tier applications. We document issues in using the individual services. Perhaps more importantly, we point out difficultie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent platform and related issues

    Publication Year: 1999, Page(s):219 - 225
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    Implementing an agent platform is based on the supporting language and underline OO library. Currently, the most popular Internet language is JAVA and the library for Internet related software is JDK1.2. We designed and implemented an agent platform based on JAVA and JDK1.2. In this paper we present our design architecture of agent platform with UML and discuss a series of problems related to agen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security issues in mobile agent technology

    Publication Year: 1999, Page(s):3 - 8
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    The Mobile Agent (MA) paradigm seems to be a promising technology for developing applications in open, distributed and heterogeneous environments, such us the Internet. Many application areas, such as electronic commerce, mobile computing, network management and information retrieval can benefit from the application of the MA technology. The exploitation of mobile agents offer several peculiar adv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Next generation middleware: requirements, architecture, and prototypes

    Publication Year: 1999, Page(s):60 - 65
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    Middleware technologies such as CORBA or Java RMI have proved their suitability for “standard” client-server applications. However, challenges from existing and new types of applications, including support for multimedia real-time requirements and mobility seems to indicate the need for defining a new architecture for open distributed systems. The new architecture should be designed fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Net-centric computing research and curriculum

    Publication Year: 1999, Page(s): 287
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simulation model of task cluster scheduling in distributed systems

    Publication Year: 1999, Page(s):163 - 168
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    This paper addresses issues of task clustering-the coalition of several fine grain tasks into single coarser grain tasks called task clusters-and task cluster scheduling on distributed processors. The performance of various scheduling schemes is studied and compared for a variety of workloads. Simulation results indicate that the scheduling policy that gives priority to the cluster with the smalle... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent-based framework for nomadic computing

    Publication Year: 1999, Page(s):213 - 218
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    Nomadic computing can greatly benefit from the integration of personal mobility and program mobility technologies. This paper describes how to enhance a mobile agents platform with a set of facilities that provide mobile users with global access to agent-based applications, regardless of user location and terminal capabilities. We exploited the idea of making it possible for users to keep in touch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptable object request brokers for information survivability of evolvable real-time command and control systems

    Publication Year: 1999, Page(s):242 - 245
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    This paper describes an approach to building adaptable and evolvable real-time command and control (C2) systems. In particular, it presents an overview of the Evolvable and Adaptable Real-Time Distributed Object Management projects carried out at the MITRE Corporation and then discusses information survivability aspects for such systems. In particular issues on integrating security, real-time and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Curricula 2001: a brief summary

    Publication Year: 1999, Page(s):290 - 291
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    Model curricula are important resources for curricula planning and design. A joint task force between IEEE-CS and ACM was formed to undertake the responsibility of revising the 1991 model curricula. The effort is now underway, and the result will be known as Curricula 2001 View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Group communication in real-time computing systems: issues and directions

    Publication Year: 1999, Page(s):252 - 258
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    Group communication in real-time computing systems has been a subject of research for almost two decades but it is not yet a mature technological field. The purpose of this paper is to review the main goals of developing group communication protocols and establish a practical framework of protocols toward meeting the goals. As a part of this, an attempt is made to clarify the relationship between ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model-based approach to service creation

    Publication Year: 1999, Page(s):102 - 110
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB)

    This paper presents a model-based approach to support service creation. In this approach, services are assumed to be created from (available) software components. The creation process may involve multiple design steps in which the requested service is repeatedly decomposed into more detailed functional parts, until these parts can be mapped onto software components. A modelling language is used to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavioural specification using XML

    Publication Year: 1999, Page(s):53 - 59
    Cited by:  Papers (2)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB)

    Active networks are an example of a wide area distributed system. The objects in this system require platform independent machine-readable, flexible behaviour specifications. Current mechanisms in CORBA, DCOM and similar technologies are not adequate. We demonstrate for the first time how specifications with the required properties can be written in XML, the new language of the WWW View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing a class of concatenated omega networks

    Publication Year: 1999, Page(s):29 - 35
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    Benes networks are known to be nonblocking rearrangeable networks which can realize arbitrary permutations. Topological equivalence extends the nonblocking rearrangeability to a class of multistage interconnection networks (MIN), which has the same topology as Benes networks. There is another class of well-known multistage interconnection networks, which is not yet known as either nonblocking rear... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic architectures and architectural styles for distributed programs

    Publication Year: 1999, Page(s):89 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    In this paper we introduce JWire, a new component model for Java. JWire is designed for building dynamic architectures of components that use an open set of binding and communication protocols, and supports the use of architectural styles in assembling components. Using JWire, a system is composed of “wireable” components that each encapsulate state and behaviour behind an interface de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous information fading by mobile agents for improving user's access time and fault tolerance

    Publication Year: 1999, Page(s):279 - 283
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    Information Services on the Internet have been rapidly changing. New information services have been added, modified, and diversified, while legacy services have been abandoned. Users' requirements for the services have been changed day-by-day and person-by-person. It is becoming very difficult to find required information services in the Internet with extremely huge information base, especially fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Beyond the Whiteboard: synchronous collaboration in shared object spaces

    Publication Year: 1999, Page(s):131 - 136
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    Synchronous collaboration via a network of distributed workstations requires concurrency awareness within a relaxed WYSIWIS model (What You See is What I See). Many applications let users navigate within highly structured object spaces, such as documents, multimedia courses, graphs, or nested tables, which can be distributed asynchronously. To support their manipulation through distributed teams, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting real world security models in Java

    Publication Year: 1999, Page(s):155 - 159
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    The Java Security Model has undergone considerable evolution since its initial implementation. However, due to its historical focus on securing machines against attack from hostile Java applications, it has neglected support for securing “Real World” applications. We suggest that in order to support “Real World” security the ability to insert checks into compiled code in a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location transparent routing in mobile agent systems merging name lookups with routing

    Publication Year: 1999, Page(s):207 - 212
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    Telecommunication systems these days are moving from static wide area component structures towards highly dynamic mobile infrastructures. This shift requires new algorithms to interconnect these mobile entities/components and route messages between them. In this paper we describe a naming and routing algorithm which can be used in fine-grained mobile component systems. As a case we use a homogenou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of a decentralised virtual service redirector for Internet applications

    Publication Year: 1999, Page(s):235 - 241
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    An ongoing project of the Highly Dependable Systems Research Programme (PHDS) at the University of the Witwatersrand is the development of a dependable distributed system and its application in supporting Internet services. The current research related to this project includes the design, specification, verification and implementation of a virtual service redirector for critical internet applicati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ephemeral Java source code

    Publication Year: 1999, Page(s):9 - 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    In an object oriented, distributed environment, program maintenance, which has never been the most predictable task, becomes even more uncertain. Java's dynamic loading mechanism was developed to tackle some of the uncertainties. In doing so, it shifts the focus from the state of the sources to that of the binaries. This paper discusses some of the implications of that move View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using WAP as the enabling technology for CORBA in mobile and wireless environments

    Publication Year: 1999, Page(s):69 - 74
    Cited by:  Papers (3)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    CORBA is currently the most popular middleware platform. Due to the progress and acceptance of mobile communications, it is inevitable to offer CORBA services for mobile terminals, especially over a wireless link. The Object Management Group, the standardization body for CORBA, already requested proposals for extending CORBA in the wireless environment, leading to several submissions. However, the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some perspectives on network centric distance learning and software engineering

    Publication Year: 1999, Page(s):288 - 289
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    Network-centric computing involves fundamental changes at many levels that amount to a substantial paradigm shift in computing. Creative approaches and competent strategies to manage the network-centric environment at both the instructional design and user levels need to be established and understood in order to ensure a degree of quality comparable to what we had before. A few perspectives on som... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PODC: Paradigm-oriented distributed computing

    Publication Year: 1999, Page(s):169 - 175
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    We describe an environment for distributed computing that uses the concept of well-known paradigms. The main advantage of paradigm-oriented distributed computing is that the user only needs to specify application-specific sequential code, while the underlying infrastructure takes care of the parallelization and distribution. The main features of the proposed approach, called PODC, are the followin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.