Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004.

26-28 May 2004

Filter Results

Displaying Results 1 - 25 of 62
  • Towards a fully distributed P2P Web search engine

    Publication Year: 2004, Page(s):332 - 338
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    Most centralized Web search engines currently find it harder to catch up with the growth in information needs. Here, we present a fully distributed, collaborative peer-to-peer Web search engine named Coopeer. The goal of the work is to complement centralized search engines to provide more humanized and personalized results by utilizing users' collaboration. Towards this goal, three main ideas are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The power of DHT as a logical space

    Publication Year: 2004, Page(s):325 - 331
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    P2P DHT has fast become a rather "classical" research field. The currently popular mindsets are mostly routing-centric, or storage-centric. In this paper, we argue that it maybe more interesting to simply view DHT as a logical space that can dynamically size itself with potentially unlimited amount resources. This is in someway analogous to the virtual memory in any contemporary operating system. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Grid computing in Hong Kong: research and development

    Publication Year: 2004, Page(s):205 - 208
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    Grid is a new exciting arena for re-application of many distributed computing techniques from the past as well as brand new ideas because of new requirements imposed upon by a form of computing that was never possible before. We present the Hong Kong Grid which is a major Grid platform for local institutions to conduct their R and D projects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Random landmarking in mobile, topology-aware peer-to-peer networks

    Publication Year: 2004, Page(s):319 - 324
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (373 KB) | HTML iconHTML

    DHT can locate objects in a peer-to-peer network within an efficient amount of overlay hops. Since an overlay hop is likely to consist of multiple physical hops, the ratio between the number of physical hops induced by the overlay routing process and the number of physical hops on a direct physical path is often significantly lopsided. Recently, some approaches have been suggested to optimize that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Usage model considerations for future distributed computing systems

    Publication Year: 2004, Page(s):10 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    Mass user adoption is often a good indication of a technology's success. We argue that the vision laid out by some distributed computing system (DCS) pioneer that "almost everyone who uses a pencil will use a computer" is still unrealized. We review the past and present DCS usage models and call for explicit attention to the end user's need. In particular, manageability, mobility, security, privac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Grid computing in Taiwan

    Publication Year: 2004, Page(s):201 - 204
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2496 KB) | HTML iconHTML

    Grid computing focuses on aggregating resources (e.g., processor cycles, disk storage and contents) from a large-scale computing environment. It intends to deliver high-performance distributed platforms for computationand/or data-intensive applications. In this paper, we study the enabling techniques for Grid computing for high-performance computing. Our goals are to: (1) understand the design of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an integrated architecture for peer-to-peer and ad hoc overlay network applications

    Publication Year: 2004, Page(s):312 - 318
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    Peer-to-peer (P2P) networks and mobile ad hoc networks (MANET) share some key characteristics: self-organization and decentralization, and both need to solve the same fundamental problem: connectivity. We motivate a study for the convergence of the two overlay network technologies and sketch an evolving architecture towards integrating the two technologies in building overlay network applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fundamental research challenges in real-time distributed computing

    Publication Year: 2004, Page(s):2 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (822 KB) | HTML iconHTML

    The author presents a personal perspective on where research efforts are most urgently needed to advance the fundamental foundation for real-time distributed computing. At the top level the biggest fundamental research challenge is to enable high-level high-precision real-time distributed software design and programming accompanied by cost-effective guaranteeing of acceptable response times. This ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving QoS for peer-to-peer applications through adaptation

    Publication Year: 2004, Page(s):178 - 183
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    The use of peer-to-peer networks has increased dramatically in recent years. As the power of home computers and Internet access speeds increase, we envisage that an increasingly diverse set of applications will seek to make use of the growing pool of resources available around the edge of the network. We suggest that existing peer-to-peer networks are unable to cater for the diverse demands of fut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Container based framework for self-healing software system

    Publication Year: 2004, Page(s):306 - 310
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    Software "self-healing" is an approach to detect improper operations of software applications, transactions and business processes, and then to initiate corrective action without disrupting users. The software engineering literature contains many studies on software error detection and error correction. In this paper, we introduce a "container based self-healing" framework and provide an outline o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Platform-independent dynamic reconfiguration of distributed applications

    Publication Year: 2004, Page(s):286 - 291
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    The aim of dynamic reconfiguration is to allow a system to evolve incrementally from one configuration to another at run-time, without restarting it or taking it offline. In recent years, support for transparent dynamic reconfiguration has been added to middleware platforms, shifting the complexity required to enable dynamic reconfiguration to the supporting infrastructure. These approaches to dyn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GT-P2PRMI: improving middleware performance using peer-to-peer service replication

    Publication Year: 2004, Page(s):172 - 177
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    Peer-to-peer systems have the desirable property that the amount of resources available in the system increase as demand for services increases due to growth of the system. We explore how resources in such systems can be used to support distributed object-based middleware. The remote method invocation abstraction reduces the complexity of distributed programming and its implementation in peer-to-p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards supporting fine-grained access control for Grid resources

    Publication Year: 2004, Page(s):59 - 65
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (887 KB) | HTML iconHTML

    The heterogeneous nature and independent administration of geographically dispersed resources in a Grid demand the need for access control using fine-grained policies. In this paper, we investigate the problem of fine-grained access control in the context of resource allocation in the Grid, as we believe it is the first and key step in developing access control methods specifically tailored for Gr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fuzzy data mining based intrusion detection model

    Publication Year: 2004, Page(s):191 - 197
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    With explosively increasing information, data mining techniques are frequently employed to identify trends in the warehouse that may not be readily apparent. In this paper we apply fuzzy data mining techniques to a security system and build a fuzzy data mining based intrusion detection model. Through normalizing the data set and building a fuzzy similar matrix of the network connections in the dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous decentralized community construction technology to assure quality of services

    Publication Year: 2004, Page(s):299 - 305
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB) | HTML iconHTML

    Recent advances in wireless communication and mobile telecommunications have made mobile commerce possible. In the retail business under the evolving market, the users solicit continuously to utilize the appropriate services based on their preferences and situations. In addition, the service providers insist on seizing the current requirements of the majority of the users in the local service area... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IPSec-based delegation protocol and its application

    Publication Year: 2004, Page(s):74 - 79
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    In this paper, we present a key-management protocol for delegated trust between the user and a set of entities. The protocol is based on IPSec architecture. We draw a mapping from SPI in IPSec architecture to users requesting a service spread across multiple hosts potentially in different administrative domains. We also outline the application and implementation of the protocol. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two stage optimization of job scheduling and assignment in heterogeneous compute farms

    Publication Year: 2004, Page(s):119 - 124
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    Distributed networked computing in a compute farm environment has attracted great attention in recent years. Specialized management system for a compute farm enables heterogeneous distributed resources to be shared in a seamless way between various competing jobs. A key functionality of such system is a scheduler that controls the assignment of jobs to resources. This paper outlines a range of sch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable, structured data placement over P2P storage utilities

    Publication Year: 2004, Page(s):244 - 251
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (633 KB) | HTML iconHTML

    P2P overlays offer a convenient way to host an infrastructure that can scale to the size of the Internet and yet be manageable. Current proposals, however, do not offer support for structuring data, other than assuming a distributed hash table. In reality, both applications and users typically organize data in a structured form. One such popular structure is the tree as employed in a file system, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CNGrid: a test-bed for Grid technologies in China

    Publication Year: 2004, Page(s):135 - 139
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    The rapid expansion of the Internet and ever increasing of critical applications on the Internet are stimulating the research on the new information infrastructure. The Grid, that is supposed to be the new generation information infrastructure, is attracting more and more attention in both academic and industrial communities. A test-bed for Grid technologies, the China National Grid (CNGrid), is c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-aware distributed embedded systems

    Publication Year: 2004, Page(s):102 - 107
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    Distributed embedded sensor networks are now being successfully deployed in environmental monitoring of natural phenomena as well as for applications in commerce and physical security. Distributed architectures have been developed for cooperative detection, scalable data transport, and other capabilities and services. However, the complexity of environmental phenomena has introduced a new set of c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and experimentation of an open distributed platform for synthetic traffic generation

    Publication Year: 2004, Page(s):277 - 283
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    This work presents an open distributed platform for traffic generation that we called distributed Internet traffic generator (D-ITG), capable of producing traffic (network transport and application layer) and of accurately replicating appropriate stochastic processes for both IDT (inter departure time) and PS (packet size) random variables. We implemented two different versions of our distributed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PKUAS: an architecture-based reflective component operating platform

    Publication Year: 2004, Page(s):163 - 169
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (826 KB) | HTML iconHTML

    Reflective middleware is the major approach to improving the adaptability of middleware and its applications. Current researches and practices pay little attention on the usability of reflective middleware. There is also lacking a systematic way to adapt a runtime system via reflective middleware. This paper presents the design and implementation of PKUAS (Peking University Application Server), an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mapping Web services specifications to process ontology: opportunities and limitations

    Publication Year: 2004, Page(s):229 - 235
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1039 KB) | HTML iconHTML

    There are many XML based workflow and process modeling languages like XPDL, BPEL4WS etc. that can be used to define workflow and business processes in the Web services world. However, the use of XML makes the meaning of the processes ambiguous with limited capability to describe the relationships (semantics, schemas or ontologies) with respect to objects. Put into action, it becomes obvious that t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing network monitoring service for Grid computing

    Publication Year: 2004, Page(s):52 - 58
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    Collecting, correlating and extracting network performance information is an important premise for effective Grid applications and services. Based on the intrinsic relationship between the Internet and Grid computing, we extend the network performance monitoring activities in the Internet to the Grid scenario and develop a scalable, interoperable Grid network measurements and monitoring system (GM... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introducing compositionality in Web service descriptions

    Publication Year: 2004, Page(s):14 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    Web services are essentially black box components from a composer's or a mediator's perspective. The behavioural description of any service can be asserted by the composer only through interface predicates exposed by the service provider Normally for proving properties of service compositions, pre/post conditions are found to be sufficient. However these properties are assertions only on the initi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.