Scheduling real-time data items in multiple channels and multiple receivers environments - Trang 455-456
Guanling Lee, Yi-Ning Pan, A.L.P. Chen
The problem of transmitting data items with timing constraint in the multiple
broadcast channels where clients equipped with multiple receivers is studied. In
our approach, the data items are divided into two sets, the broadcast data set
and the on-demand data set. The data items in the broadcast data set is
periodically broadcast on the broadcast channels while the data items in the
on-demand dat... hiện toàn bộ
#Broadcasting #Databases #Timing #Bandwidth #Processor scheduling #Scheduling algorithm #Computer science #Roads #Fault tolerance #Information retrieval
dRBAC: distributed role-based access control for dynamic coalition environments - Trang 411-420
E. Freudenthal, T. Pesin, L. Port, E. Keenan, V. Karamcheti
distributed role-based access control (dRBAC) is a scalable, decentralized
trust-management and access-control mechanism for systems that span multiple
administrative domains. dRBAC utilizes PKI identities to define trust domains,
roles to define controlled activities, and role delegation across domains to
represent permissions to these activities. The mapping of controlled actions to
roles enable... hiện toàn bộ
#Access control #Permission #Authorization #Control systems #Protection #Computer science #IP networks #Web and internet services #Computerized monitoring #Feeds
Distributed bandwidth broker for QoS multicast traffic - Trang 319-326
E. Pagani, G.P. Rossi
The differentiated services model is the emerging standard to provide
Quality-of-Service (QoS) support for multimedia applications in the future
Internet. This model involves bandwidth broker agents performing admission
control and network configuration functionalities. A great deal of effort has
been recently devoted to investigate viable approaches to the implementation of
mechanisms that automa... hiện toàn bộ
#Bandwidth #Admission control #Multicast protocols #Traffic control #Phase measurement #Quality of service #Length measurement #Web and internet services #Performance evaluation #Communication system traffic control
Routing indices for peer-to-peer systems - Trang 23-32
A. Crespo, H. Garcia-Molina
Finding information in a peer-to-peer system currently requires either a costly
and vulnerable central index, or flooding the network with queries. We introduce
the concept of routing indices (RIs), which allow nodes to forward queries to
neighbors that are more likely to have answers. If a node cannot answer a query,
it forwards the query to a subset of its neighbors, based on its local RI,
rathe... hiện toàn bộ
#Routing #Peer to peer computing #System performance #Distributed computing #Robustness #Costs #Web search #Search engines #Computer hacking
Process migration: a generalized approach using a virtualizing operating system - Trang 385-392
T. Boyd, P. Dasgupta
Process migration has been used to perform specialized tasks, such as load
sharing and checkpoint/restarting long running applications. Implementation
typically consists of modifications to existing applications and the creation of
specialized support systems, which limit the applicability of the methodology.
Off the shelf applications have not benefited from process migration
technologies, mainly... hiện toàn bộ
#Operating systems #Application software #Application virtualization #Libraries #Distributed computing #Computer science #Checkpointing #Kernel #Concurrent computing #Communities
Agent chaining: an approach to dynamic mobile agent planning - Trang 579-586
Jin-Wook Baek, Jae-Heung Yeo, Heon-Young Yeom
The distributed agent concept has become a new computing paradigm in Internet
distributed computing, including mobile computing. Mobile agent planning is one
of the most important techniques for completing a given task efficiently. The
static planning technique may not be the best approach in real network
environments. For better performance, it is necessary that mobile agents be more
sensitive to... hiện toàn bộ
#Mobile agents #Distributed computing #Telecommunication traffic #Internet #Mobile computing #Information retrieval #Distributed databases #Computer science #Fluctuations #Heuristic algorithms
Dynamic data broadcasting with traffic awareness - Trang 112-119
Chih-Lin Hu, Ming-Syan Chen
Data dissemination has significantly served as a scalable data delivery
mechanism in wireless networks. However, even though the broadcast traffic has
the nature of dynamic changes, most previous research efforts were elaborated
upon the premise of static workloads and access patterns without having proper
traffic awareness. In this paper, we address the existence of client impatience
and accordin... hiện toàn bộ
#Broadcasting #Telecommunication traffic #Feedback #Frequency estimation #Bandwidth #Wireless networks #Degradation #File servers #Energy consumption #Electronic mail
Adaptive and virtual reconfigurations for effective dynamic job scheduling in cluster systems - Trang 35-42
Songqing Chen, Li Xiao, Xiaodong Zhang
In a cluster system with dynamic load sharing support, a job submission or
migration to a workstation is determined by the availability of CPU and memory
resources of the workstation at the time. In such a system, a small number of
running jobs with unexpectedly large memory allocation requirements may
significantly increase the queuing delay times of the rest of jobs with normal
memory requiremen... hiện toàn bộ
#Dynamic scheduling #Workstations #Optimal scheduling #Processor scheduling #Delay #Switches #Job design #Computer science #Educational institutions #Availability
Design of a policy-driven middleware for secure distributed collaboration - Trang 393-400
A.R. Tripathi, T. Ahmed, R. Kumar, S. Jaman
We present the execution model of policy-driven middleware for building secure
distributed collaboration systems from their high level specifications. Our
specification model supports nested collaboration activities, and uses
role-based security policies and event count based coordination specification.
From the specifications of a collaboration environment, appropriate policy
modules are derived ... hiện toàn bộ
#Middleware #Collaborative work #Protocols #National security #Real time systems #Online Communities/Technical Collaboration #Collaborative software #Runtime environment #Computer science #Buildings
From total order to database replication - Trang 494-503
Y. Amir, C. Tutu
This paper presents in detail an efficient and provably correct algorithm for
database replication over partitionable networks. Our algorithm avoids the need
for end-to-end acknowledgments for each action while supporting network
partitions and merges and allowing dynamic instantiation of new replicas. One
round of end-to-end acknowledgments is required only upon a membership change
event such as ... hiện toàn bộ
#Partitioning algorithms #Transaction databases #Engines #Computer science #Availability #Computer crashes #Throughput #Delay #Distributed computing #Prototypes