Proceedings - International Conference on Distributed Computing Systems

SCOPUS (1982,1984,1986-2024)

  1063-6927

 

  Mỹ

 

Cơ quản chủ quản:  Institute of Electrical and Electronics Engineers Inc.

Lĩnh vực:
Computer Networks and CommunicationsSoftwareHardware and Architecture

Phân tích ảnh hưởng

Các bài báo tiêu biểu

Reclaiming space from duplicate files in a serverless distributed file system
- Trang 617-624
J.R. Douceur, A. Adya, W.J. Bolosky, P. Simon, M. Theimer
The Farsite distributed file system provides availability by replicating each file onto multiple desktop computers. Since this replication consumes significant storage space, it is important to reclaim used space where possible. Measurement of over 500 desktop file systems shows that nearly half of all consumed space is occupied by duplicate files. We present a mechanism to reclaim space from this... hiện toàn bộ
#File systems #Cryptography #Extraterrestrial measurements #Databases #Large-scale systems #File servers #Availability #Fault diagnosis #Secure storage #Distributed computing
Fast Collect in the absence of contention
- Trang 537-543
B. Englert, E. Gafni
We present a generic module, called Fast Collect. Fast Collect is an implementation of single-writer multi-reader (SWMR) shared-memory in an asynchronous system in which a processor updates its cell and then reads in any order all the other cells. Our simple implementation of Fast Collect uses some multiwriter multi-reader (MWMR) variables and one local Boolean per processor, such that eventually,... hiện toàn bộ
#Concurrent computing #Costs #Software algorithms #Adaptive algorithm #Chromium #Distributed algorithms #Computer bugs #Mathematics #Computer science #Steady-state
Partial database replication using epidemic communication
- Trang 485-493
J. Holliday, D. Agrawal, A. El Abbadi
Data replication in distributed databases has been investigated extensively with the hope that it will improve performance, reliability, and availability. However the growth of the Internet has shown us that current replica management do not work well when the replicas are connected by an unreliable network, subject to congestion and dynamic topology changes. In this paper we present a replica upd... hiện toàn bộ
#Distributed databases #Transaction databases #Protocols #Network topology #Network servers #Distributed computing #Computer science #Availability #IP networks #Joining processes
Author index
- Trang 566-568 - 2002
The author index contains an entry for each author and coauthor included in the proceedings record.
Improving search in peer-to-peer networks
- Trang 5-14
B. Yang, H. Garcia-Molina
Peer-to-peer systems have emerged as a popular way to share huge volumes of data. The usability of these systems depends on effective techniques to find and retrieve data; however current techniques used in existing P2P systems are often very inefficient. We present three techniques for efficient search in P2P systems. We present the design of these techniques, and then evaluate them using a combi... hiện toàn bộ
#Intelligent networks #Peer to peer computing #Usability #Information retrieval #Computer science #Multimedia systems #Costs #Bandwidth #Fault tolerant systems #Network topology
Dynamic behaviour of the distributed tree quorum algorithm
- Trang 517-524
N. Kafri, J. Janecek
Mechanisms that ensure mutual access, replication and resilience to failures in large distributed systems can be based on quorum consensus. Effectiveness and scalability of the method selected are crucial. The aim of this paper is to present a message/time cost analysis of a distributed algorithm based on the tree quorum, which needs no global information, and has message complexity independent of... hiện toàn bộ
#Costs #Scalability #Distributed algorithms #Delay #Computer science #Resilience #Information analysis #Algorithm design and analysis #Middleware #Availability
RICA: a receiver-initiated approach for channel-adaptive on-demand routing in ad hoc mobile computing networks
- Trang 84-91
Xiao-Hui Lin, Yu-Kwong Kwok, V.K.N. Lau
To support truly peer-to-peer applications in ad hoc wireless mobile computing networks, a judicious and efficient ad hoc routing protocol is needed. Much research has been done on designing ad hoc routing protocols and some well known protocols are also being implemented in practical situations. However, one major drawback in existing state-of-the-art protocols, such as the AODV routing protocol,... hiện toàn bộ
#Mobile computing #Computer networks #Routing protocols #Peer to peer computing #Throughput #Wireless application protocol #Channel coding #Modulation coding #Protection #Delay
ControlWare: a middleware architecture for feedback control of software performance
- Trang 301-310
Ronghua Zhang, Chenyang Lu, T.F. Abdelzaher, J.A. Stankovic
Attainment of software performance assurances in open, largely unpredictable environments has recently become an important focus for real-time research. Unlike closed embedded systems, many contemporary distributed real-time applications operate in environments where offered load and available resources suffer considerable random fluctuations, thereby complicating the performance assurance problem... hiện toàn bộ
#Middleware #Computer architecture #Feedback control #Software performance #Embedded system #Real time systems #Application software #Fluctuations #Control system analysis #Performance analysis
From total order to database replication
- Trang 494-503
Y. Amir, C. Tutu
This paper presents in detail an efficient and provably correct algorithm for database replication over partitionable networks. Our algorithm avoids the need for end-to-end acknowledgments for each action while supporting network partitions and merges and allowing dynamic instantiation of new replicas. One round of end-to-end acknowledgments is required only upon a membership change event such as ... hiện toàn bộ
#Partitioning algorithms #Transaction databases #Engines #Computer science #Availability #Computer crashes #Throughput #Delay #Distributed computing #Prototypes
Migratory TCP: connection migration for service continuity in the Internet
- Trang 469-470
F. Sultan, K. Srinivasan, D. Iyer, L. Iftode
Today's Internet services are commonly built over TCP, the standard Internet connection-oriented reliable transport protocol. The endpoint naming scheme of TCP, based on network layer (IP) addresses, creates an implicit binding between a service and the IP address of a server providing it, throughout the lifetime of a client connection. This makes a TCP client prone to all adverse conditions that ... hiện toàn bộ
#Web and internet services #Network servers #Web server #TCPIP #IP networks #Transport protocols #Computer crime #Stability #Availability #Communication system traffic control