Proceedings - International Conference on Distributed Computing Systems

SCOPUS (1982,1984,1986-2024)

  1063-6927

 

  Mỹ

 

Cơ quản chủ quản:  Institute of Electrical and Electronics Engineers Inc.

Lĩnh vực:
Computer Networks and CommunicationsSoftwareHardware and Architecture

Phân tích ảnh hưởng

Các bài báo tiêu biểu

Scheduling real-time data items in multiple channels and multiple receivers environments
- Trang 455-456
Guanling Lee, Yi-Ning Pan, A.L.P. Chen
The problem of transmitting data items with timing constraint in the multiple broadcast channels where clients equipped with multiple receivers is studied. In our approach, the data items are divided into two sets, the broadcast data set and the on-demand data set. The data items in the broadcast data set is periodically broadcast on the broadcast channels while the data items in the on-demand dat... hiện toàn bộ
#Broadcasting #Databases #Timing #Bandwidth #Processor scheduling #Scheduling algorithm #Computer science #Roads #Fault tolerance #Information retrieval
dRBAC: distributed role-based access control for dynamic coalition environments
- Trang 411-420
E. Freudenthal, T. Pesin, L. Port, E. Keenan, V. Karamcheti
distributed role-based access control (dRBAC) is a scalable, decentralized trust-management and access-control mechanism for systems that span multiple administrative domains. dRBAC utilizes PKI identities to define trust domains, roles to define controlled activities, and role delegation across domains to represent permissions to these activities. The mapping of controlled actions to roles enable... hiện toàn bộ
#Access control #Permission #Authorization #Control systems #Protection #Computer science #IP networks #Web and internet services #Computerized monitoring #Feeds
Distributed bandwidth broker for QoS multicast traffic
- Trang 319-326
E. Pagani, G.P. Rossi
The differentiated services model is the emerging standard to provide Quality-of-Service (QoS) support for multimedia applications in the future Internet. This model involves bandwidth broker agents performing admission control and network configuration functionalities. A great deal of effort has been recently devoted to investigate viable approaches to the implementation of mechanisms that automa... hiện toàn bộ
#Bandwidth #Admission control #Multicast protocols #Traffic control #Phase measurement #Quality of service #Length measurement #Web and internet services #Performance evaluation #Communication system traffic control
Routing indices for peer-to-peer systems
- Trang 23-32
A. Crespo, H. Garcia-Molina
Finding information in a peer-to-peer system currently requires either a costly and vulnerable central index, or flooding the network with queries. We introduce the concept of routing indices (RIs), which allow nodes to forward queries to neighbors that are more likely to have answers. If a node cannot answer a query, it forwards the query to a subset of its neighbors, based on its local RI, rathe... hiện toàn bộ
#Routing #Peer to peer computing #System performance #Distributed computing #Robustness #Costs #Web search #Search engines #Computer hacking
Process migration: a generalized approach using a virtualizing operating system
- Trang 385-392
T. Boyd, P. Dasgupta
Process migration has been used to perform specialized tasks, such as load sharing and checkpoint/restarting long running applications. Implementation typically consists of modifications to existing applications and the creation of specialized support systems, which limit the applicability of the methodology. Off the shelf applications have not benefited from process migration technologies, mainly... hiện toàn bộ
#Operating systems #Application software #Application virtualization #Libraries #Distributed computing #Computer science #Checkpointing #Kernel #Concurrent computing #Communities
Agent chaining: an approach to dynamic mobile agent planning
- Trang 579-586
Jin-Wook Baek, Jae-Heung Yeo, Heon-Young Yeom
The distributed agent concept has become a new computing paradigm in Internet distributed computing, including mobile computing. Mobile agent planning is one of the most important techniques for completing a given task efficiently. The static planning technique may not be the best approach in real network environments. For better performance, it is necessary that mobile agents be more sensitive to... hiện toàn bộ
#Mobile agents #Distributed computing #Telecommunication traffic #Internet #Mobile computing #Information retrieval #Distributed databases #Computer science #Fluctuations #Heuristic algorithms
Dynamic data broadcasting with traffic awareness
- Trang 112-119
Chih-Lin Hu, Ming-Syan Chen
Data dissemination has significantly served as a scalable data delivery mechanism in wireless networks. However, even though the broadcast traffic has the nature of dynamic changes, most previous research efforts were elaborated upon the premise of static workloads and access patterns without having proper traffic awareness. In this paper, we address the existence of client impatience and accordin... hiện toàn bộ
#Broadcasting #Telecommunication traffic #Feedback #Frequency estimation #Bandwidth #Wireless networks #Degradation #File servers #Energy consumption #Electronic mail
Adaptive and virtual reconfigurations for effective dynamic job scheduling in cluster systems
- Trang 35-42
Songqing Chen, Li Xiao, Xiaodong Zhang
In a cluster system with dynamic load sharing support, a job submission or migration to a workstation is determined by the availability of CPU and memory resources of the workstation at the time. In such a system, a small number of running jobs with unexpectedly large memory allocation requirements may significantly increase the queuing delay times of the rest of jobs with normal memory requiremen... hiện toàn bộ
#Dynamic scheduling #Workstations #Optimal scheduling #Processor scheduling #Delay #Switches #Job design #Computer science #Educational institutions #Availability
Design of a policy-driven middleware for secure distributed collaboration
- Trang 393-400
A.R. Tripathi, T. Ahmed, R. Kumar, S. Jaman
We present the execution model of policy-driven middleware for building secure distributed collaboration systems from their high level specifications. Our specification model supports nested collaboration activities, and uses role-based security policies and event count based coordination specification. From the specifications of a collaboration environment, appropriate policy modules are derived ... hiện toàn bộ
#Middleware #Collaborative work #Protocols #National security #Real time systems #Online Communities/Technical Collaboration #Collaborative software #Runtime environment #Computer science #Buildings
From total order to database replication
- Trang 494-503
Y. Amir, C. Tutu
This paper presents in detail an efficient and provably correct algorithm for database replication over partitionable networks. Our algorithm avoids the need for end-to-end acknowledgments for each action while supporting network partitions and merges and allowing dynamic instantiation of new replicas. One round of end-to-end acknowledgments is required only upon a membership change event such as ... hiện toàn bộ
#Partitioning algorithms #Transaction databases #Engines #Computer science #Availability #Computer crashes #Throughput #Delay #Distributed computing #Prototypes