Routing through the mist: privacy preserving communication in ubiquitous computing environments - Trang 74-83
J. Al-Muhtadi, R. Campbell, A. Kapadia, M.D. Mickunas, Seung Yi
Ubiquitous computing is poised to revolutionize the way we compute and interact
with each other. However, unless privacy concerns are taken into account early
in the design process, we will end up creating a very effective distributed
surveillance system, which would be a dream come true for electronic stalkers
and "big brothers". We present a protocol, which preserves the privacy of users
and kee... hiện toàn bộ
#Routing #Privacy #Ubiquitous computing #Pervasive computing #Physics computing #Computer science #Distributed computing #Intelligent sensors #Access protocols #Process design
Process migration: a generalized approach using a virtualizing operating system - Trang 385-392
T. Boyd, P. Dasgupta
Process migration has been used to perform specialized tasks, such as load
sharing and checkpoint/restarting long running applications. Implementation
typically consists of modifications to existing applications and the creation of
specialized support systems, which limit the applicability of the methodology.
Off the shelf applications have not benefited from process migration
technologies, mainly... hiện toàn bộ
#Operating systems #Application software #Application virtualization #Libraries #Distributed computing #Computer science #Checkpointing #Kernel #Concurrent computing #Communities
A self-stabilizing protocol for pipelined PIF in tree networks - Trang 181-190
D. Kondou, H. Masuda, T. Masuzawa
Self-stabilization is a promising paradigm for achieving fault-tolerance of
distributed systems. A self-stabilizing protocol can converge to its intended
behavior even when it starts from any system configuration, and, thus, can
tolerate any type and any number of transient faults. The PIF (propagation of
information with feedback) scheme in a tree network allows the root process to
broadcast its ... hiện toàn bộ
#Protocols #Intelligent networks #Pipeline processing #Broadcasting #Throughput #Fault tolerant systems #Feedback #Binary trees #Distributed computing #Convergence
Non-blocking transactional mobile agent execution - Trang 443-444
S. Pleisch, A. Schiper
Mobile agents are computer programs that act autonomously on behalf of a user
and travel through a network of heterogeneous machines. To enable mobile agent
technology for e-business, transaction support needs to be provided, in
particular execution atomicity. Execution atomicity ensures that either all
operations of the agent succeed, or none at all, and needs to be ensured also in
the face of in... hiện toàn bộ
#Mobile agents #Computer crashes #Laboratories #Books #Computer networks #Distributed computing #Throughput #Logic
Query optimization to meet performance targets for wide area applications - Trang 271-279
V. Zadorozhny, L. Raschid
Recent technology advances have enabled mediated query processing with Internet
accessible WebSources. A characteristic of WebSources is that their access costs
exhibit transient behavior These costs depend on the network and server
workloads, which are often affected by, the time of day,, day, etc. Given
transient behavior, an appropriate performance target (PT) for a noisy,
environment will corr... hiện toàn bộ
#Query processing #Delay #Network servers #Cost function #Internet #Educational institutions #Web server #Working environment noise #Network topology #Telegraphy
RICA: a receiver-initiated approach for channel-adaptive on-demand routing in ad hoc mobile computing networks - Trang 84-91
Xiao-Hui Lin, Yu-Kwong Kwok, V.K.N. Lau
To support truly peer-to-peer applications in ad hoc wireless mobile computing
networks, a judicious and efficient ad hoc routing protocol is needed. Much
research has been done on designing ad hoc routing protocols and some well known
protocols are also being implemented in practical situations. However, one major
drawback in existing state-of-the-art protocols, such as the AODV routing
protocol,... hiện toàn bộ
#Mobile computing #Computer networks #Routing protocols #Peer to peer computing #Throughput #Wireless application protocol #Channel coding #Modulation coding #Protection #Delay
Overlook: scalable name service on an overlay network - Trang 52-61
M. Theimer, M.B. Jones
This paper indicates that a scalable fault-tolerant name service can be provided
utilizing an overlay network and that such a name service can scale along a
number of dimensions: it can be sized to support a large number of clients, it
can allow large numbers of concurrent lookups on the same name or sets of names,
and it can provide name lookup latencies measured in seconds. Furthermore, it
can e... hiện toàn bộ
#Peer to peer computing #Routing #Web and internet services #Scalability #Adaptive systems #Fault tolerant systems #Delay #Size measurement #Mechanical factors #Bandwidth
Anthill: a framework for the development of agent-based peer-to-peer systems - Trang 15-22
O. Babaoglu, H. Meling, A. Montresor
Recent peer-to-peer (P2P) systems are characterized by decentralized control,
large scale and extreme dynamism of their operating environment. As such, they
can be seen as instances of complex adaptive systems (CAS) typically found in
biological and social sciences. We describe Anthill, a framework to support the
design, implementation and evaluation of P2P applications based on ideas such as
mult... hiện toàn bộ
#Peer to peer computing #Content addressable storage #Distributed computing #Grid computing #Adaptive systems #Centralized control #Distributed control #Large-scale systems #Biology #Resource management
Cost-effective switching fabrics with distributed control for scalable routers - Trang 65-73
Nian-Feng Tzeng, M. Mandviwalla
This paper deals with scalable switching fabrics for high-performance routers
with large numbers of ports for connecting external links operating at various
speeds to arrive at aggregate rates up to multi-terabits per second. The
proposed switching fabrics employ no centralized scheduling and consist of small
routing units (RUs), which are interconnected by multistage-based connecting
components (... hiện toàn bộ
#Fabrics #Distributed control #Routing #Hardware #Joining processes #Aggregates #Scalability #Packet switching #Asynchronous transfer mode #Distributed computing
SYN-dog: sniffing SYN flooding sources - Trang 421-428
Haining Wang, Danlu Zhang, K.G. Shin
Presents a simple and robust mechanism called SYN-dog to sniff SYN flooding
sources. We install SYN-dog as a software agent at leaf routers that connect
stub networks to the Internet. The statelessness and low computation overhead of
SYN-dog make itself immune to any flooding attacks. The core mechanism of
SYN-dog is based on the protocol behavior of TCP SYN-SYN/ACK pairs, and is an
instance of th... hiện toàn bộ
#Floods #Computer crime #Robustness #Laboratories #Software agents #IP networks #Access protocols #Availability #TCPIP #Internet