Proceedings - International Conference on Distributed Computing Systems

SCOPUS (1982,1984,1986-2024)

  1063-6927

 

  Mỹ

 

Cơ quản chủ quản:  Institute of Electrical and Electronics Engineers Inc.

Lĩnh vực:
Computer Networks and CommunicationsSoftwareHardware and Architecture

Phân tích ảnh hưởng

Các bài báo tiêu biểu

Routing through the mist: privacy preserving communication in ubiquitous computing environments
- Trang 74-83
J. Al-Muhtadi, R. Campbell, A. Kapadia, M.D. Mickunas, Seung Yi
Ubiquitous computing is poised to revolutionize the way we compute and interact with each other. However, unless privacy concerns are taken into account early in the design process, we will end up creating a very effective distributed surveillance system, which would be a dream come true for electronic stalkers and "big brothers". We present a protocol, which preserves the privacy of users and kee... hiện toàn bộ
#Routing #Privacy #Ubiquitous computing #Pervasive computing #Physics computing #Computer science #Distributed computing #Intelligent sensors #Access protocols #Process design
Process migration: a generalized approach using a virtualizing operating system
- Trang 385-392
T. Boyd, P. Dasgupta
Process migration has been used to perform specialized tasks, such as load sharing and checkpoint/restarting long running applications. Implementation typically consists of modifications to existing applications and the creation of specialized support systems, which limit the applicability of the methodology. Off the shelf applications have not benefited from process migration technologies, mainly... hiện toàn bộ
#Operating systems #Application software #Application virtualization #Libraries #Distributed computing #Computer science #Checkpointing #Kernel #Concurrent computing #Communities
A self-stabilizing protocol for pipelined PIF in tree networks
- Trang 181-190
D. Kondou, H. Masuda, T. Masuzawa
Self-stabilization is a promising paradigm for achieving fault-tolerance of distributed systems. A self-stabilizing protocol can converge to its intended behavior even when it starts from any system configuration, and, thus, can tolerate any type and any number of transient faults. The PIF (propagation of information with feedback) scheme in a tree network allows the root process to broadcast its ... hiện toàn bộ
#Protocols #Intelligent networks #Pipeline processing #Broadcasting #Throughput #Fault tolerant systems #Feedback #Binary trees #Distributed computing #Convergence
Non-blocking transactional mobile agent execution
- Trang 443-444
S. Pleisch, A. Schiper
Mobile agents are computer programs that act autonomously on behalf of a user and travel through a network of heterogeneous machines. To enable mobile agent technology for e-business, transaction support needs to be provided, in particular execution atomicity. Execution atomicity ensures that either all operations of the agent succeed, or none at all, and needs to be ensured also in the face of in... hiện toàn bộ
#Mobile agents #Computer crashes #Laboratories #Books #Computer networks #Distributed computing #Throughput #Logic
Query optimization to meet performance targets for wide area applications
- Trang 271-279
V. Zadorozhny, L. Raschid
Recent technology advances have enabled mediated query processing with Internet accessible WebSources. A characteristic of WebSources is that their access costs exhibit transient behavior These costs depend on the network and server workloads, which are often affected by, the time of day,, day, etc. Given transient behavior, an appropriate performance target (PT) for a noisy, environment will corr... hiện toàn bộ
#Query processing #Delay #Network servers #Cost function #Internet #Educational institutions #Web server #Working environment noise #Network topology #Telegraphy
RICA: a receiver-initiated approach for channel-adaptive on-demand routing in ad hoc mobile computing networks
- Trang 84-91
Xiao-Hui Lin, Yu-Kwong Kwok, V.K.N. Lau
To support truly peer-to-peer applications in ad hoc wireless mobile computing networks, a judicious and efficient ad hoc routing protocol is needed. Much research has been done on designing ad hoc routing protocols and some well known protocols are also being implemented in practical situations. However, one major drawback in existing state-of-the-art protocols, such as the AODV routing protocol,... hiện toàn bộ
#Mobile computing #Computer networks #Routing protocols #Peer to peer computing #Throughput #Wireless application protocol #Channel coding #Modulation coding #Protection #Delay
Overlook: scalable name service on an overlay network
- Trang 52-61
M. Theimer, M.B. Jones
This paper indicates that a scalable fault-tolerant name service can be provided utilizing an overlay network and that such a name service can scale along a number of dimensions: it can be sized to support a large number of clients, it can allow large numbers of concurrent lookups on the same name or sets of names, and it can provide name lookup latencies measured in seconds. Furthermore, it can e... hiện toàn bộ
#Peer to peer computing #Routing #Web and internet services #Scalability #Adaptive systems #Fault tolerant systems #Delay #Size measurement #Mechanical factors #Bandwidth
Anthill: a framework for the development of agent-based peer-to-peer systems
- Trang 15-22
O. Babaoglu, H. Meling, A. Montresor
Recent peer-to-peer (P2P) systems are characterized by decentralized control, large scale and extreme dynamism of their operating environment. As such, they can be seen as instances of complex adaptive systems (CAS) typically found in biological and social sciences. We describe Anthill, a framework to support the design, implementation and evaluation of P2P applications based on ideas such as mult... hiện toàn bộ
#Peer to peer computing #Content addressable storage #Distributed computing #Grid computing #Adaptive systems #Centralized control #Distributed control #Large-scale systems #Biology #Resource management
Cost-effective switching fabrics with distributed control for scalable routers
- Trang 65-73
Nian-Feng Tzeng, M. Mandviwalla
This paper deals with scalable switching fabrics for high-performance routers with large numbers of ports for connecting external links operating at various speeds to arrive at aggregate rates up to multi-terabits per second. The proposed switching fabrics employ no centralized scheduling and consist of small routing units (RUs), which are interconnected by multistage-based connecting components (... hiện toàn bộ
#Fabrics #Distributed control #Routing #Hardware #Joining processes #Aggregates #Scalability #Packet switching #Asynchronous transfer mode #Distributed computing
SYN-dog: sniffing SYN flooding sources
- Trang 421-428
Haining Wang, Danlu Zhang, K.G. Shin
Presents a simple and robust mechanism called SYN-dog to sniff SYN flooding sources. We install SYN-dog as a software agent at leaf routers that connect stub networks to the Internet. The statelessness and low computation overhead of SYN-dog make itself immune to any flooding attacks. The core mechanism of SYN-dog is based on the protocol behavior of TCP SYN-SYN/ACK pairs, and is an instance of th... hiện toàn bộ
#Floods #Computer crime #Robustness #Laboratories #Software agents #IP networks #Access protocols #Availability #TCPIP #Internet