Sciweavers

Share
SIGACT
2010
76views more  SIGACT 2010»
8 years 5 months ago
Reconfiguring a state machine
Reconfiguration means changing the set of processes executing a distributed system. We explain several methods for reconfiguring a system implemented using the state-machine appro...
Leslie Lamport, Dahlia Malkhi, Lidong Zhou
JCIT
2010
160views more  JCIT 2010»
8 years 5 months ago
An Improved Dynamic Load Balancing Algorithm for a Distributed System in LAN
A dynamic time delay model for load balancing was proposed in distributed heterogeneous system by Hayat. But how to compute the load-transfer delay and the gain coefficient were n...
Jie Huang, Bei Huang, Qiucen Huang
FGCS
2011
153views more  FGCS 2011»
8 years 6 months ago
Representing distributed systems using the Open Provenance Model
From the World Wide Web to supply chains and scientific simulations, distributed systems are a widely used and important approach to building computational systems. Tracking prov...
Paul T. Groth, Luc Moreau
SICHERHEIT
2010
8 years 9 months ago
A Fuzzy Model for IT Security Investments
: This paper presents a fuzzy set based decision support model for taking uncertainty into account when making security investment decisions for distributed systems. The proposed m...
Guido Schryen
SIGOPS
2010
80views more  SIGOPS 2010»
8 years 9 months ago
Mining dependency in distributed systems through unstructured logs analysis
Dependencies among system components are crucial to locating root errors in a distributed system. In this paper, we propose an approach to mine intercomponent dependencies from un...
Jian-Guang Lou, Qiang Fu, Yi Wang, Jiang Li
FGCS
2010
108views more  FGCS 2010»
8 years 9 months ago
The wandering token: Congestion avoidance of a shared resource
In a distributed system where scalability is an issue, like in a GRID [5], the problem of enforcing mutual exclusion often arises in a soft form: the infrequent failure of the mut...
Augusto Ciuffoletti
TPDS
1998
94views more  TPDS 1998»
8 years 10 months ago
Access Control and Signatures via Quorum Secret Sharing
—We suggest a method of controlling the access to a secure database via quorum systems. A quorum system is a collection of sets (quorums) every two of which have a nonempty inter...
Moni Naor, Avishai Wool
MAM
2002
90views more  MAM 2002»
8 years 10 months ago
Layered interactive convergence for distributed clock synchronization
Raghukul Tilak, Alan D. George, Robert W. Todd
CACM
1999
113views more  CACM 1999»
8 years 10 months ago
Object-oriented Abstractions for Distributed Programming
ion suffices ("decide which type you want and provide a full set of operations for each type"). If the application domain is, say, the administration of a university, the...
Rachid Guerraoui, Mohamed Fayad
IPL
2002
95views more  IPL 2002»
8 years 10 months ago
On a game in directed graphs
Inspired by recent algorithms for electing a leader in a distributed system, we study the following game in a directed graph: each vertex selects one of its outgoing arcs (if any)...
Alan J. Hoffman, Kate Jenkins, Tim Roughgarden
books