Sciweavers

JSSPP
1998
Springer
13 years 12 months ago
Predicting Application Run Times Using Historical Information
We present a technique for deriving predictions for the run times of parallel applications from the run times of "similar" applications that have executed in the past. T...
Warren Smith, Ian T. Foster, Valerie E. Taylor
JSSPP
1998
Springer
13 years 12 months ago
Improving First-Come-First-Serve Job Scheduling by Gang Scheduling
Abstract. We present a new scheduling method for batch jobs on massively parallel processor architectures. This method is based on the First
Uwe Schwiegelshohn, Ramin Yahyapour
JSSPP
1998
Springer
13 years 12 months ago
A Resource Management Architecture for Metacomputing Systems
Metacomputing systems are intended to support remote and/or concurrent use of geographically distributed computational resources. Resource management in such systems is complicate...
Karl Czajkowski, Ian T. Foster, Nicholas T. Karoni...
JSSPP
1998
Springer
13 years 12 months ago
Job Scheduling Scheme for Pure Space Sharing Among Rigid Jobs
Kento Aida, Hironori Kasahara, Seinosuke Narita
HCW
1997
IEEE
13 years 12 months ago
Distributed interactive simulation for synthetic forces
Paul Messina, Sharon Brunett, Dan Davis, Thomas Go...
FTDCS
1997
IEEE
13 years 12 months ago
Intrusion ripple analysis in distributed information systems
: Security is a very important aspect of distributed computing systems, especially in distributed information environments involving widearea networks, such as internets. In this p...
S. S. Yau, Jun Zhu
FTDCS
1997
IEEE
13 years 12 months ago
Distributed Transaction Processing as a Reliability Concept for Mobile Agents
Mobile agents offer a new possibility for the development of applications in distributed systems and are no longer a theoretical issue since different architectures for their impl...
Hartmut Vogler, Thomas Kunkelmann, Marie-Luise Mos...
FTDCS
1997
IEEE
13 years 12 months ago
The Saga Security System: A Security Architecture for Open Distributed Systems
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...
Masakazu Soshi, Mamoru Maekawa
FTDCS
1997
IEEE
13 years 12 months ago
Protocols versus Objects: Can Models for Telecommunications and Distributed Processing Coexist?
This paper identifies two paradigms that influence the design of telematics systems nowadays: the protocol-centred and the object-centred paradigm. Both paradigms have been intr...
Marten van Sinderen, Luís Ferreira Pires