Sciweavers

SIGACT
2010
76views more  SIGACT 2010»
13 years 6 months ago
Reconfiguring a state machine
Reconfiguration means changing the set of processes executing a distributed system. We explain several methods for reconfiguring a system implemented using the state-machine appro...
Leslie Lamport, Dahlia Malkhi, Lidong Zhou
JCIT
2010
160views more  JCIT 2010»
13 years 6 months ago
An Improved Dynamic Load Balancing Algorithm for a Distributed System in LAN
A dynamic time delay model for load balancing was proposed in distributed heterogeneous system by Hayat. But how to compute the load-transfer delay and the gain coefficient were n...
Jie Huang, Bei Huang, Qiucen Huang
FGCS
2011
153views more  FGCS 2011»
13 years 6 months ago
Representing distributed systems using the Open Provenance Model
From the World Wide Web to supply chains and scientific simulations, distributed systems are a widely used and important approach to building computational systems. Tracking prov...
Paul T. Groth, Luc Moreau
SICHERHEIT
2010
13 years 9 months ago
A Fuzzy Model for IT Security Investments
: This paper presents a fuzzy set based decision support model for taking uncertainty into account when making security investment decisions for distributed systems. The proposed m...
Guido Schryen
SIGOPS
2010
80views more  SIGOPS 2010»
13 years 9 months ago
Mining dependency in distributed systems through unstructured logs analysis
Dependencies among system components are crucial to locating root errors in a distributed system. In this paper, we propose an approach to mine intercomponent dependencies from un...
Jian-Guang Lou, Qiang Fu, Yi Wang, Jiang Li
FGCS
2010
108views more  FGCS 2010»
13 years 10 months ago
The wandering token: Congestion avoidance of a shared resource
In a distributed system where scalability is an issue, like in a GRID [5], the problem of enforcing mutual exclusion often arises in a soft form: the infrequent failure of the mut...
Augusto Ciuffoletti
TPDS
1998
94views more  TPDS 1998»
13 years 11 months ago
Access Control and Signatures via Quorum Secret Sharing
—We suggest a method of controlling the access to a secure database via quorum systems. A quorum system is a collection of sets (quorums) every two of which have a nonempty inter...
Moni Naor, Avishai Wool
MAM
2002
90views more  MAM 2002»
13 years 11 months ago
Layered interactive convergence for distributed clock synchronization
Raghukul Tilak, Alan D. George, Robert W. Todd
CACM
1999
113views more  CACM 1999»
13 years 11 months ago
Object-oriented Abstractions for Distributed Programming
ion suffices ("decide which type you want and provide a full set of operations for each type"). If the application domain is, say, the administration of a university, the...
Rachid Guerraoui, Mohamed Fayad
IPL
2002
95views more  IPL 2002»
13 years 11 months ago
On a game in directed graphs
Inspired by recent algorithms for electing a leader in a distributed system, we study the following game in a directed graph: each vertex selects one of its outgoing arcs (if any)...
Alan J. Hoffman, Kate Jenkins, Tim Roughgarden