The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The goal of this paper is to develop a fault tolerant Grid Intrusion Detection System. The architecture is based on a network of high level detection systems which receive intrusion information form local detectors. These high level detectors constantly exchange information using gossip algorithms and correlate the data received received from the local level to detect complex attacks targeted at different...
The uncertainties of grid nodes security are main hurdle to make the job scheduling secure, reliable and fault-tolerant. The fixed fault-tolerant strategy in jobs scheduling may utilize excessive resources. In this paper, the job scheduling decides which kinds of fault-tolerance strategy will be applied to each individual job for more reliable computation and shorter makespan. And we discuss the fuzziness...
A major challenge facing grid applications is the appropriate handling of failures. Data replication is a key technique of data grid, from which, we can get better access performance. It is a fault-tolerant approach, but at the same time bringing some hidden trouble for security, so security and fault-tolerance should be colligated to research. Combining data replication with security, we propose...
The following topics are dealt with: grid and cluster computing; performance evaluation and measurement; architectures and systems; wireless and mobile communications; network communications; security and privacy; reliability and fault tolerance; data mining and caching; AHPCN; multicore and multithreaded architectures and programming; network storage and data management; and parallel algorithm and...
The architecture of intelligent grid offers a solution to the existing problems in ambient intelligence, based on intelligent agents. State-of-the-art concerns regarding intelligent agents based systems are showing the necessity of developing techniques for addressing the problem of security and fault tolerance. This paper proposes dedicated detection schemes for different types of attacks, being...
The security of the existing ambient intelligence model presents a particular challenge because this architecture combines different networks, being prone to vulnerabilities and attacks. Specific techniques are required to be studied in order to provide a fault-tolerant system. One way to address this goal is to apply different techniques in order to correct the errors introduced in the systems by...
Grid users and their jobs need credentials to access grid resources and services. It is important to minimize the exposure of credentials to adversaries. A practical solution is needed that works with existing software and is easy to deploy, administer, and maintain. Thus, credential management services are the wave of the future for virtual organizations such as Grid computing. This paper describes...
This work mainly aims at the designs of the genetic algorithm based scheduling strategies by considering four different fault tolerance techniques in the grid environment, including retry, migration, checkpoint, replication. We also take into account the risk relationship between jobs and nodes to improve the system reliability in the scheduling algorithm. According to the simulation results, we can...
Live migration of virtual machine (VM) is a desirable feature for distributed computing such as grid computing and recent cloud computing by facilitating fault tolerance, load balance, and hardware maintenance. Virtual machine monitor (VMM) enforced process protection is a newly advocated approach to provide a trustworthy execution environment for processes running on commodity operating systems.While...
The use of discrete-event simulators in the design and development of distributed systems is appealing due to their efficiency and scalability. Their core abstractions of process and event map neatly to the components and interactions of modern-day distributed systems and allow designing realistic simulation scenarios. MONARC, a multi-threaded, process oriented simulation framework designed for modeling...
Grids and peer-to-peer (P2P) networks have emerged as popular platforms for the next generation parallel and distributed computing. In these environments, resources are geographically distributed, managed and owned by various organizations with different policies, and interconnected by wide-area networks or the Internet. This introduces a number of resource management and application scheduling challenges...
Grid technologies are emerging as the next generation of distributed computing, allowing the aggregation of resources that are geographically distributed across different locations. However, these resources are independent and managed separately by various organizations with different policies. This will have a major impact to users who submit their jobs to the Grid, as they have to deal with issues...
The following topics are dealt with: multiprocessor architecture; grid and cluster computing; information retrieval and mining; overlay and network architecture; power-aware architecture; mobile computing; parallel and distributed systems; security and trustworthy computing; wireless networks; resource scheduling; fault tolerance; peer-to-peer computing; wireless communication; parallel algorithms.
This is an introduction to the proceedings of the MWS 2007 workshop held at EDOC 2007. It first explains the motivation for and background of the workshop. Then, it contains a short description of the keynote, each long and short peer-reviewed paper, and the discussion session "impact of various execution environments on middleware for web services". After the closing statements, MWS 2007...
The following topics are dealt with: heterogeneous scheduling; stabilization algorithms; availability and security; MPI & shared memory; scheduling and resource management; parallel and distributed algorithms; Web performance; data dissemination in sensor networks; QoS in interconnection networks; streaming; sensor network deployment; power-aware protocols; grids; multiprocessor scheduling; multicore...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.