- 1.Elan Amir, Steve McCanne, and Randy Katz. An Active Service Framework and its Application to Real-time Multimedia Transcoding. In Proceedings of the ACM SIGCOMM Conference, pages 178-189, Vancouver, British Columbia, Canada, Sep 1998. Google ScholarDigital Library
- 2.Yair Amir, David Breitgand, Gregory V. Chockler, and Danny Dolev. Group Communication as an Infrastructure for Distributed System Management. In The International Workshop on Services in Distributed and Networked Environment, pages 84-91, Jun 1996. Google ScholarDigital Library
- 3.Godmar Back and Wilson Hsieh. Drawing the Red Line in Java. In The 7th IEEE Workshop on Hot Topics in Operating Systems, Rio Rico, Arizona, Mar 1999. Google ScholarDigital Library
- 4.B. N. Bershad, S. Savage, P. Pardyak, E. G. Sirer, M. Fiuczynski, D. Becker, S. Eggers, and C. Chambers. Extensibility Safety and Performance in the SPIN Operating System. In Proceedings of the 15th Symposium on Operating Systems Principles, pages 267-284, Copper Mountain, Colorado, Dec 1995. Google ScholarDigital Library
- 5.Andrzej Bieszczad, Bernard Pagurek, and Tony White. Mobile Agents for Network Management. IEEE Communciations Surveys, 1(1):2-9, Sep 1998. Google ScholarDigital Library
- 6.Dawson R. Engler, M. Frans Kaashoek, and James O'Toole Jr. Exokernel: an operating system architecture for application-level resource management. In Proceedings of the 15th ACM Symposium on Operating Systems Principles, pages 251-266, Copper Mountaim Colorado, Dec 1995. Google ScholarDigital Library
- 7.Ulfar Erlingsson and Fred B. Schneider. SASI Enforcement of Security Policies: A Retrospective. Technical Report TR99-1758, Department of Computer Science, Cornell University, Jul 1999.Google ScholarCross Ref
- 8.G. Goldszmidt and Y. Yemini. Distributed Management by Delegation. In Proceedings of the 15th International Conference on Distributed Computing Systems, pages 333-341, Los Alamitos, CA, USA, Jun 1995. Google ScholarDigital Library
- 9.B. Harris and R. Hunt. TCP/IP Security Threats and Attack Methods. Computer Communciations, 22(10):885-897, Jun 1999. Google ScholarDigital Library
- 10.Dag Johansen. Mobile Agent Applicability. In Proceedings of the Mobile Agents, pages 80-98, Stuttgart, Germany: Sep 1998. Google ScholarDigital Library
- 11.Dag Johansen, Keith Marzullo, and Kare J. Lauvset. An Approach towards an Agent Computing Environment. In The Workshop on Middleware at the International Conference on Distributed Computing Systems, pages 78-83, Austin, Texas, May 1999.Google ScholarCross Ref
- 12.Dag Johansen, Keith Marzullo, Fred B. Schneider, Kjetil Jacobsen, and Dmitrii Zagorodnov. NAP: Practical Fault-Tolerance for Itinerant Computations. In Proceedings of the 19th IEEE International Conference on Distributed Computing Systems, pages 180-189, Austin, Texas, May 1999. Google ScholarDigital Library
- 13.Dag Johansen, Nils P. Sudmann, and Robbert van Renesse. Performance Issues in TACOMA. In Proceedings of the 3rd Workshop on Mobile Object Systems, 11th Europeean Conference on Object-Oriented Programming, Jyvaskyla, Finland, Jun 1997.Google Scholar
- 14.Dag Johansen, Robbert van Renesse, and Fred B. Schneider. An Introduction to the TACOMA Distributed System Version 1.0. Technical Report 95-23, Department of Computer Science, University of Tromso, 1995.Google Scholar
- 15.Danny B. Lange and Mitsuru Oshima. Mobile Agents with Java: The Aglet API. In Dejan Milojicic, Frederick Douglis, and Richard Wheeler, editors, Mobility, Mobile Agents and Process Migration - An edited Collection, pages 495-512. Addison Wesley, 1999. Google ScholarDigital Library
- 16.H.C. Lauer and R.M. Needham. On the Duality of Operating System Structures. reprinted in A CM Operating Systems Review, 13(2):3-10, Apr 1979. Google ScholarDigital Library
- 17.Hugh C. Lauer and Edwin H. Satterthwaite. The Impact of Mesa on System Design. In Proceedings of the 4th International Conference on Software Engineering, pages 174-182, Sep 1979. Google ScholarDigital Library
- 18.Jochen Liedtke. On p-Kernel Construction. In Proceedings of the 15th Symposium on Operating System Principles, pages 237-250, Copper Mountain, Colorado, Dec 1995. Google ScholarDigital Library
- 19.O.G. Loques, J.C.B. Leite, A. Sztajnberg, and M. Lobosco. Towards Integrating Meta-Level Programming and Configuration Programming. Technical Report CAA no. 1, Instituto de Computaao, Universidade Federal Fluminense, Feb 1999.Google Scholar
- 20.John F. Shoch and Jon A. Hupp. The "Worm" Programs - Early Experience with a Distributed Computation. Communications of the ACM, 25(3):172-180, Mar 1982. Google ScholarDigital Library
- 21.Christopher Small and Margo Seltzer. Structuring the Kernel as a Toolkit of Extensible, Reusable Components. In Proceedings of the 4th International Workshop on Object Orientation in Operating Systems, pages 134-137, Lund, Sweden, Aug 1995. Google ScholarDigital Library
- 22.James W. Stamos and David K. Gifford. Remote Evaluation. ACM Transactions on Programming Languages and Systems, 12(4):537-565, Oct 1990. Google ScholarDigital Library
- 23.Jim Waldo. The Jini Architecture for network-centric computing. Communications of the A CM, 42 (7) :76-82, Jul 1999. Google ScholarDigital Library
- 24.Jim White. Mobile Agents White Paper. Technical report, General Magic, 1994.Google Scholar
Index Terms
- TOS: kernel support for distributed systems management
Recommendations
An Efficient Hybrid Peer-to-Peer System for Distributed Data Sharing
Peer-to-peer overlay networks are widely used in distributed systems. Based on whether a regular topology is maintained among peers, peer-to-peer networks can be divided into two categories: structured peer-to-peer networks in which peers are connected ...
An Implementation and Its Evaluation of a Framework for Managing States of Nodes among Structured Overlay Networks
ICNS '10: Proceedings of the 2010 Sixth International Conference on Networking and ServicesStructured overlay networks are widely used as platforms for distributed systems. However, in a high churn situation, it is highly costly to maintain the structure and service availability of an overlay network because there is a limitation in churn ...
Comments