2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing最新文献

筛选
英文 中文
Network Hardware Algorithms 网络硬件算法
B. Prabhakar
{"title":"Network Hardware Algorithms","authors":"B. Prabhakar","doi":"10.1109/COLCOM.2005.1651258","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651258","url":null,"abstract":"Over the past 10-15 years the area of Network Algorithms has grown from a collection of isolated algorithms and analysis methods into a cohesive body of research and development. The problems in this area are characterized by several requirements, of which speed, scalability and simplicity are the most important. For algorithms designed to operate in high-speed router hardware, there is the additional stringent constraint of low heat dissipation. We overview the development of Network Algorithms, emphasizing algorithms designed for high-speed hardware implementations. Specifically, we describe the algorithms and analysis methods developed for bandwidth partitioning, routing and security applications. We highlight the crucial role of randomization and probabilistic techniques in simplifying the implementation while delivering high performance.","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125324288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collaborative Enterprise Applications 协作企业应用程序
C. Pu
{"title":"Collaborative Enterprise Applications","authors":"C. Pu","doi":"10.1109/COLCOM.2005.1651207","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651207","url":null,"abstract":"","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122814055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On overlay multicast tree construction and maintenance 覆盖组播树的构建与维护
T. M. Kwan, K. Yeung
{"title":"On overlay multicast tree construction and maintenance","authors":"T. M. Kwan, K. Yeung","doi":"10.1109/COLCOM.2005.1651247","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651247","url":null,"abstract":"Overlay multicast tree construction and maintenance is a major challenge in designing application layer multicast protocols. In this paper, we focus on improving the joining and maintenance procedures of an overlay multicast tree. Unlike the existing direct-tree protocols, our proposed overlay multicast tree protocol (OMTP) has the following characteristics. First, by leveraging on the IP hierarchical addressing locality, we can speed up the formation of overlay multicast tree and enhance the efficiency of the tree maintenance. Second, we take both bandwidth availability and round-trip-time (RTT) into consideration when a newcomer selects its parent node. Finally, an effective mechanism is designed to disperse the simultaneous rejoin crowds in the tree repair phase. Simulation results show that with our proposed protocol, the join latency can be reduced by as large as 50% as compared with a popular direct-tree protocol HMTP","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131870067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Distributed floor control protocols for computer collaborative applications on overlay networks 覆盖网络上计算机协同应用的分布式楼层控制协议
S. Banik, S. Radhakrishnan, T. Zheng, C. Sekharan
{"title":"Distributed floor control protocols for computer collaborative applications on overlay networks","authors":"S. Banik, S. Radhakrishnan, T. Zheng, C. Sekharan","doi":"10.1109/COLCOM.2005.1651240","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651240","url":null,"abstract":"Computer supported collaborative applications on overlay networks are gaining popularity among users who are geographically dispersed. Examples of these kinds of applications include video-conferencing, collaborative design and simulation, distance learning, and online games. One of the important issues in collaborative applications is floor control wherein the end-users coordinate among themselves to gain exclusive access to the communication channel. An end-user who wins the floor, sends message to all other participating end-users. In this paper, to solve the floor control problem we present an implementation and evaluation of ALOHA and distributed queue dual bus (DQDB) distributed MAC (medium access control) protocols on overlay networks. As an initial step in the implementation of these MAC protocols, we propose an algorithm to construct an efficient communication channel among the Network Service Nodes (NSNs) in the overlay network. We also show that our implementation scheme (first one among decentralized floor control protocols) preserves the causal ordering of messages. We compare the efficiencies of the proposed implementation of floor control protocols using an analytical model that is verified using extensive simulation experiments","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127686047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Server selection with arbitrary distribution 任意分布的服务器选择
Xinjie Li, M. Brockmeyer
{"title":"Server selection with arbitrary distribution","authors":"Xinjie Li, M. Brockmeyer","doi":"10.1109/COLCOM.2005.1651266","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651266","url":null,"abstract":"Many applications need to pick servers with some desired distribution. For example, in probabilistic quorum systems, one method to generate quorums with high probability of intersection is to randomly pick kradicn nodes with a fixed probability distribution. Load balancing applications may need to take several samples of the servers with some desired distribution. Existing approaches realize a fixed stationary distribution by controlling the topology of the overlay graph and conducting random walks on it. In particular, existing approaches focus on achieving a uniform distribution. This paper proposes using the distributed Hastings-Metropolis algorithm to achieve any desired stationary distribution without control or global knowledge of the overlay graph. The new method facilitates good load balancing, since heterogeneous server capacity or other factors can be considered in deciding the appropriate distribution by which to pick servers","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117011291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Matching distributed systems to their environment using dissipative structures 使用耗散结构使分布式系统与其环境相匹配
J. Dowling, D. Dahlem, J. Sacha
{"title":"Matching distributed systems to their environment using dissipative structures","authors":"J. Dowling, D. Dahlem, J. Sacha","doi":"10.1109/COLCOM.2005.1651268","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651268","url":null,"abstract":"In contrast to a large body of theoretical work on computer systems, distributed systems are not idealised constructions, unconstrained by physical world limitations. They must be designed to account for limiting, real-world properties such as network latency, varying node capabilities, varying application behaviour and unexpected failures. These real-world properties that we describe under the general area of a system's environment have regularities or heterogeneities that can often be modelled as a stochastic process, often using well-known distributions. This paper proposes dissipative structures as a model to capture information about properties of these stochastic processes. In dissipative systems, agents (or nodes) sample information from their local environments and collectively build structures that capture knowledge of recent regularities or heterogeneities in the system's environment. Dissipative structures are a promising technique for transferring knowledge of the system's environment among agents without requiring excessive message passing. This approach offers the promise of building more efficient search algorithms based on reduced uncertainty of the system's environment","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122706693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed service discovery using preference 使用首选项的分布式服务发现
R. Egashira, A. Enomoto, T. Suda, Hiroshi Sasaki, H. Iwasaki
{"title":"Distributed service discovery using preference","authors":"R. Egashira, A. Enomoto, T. Suda, Hiroshi Sasaki, H. Iwasaki","doi":"10.1109/COLCOM.2005.1651245","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651245","url":null,"abstract":"Distributed collaborative applications will be widely used in a future large-scale and dynamic network. Such applications require the capability of locating distributed network objects that better match query originator's criteria. In this paper, a discovery mechanism utilizing query originator's preference is proposed in order to locate objects preferred by query originators. The proposed mechanism allows query originators to return feedbacks that describe the degree of the preference for discovered objects. The preference of query originators is utilized to guide subsequent queries in a distributed manner, enhancing efficiency of discovery. The preference of query originators is also utilized to adaptively change forwarding paths of queries corresponding to varying network environments. Extensive simulation work shows that the proposed mechanism is efficient and adaptive to dynamics of the peer-to-peer network environment where transient objects often join and leave","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134429389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Location assisted routing for near-far effect mitigation in wireless networks 无线网络中用于缓解远近影响的位置辅助路由
Hassan Mahmood, C. Comaniciu
{"title":"Location assisted routing for near-far effect mitigation in wireless networks","authors":"Hassan Mahmood, C. Comaniciu","doi":"10.1109/COLCOM.2005.1651254","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651254","url":null,"abstract":"CDMA technology represents an attractive choice for various wireless ad hoc networks applications, due to its appealing properties, such as resistance to jamming and interference, low probability of intercept, and potential for energy savings. On the other hand, ad hoc CDMA network performance is severely limited by strong interferers, and for peer-to-peer communications the near-far effect problem cannot be mitigated through power control as in cellular systems. In this paper, we propose a location assisted routing solution to alleviate the near-far problem at the network level. The novelty of the solution resides in using a composite cost function for route optimization, which accounts for an estimate of the near-far effect generated by each relaying node. This estimate is determined based on node locations information. The tradeoff performance-complexity is investigated, and we show that a throughput improvement of up to 45% can be obtained using the new proposed near-far effect aware routing metric","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134557188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Scheduling algorithms for peer-to-peer collaborative file distribution 点对点协同文件分发的调度算法
J. Chan, V. Li, K. Lui
{"title":"Scheduling algorithms for peer-to-peer collaborative file distribution","authors":"J. Chan, V. Li, K. Lui","doi":"10.1109/COLCOM.2005.1651215","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651215","url":null,"abstract":"Peer-to-peer file sharing applications on the Internet, such as BitTorrent, Gnutella, etc., have been immensely popular prior research mainly focuses on peer and content discovery, overlay topology formation, fairness and incentive issues, etc, but seldom investigates the data distribution problem which is also a core component of any file sharing application. In this paper, we present the first effort in addressing this collaborative file distribution problem and formally define the scheduling problem in a simplified context. We suggest several types of algorithms, including a novel bipartite matching algorithm, for solving the problem. Simulation results show that our weighted bipartite algorithm finds an optimal solution for all cases tested. Therefore, we believe our algorithm is a promising solution to be employed as the core scheduling module in P2P file sharing applications, shortening the total download time experienced by users","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134020705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A collaborative and multi-agent system for e-mail filtering and classification 用于电子邮件过滤和分类的协作和多代理系统
Lorenzo Lazzari, M. Mari, A. Poggi
{"title":"A collaborative and multi-agent system for e-mail filtering and classification","authors":"Lorenzo Lazzari, M. Mari, A. Poggi","doi":"10.1109/COLCOM.2005.1651248","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651248","url":null,"abstract":"CAFE (collaborative agents for filtering e-mails) is a multi-agent system to collaboratively filter spam and classify legitimate messages in users' mail stream. CAFE associates a proxy agent with each user, and this agent represents a sort of interface between the user's e-mail client and the e-mail server. With the support of other types of agents, the proxy agent makes a classification of new messages into three categories: ham (good messages), spam and spam-presumed. Ham messages can be in their turn divided on the basis of the sender's identity and reputation. The reputation is collaboratively inferred from users' ratings. The filtering process is performed using three kinds of approach: a first approach based on the usage of an hash function, a static approach using DNSBL (DNS-based black lists) databases and a dynamic approach based on a Bayesian filter. We give a mathematical representation of the system, showing that if users collaborate, the fault probability decreases in proportion to the number of active users","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114083340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信