• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 417,458
Next 10 →

Remote Remote Services Services

by Service Service, Service Service, Service Service, Service Service
"... Service-based for simple interaction patterns Loose Coupling so components need not know implementation details and can be bound late Separation of Concerns so developers can focus on immediate task Composition and re-composition of assets Heterogeneity to re-use what we already have © IBM Corp, 201 ..."
Abstract - Add to MetaCart
Service-based for simple interaction patterns Loose Coupling so components need not know implementation details and can be bound late Separation of Concerns so developers can focus on immediate task Composition and re-composition of assets Heterogeneity to re-use what we already have © IBM Corp

REMOTE SERVICE SATISFACTION: AN INITIAL EXAMINATION

by Stefanie Paluch, Markus Blut
"... As more providers establish remote services for remote repair, remote diagnosis and maintenance purposes to provide greater value to their customers, understanding what creates a satisfying customer experience becomes crucial. Even though this understanding appears crucial, no studies have examined ..."
Abstract - Add to MetaCart
As more providers establish remote services for remote repair, remote diagnosis and maintenance purposes to provide greater value to their customers, understanding what creates a satisfying customer experience becomes crucial. Even though this understanding appears crucial, no studies have examined

Agile Application-Aware Adaptation for Mobility

by Brian D. Noble, M. Satyanarayanan, Dushyanth Narayanan, James Eric Tilton, Jason Flinn, Kevin R. Walker - SOSP-16 , 1997
"... In this paper we show that application-aware adaptation, a collaborative partnership between the operating system and applications, offers the most general and effective approach to mobile information access. We describe the design of Odyssey, a prototype implementing this approach, and show how it ..."
Abstract - Cited by 503 (31 self) - Add to MetaCart
applications concurrently using remote services over a network with highly variable bandwidth.

Integrated services in the internet architecture: an overview (RFC

by Group R. Braden, S. Shenker, Scott Shenker, Lixia Zhang, Deborah Estrin, Sugih Jamin , 1633
"... This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. Distribution of this memo is unlimited. This memo discusses a proposed extension to the Internet architecture and protocols to provide integrated services, i.e., to support real-ti ..."
Abstract - Cited by 733 (23 self) - Add to MetaCart
-time as well as the current non-real-time service of IP. This extension is necessary to meet the growing need for real-time service for a variety of new applications, including teleconferencing, remote seminars, telescience, and distributed simulation. This memo represents the direct product of recent work

Remote Service Discovery

by W. Zhao, H. Schulzrinne, E. Guttman, C. Bisdikian, W. Jerome - in the Service Location Protocol (SLP) via DNS SRV", RFC 3832 , 2004
"... Status of this Memo ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
Status of this Memo

Kerberos: An Authentication Service for Open Network Systems

by Jennifer G. Steiner, Clifford Neuman, Jeffrey I. Schiller - IN USENIX CONFERENCE PROCEEDINGS , 1988
"... In an open network computing environment, a workstation cannot be trusted to identify its users correctly to network services. Kerberos provides an alternative approach whereby a trusted third-party authentication service is used to verify users’ identities. This paper gives an overview of the Kerb ..."
Abstract - Cited by 692 (12 self) - Add to MetaCart
In an open network computing environment, a workstation cannot be trusted to identify its users correctly to network services. Kerberos provides an alternative approach whereby a trusted third-party authentication service is used to verify users’ identities. This paper gives an overview

SEDA: An Architecture for Well-Conditioned, Scalable Internet Services

by Matt Welsh, David Culler, Eric Brewer , 2001
"... We propose a new design for highly concurrent Internet services, whichwe call the staged event-driven architecture (SEDA). SEDA is intended ..."
Abstract - Cited by 522 (10 self) - Add to MetaCart
We propose a new design for highly concurrent Internet services, whichwe call the staged event-driven architecture (SEDA). SEDA is intended

Grid Information Services for Distributed Resource Sharing

by Karl Czajkowski , Steven Fitzgerald, Ian Foster, Carl Kesselman , 2001
"... Grid technologies enable large-scale sharing of resources within formal or informal consortia of individuals and/or institutions: what are sometimes called virtual organizations. In these settings, the discovery, characterization, and monitoring of resources, services, and computations are challengi ..."
Abstract - Cited by 703 (52 self) - Add to MetaCart
Grid technologies enable large-scale sharing of resources within formal or informal consortia of individuals and/or institutions: what are sometimes called virtual organizations. In these settings, the discovery, characterization, and monitoring of resources, services, and computations

Tapestry: A Resilient Global-scale Overlay for Service Deployment

by Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, John D. Kubiatowicz - IEEE Journal on Selected Areas in Communications , 2004
"... We present Tapestry, a peer-to-peer overlay routing infrastructure offering efficient, scalable, locationindependent routing of messages directly to nearby copies of an object or service using only localized resources. Tapestry supports a generic Decentralized Object Location and Routing (DOLR) API ..."
Abstract - Cited by 593 (14 self) - Add to MetaCart
We present Tapestry, a peer-to-peer overlay routing infrastructure offering efficient, scalable, locationindependent routing of messages directly to nearby copies of an object or service using only localized resources. Tapestry supports a generic Decentralized Object Location and Routing (DOLR) API

Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications

by Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan - SIGCOMM'01 , 2001
"... A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data item. This paper presents Chord, a distributed lookup protocol that addresses this problem. Chord provides support for just one operation: given a key, it maps the key onto ..."
Abstract - Cited by 4435 (75 self) - Add to MetaCart
A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data item. This paper presents Chord, a distributed lookup protocol that addresses this problem. Chord provides support for just one operation: given a key, it maps the key onto a node. Data location can be easily implemented on top of Chord by associating a key with each data item, and storing the key/data item pair at the node to which the key maps. Chord adapts efficiently as nodes join and leave the system, and can answer queries even if the system is continuously changing. Results from theoretical analysis, simulations, and experiments show that Chord is scalable, with communication cost and the state maintained by each node scaling logarithmically with the number of Chord nodes.
Next 10 →
Results 1 - 10 of 417,458
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University