skip to main content
Skip header Section
Distributed Systems: Principles and ParadigmsSeptember 2001
Publisher:
  • Prentice Hall PTR
  • Upper Saddle River, NJ
  • United States
ISBN:978-0-13-088893-8
Published:01 September 2001
Pages:
840
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

From the Publisher: Andrew Tanenbaum and Maarten van Steen cover the principles, advanced concepts, and technologies of distributed systems in detail, including: communication, replication, fault tolerance, and security. Intended for use in a senior/graduate level distributed systems course or by professionals, this text systematically shows how distributed systems are designed and implemented in real systems. Written in the superb writing style of other Tanenbaum books, the material also features unique accessibility and a wide variety of real-world examples and case studies, such as NFS v4, CORBA, DOM, Jini, and the World Wide Web. FEATURES Detailed coverage of seven key principles. An introductory chapter followed by a chapter devoted to each key principle: communication, processes, naming, synchronization, consistency and replication, fault tolerance, and security, including unique comprehensive coverage of middleware models. Four chapters devoted to state-of-the-art real-world examples of middleware. Covers object-based systems, document-based systems, distributed file systems, and coordination-based systems including CORBA, DCOM, Globe, NFS v4, Coda, the World Wide Web, and Jini. Excellent coverage of timely, advanced, distributed systems topics: Security, payment systems, recent Internet and Web protocols, scalability, and caching and replication. NEW-The Prentice Hall Companion Website for this book contains PowerPoint slides, figures in various file formats, and other teaching aids, and a link to the author's Web site.

Cited By

  1. Wan S, Li M, Liu G and Wang C (2019). Recent advances in consensus protocols for blockchain: a survey, Wireless Networks, 26:8, (5579-5593), Online publication date: 1-Nov-2020.
  2. Prasanna Kumar K and Kousalya K (2019). Amelioration of task scheduling in cloud computing using crow search algorithm, Neural Computing and Applications, 32:10, (5901-5907), Online publication date: 1-May-2020.
  3. Casteigts A, Métivier Y, Robson J and Zemmari A (2019). Deterministic Leader Election Takes $$\Theta (D + \log n)$$?(D+logn) Bit Rounds, Algorithmica, 81:5, (1901-1920), Online publication date: 1-May-2019.
  4. Somov S (2019). Creation of Information-Technological Reserve in Distributed Data Processing Systems, Automation and Remote Control, 80:4, (781-790), Online publication date: 1-Apr-2019.
  5. ACM
    Pesicka L, Matejka L, Safarik J and Racek S Performance improvement of distributed file system using tunneling Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems, (1-8)
  6. Stanković R, źTula M and Maras J (2017). Evaluating fault tolerance approaches in multi-agent systems, Autonomous Agents and Multi-Agent Systems, 31:1, (151-177), Online publication date: 1-Jan-2017.
  7. ACM
    Zegrari F, Idrissi A and Rehioui H Resource Allocation with Efficient Load Balancing in Cloud Environment Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, (1-7)
  8. Ozalevli E (2016). A Compact One-Pin Mode Transition Circuit for Clock Synchronization in Current-Mode- Controlled Switching Regulators, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 24:9, (2960-2969), Online publication date: 1-Sep-2016.
  9. ACM
    Lin Q, Zhang H, Lou J, Zhang Y and Chen X Log clustering based problem identification for online service systems Proceedings of the 38th International Conference on Software Engineering Companion, (102-111)
  10. Stankovski V, Taherizadeh S, Taylor I, Jones A, Becker B, Mastroianni C and Suhartanto H Towards an environment supporting resilience, high-availability, reproducibility and reliability for cloud applications Proceedings of the 8th International Conference on Utility and Cloud Computing, (383-386)
  11. Huang H, Chen X and Wang Z (2015). Failure recovery in distributed model composition with intelligent assistance, Information Systems Frontiers, 17:3, (673-689), Online publication date: 1-Jun-2015.
  12. Javanmardi S, Shojafar M, Shariatmadari S, Abawajy J and Singhal M (2014). PGSW-OS, The Journal of Supercomputing, 69:2, (955-975), Online publication date: 1-Aug-2014.
  13. ACM
    Medina V and García J (2014). A survey of migration mechanisms of virtual machines, ACM Computing Surveys, 46:3, (1-33), Online publication date: 1-Jan-2014.
  14. Klepikov V (2013). Ensuring fault-tolerant computations in distributed control systems, Automation and Remote Control, 74:12, (2112-2121), Online publication date: 1-Dec-2013.
  15. Miorandi D, Sicari S, De Pellegrini F and Chlamtac I (2012). Internet of things, Ad Hoc Networks, 10:7, (1497-1516), Online publication date: 1-Sep-2012.
  16. Chalopin J, Métivier Y and Morsellino T (2012). Enumeration and Leader Election in Partially Anonymous and Multi-hop Broadcast Networks, Fundamenta Informaticae, 120:1, (1-27), Online publication date: 1-Jan-2012.
  17. Piątkowski Ł K---Resilient server synchronization protocol for session guarantees in MANET environments Proceedings of the 2011 international conference on Advanced Computing, Networking and Security, (290-296)
  18. Blair G, Bennaceur A, Georgantas N, Grace P, Issarny V, Nundloll V and Paolucci M The role of ontologies in emergent middleware Proceedings of the 12th International Middleware Conference, (400-419)
  19. Blair G, Bennaceur A, Georgantas N, Grace P, Issarny V, Nundloll V and Paolucci M The role of ontologies in emergent middleware Proceedings of the 12th ACM/IFIP/USENIX international conference on Middleware, (410-430)
  20. ACM
    Fehling C, Leymann F, Retter R, Schumm D and Schupeck W An architectural pattern language of cloud-based applications Proceedings of the 18th Conference on Pattern Languages of Programs, (1-11)
  21. Brut M, Laborie S, Manzat A and Sèdes F Generic information system architecture for distributed multimedia indexation and management Proceedings of the 15th international conference on Advances in databases and information systems, (347-360)
  22. Brzeziński J, Dwornikowski D, Piątkowski Ł and Sobański G K-resilient session guarantees synchronization protocol for mobile ad-hoc networks Proceedings of the 9th international conference on Parallel Processing and Applied Mathematics - Volume Part I, (30-39)
  23. Lee H, Park D, Yu H and Lee G (2011). FRASystem, Cluster Computing, 14:1, (15-25), Online publication date: 1-Mar-2011.
  24. Ishikawa M, Hasebe K, Sugiki A and Kato K (2010). Dynamic grid quorum, Service Oriented Computing and Applications, 4:4, (245-260), Online publication date: 1-Dec-2010.
  25. Chalopin J and Métivier Y (2010). On the power of synchronization between two adjacent processes, Distributed Computing, 23:3, (177-196), Online publication date: 1-Nov-2010.
  26. Hinrichs E, Hinrichs M and Zastrow T WebLicht Proceedings of the ACL 2010 System Demonstrations, (25-29)
  27. ACM
    Lee A, Minami K and Winslett M (2010). On the consistency of distributed proofs with hidden subtrees, ACM Transactions on Information and System Security, 13:3, (1-32), Online publication date: 1-Jul-2010.
  28. ACM
    Kossmann D, Kraska T and Loesing S An evaluation of alternative architectures for transaction processing in the cloud Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, (579-590)
  29. Ye Y and Megson G Distributed acceleration of mobile radio network optimisation algorithms Proceedings of the 9th conference on Wireless telecommunications symposium, (124-131)
  30. Namboodiri V and Pendse R (2010). Bit level synchronized MAC protocol for multireader RFID networks, EURASIP Journal on Wireless Communications and Networking, 2010, (1-13), Online publication date: 1-Apr-2010.
  31. Stöttinger M, Biedermann A and Huss S Virtualization within a parallel array of homogeneous processing units Proceedings of the 6th international conference on Reconfigurable Computing: architectures, Tools and Applications, (17-28)
  32. ACM
    Inoue H, Sakai J and Edahiro M (2010). A robust seamless communication architecture for next-generation mobile terminals on multi-CPU SoCs, ACM Transactions on Embedded Computing Systems, 9:3, (1-28), Online publication date: 1-Feb-2010.
  33. ACM
    Rosaci D, Sarné G and Garruzzo S (2009). MUADDIB, ACM Transactions on Information Systems, 27:4, (1-41), Online publication date: 1-Nov-2009.
  34. Kinshuk K, Sakurai Y, Takada K, Graf S, Zarypolla A and Tsuruta S Providing adaptive support in computer supported collaboration environments Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics, (1304-1309)
  35. Kraemer F, Slåtten V and Herrmann P Model-driven construction of embedded applications based on reusable building blocks Proceedings of the 14th international SDL conference on Design for motes and mobiles, (1-18)
  36. Kraska T, Hentschel M, Alonso G and Kossmann D (2009). Consistency rationing in the cloud, Proceedings of the VLDB Endowment, 2:1, (253-264), Online publication date: 1-Aug-2009.
  37. Hsiao Y and Su H An Empirical Study on the Performance Issues on the Clustered Client-Server Computing Environment Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing, (79-89)
  38. Choi S, Choo H, Baik M, Kim H and Byun E ODDUGI Proceedings of the International Conference on Computational Science and Its Applications: Part II, (393-407)
  39. ACM
    Florescu D and Kossmann D (2009). Rethinking cost and performance of database systems, ACM SIGMOD Record, 38:1, (43-48), Online publication date: 24-Jun-2009.
  40. Wang Y, Vrancken J and Dos Santos Soares M Intelligent network traffic control by integrating top-down and bottom-up control Proceedings of the 21st annual international conference on Chinese Control and Decision Conference, (1612-1617)
  41. ACM
    Weise T and Zapf M Evolving distributed algorithms with genetic programming Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, (577-584)
  42. Hindi H and Crawford L Control in printing systems Proceedings of the 2009 conference on American Control Conference, (38-52)
  43. ACM
    Mejías B, Cádiz A and Van Roy P Beernet Proceedings of the 1st International Workshop on Distributed Objects for the 21st Century, (1-8)
  44. Chan K, Bishop J, Steyn J, Baresi L and Guinea S A Fault Taxonomy for Web Service Composition Service-Oriented Computing - ICSOC 2007 Workshops, (363-375)
  45. ACM
    Lee A and Winslett M (2008). Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems, ACM Transactions on Information and System Security, 12:2, (1-33), Online publication date: 1-Dec-2008.
  46. ACM
    Hillenbrand M, Götze J and Müller P Contract-first service development within the Venice service grid Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services, (48-54)
  47. Donaldson A and Miller A (2008). Automatic Symmetry Detection for Promela, Journal of Automated Reasoning, 41:3-4, (251-293), Online publication date: 1-Nov-2008.
  48. Dan Chen , Turner S and Wentong Cai (2008). Towards Fault-tolerant HLA-based Distributed Simulations, Simulation, 84:10-11, (493-509), Online publication date: 1-Oct-2008.
  49. Lo J, Bishop J and Eloff J (2008). SMSSec, Computers and Security, 27:5-6, (154-167), Online publication date: 1-Oct-2008.
  50. Mastroianni C, Pirrò G and Talia D A hybrid architecture for content consistency and peer synchronization in cooperative P2P environments Proceedings of the 3rd international conference on Scalable information systems, (1-9)
  51. Farian H, Anne K and Haas M (2008). Teaching high-performance computing in the undergraduate college CS curriculum, Journal of Computing Sciences in Colleges, 23:3, (135-142), Online publication date: 1-Jan-2008.
  52. Carughi G, Comai S, Bozzon A and Fraternali P Modeling distributed events in data-intensive rich internet applications Proceedings of the 8th international conference on Web information systems engineering, (593-602)
  53. Davidyuk O, Ceberio J and Riekki J An algorithm for task-based application composition Proceedings of the 11th IASTED International Conference on Software Engineering and Applications, (465-472)
  54. ACM
    Enck W, Rueda S, Schiffman J, Sreenivasan Y, St. Clair L, Jaeger T and McDaniel P Protecting users from "themselves" Proceedings of the 2007 ACM workshop on Computer security architecture, (29-36)
  55. ACM
    Kabus P and Buchmann A Design of a cheat-resistant P2P online gaming system Proceedings of the 2nd international conference on Digital interactive media in entertainment and arts, (113-120)
  56. Sosnowski J, Tymoczko A and Gawkowski P An approach to distributed fault injection experiments Proceedings of the 7th international conference on Parallel processing and applied mathematics, (361-370)
  57. Brzeziński J, Kalewski M and Sobaniec C Safety of a session guarantees protocol using plausible clocks Proceedings of the 7th international conference on Parallel processing and applied mathematics, (1-10)
  58. Dai L and Guo W Concurrent subsystem-component development model (CSCDM) for developing adaptive E-commerce systems Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III, (81-91)
  59. Dhankhar V, Kaushik S and Wijesekera D XACML policies for exclusive resource usage Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security, (275-290)
  60. Carotenuto D, Murano A and Peron A 2-visibly pushdown automata Proceedings of the 11th international conference on Developments in language theory, (132-144)
  61. ACM
    Müller J, Gorlatch S, Schröter T and Fischer S Scaling multiplayer online games using proxy-server replication Proceedings of the 16th international symposium on High performance distributed computing, (219-220)
  62. ACM
    Lee A, Minami K and Winslett M Lightweight consistency enforcement schemes for distributed proofs with hidden subtrees Proceedings of the 12th ACM symposium on Access control models and technologies, (101-110)
  63. ACM
    Warnier M, Brazier F, Apistola M and Oskamp A Towards automatic identification of completeness and consistency in digital dossiers Proceedings of the 11th international conference on Artificial intelligence and law, (177-181)
  64. Paradis L and Han Q (2007). A Survey of Fault Management in Wireless Sensor Networks, Journal of Network and Systems Management, 15:2, (171-190), Online publication date: 1-Jun-2007.
  65. Parsa S and Bushehrian O Formal specification and implementation of an environment for automatic distribution Proceedings of the 2nd international conference on Advances in grid and pervasive computing, (543-554)
  66. Liao W, Coloma K, Choudhary A and Ward L (2007). Cooperative Client-Side File Caching for MPI Applications, International Journal of High Performance Computing Applications, 21:2, (144-154), Online publication date: 1-May-2007.
  67. Ramanathan M, Ferreira R, Jagannathan S, Grama A and Szpankowski W (2007). Randomized leader election, Distributed Computing, 19:5-6, (403-418), Online publication date: 1-Apr-2007.
  68. ACM
    Biskupski B, Dowling J and Sacha J (2007). Properties and mechanisms of self-organizing MANET and P2P systems, ACM Transactions on Autonomous and Adaptive Systems, 2:1, (1-es), Online publication date: 1-Mar-2007.
  69. Avidan S, Moses Y and Moses Y (2007). Centralized and Distributed Multi-view Correspondence, International Journal of Computer Vision, 71:1, (49-69), Online publication date: 1-Jan-2007.
  70. Guo W Adaptive approach for developing client-driven e-commerce systems Proceedings of the 6th WSEAS international conference on Applied computer science, (237-241)
  71. ACM
    Brustoloni J (2006). Laboratory experiments for network security instruction, Journal on Educational Resources in Computing, 6:4, (5-es), Online publication date: 1-Dec-2006.
  72. ACM
    Kaushik S, Wijesekera D and Ammann P BPEL orchestration of secure webmail Proceedings of the 3rd ACM workshop on Secure web services, (85-94)
  73. Wong W and Ng J (2006). Scalable peer-to-peer networking architecture: DIVINE, Software—Practice & Experience, 36:13, (1467-1487), Online publication date: 1-Nov-2006.
  74. ACM
    Becker S, Hasselbring W, Paul A, Boskovic M, Koziolek H, Ploski J, Dhama A, Lipskoch H, Rohr M, Winteler D, Giesecke S, Meyer R, Swaminathan M, Happe J, Muhle M and Warns T (2006). Trustworthy software systems, ACM SIGSOFT Software Engineering Notes, 31:6, (1-18), Online publication date: 1-Nov-2006.
  75. Liao W, Coloma K, Choudhary A, Ward L, Russell E and Pundit N (2006). Scalable Design and Implementations for MPI Parallel Overlapping I/O, IEEE Transactions on Parallel and Distributed Systems, 17:11, (1264-1276), Online publication date: 1-Nov-2006.
  76. Choi S, Kim H, Byun E, Hwang C and Baik M (2006). Reliable Asynchronous Message Delivery for Mobile Agents, IEEE Internet Computing, 10:6, (16-25), Online publication date: 1-Nov-2006.
  77. Bushehrian O and Parsa S Formal description of a runtime infrastructure for automatic distribution of programs Proceedings of the 21st international conference on Computer and Information Sciences, (793-802)
  78. ACM
    Müller J, Gössling A and Gorlatch S On correctness of scalable multi-server state replication in online games Proceedings of 5th ACM SIGCOMM workshop on Network and system support for games, (21-es)
  79. ACM
    Lee A and Winslett M Safety and consistency in policy-based authorization systems Proceedings of the 13th ACM conference on Computer and communications security, (124-133)
  80. Alves D, Weigang L and Souza B Using meta-level control with reinforcement learning to improve the performance of the agents Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery, (1109-1112)
  81. Gu X, Lin W and Veeravalli B (2006). Practically Realizable Efficient Data Allocation and Replication Strategies for Distributed Databases with Buffer Constraints, IEEE Transactions on Parallel and Distributed Systems, 17:9, (1001-1013), Online publication date: 1-Sep-2006.
  82. Georgiades A, Luo Y, Lasebae A and Comley R Dual identity return routability for the security of mobile Ipv6 binding updates within the distributed authentication protocol Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications, (406-411)
  83. ACM
    Müller J and GORLATCH S (2006). Rokkatan, Computers in Entertainment, 4:3, (11-es), Online publication date: 1-Jul-2006.
  84. Wang H, Li K, Wang K and Lu S (2006). On the Design and Implementation of an Effective Prefetch Strategy for DSM Systems, The Journal of Supercomputing, 37:1, (91-112), Online publication date: 1-Jul-2006.
  85. Astudillo H, Pereira J and López C Evaluating alternative COTS assemblies from imperfect component information Proceedings of the Second international conference on Quality of Software Architectures, (27-42)
  86. Özkasap Ö and Çaǧlar M (2006). Traffic characterization of transport level reliable multicasting, Computer Networks: The International Journal of Computer and Telecommunications Networking, 50:9, (1193-1218), Online publication date: 20-Jun-2006.
  87. Sharifi M and Salimi H Replication-aware transactions Proceedings of the 11th Ada-Europe international conference on Reliable Software Technologies, (203-214)
  88. ACM
    Al-Dabass D, Peytchev E, Khalil M and Ren M Scalability issues in urban traffic systems Proceedings of the 1st international conference on Scalable information systems, (31-es)
  89. Bayat P, Bordbar M and Challenger M A simulation for distributed systems Proceedings of the 17th IASTED international conference on Modelling and simulation, (334-337)
  90. ACM
    Banagala V Analysis of transaction problems using the problem frames approach Proceedings of the 2006 international workshop on Advances and applications of problem frames, (5-12)
  91. ACM
    Klein F and Tichy M Building reliable systems based on self-organizing multi-agent systems Proceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems, (51-58)
  92. ACM
    Shehory O The role of agents in enterprise system management Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, (1530-1533)
  93. Wujuan L and Veeravalli B (2006). An object replication algorithm for real-time distributed databases, Distributed and Parallel Databases, 19:2-3, (125-146), Online publication date: 1-May-2006.
  94. Brzeziński J, Kobusińska A and Szychowiak M Checkpointing and rollback-recovery protocol for mobile systems with MW session guarantee Proceedings of the 20th international conference on Parallel and distributed processing, (358-358)
  95. ACM
    Elias G, Schuenck M, Negócio Y, Dias J and Filho S X-ARM Proceedings of the 2006 ACM symposium on Applied computing, (1690-1694)
  96. Power K and Morrison J A fault recovery scheme for p2p metacomputers Proceedings of the 12th international conference on High Performance Computing, (51-61)
  97. ACM
    Veas E, Kiyokawa K and Takemura H Self-aware framework for adaptive augmented reality Proceedings of the 2005 international conference on Augmented tele-existence, (70-77)
  98. Choi S, Baik M, Gil J, Park C, Jung S and Hwang C Dynamic scheduling mechanism for result certification in peer to peer grid computing Proceedings of the 4th international conference on Grid and Cooperative Computing, (811-824)
  99. Boström P and Waldén M Development of fault tolerant grid applications using distributed b Proceedings of the 5th international conference on Integrated Formal Methods, (167-186)
  100. Aldred L, van der Aalst W, Dumas M and ter Hofstede A On the notion of coupling in communication middleware Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, COA, and ODBASE - Volume Part II, (1015-1033)
  101. Zhang G, Wang P and Chen W Transaction of web services based on struts Proceedings of the 6th international conference on Advanced Parallel Processing Technologies, (427-434)
  102. Bora S and Dikenelli O Implementing a multi-agent organization that changes its fault tolerance policy at run-time Proceedings of the 6th international conference on Engineering Societies in the Agents World, (153-167)
  103. Hummel K Mobility-aware coordination in a WLAN hot-spot area Proceedings of the Second international conference on Mobility Aware Technologies and Applications, (294-304)
  104. Zimmermann K, Felis S, Schmid S, Eggert L and Brunner M Autonomic wireless network management Proceedings of the Second international IFIP conference on Autonomic Communication, (57-70)
  105. López C and Astudillo H Explicit architectural policies to satisfy NFRs using COTS Proceedings of the 2005 international conference on Satellite Events at the MoDELS, (227-236)
  106. Mendoza S, Decouchant D, Moran A, Enriquez A and Favela J A Flexible Distribution Service for a Co-authoring Environment on the Web Proceedings of the Sixth Mexican International Conference on Computer Science, (10-17)
  107. Mendoza S, Decouchant D, Morán A, Enríquez A and Favela J Adaptive distribution support for co-authored documents on the web Proceedings of the 11th international conference on Groupware: design, Implementation, and Use, (33-48)
  108. ACM
    Zennaro M and Sengupta R Distributing synchronous programs using bounded queues Proceedings of the 5th ACM international conference on Embedded software, (325-334)
  109. Fagg G, Angskun T, Bosilca G, Pjesivac-Grbovic J and Dongarra J Scalable fault tolerant MPI Proceedings of the 12th European PVM/MPI users' group conference on Recent Advances in Parallel Virtual Machine and Message Passing Interface, (67-75)
  110. Brzeziński J and Sobaniec C Safety of an object-based version vector consistency protocol of session guarantees Proceedings of the 6th international conference on Parallel Processing and Applied Mathematics, (978-985)
  111. ACM
    Oechsle R and Gottwald T (2005). DisASTer (distributed algorithms simulation terrain), ACM SIGCSE Bulletin, 37:3, (44-48), Online publication date: 1-Sep-2005.
  112. Sacha J and Dowling J A gradient topology for master-slave replication in peer-to-peer environments Proceedings of the 2005/2006 international conference on Databases, information systems, and peer-to-peer computing, (86-97)
  113. ACM
    Pillai P (2005). Experimental mobile gateways, XRDS: Crossroads, The ACM Magazine for Students, 11:4, (6-6), Online publication date: 1-Aug-2005.
  114. Subotic S and Bishop J Emergent behaviour of aspects in high performance and distributed computing Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries, (11-19)
  115. Donaldson A and Miller A Automatic symmetry detection for model checking using computational group theory Proceedings of the 2005 international conference on Formal Methods, (481-496)
  116. ACM
    Oechsle R and Gottwald T DisASTer (distributed algorithms simulation terrain) Proceedings of the 10th annual SIGCSE conference on Innovation and technology in computer science education, (44-48)
  117. Bora S A fault tolerant system using collaborative agents Proceedings of the 14th Turkish conference on Artificial Intelligence and Neural Networks, (211-218)
  118. ACM
    Müller J, Metzen J, Ploss A, Schellmann M and Gorlatch S Rokkatan Proceedings of the 2005 ACM SIGCHI International Conference on Advances in computer entertainment technology, (125-132)
  119. Kim J and Fox G Scalable hybrid search on distributed databases Proceedings of the 5th international conference on Computational Science - Volume Part III, (431-438)
  120. Brzeziński J, Sobaniec C and Wawrzyniak D Safety of a server-based version vector protocol implementing session guarantees Proceedings of the 5th international conference on Computational Science - Volume Part III, (423-430)
  121. Choi S, Baik M, Hwang C, Gil J and Yu H Mobile agent based adaptive scheduling mechanism in peer to peer grid computing Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV, (936-947)
  122. Corradini F and Merelli E Hermes Proceedings of the 5th international conference on Formal Methods for the Design of Computer, Communication, and Software Systems: mobile computing, (234-270)
  123. Garbacki P, Biskupski B and Bal H Transparent fault tolerance for grid applications Proceedings of the 2005 European conference on Advances in Grid Computing, (671-680)
  124. Litke A, Tserpes K, Dolkas K and Varvarigou T A task replication and fair resource management scheme for fault tolerant grids Proceedings of the 2005 European conference on Advances in Grid Computing, (1022-1031)
  125. Gao L, Dahlin M, Nayate A, Zheng J and Iyengar A (2005). Improving Availability and Performance with Application-Specific Data Replication, IEEE Transactions on Knowledge and Data Engineering, 17:1, (106-120), Online publication date: 1-Jan-2005.
  126. ACM
    Ezenwoye O, Ege R, Yang L and Kharma Q A mediation framework for multimedia delivery Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia, (251-256)
  127. Choi E and Min D A web cluster simulator for performance analysis of the ALBM cluster system Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems, (528-537)
  128. Li X and Autran G Inter-agent communication in IMAGO prolog Proceedings of the Second international conference on Programming Multi-Agent Systems, (163-180)
  129. ACM
    Spasov G and Kakanakov N CGI-based applications for distributed embedded systems for monitoring temperature and humidity Proceedings of the 5th international conference on Computer systems and technologies, (1-6)
  130. Bulut H, Pallickara S and Fox G Implementing a NTP-based time service within a distributed middleware system Proceedings of the 3rd international symposium on Principles and practice of programming in Java, (126-134)
  131. ACM
    Gerndt A, Asbach M, Kuhlen T, Bischof C, Lankes S and Bemmerl T Conceptual design and implementation of a pipeline-based VR-system parallelized by CORBA, and comparison with existing approaches Proceedings of the 2004 ACM SIGGRAPH international conference on Virtual Reality continuum and its applications in industry, (368-374)
  132. ACM
    Biskup J and Wortmann S Towards a credential-based implementation of compound access control policies Proceedings of the ninth ACM symposium on Access control models and technologies, (31-40)
  133. Özkasap Ö (2004). Performance study of a probabilistic multicast transport protocol, Performance Evaluation, 57:2, (177-198), Online publication date: 1-Jun-2004.
  134. ACM
    Granmo O Parallel hypothesis driven video content analysis Proceedings of the 2004 ACM symposium on Applied computing, (642-648)
  135. Blochinger W, Sinz C and Küchlin W (2003). Parallel propositional satisfiability checking with distributed dynamic learning, Parallel Computing, 29:7, (969-994), Online publication date: 1-Jul-2003.
  136. ACM
    Gao L, Dahlin M, Nayate A, Zheng J and Iyengar A Application specific data replication for edge services Proceedings of the 12th international conference on World Wide Web, (449-460)
  137. Tilevich E and Smaragdakis Y NRMI Proceedings of the 23rd International Conference on Distributed Computing Systems
  138. ACM
    Hamza-Lup F, Davis L, Hughes C and Rolland J (2010). Where Digital Meets Physical: Computer-based Distributed Collaborative Environments, XRDS: Crossroads, The ACM Magazine for Students, 9:3, Online publication date: 1-Mar-2003.
  139. ACM
    Lee A A manageable web software architecture Proceedings of the 34th SIGCSE technical symposium on Computer science education, (229-233)
  140. ACM
    Lee A (2003). A manageable web software architecture, ACM SIGCSE Bulletin, 35:1, (229-233), Online publication date: 11-Jan-2003.
  141. ACM
    Farkas C, Ziegler G, Meretei A and Lörincz A Anonymity and accountability in self-organizing electronic communities Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society, (81-90)
  142. ACM
    Friedman R Caching web services in mobile ad-hoc networks Proceedings of the second ACM international workshop on Principles of mobile computing, (90-96)
  143. Özkasap Ö Large-scale behavior of end-to-end epidemic message loss recovery Proceedings of the 3rd international conference on quality of future internet services and internet charging and QoS technologies 2nd international conference on From QoS provisioning to QoS charging, (25-35)
  144. Wijngaards N, Overeinder B, van Steen M and Brazier F (2002). Supporting internet-scale multi-agent systems, Data & Knowledge Engineering, 41:2-3, (229-245), Online publication date: 1-Jun-2002.
Contributors
  • Free University Amsterdam
  • University of Twente

Recommendations