메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 31-38

Result verification and trust-based scheduling in peer-to-peer Grids

Author keywords

Grid computing; Peer to peer; Reputation system; Result verification; Trust

Indexed keywords

GRID COMPUTING; PEER-TO-PEER GRIDS; REPUTATION SYSTEM; RESULT VERIFICATION;

EID: 33845370375     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/P2P.2005.32     Document Type: Conference Paper
Times cited : (95)

References (19)
  • 1
    • 84898264431 scopus 로고    scopus 로고
    • A peer-to-peer approach to resource discovery in grid environments
    • Adriana Iamnitchi and Ian Foster, "A peer-to-peer approach to resource discovery in grid environments," in HPDC'02, 2002.
    • (2002) HPDC'02
    • Iamnitchi, A.1    Foster, I.2
  • 2
    • 0012419393 scopus 로고    scopus 로고
    • Fran Berman, Geoffrey Fox, and Anthony Hey, Eds., John Wiley & Sons Ltd, Chichester, UK
    • Fran Berman, Geoffrey Fox, and Anthony Hey, Eds., Grid Computing: Making The Global Infrastructure a Reality, John Wiley & Sons Ltd, Chichester, UK, 2003.
    • (2003) Grid Computing: Making the Global Infrastructure a Reality
  • 4
    • 34548057704 scopus 로고    scopus 로고
    • Cluster computing on the fly: P2p scheduling of idle cycles in the internet
    • V. Lo, D. Zappala, D. Zhou, Y. Liu, and S. Zhao, "Cluster computing on the fly: P2p scheduling of idle cycles in the internet," in IPTPS, 2004.
    • (2004) IPTPS
    • Lo, V.1    Zappala, D.2    Zhou, D.3    Liu, Y.4    Zhao, S.5
  • 7
    • 33845365702 scopus 로고    scopus 로고
    • The seti@home problem
    • David Molnar, "The seti@home problem," E-Commerce, 2000.
    • (2000) E-Commerce
    • Molnar, D.1
  • 8
    • 84887571726 scopus 로고    scopus 로고
    • Sabotage-tolerance mechanisms for volunteer computing systems
    • Luis F. G. Sarmenta, "Sabotage-tolerance mechanisms for volunteer computing systems," in CCGrid, 2001.
    • (2001) CCGrid
    • Sarmenta, L.F.G.1
  • 9
    • 0003197918 scopus 로고    scopus 로고
    • Protecting mobile agents against malicious hosts
    • G. Vigna (ed.)
    • T. Sander and C. Tschudin, "Protecting mobile agents against malicious hosts," in G. Vigna (ed.) Mobile Agents and Security, LNCS, 1998.
    • (1998) Mobile Agents and Security, LNCS
    • Sander, T.1    Tschudin, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.