메뉴 건너뛰기




Volumn , Issue , 2005, Pages

Toward an optimal redundancy strategy for distributed computations

Author keywords

Distributed computation; Probabilistic verification

Indexed keywords

CHEATING DETECTION; CLUSTER COMPUTING; COMPUTATIONAL COSTS; COMPUTATIONAL RESOURCES; DETECTION PROBABILITIES; DISTRIBUTED COMPUTATION; DISTRIBUTED COMPUTATIONS; DISTRIBUTION SCHEME; INTERNATIONAL CONFERENCES; LOWER BOUNDS; OPTIMAL REDUNDANCY; PROBABILISTIC VERIFICATION; TASK DISTRIBUTION;

EID: 50149106838     PISSN: 15525244     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CLUSTR.2005.347045     Document Type: Conference Paper
Times cited : (19)

References (15)
  • 3
    • 84949235873 scopus 로고    scopus 로고
    • Secure distributed computing in a commercial environment
    • P. Syverson, editor, Proceedings of Financial Crypto 2001, of, Springer-Verlag
    • P. Golle and S. Stubblebine. Secure distributed computing in a commercial environment. In P. Syverson, editor, Proceedings of Financial Crypto 2001, volume 2339 of Lecture Notes in Computer Science, pages 289-304. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2339 , pp. 289-304
    • Golle, P.1    Stubblebine, S.2
  • 4
    • 0001943763 scopus 로고    scopus 로고
    • Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
    • G. Vigna, editor, Springer-Verlag: Heidelberg, Germany
    • F. Hohl. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In G. Vigna, editor, Mobile Agent Security, pages 92-113. Springer-Verlag: Heidelberg, Germany, 1998.
    • (1998) Mobile Agent Security , pp. 92-113
    • Hohl, F.1
  • 9
    • 0003197918 scopus 로고    scopus 로고
    • Protecting Mobile Agents Against Malicious Hosts
    • G. Vigna, editor, Springer-Verlag: Heidelberg, Germany
    • T. Sander and C. F. Tschudin. Protecting Mobile Agents Against Malicious Hosts. In G. Vigna, editor, Mobile Agent Security, pages 44-60. Springer-Verlag: Heidelberg, Germany, 1998.
    • (1998) Mobile Agent Security , pp. 44-60
    • Sander, T.1    Tschudin, C.F.2
  • 10
    • 0036499242 scopus 로고    scopus 로고
    • Sabotage-tolerance mechanisms for volunteer computing systems
    • March
    • L. Sarmenta. Sabotage-tolerance mechanisms for volunteer computing systems. Future Generation Computer Systems, 18(4):561-572, March 2002.
    • (2002) Future Generation Computer Systems , vol.18 , Issue.4 , pp. 561-572
    • Sarmenta, L.1
  • 11
    • 0032592479 scopus 로고    scopus 로고
    • Bayanihan: Building and studying web-based volunteer computing systems using java
    • L. Sarmenta and S. Hirano. Bayanihan: Building and studying web-based volunteer computing systems using java. Future Generation Computer Systems, 15(5/6):675-686, 1999.
    • (1999) Future Generation Computer Systems , vol.15 , Issue.5-6 , pp. 675-686
    • Sarmenta, L.1    Hirano, S.2
  • 12
    • 50149112769 scopus 로고    scopus 로고
    • The Search for Extraterrestrial Intelligence project. University of California, Berkeley. http://setiathome.berkeley.edu/.
    • The Search for Extraterrestrial Intelligence project. University of California, Berkeley. http://setiathome.berkeley.edu/.
  • 14
    • 0002717089 scopus 로고    scopus 로고
    • Cryptographic Traces for Mobile Agents
    • G. Vigna, editor, Springer-Verlag: Heidelberg, Germany
    • G. Vigna. Cryptographic Traces for Mobile Agents. In G. Vigna, editor, Mobile Agent Security, pages 137-153. Springer-Verlag: Heidelberg, Germany, 1998.
    • (1998) Mobile Agent Security , pp. 137-153
    • Vigna, G.1
  • 15
    • 0031274275 scopus 로고    scopus 로고
    • Software reliability via runtime result-checking
    • H. Wasserman and M. Blum. Software reliability via runtime result-checking. Journal of the ACM, 44(6):826-849, 1997.
    • (1997) Journal of the ACM , vol.44 , Issue.6 , pp. 826-849
    • Wasserman, H.1    Blum, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.