XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Articles Tagged: Distributed systems organizing principles

Articles & Features

Toward decentralization: Democracy for devices

SECTION: Features

Toward decentralization: Democracy for devices

As more and more devices are connected to one another, there is a growing shift to decentralized independent operation without the need of a central controller. We look into the aspects of collective operation, resilience, security, and peer-to-peer economy in a decentralized network, analyzing the benefits and challenges of introducing "democracy" among devices.

By Nitin Shivaraman, September 2019

PDF | HTML | In the Digital Library

Blogs

DEPARTMENT: Blogs

Blogs

By Matthew Kay, Dimitris Mitropoulos, Wolfgang Richter, Lora Oehlberg, Lea Rosen, September 2012

PDF | HTML | In the Digital Library

Elasticity in the cloud

Elasticity in the cloud

By David Chiu, March 2010

PDF | HTML | In the Digital Library

Cloud computing in plain English

Volunteer computing

Volunteer computing

Computers continue to get faster exponentially, but the computational demands of science are growing even faster. Extreme requirements arise in at least three areas.

By David P. Anderson, March 2010

PDF | HTML | In the Digital Library

Clouds at the crossroads

Clouds at the crossroads

Despite its promise, most cloud computing innovations have been almost exclusively driven by a few industry leaders, such as Google, Amazon, Yahoo!, Microsoft, and IBM. The involvement of a wider research community, both in academia and industrial labs, has so far been patchy without a clear agenda. In our opinion, the limited participation stems from the prevalent view that clouds are mostly an engineering and business-oriented phenomenon based on stitching together existing technologies and tools.

By Ymir Vigfusson, Gregory Chockler, March 2010

PDF | HTML | In the Digital Library

Scientific workflows and clouds

Scientific workflows and clouds

In recent years, empirical science has been evolving from physical experimentation to computation-based research. In astronomy, researchers seldom spend time at a telescope, but instead access the large number of image databases that are created and curated by the community [42]. In bioinformatics, data repositories hosted by entities such as the National Institutes of Health [29] provide the data gathered by Genome-Wide Association Studies and enable researchers to link particular genotypes to a variety of diseases.

By Gideon Juve, Ewa Deelman, March 2010

PDF | HTML | In the Digital Library

The cloud at work

The cloud at work

By Sumit Narayan, Chris Heiden, March 2010

PDF | HTML | In the Digital Library

State of security readiness

State of security readiness

Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. With this pay-as-you-go model of computing, cloud solutions are seen as having the potential to both dramatically reduce costs and increase the rapidity of development of applications.

By Ramaswamy Chandramouli, Peter Mell, March 2010

PDF | HTML | In the Digital Library

Server virtualization architecture and implementation

Virtual machine technology, or virtualization, is gaining momentum in the information technology community. While virtual machines are not a new concept, recent advances in hardware and software technology have brought virtualization to the forefront of IT management. Stability, cost savings, and manageability are among the reasons for the recent rise of virtualization. Virtual machine solutions can be classified by hardware, software, and operating system/containers. From its inception on the mainframe to distributed servers on x86, the virtual machine has matured and will play an increasing role in systems management.

By Jeff Daniels, September 2009

PDF | HTML | In the Digital Library

Introduction

By Justin Solomon, March 2009

PDF | HTML | In the Digital Library

Architecting trust-enabled peer-to-peer file-sharing applications

Decentralized peer-to-peer (P2P) resource sharing applications lack a centralized authority that can facilitate peer and resource look-ups and coordinate resource sharing between peers. Instead, peers directly interact and exchange resources with other peers. These systems are often open and do not regulate the entry of peers into the system. Thus, there can be malicious peers in the system who threaten others by offering Trojan horses and viruses disguised as seemingly innocent resources. Several trust-based solutions exist to address such threats; unfortunately there is a lack of design guidance on how these solutions can be integrated into a resource sharing application. In this paper, we describe how two teams of undergraduate students separately integrated XREP, a third-party reputation-based protocol for file-sharing applications, with PACE, our software architecture-based approach for decentralized trust management. This was done in order to construct trust-enabled P2P file-sharing application prototypes. Our observations have revealed that using an architecture-based approach in incorporating trust into P2P resource-sharing applications is not only feasible, but also significantly beneficial. Our efforts also demonstrate both the ease of adoption and ease of use of the PACE-based approach in constructing such trust-enabled decentralized applications.

By Girish Suryanarayana, Mamadou H. Diallo, Justin R. Erenkrantz, Richard N. Taylor, August 2006

PDF | HTML | In the Digital Library

Building an MPI cluster

By Donald C. Bergen, Boise P. Miller, August 2002

PDF | HTML | In the Digital Library

Charlotte

By Stuart Patterson, June 2000

PDF | HTML | In the Digital Library

AgentOS

By Larry Chen, November 1998

PDF | HTML | In the Digital Library