Topic
Shared resource
About: Shared resource is a research topic. Over the lifetime, 7536 publications have been published within this topic receiving 123491 citations. The topic is also known as: network share.
Papers published on a yearly basis
Papers
More filters
01 Jan 1997
TL;DR: Alpha is a non-proprietary experimental operating system kernel which extends the realtime domain to encompass distributed applications, such as for telecommunications, factory automation, and defense, which cannot be combined and scaled up cost-effectively to accommodate distributed real-time systems.
Abstract: Alpha is a non-proprietary experimental operating system kernel which extends the realtime domain to encompass distributed applications, such as for telecommunications, factory automation, and defense Distributed real-time systems are inherently asynchronous, dynamic, and non-deterministic, and yet are nonetheless mission-criticalThe increasing complexity and pace of these systems precludes the historical reliance solely on human operators for assuring system dependability under uncertainty Traditional real-time OS technology is based on attempting to assert or impose determinism of not just the ends but also the means, for centralized low-level sampled-data monitoring and control, with an insufficiency of hardware resources Conventional distributed OS technology is primarily based on two-party client/server hierarchies for explicit resource sharing in networks of autonomous users These two technological paradigms are special cases which cannot be combined and scaled up cost-effectively to accommodate distributed real-time systems Alpha’s new paradigm for real-time distributed computing is founded on best-effort management of all resources directly with computation completion time constraints which are expressed as benefit functions; and multiparty, peer-structured, trans-node computations for cooperative mission management
69 citations
••
TL;DR: This chapter presents the implementation of a resource broker for UNICORE as this functionality was not supported in the previous version of Gridbus and a comparison of these systems on the basis of the architecture, implementation model and several other features is included.
Abstract: Grid is an infrastructure that involves the integrated and collaborative use of computers, networks,
databases and scientific instruments owned and managed by multiple organizations Grid applications often involve
large amounts of data and/or computing resources that require secure resource sharing across organizational
boundaries This makes Grid application management and deployment a complex undertaking Grid middlewares
provide users with seamless computing ability and uniform access to resources in the heterogeneous Grid
environment Several software toolkits and systems have been developed, most of which are results of academic
research projects, all over the world This chapter will focus on four of these middlewares—UNICORE, Globus,
Legion and Gridbus It also presents our implementation of a resource broker for UNICORE as this functionality
was not supported in it A comparison of these systems on the basis of the architecture, implementation model and
several other features is included
69 citations
••
TL;DR: A Comprehensive Transmission model is proposed, by combining the Client/Server (C/S) mode and the Peer-to-Peer (P2P) mode for reliable data transmission, and a Two-Phase Resource Sharing (TPRS) protocol is designed, which mainly consists of a pre-filtering phase and a verification phase to efficiently and privately achieve authorized resource sharing in the CT model.
68 citations
•
IBM1
TL;DR: In this paper, the authors present methods and apparatus for implementing context-dependent security for files and other computer system resources, in particular, they implement context-based permissions that are used in contextdependent file security.
Abstract: The present invention concerns methods and apparatus for implementing context-dependent security for files and other computer system resources. In particular, methods and apparatus of the present invention implement context-based permissions that are used in context-dependent file security. In examples of the present invention, the context-based permissions may allow access to a file only when an attempt to access the file is made at a certain time of day, or from an authorized computer system, or from a computer having a certain application program installed. In general terms, the context-based permissions may specify time, location and application information that either alone or in combination may be used to restrict access to a file.
68 citations
•
15 Dec 2006TL;DR: In this paper, the total offered traffic load for a shared resource within a network switching system may include a sum of offered traffic loads from one or more active virtual output queues (VOQs).
Abstract: According to an example embodiment, a total offered traffic load for a shared resource within a network switching system may be determined, the total offered traffic load may include, for example, a sum of offered traffic loads from one or more active virtual output queues (VOQs) of the network switching system. A capacity of the shared resource within the network switching system may be determined. A transmission rate from one or more of the active VOQs over the shared resource may be adjusted such that the total traffic load from the active VOQs does not exceed the capacity of the shared resource.
68 citations