scispace - formally typeset
Search or ask a question
Topic

Shared resource

About: Shared resource is a research topic. Over the lifetime, 7536 publications have been published within this topic receiving 123491 citations. The topic is also known as: network share.


Papers
More filters
01 Jan 1997
TL;DR: Alpha is a non-proprietary experimental operating system kernel which extends the realtime domain to encompass distributed applications, such as for telecommunications, factory automation, and defense, which cannot be combined and scaled up cost-effectively to accommodate distributed real-time systems.
Abstract: Alpha is a non-proprietary experimental operating system kernel which extends the realtime domain to encompass distributed applications, such as for telecommunications, factory automation, and defense Distributed real-time systems are inherently asynchronous, dynamic, and non-deterministic, and yet are nonetheless mission-criticalThe increasing complexity and pace of these systems precludes the historical reliance solely on human operators for assuring system dependability under uncertainty Traditional real-time OS technology is based on attempting to assert or impose determinism of not just the ends but also the means, for centralized low-level sampled-data monitoring and control, with an insufficiency of hardware resources Conventional distributed OS technology is primarily based on two-party client/server hierarchies for explicit resource sharing in networks of autonomous users These two technological paradigms are special cases which cannot be combined and scaled up cost-effectively to accommodate distributed real-time systems Alpha’s new paradigm for real-time distributed computing is founded on best-effort management of all resources directly with computation completion time constraints which are expressed as benefit functions; and multiparty, peer-structured, trans-node computations for cooperative mission management

69 citations

Book ChapterDOI
TL;DR: This chapter presents the implementation of a resource broker for UNICORE as this functionality was not supported in the previous version of Gridbus and a comparison of these systems on the basis of the architecture, implementation model and several other features is included.
Abstract: Grid is an infrastructure that involves the integrated and collaborative use of computers, networks, databases and scientific instruments owned and managed by multiple organizations Grid applications often involve large amounts of data and/or computing resources that require secure resource sharing across organizational boundaries This makes Grid application management and deployment a complex undertaking Grid middlewares provide users with seamless computing ability and uniform access to resources in the heterogeneous Grid environment Several software toolkits and systems have been developed, most of which are results of academic research projects, all over the world This chapter will focus on four of these middlewares—UNICORE, Globus, Legion and Gridbus It also presents our implementation of a resource broker for UNICORE as this functionality was not supported in it A comparison of these systems on the basis of the architecture, implementation model and several other features is included

69 citations

Journal ArticleDOI
TL;DR: A Comprehensive Transmission model is proposed, by combining the Client/Server (C/S) mode and the Peer-to-Peer (P2P) mode for reliable data transmission, and a Two-Phase Resource Sharing (TPRS) protocol is designed, which mainly consists of a pre-filtering phase and a verification phase to efficiently and privately achieve authorized resource sharing in the CT model.

68 citations

Patent
28 Oct 2005
TL;DR: In this paper, the authors present methods and apparatus for implementing context-dependent security for files and other computer system resources, in particular, they implement context-based permissions that are used in contextdependent file security.
Abstract: The present invention concerns methods and apparatus for implementing context-dependent security for files and other computer system resources. In particular, methods and apparatus of the present invention implement context-based permissions that are used in context-dependent file security. In examples of the present invention, the context-based permissions may allow access to a file only when an attempt to access the file is made at a certain time of day, or from an authorized computer system, or from a computer having a certain application program installed. In general terms, the context-based permissions may specify time, location and application information that either alone or in combination may be used to restrict access to a file.

68 citations

Patent
Brian Petersen1
15 Dec 2006
TL;DR: In this paper, the total offered traffic load for a shared resource within a network switching system may include a sum of offered traffic loads from one or more active virtual output queues (VOQs).
Abstract: According to an example embodiment, a total offered traffic load for a shared resource within a network switching system may be determined, the total offered traffic load may include, for example, a sum of offered traffic loads from one or more active virtual output queues (VOQs) of the network switching system. A capacity of the shared resource within the network switching system may be determined. A transmission rate from one or more of the active VOQs over the shared resource may be adjusted such that the total traffic load from the active VOQs does not exceed the capacity of the shared resource.

68 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
84% related
Information system
107.5K papers, 1.8M citations
83% related
Software
130.5K papers, 2M citations
80% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202381
2022194
2021223
2020298
2019381
2018373