Journal Articles 2015(1 publication) [publication]Magalhaes, J.P. and Silva, L. , "SHõWA: A Self-Healing Framework for Web-Based Applications", ACM Transactions on Autonomous and Adaptive Systems , vol. 10, pp. 1-28, 2015 2009(1 publication) [publication]Silaghi, G.C. and Araujo, F. and Silva, L. and Domingues, P. and Arenas, A.E. , "Defeating colluding nodes in desktop grid computing platforms", Journal of Grid Computing, vol. 7, pp. 555-573, 2009 [citation][year=2014][PDF] Reliable peer-to-peer computing system M ZOCHNIAK, B SAWICKI - red.pe.org.pl Abstract. Paper discuss a heterogeneous, distributed computing system commonly referred as a volunteer computing. Mechanism of determining correctness of results, based on replication and trust modeling, is proposed. In presented solution owners of computational ... Cited by 1 Related articles All 4 versions Cite Save More [citation][year=2014]The Effectiveness of Reputation-based Voting for Collusion Tolerance in Large-Scale Grids M Essaaidi, A Bendahmane, A El Moussaoui, Y Ali - ieeexplore.ieee.org Abstract—Large scale grids permit to share grid resources spread over different autonomous administrative sites in the internet. The rapid progress of grid systems opens the door for numerous companies to adopt this technology in their business development. ... Cite Save Create alert [citation][year=2013]Algorithmic Mechanisms for Reliable Internet-based Computing under Collusion http://arxiv.org/abs/1307.1650 AF Anta, C Georgiou, MA Mosteiro arXiv preprint arXiv:1307.1650 2013 arxiv.org [citation][year=2012]Xu Ling, ”Security Mechanisms for Distributed Computing Systems”, PhD Thesis, Tohoku University, 2012. (http://hdl.handle.net/10097/53937) [citation][year=2011]Gianluca Ciccarelli, Renato Lo Cigno, Collusion in peer-to-peer systems, Computer Networks, Volume 55, Issue 15, 27 October 2011, pp 3517-3532, ISSN 1389-1286, 10.1016/j.comnet.2011.06.028. [citation][year=2011]Canon, L., Jeannot, E., Weissman, J., "A Scheduling and Certification Algorithm for Defeating Collusion in Desktop Grids", 31st International Conference on Distributed Computing Systems (ICDCS), pp 343-352, 2011 [citation][year=2010]REPORTS ON SYSTEMS AND COMMUNICATIONS http://gsyc.es/tr-docs/RoSaC-2010-1.pdf AF Anta, A Milani, MA Mosteiro, S Zaks - http://gsyc.es/tr-docs/RoSaC-2010-1.pdf [citation][year=2010]Safety in Numbers http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=ADA532995 D Melski, D Cok, J Phillips, S Wisniewski, SH Yong… Publication/NA 2010 [citation][year=2010]L.-C. Canon. Coping with uncertainty in scheduling problems. In {em Parallel Distributed Processing, Workshops and Phd Forum (IPDPSW), 2010 IEEE International Symposium on}, pages 1 --4, April 2010. [citation][year=2010]L.-C. Canon, E.~Jeannot, and J.~Weissman. A dynamic approach for characterizing collusion in desktop grids. In {em Parallel Distributed Processing (IPDPS), 2010 IEEE International Symposium on}, pages 1 --12, April 2010. [citation][year=2010]{L}ouis-{C}laude {C}anon, {E}mmanuel {J}eannot, and {J}on {W}eissman. {A} {S}cheduling {A}lgorithm for {D}efeating {C}ollusion. Research Report {RR}-7403, INRIA, 10 2010. [citation][year=2010]Eugen Staab. {em Reliable Information Acquisition in the Presence of Malicious Sources}. PhD thesis, University of Luxembourg, April 2010. Online Version, 2010-04-22. [citation][year=2010]Canon, L.C., “Outils et algorithmes pour gérer l’incertitude lors de l’ordonnancement d’application sur plateformes distribuées”, PhD Thesis, Université Henri Poincarré – Nancy 1, France, 2010. [citation][year=2009]Eugen Staab and Thomas Engel. Collusion detection for grid computing. In Franck Cappello, Cho-Li Wang, and Rajkumar Buyya, editors, {\em Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid CCGrid '09)}, pages 412--419. IEEE Computer Society, May 2009. [citation][year=2009]Kan Watanabe, Masaru Fukushi, and Susumu Horiguchi. Collusion-resistant sabotage-tolerance mechanisms for volunteer computing systems. e-Business Engineering, IEEE International Conference on, 0:213--218, 2009. [citation][year=2008]Eugen Staab, Volker Fusenig, and Thomas Engel. Using correlation for collusion detection in grid settings, 2008. 2008(1 publication) [publication]Costa, F. and Kelley, I. and Silva, L. and Fedak, G. , "Optimizing Data Distribution in Desktop Grid Platforms", Parallel Processing Letters, vol. 18, 2008 2007(1 publication) [publication]Domingues, P. and Silva, L. and Sousa, B. , "Sabotage-Tolerance and Trust Management in Desktop Grid Computing", Journal on Future Generation Computer Systems, vol. 23, 2007 [citation][year=2015]Pareek, Gaurav, Chetanya Goyal, and Mukesh Nayal. "A Result Verification Scheme for MapReduce Having Untrusted Participants." Intelligent Distributed Computing. Springer International Publishing, 2015. 11-19. [citation][year=2014]Wang, Yongzhi, Jinpeng Wei, and Yucong Duan. "Securing MapReduce Result Integrity via Verification-based Integrity Assurance Framework." International Journal of Grid & Distributed Computing 7.6 (2014). [citation][year=2014]Essaaidi, Mohamed, et al. "The Effectiveness of Reputation-based Voting for Collusion Tolerance in Large-Scale Grids.", 2014. [citation][year=2014]Mehta, Hemant Kumar, and Rohit Ahuja. "A Holistic Trust Management Leasing Algorithm for IaaS Cloud." International Journal of Systems and Service-Oriented Engineering (IJSSOE) 4.2 (2014): 1-12. [citation][year=2014]McGilvary, Gary Andrew. "Ad hoc cloud computing." (2014). [citation][year=2014]ZOCHNIAK, Micha?, and Bartosz SAWICKI. "Reliable peer-to-peer computing system." Przeglad Elektrotechniczny (2014). [citation][year=2013]Christoforou, Evgenia and Anta, Antonio Fernandez and Georgiou, Chryssis and Mosteiro, Miguel A et al., ”Reputation-based Mechanisms for Evolutionary Master-Worker Computing”,arXiv preprint arXiv:1307.2783, 2013. [citation][year=2013]Muszynski, Jakub and Varrette, Sébastien and Bouvry, Pascal, ”Expected running time of parallel evolutionary algorithms on unimodal pseudo-boolean functions over small-world networks”, IEEE Congress on Evolutionary Computation (CEC), pp. 2588-2594, 2013. [citation][year=2013]Watanabe, Kan and Fukushi, Masaru and Funabiki, Nobuo and Nakanishi, Toru,”Performance Evaluation of Check-By-Voting for Colluding Attack in Volunteer Computing Systems”, IAENG Transactions on Engineering Technologies, pp.33-48, 2013. [citation][year=2013]Watanabe, Kan and Funabiki, Nobuo and Nakanishi, Toru and Fukushi, Masaru, ”Optimal Spot-Checking for Delayed Attack on Desktop Grid Systems”, UKSim, pp.600-605, 2013. [citation][year=2012]Kan Watanabe, Nobuo Funabiki, Toru Nakanishi and Masaru Fukushi, ”Modeling and Performance Evaluation of Colluding Attack in Volunteer Computing Systems”, Proceedings of the International MultiConference of Engineers and Computer Scientists 2012, Vol. II, IMECS 2012, March 14-16, 2012, Hong Kong. [citation][year=2012]Silaghi C. Gheorghe, Dependable Resource Management Tools towards Automated Collaboration in Heterogeneous Computing Environments, Habilitation Thesis, Babes Bolyai University, Romenia, 2012. [citation][year=2012]Christoforou, Evgenia and Fernández Anta, Antonio and Georgiou, Chryssis and Mosteiro, Miguel A. Algorithmic Mechanisms for Reliable Master-Worker Internet-based Computing. IEEE Transactions on Computers. ISSN 0018-9340, 2012. [citation][year=2012]Fernández Anta, Antonio and Georgiou, Chryssis and López, Luis and Santos, Agustin (2012) Reliable Internet-based Master-Worker Computing in the Presence of Malicious Workers. Parallel Processing Letters, 22 (1). [citation][year=2012]Bendahmane, Ahmed and Essaaidi, Mohammad and Younes, Ali et al., ”A new mechanism to ensure integrity for MapReduce in cloud computing”, 2012 International Conference on Multimedia Computing and Systems (ICMCS), pp 785–790, 2012. [citation][year=2012]Bendahmane, Ahmed and Essaaidi, Mohammad and Moussaoui, Ahmed El and Younes, Ali, ”Result verification mechanism for MapReduce computation integrity in cloud computing”, 2012 International Conference on Complex Systems (ICCS), 2012. [citation][year=2012]W Viriyasitavat, A Martin, "A survey of trust in workflows and relevant contexts", Communications Surveys & Tutorials, 2012 [citation][year=2012]Y Cui, M Li, Y Xiang, Y Ren et al. "A QoS-based fine-grained reputation system in the grid environment", 2012, Wiley. [citation][year=2012]A Mohaisen, "Towards Trustworthy Computing on Social Networks: Measurements and New Applications" [citation][year=2012]A Bendahmane, M Essaaidi et al., "A new mechanism to ensure integrity for MapReduce in cloud computing" [citation][year=2012]A Bendahmane, M Essaaidi et al., "Result verification mechanism for MapReduce computation integrity in cloud computing" [citation][year=2012]AJ Sánchez-Santiago, "Planificación local de tareas con sistemas basados en reglas borrosas. Aplicación a la detección de defectos en tableros de fibra" [citation][year=2011]K., Watanabe, and Fukushi, M. and Kameyama, M., “Adaptive Group-Based Job Scheduling for High Performance and Reliable Volunteer Computing”, Journal of Information Processing, volume 19, pp. 39-51, 2011 [citation][year=2011]Moca, M.; Silaghi, G.C.; Fedak, G.;Babes-Bolyai , “Distributed results checking for MapReduce in volunteer computing”, Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium o. May 2011. (DOI: 10.1109/IPDPS.2011.351) [citation][year=2011]Yongzhi Wang, Jinpeng Wei, "VIAF: Verification-Based Integrity Assurance Framework for MapReduce", Cloud Computing (CLOUD), 2011 IEEE International Conference on. DOI: 10.1109/CLOUD.2011.33 [citation][year=2011]Hailong Sun, Jinpeng Huai, Xudong Liu, Jing Li, “RECON: a novel approach to fighting unreliability in peer-to-peer grids”, International Journal of Grid and Utility Computing (ISSN:1741-847X), pp 77-84, Volume 2, Number 2/2011, DOI: 10.1504/IJGUC.2011.040595 (http://inderscience.metapress.com/content/7w548p44225284w6/) [citation][year=2011]Viriyasitavat, W. Martin, A., "A Survey of Trust in Workflows and Relevant Contexts", Communications Surveys & Tutorials, IEEE, pp 1-30, Issue 99, 2011, DOI: 10.1109/SURV.2011.072811.00081 [citation][year=2011]Wander, M.; Weis, T.; Wacker, A.; “Detecting Opportunistic Cheaters in Volunteer Computing”, Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), 2011, pp 1-6, DOI: 10.1109/ICCCN.2011.6006040 [citation][year=2011]Bendahmane, A.; Essaaidi, M.; Moussaoui, A.E.; Younes, A., "Tolerating malicious resources to ensure safe computations in grid systems", 2011 International Conference on Multimedia Computing and Systems (ICMCS), DOI: 10.1109/ICMCS.2011.5945679 [citation][year=2011]Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim, “SocialCloud: Using Social Networks for Building Distributed Computing Services”, CoRR, 2011. [citation][year=2011]Viriyasitavat, W.; Martin, A.; , "A Survey of Trust in Workflows and Relevant Contexts," Communications Surveys & Tutorials, IEEE , vol.PP, no.99, pp.1-30, 2011. (doi:10.1109/SURV.2011.072811.00081) [citation][year=2010]Junseok Hwang, Jihyoun Park, Jorn Altmann, “Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods”, in book “Information Systems, Technology and Management”, pp 187-197, 2010. [citation][year=2010]Wang, Y., Nakao, A., “Poisonedwater: An improved approach for accurate reputation ranking in P2P networks” Future Generation Computer Systems, volume 26, issue 8, year 2010, pp. 1317 – 1326. [citation][year=2010]Papaioannou, T.G., Stamoulis, G.D, “coverReputation-based estimation of individual performance in collaborative and competitive grids”, Future Generation Computer Systems, volume 26, issue 8, pp. 1327 – 1335, 2010. [citation][year=2010]Bernard, Y., Klejnowski, L., Hahner, J., Muller-Schloer, C., “Towards trust in desktop grid systems”, Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 637—642, 2010. [citation][year=2010]Choi, S.J. and Buyya, R., “Group-based adaptive result certification mechanism in Desktop Grids”, Future Generation Computer Systems, volume 26, issue 5, pp. 776—786, 2010. [citation][year=2010]Bendahmane, A., Essaaidi, M., El Moussaoui, A., Younes, A., “Compromised Resources Tolerance in Grid Computing Systems”, Intelligent Distributed Computing IV, pp. 145—154, 2010. [citation][year=2010]Antonopoulos, N., Rana, O.F., “Management and optimisation of P2P and Grid systems with network economics”, Future Generation Computer Systems, volume 26, issue 8, pp. 1282—1284, 2010. [citation][year=2010]Canon, Louis-Claude, Jeannot, Emmanuel, Weissman, Jon, “A Scheduling Algorithm for Defeating Collusion”, Research Report, INRIA, RR-7403, October 2010 [citation][year=2010]Hwang, J. and Kim, H.J. and Park, J., “Managing risks in an open computing environment using mean absolute deviation portfolio optimization”, Future Generation Computer Systems, volume 26, issue 8, pp. 1381-1390, 2010 [citation][year=2010]Hwang, J. and Park, J. and Altmann, J., “Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods”, Information Systems, Technology and Management, pp. 187-197, 2010 [citation][year=2010]Canon, L.C. and Jeannot, E. and Weissman, J., “A Scheduling Algorithm for Defeating Collusion”, 2010 [citation][year=2010]Bendahmane, A. and Essaaidi, M. and El Moussaoui, A. and Younes, A., “Reputation-based Majority Voting for Malicious Grid Resources Tolerance”, Scalable Computing, pp. 385, 2010. [citation][year=2010]Canon, L.C., “Outils et algorithmes pour gérer l’incertitude lors de l’ordonnancement d’application sur plateformes distribuées”, PhD Thesis, Université Henri Poincarré – Nancy 1, France, 2010. [citation][year=2010]Bendahmane, Mohammad Essaaidi, Ahmed El Moussaoui, Ali Younes, "Reputation-based Majority Voting for Malicious Grid Resources Tolerance", Ahmed Scientific International Journal for Parallel and Distributed Computing, Vol 11, No 4 (2010) - (http://www.scpe.org/index.php/scpe/article/view/669) [citation][year=2010]K Watanabe, M Fukushi, S Horiguchi, “Expected-Credibility-Based Job Scheduling for Reliable Volunteer Computing”, IEICE TRANSACTIONS on Information and Systems 93(2), pp 306-314, 2010. [citation][year=2010]K Watanabe, M Fukushi, “Generalized Spot-Checking for Reliable Volunteer Computing”, IEICE TRANSACTIONS on Information and Systems 93(12), pp 3164-3172, 2010. [citation][year=2010]F. Taoab, Y. Hub, D. Zhaoc, Z. Zhoub, “Study of failure detection and recovery in manufacturing grid resource service scheduling”, International Journal of Production Research 48(1), pp 69-94, 2010. doi:10.1080/00207540802275871 [citation][year=2010]K Watanabe, M Fukushi, S Horiguchi, “Generalized Spot-Checking for Sabotage-Tolerance in Volunteer Computing Systems”, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp 655-660, 2010. [citation][year=2010]Y. Bernard, L. Klejnowski, J. Hahner, C. Muller-Schloer, “Towards Trust in Desktop Grid Systems”, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp 637-642, 2010. [citation][year=2010]F. Georgatos, V. Gkamas, A. Ilias, G. Kouretis, E. Varvarigos, “A Grid-enabled CPU Scavenging Architecture and a Case Study of its Use in the Greek School Network”, Journal of Grid Computing 8(1), pp 61-75, 2010. [citation][year=2009]J. Hwang, H.J. Kim, J. Park “Managing risks in an open computing environment using mean absolute deviation portfolio optimization”, Future Generation Computer Systems, 2009. [citation][year=2009]Y. Wang, A. Nakao, “Poisonedwater: An improved approach for accurate reputation ranking in P2P networks”, Future Generation Computer Systems, 2009. [citation][year=2009]Ana Cristina Oliveira, Lívia Sampaio, Stênio Flávio Fernandes, Francisco Brasileiro, "Adaptive Sabotage-Tolerant Scheduling for Peer-to-Peer Grids," ladc, pp.25-32, 2009 Fourth Latin American Symposium on Dependable Computing, 2009 [citation][year=2009]S.J. Choi, R. Buyya, “Group-based adaptive result certification mechanism in Desktop Grids”, Future Generation Computer Systems, 2009. [citation][year=2009]T.G. Papaioannou, G.D. Stamoulis, “Reputation-based estimation of individual performance in collaborative and competitive grids”, Future Generation Computer Systems, 2009. [citation][year=2009]K Watanabe, M Fukushi, S Horiguchi, “Optimal Spot-checking for Computation Time Minimization in Volunteer Computing”, Journal of Grid Computing 7(4), pp 575-600, 2009. [citation][year=2009]W. Wei, J. Du, T. Yu, X. Gu, “SecureMR: A Service Integrity Assurance Framework for MapReduce”, Proceedings of the 2009 Annual Computer Security Applications Conference, pp 73-82, 2009. [citation][year=2009]K Watanabe, M Fukushi, S Horiguchi, “Collusion-Resistant Sabotage-Tolerance Mechanisms for Volunteer Computing Systems”, 2009 IEEE International Conference on e-Business Engineering, pp. 213-218, 2009. [citation][year=2009]J. Hwang, , H.J. Kim, J. Park, “Managing risks in an open computing environment using mean absolute deviation portfolio optimization”, Future Generation Computer Systems, 2009. [citation][year=2009]Oliveira, A.C. and Sampaio, L. and Fernandes, S.F. and Brasileiro, F., “Adaptive Sabotage-Tolerant Scheduling for Peer-to-Peer Grids”, 2009 Fourth Latin-American Symposium on Dependable Computing, pp. 25-32, 2009 [citation][year=2008]Constantinescu-Fuløp, Zoran, "A Desktop Grid Computing Approach for Scientific Computing and Visualization?, PhD Thesis, Norwegian University of Science and Technology, May 2008 [citation][year=2008]Syed Naqvi, Stephane Mouton, Philippe Massonet, Gheorghe Cosmin Silaghi, Dominic Battré, Matthias Hovestadt, Karim Djemame, "Using SLA- Based Approach To Handle Sabotage Tolerance In The Grids?, From Grids to Service and Pervasive Computing, pp 153 162, Thierry Priol and Marco Vanneschi (eds), Springer-Verlag, ISBN: 978-0-387-09454-0, 2008. 2004(1 publication) [publication]Bruno Cabral and Marques, P. and Silva, L. , "IL Code Instrumentation with RAIL", .NET Developers Journal, vol. 2, pp. 34-35, 2004 [citation][year=2006]C. Anslow, S. Marshall, J. Noble, K. Jackson, M. McGavin, and R. Biddle, "Program Trace Formats for Software Visualisation", Technical Report CS-TR-06/1, School of Mathematical and Computing Sciences, VICTORIA UNIVERSITY OF WELLINGTON, New Zeland, May 2006 [citation][year=2006]Craig Anslow, Stuart Marshall, James Noble, Kirk Jackson, Mike McGavin, and Robert Biddle, Program Trace Formats for Software Visualisation, Technical Report CS-TR-06/1, VICTORIA UNIVERSITY OF WELLINGTON, School of Mathematical and Computing Sciences, May 2006. [citation][year=2004]Luis Vinuesa, Francisco Ortin, TEJEDOR DINÁMICO DE ASPECTOS SOBRE LA PLATAFORMA .NET, in Iberian workshop on Aspect Oriented Software Development DSOA'2004, Málaga, November, 2004 [citation][year=2004]B. Wang, X. Liu, J. Kerridge, Y. Li, "Scenario Based Generative Component Adaptation in .NET", in Proc. of the 2004 International Conference on Information Reuse and Integration, Las Vegas, USA, 2004 [citation][year=2004]Ninghui Li and John C. Mitchell; "Securing Java RMI-based Distributed Applications", in Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC"04); 2004 2002(1 publication) [publication]Marques, P. and Silva, L. and Silva, J.G. , "M&M's: Building Binary Software Components for Supporting Mobile-Agent Enabled Applications", Journal of Autonomous Agents and Multi-Agents Systems, vol. 5, pp. 101-109, 2002 [citation][year=2005]1. H. Wang and B. Feng, "Research of the Chinese Meta-Search Engine Model Based on Intelligent Agent", in Proc. of the 19th International Conference on Advanced Information Networking and Applications (AINA"05), IEEE Press, Taiwan, March 2005 [citation][year=2004]1. Yingjie Z.; Liling G., "Using the philosophy of mobile agent technology for e-service in the field of reverse engineering applications", Rapid Prototyping Journal, 1 March 2004, vol. 10, no. 3, pp. 158-165(8), Publisher: Emerald Group Publishing Limited 2000(2 publications) [publication]Silva, L. and Martins, P. and Silva, J.G. , "Heterogeneous Parallel Computing using Java and WMPI", special issue of Concurrency Practice and Experience, vol. 12, pp. 1077-1091, 2000 [citation][year=2002]1. Butrylo, B. Musy, F. Nicolas, L. Scorretti, R. Vollaire, C. , "New trends in parallel electromagnetic fields computation", International Conference on Parallel Computing in Electrical Engineering (PARELEC'02), September 2002, Warsaw, Poland [publication]Silva, L. , "Comparing the Performance of Mobile Agent Systems", Journal of Computer Communications 23, vol. 23, 2000 1998(3 publications) [publication]Bizarro, P. and Silva, L. and Silva, J.G. , "JWARP: a Java library for parallel discrete event simulations", Concurrency: Practice and Experience, vol. 10, pp. 999-1005, 1998 [citation][year=2006]MPJ Express Meets Gadget: Towards a Java Code for Cosmological Simulations M Baker, B Carpenter, A Shafi LECTURE NOTES IN COMPUTER SCIENCE, 2006 - Springer Recent Advances in Parallel Virtual Machine and Message Passing Interface Volume 4192/2006, Pages 358-365, September 21, 2006 [citation][year=2006]MPJ: Enabling Parallel Simulations in Java Mark Baker, Bryan Carpenter and Aamir Sha Technical Report, Distributed Systems Group, University of Portsmouth [citation][year=2006]CoJava: Optimization Modeling by Nondeterministic Simulation Lecture Notes in Computer Science Springer Berlin / Heidelberg Volume 4204/2006, Pages 91-106, September 29, 2006 Principles and Practice of Constraint Programming - CP 2006 [citation][year=2002]Teo, Y.M., Ng, Y.K., Onggo, B.S.S., "Conservative simulation using distributed-shared memory", Proceedings. 16th Workshop on Parallel and Distributed Simulation, 2002. [citation][year=2002]Yong Meng Teo, Yew Kwong Ng, "SPaDES/Java: object-oriented parallel discrete-event simulation", Proceedings. 35th Annual Simulation Symposium, April 2002. [publication]Silva, L. and Silva, J.G. , "Using two-level stable storage for efficient checkpointing", IEE Software Engineering Journal, vol. 145, 1998 [publication]Bizarro, P. and Silva, J.G. and Silva, L. , "JWARP: A Java Library for Parallel Discrete-Event Simulations", Concurrency: Practice and Experience, vol. 10, 1998 1997(3 publications) [publication]Silva, L. and Silva, J.G. and Chapple, S. , "Implementation and Performance of DSMPI", Scientific Programming Journal, vol. 6, pp. 201-214, 1997 [citation][year=2000]1. Mourao E, Booth S "Single sided communications in multi-protocol MPI" RECENT ADVANCES IN PARALLEL VIRTUAL MACHINE AND MESSAGE PASSING INTERFACE, PROCEEDINGS, LECTURE NOTES IN COMPUTER SCIENCE, 1908: 176-183 2000 [publication]Pedroso, H. and Pedroso, H. and Silva, L. and Silva, J.G. , "Web - based Metacomputing with JET", Concurrency: Practice and Experience, vol. 9, 1997 [citation][year=2004]1. Kondo, D. Taufer, M. Brooks, C.L. Casanova, H. Chien, A.A., "Characterizing and evaluating desktop grids: an empirical study", Proceedings. 18th International Parallel and Distributed Processing Symposium, 2004. [citation][year=2002]1. Fabian Breg, "DSJOS: Distributed Scalable Java Operating System for Cluster Architectures", Technical Report Center for Supercomputing Research and Development, University of Illinois, May 2002 [citation][year=2001]G. Fedak and C. Germain and V. N'eri and F. Cappello, "XtremWeb: A Generic Global Computing System", In IEEE Int. Symp. on Cluster Computing and the Grid, 2001. [citation][year=2001]C. Germain and G. Fedak and V. Néri and F. Cappello, "Global Computing Systems", Lecture Notes in Computer Science, 2179, pp.218--??, 2001. [citation][year=2001]Luis F. G. Sarmenta, "Volunteer Computing", PhD Thesis MIT, USA, June 2001 [citation][year=2001]Philipp Drum, "Effiziente Methoden für global verteiltes wissenschaftliches Rechnen", PhD Dissertation, Technischen Universität München, May 2001 [citation][year=1999]1. G. Judd, M. Clement, Q. Snell, V. Getov. "Design Issues for Efficient Implementation of MPI in Java" ACM 1999 Java Grande Conference, ACM Press, June 1999, pp. 58--65. [citation][year=1998]1. Glenn Judd, Mark Clement and Quinn Snell "DOGMA: Distributed Object Group Metacomputing Architecture', Concurrency: Practice and Experience, Vol 10(1),1-7 (1998). [publication]Silva, L. and Silva, J.G. , "Checkpointing Distributed Shared Memory", n/a, vol. 11, pp. 137-158, 1997 [citation][year=2004]1. Katsinis, C. Hecht, D., "Fault-tolerant DSM on the SOME-Bus multiprocessor architecture with message combining", Proceedings 18th International Parallel and Distributed Processing Symposium, April 2004. [citation][year=2003]1. Diana Hecht, Constantine Katsinis, "Performance Analysis of a Fault-Tolerant Distributed-Shared-Memory Protocol on the SOME-Bus Multiprocessor Architecture", Proceedings of the 17th International Symposium on Parallel and Distributed Processing, 2003 [citation][year=2002]1. Hecht, D. Katsinis, C., "Protocols for fault-tolerant distributed-shared-memory on the SOME-bus multiprocessor architecture" , Proceedings 16th International Parallel and Distributed Processing Symposium, IPDCS- 2002 [citation][year=2000]1. Kyue-Sup Byun and Jai-Hoon Kim, "Determining Checkpointing Intervals for Fault Tolerant Real-Time Systems," PDPTA'2000, Las Vegas, Nevada, pp. 2795-2801, June 2000. [citation][year=1999]1. Vivekanand Vellanki, Nissim Harel, Namgeun Joeng, Joonwon Lee and Umakishore Ramachandran, "High Availability for Software DSM Systems", Workshop on Scalable Shared Memory Systems, May 1999. Conference Articles 2015(1 publication) [publication]Cunha, C. and Silva, L. , "Reboot-based Recovery of Performance Anomalies in Adaptive Bitrate Video-Streaming Services", in The 21th IEEE Pacific Rim International Symposium on Dependable Computing, Zhangjiajie, Chin, 2015 2013(5 publications) [publication]Magalhaes, J.P. and Silva, L. , "Adaptive Monitoring of Web-based Applications: A Performance Study", in 28th Symposium On Applied Computing, 2013 [publication]Magalhaes, J.P. and Silva, L. , "Self-healing Performance Anomalies in Web-based Applications", in IEEE International Symposium on Network Computing and Applications, 2013 [publication]Magalhaes, J.P. and Silva, L. , "A Framework for Self-Healing and Self-Adaptation of Cloud-Hosted Web-Based Applications", in International Conference on Cloud Computing Technology and Science (CloudCom), 2013 [publication]Cunha, C. and Silva, L. , "Prediction of Performance Failures in Video-streaming Servers", in The 19th IEEE Pacific Rim International Symposium on Dependable Computing, Vancouver, Canada, 2013 [publication]Cunha, C. and Silva, L. , "SHStream: Self-healing Framework for HTTP Video-Streaming", in The 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (IEEE CCGRID’13), Delft, 2013 2012(2 publications) [publication]Magalhaes, J.P. and Silva, L. , "Anomaly Detection Techniques for Web-based Applications: An Experimental Study", in International Symposium on Network Computing and Applications, 2012 [publication]Cunha, C. and Silva, L. , "Separating Performance Anomalies from Workload-explained Failures in Streaming Servers", in The 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, 2012 2011(6 publications) [publication]Costa, F. and Silva, L. , "Volunteer Cloud Computing: MapReduce over the Internet", in 5th Workshop on Desktop Grids and Volunteer Computing Systems (PCGrid 2011), 2011 [publication]Magalhaes, J.P. and Silva, L. , "Root-cause analysis of performance anomalies in web-based applications", in 26th Symposium On Applied Computing, 2011 [publication]Magalhaes, J.P. and Silva, L. , "Adaptive Profiling for Root-cause Analysis of Performance Anomalies in Web-based Applications", in 10th IEEE International Symposium on Network Computing and Applications, 2011 [publication]Cunha, C. and Silva, L. , "Failure Prediction in Video-Streaming Servers Through Performance Analysis of Server and Client-Server Interactions", in Parallel and Distributed Computing and Networks, 2011 [publication]Cunha, C. and Silva, L. , "Application of a Self-Healing Video-Streaming Architecture to RTSP Servers", in IEEE International Symposium on Network Computing and Applications (NCA), 2011 [publication]Vaz, C. and Silva, L. and António Dourado , "Detecting User-Visible Failures in Web-Sites by using End-to-End Fine-Grained Monitoring: An Experimental Study", in 10th IEEE International Symposium on Network Computing and Applications (NCA), 2011, 2011 [citation][year=2016]DF] On Client-Side Bottleneck Identification in HTTP Servers R Filipe, S Boychenko, F Araujo - researchgate.net Abstract. Standing on virtualization techniques, low maintenance costs and economies of scale, cloud computing emerged in the last few years as a major trend in the industry. Since cloud resources grow and shrink as needed, providers and users of the cloud must ... 2010(2 publications) [publication]Magalhaes, J.P. and Silva, L. , "Detection of Performance Anomalies in Web-based Applications", in IEEE-NCA, Network Computing and Applications, 2010 [publication]Magalhaes, J.P. and Silva, L. , "Prediction of Performance Anomalies in Web-Applications Based-on Software Aging Scenarios", in Second International Workshop on Software Aging and Rejuvenation (WoSAR) at the 21st IEEE International Symposium on Software Reliability Engineering (ISSRE 2010), 2010 2009(2 publications) [publication]Domingues, P. and Araujo, F. and Silva, L. , "Evaluating the Performance and Intrusiveness of Virtual Machines for Desktop Grid Computing", in 3rd Workshop on Desktop Grids and Volunteer Computing Systems (PCGrid 2009), 2009 [citation][year=2016]Evaluating performance degradation in NoSQL databases generated by virtualization G Martins, P Bezerra, R Gomes… - … 2015 Latin American, 2015 - ieeexplore.ieee.org Abstract-There are many services in Cloud Systems currently on the market for hosting servers with different purposes. These environments are IT infrastructures frequently deployed in large data centers using Virtual Machines. Moreover, an increasing number of ... Cite Save [citation][year=2016]Harvesting idle CPU resources for desktop grid computing while limiting the slowdown generated to end-users E Rosales, G Sotelo, A de la Vega, CO Díaz… - Cluster …, 2015 - Springer Abstract We address the challenge of both harvesting idle CPU resources on off-the-shelf desktops donated to Desktop Grid Computing while at once limiting the slowdown generated to the resource owner, also known as end-user, to customized values. In this ... Cite Save [citation][year=2014]DS-VBF: Dual sink vector-based routing protocol for underwater wireless sensor network KM Pouryazdanpanah, M Anjomshoa… - Control and System …, 2014 - ieeexplore.ieee.org Abstract—Underwater wireless sensor networks (UWSNs) have become the seat of researchers' attention recently due to their proficiency to explore underwater areas and design different applications for marine discovery and oceanic surveillance. One of the ... Cite Save [citation][year=2014]Implications of CPU Dynamic Performance and Energy-Efficient Technologies on the Intrusiveness Generated by Desktop Grids Based on Virtualization G Sotelo, E Rosales, H Castro - High Performance Computing, 2014 - Springer Abstract We evaluate how dynamic performance and energy-efficient technologies, as features introduced in modern processor architectures, affect the intrusiveness that Desktop Grids based on virtualization generate on desktops. Such intrusiveness is defined as ... Cite Save [citation][year=2014][PDF] from ed.ac.uk Ad hoc cloud computing GA McGilvary - 2014 - era.lib.ed.ac.uk Commercial and private cloud providers offer virtualized resources via a set of co-located and dedicated hosts that are exclusively reserved for the purpose of offering a cloud service. While both cloud models appeal to the mass market, there are many cases where ... Cite Save [citation][year=2014]The Cost of Virtualization Implementation in Volunteer Computing M Anjomshoa, M Salleh, MP Kermani - ieeexplore.ieee.org Abstract—The advantages of using virtualization can be impaired if it can not deliver sufficient performance. Running applications in virtualized environment incur performance overheads regarding to the virtualization functionalities like initialization virtual machine ... Cite Save [citation][year=2014][PDF] from ual.es [CITATION] Gestión de la información espacial en sistema P2P J Vallecillos Ruiz - 2014 - repositorio.ual.es Resumen—La gestión de datos espaciales es útil hoy en d?a en muchos campos de aplicación, tales como la geociencia, CAD, la robótica o la protección del medio ambiente por mencionar algunos. Tratar con este tipo de datos (puntos, l?neas, pol?gonos, regiones, ... Cite Save [citation][year=2013]McGilvary, Gary A and Barker, Adam and Lloyd, Ashley and Atkinson, Malcolm, ”V-BOINC: The Virtualization of BOINC”, Proceedings of the 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2013), 2013. [citation][year=2013]Open-source virtualization : Functionality and performance of Qemu/KVM, Xen, Libvirt and VirtualBox [citation][year=2013]Opsahl, Jan Magnus Granberg Master thesis Date: 2013 Permanent link: http://urn.nb.no/URN:NBN:no-39029 Show full item record [citation][year=2012]Liang, Jhe-Ming and Zhan, Ren-Hao and Chen, Wei-Mei, ”Dynamic power scheduling for VM-based multi-core systems”, Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th InternationalConference on, pp. 379-386, 2012. [citation][year=2012]Tómasson, Gromur and Sigurórsson, Hlynur and Jónsson, Björn ór and Amsaleg, Laurent, ”TECHNICAL REPORT/RUTR-CS12002”, Reykjavik University, Iceland, ISSN 1670-5777, 2012. [citation][year=2012][PDF] ftp://www.kom.tu-darmstadt.de/papers/LMR+12.pdf Ulrich Lampe, André Miede, Nils Richerzhagen, Dieter Schuller, Ralf Steinmetz, "THE VIRTUAL MARGIN OF ERROR - On the Limits of Virtual Machines in Scientific Research". In: Frank Leymann, Ivan Ivanov, Marten van Sinderen: Proceedings of the 2nd International Conference on Cloud Computing and Services Science (CLOSER 2012), April 2012. [citation][year=2011]David Day, Benjamin Burns, "A Performance Analysis of Snort and Suricata Network Intrusion Detection and Prevention Engines", pp 187-192, ICDS 2011, The Fifth International Conference on Digital Society, 2011. [citation][year=2010]Shang, Ling, "Experiences et paradigmes de programmation pour calcul scientifique à grande échelle sur les grilles, les grilles de PC et les nuages informatique privés", PhD Thesis, Université Lille 1, France, 2010. [citation][year=2010]Rasmus Andersen and Brian Vinter, "Performance and Portability of the SciBy Virtual Machine", "2010 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises", pp. 252-257, 2010.(eScience Centre, University of Copenhagen, Copenhagen, Denmark) [citation][year=2010]Shang, L. and Petiton, S. and Emad, N. and Yang, X., " YML-PC: A Reference Architecture Based on Workflow for Building Scientific Private Clouds", Cloud Computing: Principles, Systems and Applications, Computer Systems and Networks, pp. 145-162, Springer, 2010. DOI: http://dx.doi.org/10.1007/978-1-84996-241-4_9 [citation][year=2010]Johannes Morgenroth, Sebastian Schildt, Lars Wolf. 2010. “HYDRA: virtualized distributed testbed for DTN simulations”. In Proceedings of the fifth ACM international workshop on Wireless network testbeds, (WiNTECH '10). ACM, pp. 71-78. DOI=10.1145/1860079.1860092 http://doi.acm.org/10.1145/1860079.1860092 [citation][year=2009]Carlos Pérez-Miguel, José Miguel-Alonso y Alexander Mendiburu, "Informe sobre Sistemas de Computación en Redes P2P", Technical Report EHU-KAT-IK-04-09, UPV/EHU, 2009 (http://www.sc.ehu.es/ccwbayes/members/cperezmig/pubs/p2p.pdf) [publication]Araujo, F. and Santiago, D. and Ferreira, D. and Farinha, J. and Silva, L. and Domingues, P. and Urbah, E. and Lodygensky, O. and Marosi, A. and Gombás, G. and Balaton, Z. and Farkas, Z. and Kacsuk, P. , "Monitoring the EDGeS Project Infrastructure", in 3rd Workshop on Desktop Grids and Volunteer Computing Systems (PCGrid 2009), 2009 [citation][year=2014]An effective monitoring framework and user interface design TY Chen, HL Yeh, HW Wei, M Sun… - Software: Practice …, 2014 - Wiley Online Library SUMMARY A distributed environment requires a monitoring system to oversee the operation of various distributed nodes. A monitoring service is crucial because it ensures a high- quality computing environment and a reliable service. The interface and framework ... Related articles Cite Save 2008(6 publications) [publication]Araujo, F. and Domingues, P. and Kondo, D. and Silva, L. , "Using cliques of nodes to store desktop grid checkpoints", in Coregrid Integration Workshop, 2008 [citation][year=2012]Ahmad Al-Shishtawy, ”Self-Management for Large-Scale Distributed Systems”, PhD Thesis, KTH School of Information and Communication Technology, Stockholm, Sweden, 2012. [citation][year=2010]Fedak, G., “Recent Advances and Research Challenges in Desktop Grid and Volunteer Computing", Grids, P2P and Services Computing, pp. 171-185, 2010 [citation][year=2009]Hóglund, J. and Al-Shishtawy, A. and Parlavantzas, N., “D1. 5: Full Specification & Final Prototypes of Overlay Services”, 2009 [citation][year=2008]Ahmad Al-Shishtawy, Joel Höglund, Konstantin Popov, Nikos Parlavantzas, Vladimir Vlassov, Per Brand, "Enabling Self-Management Of Component Based Distributed Applications?, From Grids to Service and Pervasive Computing, pp 163 174, Thierry Priol and Marco Vanneschi (eds), Springer-Verlag, ISBN: 978-0-387-09454-0, 2008 [citation][year=2008][PDF] D1. 5: Full Specification & Final Prototypes of Overlay Servicesgrid4all.eu [PDF] D Level - grid4all.eu Page 1. Project no. 034567 Grid4All Specific Targeted Research Project (STREP) Thematic Priority 2: Information Society Technologies D1.5: Full Specification & Final Prototypes of Overlay Services Due date of deliverable: 1st December 2008. ... Related articles - View as HTML [publication]Silaghi, G.C. and Araujo, F. and Domingues, P. and Silva, L. and Arenas, A.E. , "Defeating Colluding Nodes in Desktop Grid Computing Platforms", in Workshop on Desktop Grids and Volunteer Computing Systems (PCGrid 2008), 2008 [citation][year=2015][HTML] Algorithmic Mechanisms for Reliable Crowdsourcing Computation under Collusion AF Anta, C Georgiou, MA Mosteiro, D Pareja - PloS one, 2015 - dx.plos.org Abstract We consider a computing system where a master processor assigns a task for execution to worker processors that may collude. We model the workers' decision of whether to comply (compute the task) or not (return a bogus result to save the computation cost) as ... Cited by 1 Related articles All 9 versions Cite Save More [citation][year=2015][PDF] from inria.fr Contributions to Desktop Grid Computing G Fedak - 2015 - hal.inria.fr Since the mid 90's, Desktop Grid Computing-ie the idea of using a large number of remote PCs distributed on the Internet to execute large parallel applications-has proved to be an efficient paradigm to provide a large computational power at the fraction of the cost of a ... Cite Save [citation][year=2015]Virtual Screening in a Desktop Grid: Replication and the Optimal Quorum I Chernov, N Nikitina - Parallel Computing Technologies, 2015 - Springer Abstract We propose a mathematical model of a desktop grid computing system that solves tasks with two possible answers. Replication is used in order to reduce the error risk: wrong answers are returned with some known probabilities and penalty is added to the ... Cited by 2 Cite Save [citation][year=2015]A MapReduce-based algorithm for parallelizing collusion detection in Hadoop M Mortazavi, BT Ladani - Information and Knowledge …, 2015 - ieeexplore.ieee.org Abstract—MapReduce as a programming model for parallel data processing has been used in many open systems such as cloud computing and service-oriented computing. Collusive behavior of worker entities in MapReduce model can violate integrity concern of open ... Cite Save [citation][year=2013]@article{DBLP:journals/corr/AntaGM13, author = {Antonio Fern{\'a}ndez Anta and Chryssis Georgiou and Miguel A. Mosteiro}, title = {Algorithmic Mechanisms for Reliable Internet-based Computing under Collusion}, journal = {CoRR}, volume = {abs/1307.1650}, year = {2013}, ee = {http://arxiv.org/abs/1307.1650}, bibsource = {DBLP, http://dblp.uni-trier.de} } [citation][year=2010]Eugen Staab, “Reliable Information Acquisition in the Presence of Malicious Sources”, PhD Thesis, University of Luxembourg, Luxembourg, April 2010 [citation][year=2010]Canon, L.C. and Jeannot, E. and Weissman, J.,” A Scheduling Algorithm for Defeating Collusion”, 2010 [citation][year=2010]Canon, L.C., “Coping with uncertainty in scheduling problems”, Parallel & Distributed Processing, Workshops and PhD Forum (IPDPSW), 2010 IEEE International Symposium on, pp.1-4, 2010 [citation][year=2010]Melski, D., “Safety in Numbers”, 2010 [citation][year=2010]Canon, L.C. and Jeannot, E. and Weissman, J., "A Dynamic Approach for Characterizing Collusion in Desktop Grids", Proceedings of the 2010 IEEE International Parallel and Distributed Processing (IPDPS), 2010 [citation][year=2010]Canon, L.C., “Outils et algorithmes pour gérer l’incertitude lors de l’ordonnancement d’application sur plateformes distribuées”, PhD Thesis, Université Henri Poincarré – Nancy 1, France, 2010 [citation][year=2009]Collusion detection for grid computinguni.lu [PDF] E Staab, T Engel - Proceedings of the 2009 9th IEEE/ACM ?, 2009 - portal.acm.org A common technique for result verification in grid com- puting is to delegate a computation redundantly to different workers and apply majority voting to the returned results. However, the technique is sensitive to "collusion? where a majority of malicious workers collectively returns the ... Cited by 3 - Related articles - All 4 versions [citation][year=2008][PDF] ►Using correlation for collusion detection in grid settings E Staab, V Fusenig, T Engel - wiki.uni.lu Eugen Staab, Volker Fusenig and Thomas Engel ... Faculty of Sciences, Technology and Communication University of Luxembourg 6, rue R. Coudenhove-Kalergi 1359 Luxembourg Luxembourg ... Using Correlation for ... Cited by 2 - Related articles - View as HTML - Web Search [citation][year=2008][PDF] ►Grid Architectural Issues: State-of-the-art and Future Trends A Andrzejak, C Mastroianni, P Fragopoulou, D Kondo ? - coregrid.net 1 Zuse-Institute Berlin, Takustr. 7, 14195 Berlin, Germany andrzejak@zib.de 2 ICAR-CNR Via P. Bucci 41C, 87036 Rende (CS) Italy mastroianni@dns.icar.cnr.it 3 Foundation for Research and Technology-Hellas, Institute of Computer ... Related articles - View as HTML - Web Search [citation][year=2008][PDF] ►Collusion Detection E Staab - wiki.uni.lu Page 1. Collusion Detection For Acquisition of Unverifiable Information Eugen Staab University of Luxembourg eugen.staab@uni.lu SECAN-Lab day Amneville-Les-Thermes, France, June 30, 2008 Page 2. ... Related articles - View as HTML - Web Search   [publication]Costa, F. and Kelley, I. and Silva, L. and Fedak, G. , "Optimizing the Data Distribution Layer of BOINC with BitTorrent", in Second Workshop on Desktop Grids and Volunteer Computing Systems (PCGrid 2008), 2008 [publication]Andrzejak, A. and Silva, L. , "Using Machine Learning for Non-intrusive Modeling and Prediction of Software Aging", in IEEE/IFIP Network Operations & Management Symposium (NOMS 2008), 2008 [publication]Silva, L. , "Comparing Failure Detection Techniques for Web Applications: An Experimental Study", in IEEE-NCA, Network Computing and Applications, 2008 [publication]Costa, F. and Kelley, I. and Silva, L. , "Using a Content Distribution Network for Data Distribution in Desktop Grid Computing Platforms", in CoreGRID Integration Workshop, 2008 2007(11 publications) [publication]Andrzejak, A. and Silva, L. , "Deterministic Models of Software Aging and Optimal Rejuvenation Schedules", in 10th IFIP/IEEE Symposium on Integrated Management, 2007 [publication]Kondo, D. and Araujo, F. and Malecot, P. and Domingues, P. and Silva, L. and Fedak, G. and Capello, F. , "Characterizing Result Errors in Internet Desktop Grids", in 13th International EuroPar Conference 2007, 2007 [citation][year=2015][HTML] Algorithmic Mechanisms for Reliable Crowdsourcing Computation under Collusion AF Anta, C Georgiou, MA Mosteiro, D Pareja - PloS one, 2015 - dx.plos.org Abstract We consider a computing system where a master processor assigns a task for execution to worker processors that may collude. We model the workers' decision of whether to comply (compute the task) or not (return a bogus result to save the computation cost) as ... Cited by 1 Related articles All 9 versions Cite Save More [PDF] from inria.fr Contributions to Desktop Grid Computing [citation][year=2015]Multi-round Master-Worker Computing: a Repeated Game Approach AF Anta, C Georgiou, MA Mosteiro, D Pareja - arXiv preprint arXiv: …, 2015 - arxiv.org Abstract: We consider a computing system where a master processor assigns tasks for execution to worker processors through the Internet. We model the workers decision of whether to comply (compute the task) or not (return a bogus result to save the computation ... Cite Save [citation][year=2015]Result Verification Scheme with Resource Clustering in Desktop Grids JM Gil, YH Cho, SH Hong - Advanced Multimedia and Ubiquitous …, 2015 - Springer Abstract In desktop grids, it is important to guarantee the verification of task results in the presence of dynamic properties, such as volatility and heterogeneity. To achieve this objective, we propose the result-verification scheme with resource clustering that can ... Related articles All 2 versions Cite Save [citation][year=2015]An implementation of credibility-based job scheduling method in volunteer computing systems S Tani, Y Nogami, M Fukushi - Consumer Electronics-Taiwan ( …, 2015 - ieeexplore.ieee.org Abstract—This paper addresses a job scheduling problem in Volunteer Computing (VC) systems, where some malicious participant may return incorrect results (sabotaging). Credibilitybased job scheduling method, namely ENR-ECJ, is a promising approach to ... Cite Save [citation][year=2015]Virtual Screening in a Desktop Grid: Replication and the Optimal Quorum I Chernov, N Nikitina - Parallel Computing Technologies, 2015 - Springer Abstract We propose a mathematical model of a desktop grid computing system that solves tasks with two possible answers. Replication is used in order to reduce the error risk: wrong answers are returned with some known probabilities and penalty is added to the ... Cited by 2 Cite Save [citation][year=2015]Dynamic Job Scheduling Method Based on Expected Probability of Completion of Voting in Volunteer Computing Y MIYAKOSHI, S YASUDA, K WATANABE… - … on Information and …, 2015 - search.ieice.org This paper addresses the problem of job scheduling in volunteer computing (VC) systems where each computation job is replicated and allocated to multiple participants (workers) to remove incorrect results by a voting mechanism. In the job scheduling of VC, the number ... Cite Save [citation][year=2014]Reputation-Based Mechanisms for Reliable Crowdsourcing Computation E Christoforou, A Fernández Anta, G Chryssis… - 2014 - eprints.networks.imdea.org We consider an Internet-based Master-Worker framework, for machine-oriented computing tasks (ie SETI@ home) or human intelligence tasks (ie Amazon's Mechanical Turk). In this framework a master sends tasks to unreliable workers, and the workers execute and ... Cite Save [citation][year=2014]The Effectiveness of Reputation-based Voting for Collusion Tolerance in Large-Scale Grids M Essaaidi, A Bendahmane, A El Moussaoui, Y Ali - ieeexplore.ieee.org Abstract—Large scale grids permit to share grid resources spread over different autonomous administrative sites in the internet. The rapid progress of grid systems opens the door for numerous companies to adopt this technology in their business development. ... Cite Save [citation][year=2014]A Group Based Replication Mechanism to Reduce the Wastage of Processing Cycles in Volunteer Computing MK Khan, SI Hyder, GU Ahmed, S Begum… - Wireless Personal …, 2014 - Springer Abstract Volunteer Computing is an exciting discipline for high throughput applications but due to inherent resource volatility, several issues arises such as tasks failure due to host/CPU unavailability, results validation etc. Replication is a solution to most of these ... [citation][year=2013]Christoforou, Evgenia and Anta, Antonio Fernandez and Georgiou, Chryssis and Mosteiro, Miguel A et al., ”Reputation-based Mechanisms for Evolutionary Master-Worker Computing”,arXiv preprint arXiv:1307.2783, 2013. [citation][year=2013]Muszynski, Jakub and Varrette, Sébastien and Bouvry, Pascal, ”Expected running time of parallel evolutionary algorithms on unimodal pseudo-boolean functions over small-world networks”, IEEE Congress on Evolutionary Computation (CEC), pp. 2588-2594, 2013. [citation][year=2013]Watanabe, Kan and Fukushi, Masaru and Funabiki, Nobuo and Nakanishi, Toru,”Performance Evaluation of Check-By-Voting for Colluding Attack in Volunteer Computing Systems”, IAENG Transactions on Engineering Technologies, pp.33-48, 2013. [citation][year=2013]Watanabe, Kan and Funabiki, Nobuo and Nakanishi, Toru and Fukushi, Masaru, ”Optimal Spot-Checking for Delayed Attack on Desktop Grid Systems”, UKSim, pp.600-605, 2013. [citation][year=2012]Silaghi C. Gheorghe, Dependable Resource Management Tools towards Automated Collaboration in Heterogeneous Computing Environments, Habilitation Thesis, Babes Bolyai University, Romenia, 2012. [citation][year=2012]Christoforou, Evgenia and Fernández Anta, Antonio and Georgiou, Chryssis and Mosteiro, Miguel A. Algorithmic Mechanisms for Reliable Master-Worker Internet-based Computing. IEEE Transactions on Computers. ISSN 0018-9340, 2012. [citation][year=2012]Fernández Anta, Antonio and Georgiou, Chryssis and López, Luis and Santos, Agustin (2012) Reliable Internet-based Master-Worker Computing in the Presence of Malicious Workers. Parallel Processing Letters, 22 (1). [citation][year=2012]Bendahmane, Ahmed and Essaaidi, Mohammad and Younes, Ali et al., ”A new mechanism to ensure integrity for MapReduce in cloud computing”, 2012 International Conference on Multimedia Computing and Systems (ICMCS), pp 785–790, 2012. [citation][year=2012]Bendahmane, Ahmed and Essaaidi, Mohammad and Moussaoui, Ahmed El and Younes, Ali, ”Result verification mechanism for MapReduce computation integrity in cloud computing”, 2012 International Conference on Complex Systems (ICCS), 2012. [citation][year=2012][PDF] http://www.iaeng.org/publication/IMECS2012/IMECS2012_pp1658-1663.pdf Kan Watanabe, Nobuo Funabiki, Toru Nakanishi and Masaru Fukushi, "Modeling and Performance Evaluation of Colluding Attack in Volunteer Computing Systems", Proceedings of the International MultiConference of Engineers and Computer Scientists 2012, Vol. II, IMECS 2012, March 14-16, 2012, Hong Kong. [citation][year=2011]Watanabe, K. and Fukushi, M. and Kameyama, M., “Adaptive Group-Based Job Scheduling for High Performance and Reliable Volunteer Computing”, Journal of Information Processing, Volume 19, pp. 39-51, 2011 [citation][year=2011]Christoforou, E.; Anta, A.F.; Georgiou, C.; Mosteiro, M.A.; "Algorithmic mechanisms for internet supercomputing under unreliable communication", Network Computing and Applications (NCA), 2011 10th IEEE International Symposium on, pp 275-280, DOI: 10.1109/NCA.2011.46, 2011 (http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=6038615) [citation][year=2011]E. Christoforou, AF Anta, C Georgiou, Miguel A. Mosteiro, "Efficient Mechanisms for Single-task Reliable-communication Master-Worker Computing with Malicious and Rational Workers", Technical Report TR-11-04, Department of Computer Science, University of Cyprus, May 2011 (http://www.cs.ucy.ac.cy/ric/publications/UCY-CS-TR-11-04.pdf) [citation][year=2011]Heien, Eric and Kondo, Derrick and Gainaru, Ana and LaPine, Dan and Kramer, Bill and Cappello, Franck, "Modeling and tolerating heterogeneous failures in large parallel systems", Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis, pp 1(45)-11(45), SC'11, 2011. [citation][year=2011]Christoforou, Evgenia and Fernández Anta, Antonio and Georgiou, Chryssis and Mosteiro, Miguel, Algorithmic Mechanisms for Internet-Based Computing under Unreliable Communication, Lecture Notes in Computer Science, pp 147-149 (DOI:10.1007/978-3-642-24100-0_13), 2011 [citation][year=2010]Ahmed Bendahmane, Mohammad Essaaidi, Ahmed El~Moussaoui, and Ali Younes. Compromised resources tolerance in grid computing systems. In Mohammad Essaaidi, Michele Malgeri, and Costin Badica, editors, {em Intelligent Distributed Computing IV}, volume 315 of {em Studies in Computational Intelligence}, pages 145--154. Springer Berlin / Heidelberg, 2010. [citation][year=2010]Eugen Staab. {em Reliable Information Acquisition in the Presence of Malicious Sources}. PhD thesis, University of Luxembourg, April 2010. Online Version, 2010-04-22. [citation][year=2010]Bendahmane, A. and Essaaidi, M. and El Moussaoui, A. and Younes, A., “Compromised Resources Tolerance in Grid Computing Systems”, Intelligent Distributed Computing IV, pp. 145-154, 2010 [citation][year=2010]Tang, B. and Moca, M. and Chevalier, S. and He, H. and Fedak, G., “Towards mapreduce for desktop grid computing”, IEEE Computer Society, 2010 [citation][year=2010]Bendahmane, A. and Essaaidi, M. and El Moussaoui, A. and Younes, A., “Reputation-based Majority Voting for Malicious Grid Resources Tolerance”, SCALABLE COMPUTING, pp. 385, 2010 [citation][year=2010]Canon, L.C., “Outils et algorithmes pour gérer l’incertitude lors de l’ordonnancement d’application sur plateformes distribuées”, PhD Thesis, Université Henri Poincarré – Nancy 1, France, 2010. [citation][year=2010]Watanabe, K. and Fukushi, M. and Horiguchi, S., “Expected-credibility-based Job Scheduling for Reliable Volunteer Computing”, IEICE Transactions on Information and Systems, volume 93, issue 2, pp. 306-314, 2010 [citation][year=2010]Watanabe, K. and Fukushi, M., “Generalized Spot-checking for Sabotage-tolerance in Volunteer Computing Systems”, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 655-660, 2010 [citation][year=2010]Watanabe, K. and Fukushi, M., “Generalized Spot-Checking for Reliable Volunteer Computing”, IEICE TRANSACTIONS on Information and Systems, volume 93, issue 12, pp. 3164-3172, 2010 [citation][year=2009]\item Rim Chayeh, Christophe Cerin, and Mohamed Jemni. A probabilistic fault-tolerant recovery mechanism for task and result certification of large-scale distributed applications. In Nabil Abdennadher and Dana Petcu, editors, {\em Advances in Grid and Pervasive Computing}, volume 5529 of {\em Lecture Notes in Computer Science}, pages 471--482. Springer Berlin / Heidelberg, 2009. [citation][year=2009]\item Mark Silberstein, Artyom Sharov, Dan Geiger, and Assaf Schuster. Gridbot: Execution of bags of tasks in multiple grids. In {\em SC '09 Proceedings of the Conference on High Performance Computing Networking, Storage and Analysis}, 2009. [citation][year=2009]\item Eugen Staab. {\em Reliable Information Acquisition in the Presence of Malicious Sources}. PhD thesis, University of Luxembourg, April 2010. Online Version, 2010-04-22. \item Eugen Staab and Thomas Engel. Collusion detection for grid computing. In Franck Cappello, Cho-Li Wang, and Rajkumar Buyya, editors, {\em Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid '09)}, pages 412--419. IEEE Computer Society, May 2009. [citation][year=2009]\item Eugen Staab and Thomas Engel. Tuning evidence-based trust models. {\em Computational Science and Engineering, IEEE International Conference on}, 3:92--99, 2009. [citation][year=2009]In {\em e-Business Engineering, 2009. ICEBE '09. IEEE International Conference on}, pages 213 --218, October 2009. [citation][year=2008]Defeating colluding nodes in Desktop Grid computing platforms - ►coregrid.net [PDF]  GC Silaghi, F Araujo, LM Silva, P Domingues, AE ? - IEEE International Symposium on Parallel and Distributed ?, 2008 - ieeexplore.ieee.org Page 1. 978-1-4244-1694-3/08/$25.00 ©2008 IEEE Defeating Colluding Nodes in Desktop Grid Computing Platforms Gheorghe Cosmin Silaghi Dept. of Business Information Systems Babes . -Bolyai University, Cluj, Romania gsilaghi@econ.ubbcluj.ro . [citation][year=2008][PDF] ►Using correlation for collusion detection in grid settings E Staab, V Fusenig, T Engel - wiki.uni.lu Eugen Staab, Volker Fusenig and Thomas Engel ... Faculty of Sciences, Technology and Communication University of Luxembourg 6, rue R. Coudenhove-Kalergi 1359 Luxembourg Luxembourg ... Using Correlation for ... Cited by 2 - Related articles - View as HTML - Web Search [citation][year=2008]BitDew: a programmable environment for large-scale data management and distribution - ►lri.fr [PDF]  G Fedak, H He, F Cappello - Proceedings of the 2008 ACM/IEEE conference on ?, 2008 - portal.acm.org Abstract"Desktop Grids use the computing, network and storage resources from idle desktop PC"s distributed over multiple-LAN"s or the Internet to compute a large variety of resource-demanding distributed applications. While these ... Cited by 2 - Related articles - Web Search - All 5 versions [citation][year=2008][CITATION] Priority based list scheduling for sabotage-tolerance with deadline tasks in desktop grids HS Kim, CS Hwang, S Lee, SJ Choi, JM Gil - International Journal of Computer Systems Science & ?, 2008 - CRL Publishing Ltd, PO Box 31, Market Harborough, Leics, LE 16 9 ? Related articles - Web Search - BL Direct [citation][year=2008]USING SLA BASED APPROACH TO HANDLE SABOTAGE TOLERANCE IN THE GRIDS S Naqvi, S Mouton, P Massonet, GC Silaghi, D ? - Springer Syed Naqvi, Stephane Mouton, Philippe Massonet Centre of Excellence in Information and Communication Technologies, Belgium { syed.naqvi, stephane.mouton, philippe.massonet } @cetic.be ... Gheorghe Cosmin Silaghi ... Related articles - Web Search [citation][year=2008][PDF] ►BitDew: A Programmable Environment for Large-Scale Data Management and Distribution GFHHF Cappello - inria.ccsd.cnrs.fr Page 1. apport de recherche I S S N 0 2 4 9 - 6 3 9 9 I S R N I N R I A / R R - - 6 4 2 7 - - F R + E N G Thème SYM INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE BitDew: A Programmable Environment for ... Related articles - View as HTML - Web Search - All 6 versions [citation][year=2008][PDF] ►BitDew: a Programmable Environment for Data Desktop Grids G Fedak, D Kondo, F Cappello - gforge.inria.fr Page 1. BitDew : a Programmable Environment for Data Desktop Grids Gilles Fedak, Derrick Kondo, Paul Malecot, Franck Cappello Grand-Large/INRIA-Futurs Laboratoire de Recherche en Informatique Universite Paris XI Tsukuba 2006, Japan ... Related articles - View as HTML - Web Search - All 2 versions [citation][year=2008][PDF] ►Collusion Detection E Staab - wiki.uni.lu Page 1. Collusion Detection For Acquisition of Unverifiable Information Eugen Staab University of Luxembourg eugen.staab@uni.lu SECAN-Lab day Amneville-Les-Thermes, France, June 30, 2008 Page 2. ... Related articles - View as HTML - Web Search [citation][year=2008][PDF] ARC INRIA PROPOSAL labri.fr [PDF] G IPT, M IPT, A IPT - 2008 - labri.fr A grid is a set of distributed and heterogeneous resources. In recent years, a lot of work has been done to efficiently manage and use such resources. However, most of the models, algorithms, protocols and programs designed and developed in this context do not take ... View as HTML [publication]Mendes, S. and Domingues, P. and Pereira, D. and Vale, R. and Gomez-Pulido, J.A. and Silva, L. and Vega-Rodríguez, M.A. and Sánchez-Pérez, J.M. , "Omni-directional RND Optimisation using Differential Evolution: In-depth Analysis via High Throughput Computing", in EPIA 2007 - Portuguese Conference on Artificial Intelligence., 2007 [publication]Kondo, D. and Araujo, F. and Silva, L. and Domingues, P. , "Result Error Detection on Heterogeneous and Volatile Resources via Intermediate Checkpointing", in CoreGRID Workshop on Grid Programming Model/Grid and P2P Systems Architecture/Grid Systems, Tools and Environments, 2007 [citation][year=2010]SungJin Choi, Rajkumar Buyya, Group-based adaptive result certification mechanism in Desktop Grids, Future Generation Computer Systems, Volume 26, Issue 5, May 2010, Pages 776-786, ISSN 0167-739X, 10.1016/j.future.2009.05.025. (http://www.sciencedirect.com/science/article/pii/S0167739X09000557) [citation][year=2009]A Probabilistic Fault-Tolerant Recovery Mechanism for Task and Result ? R Chayeh, C Cerin, M Jemni - ? of the 4th International Conference on ?, 2009 - Springer Abstract. This paper deals with fault tolerant recovery mechanisms and prob- abilistic results certification issues on large scale architectures. The related works in the result certification domain are based on a total or a partial duplica- tion of the application. However, they are limited ... Related articles - All 3 versions [citation][year=2009]Group-based adaptive result certification mechanism in Desktop Gridsgridbus.org [PDF] SJ Choi, R Buyya - Future Generation Computer Systems, 2009 - Elsevier A Grid system is a platform that provides access to various computing resources owned by institutions by making virtual organizations [15] and [16]. In contrast, a Desktop Grid system is a platform that achieves high throughput computing by harvesting a number of idle desktop ... Related articles - All 5 versions [publication]Costa, F. and Kelley, I. and Silva, L. and Taylor, I. , "Peer-to-Peer Techniques for Data Distribution in Desktop Grid Computing Platforms", in CoreGRID Workshop on Grid Programming Model Grid and P2P Systems Architecture Grid Systems, 2007 [publication]Silaghi, G.C. and Arenas, A.E. and Silva, L. , "A Utility-Based Reputation Model for Service-Oriented Computing", in Proceedings of the 1st CoreGrid Symposium, 2007 [publication]Andrzejak, A. and Silva, L. , "Managing Performance of Aging Applications via Synchronized Replica Rejuvenation", in 18th IFIP/IEEE Distributed Systems: Operations and Management (DSOM 2007), 2007 [publication]Silva, L. and Andrzejak, A. , "Using Virtualization to Improve Software Rejuvenation", in IEEE Computer Society, 2007 [publication]Sousa, D. and Silva, L. , "A Scalable Multi-Agent Architecture for remote failure detection in Internet Applications", in CoreGRID Workshop, 2007 [publication]Rodrigues, N.M. and Silva, L. and Sousa, D. , "A Fault Injector Tool to Evaluate Failure Detectors in Grid-services", in CoreGRID Workshop, 2007 [publication]Alonso, J. and Silva, L. and Andrzejak, A. and Torres, J. , "High-Available Grid Services through the use of Virtualized Clustering", in ACM International Conference on Grid Computing, 2007 2006(11 publications) [publication]Domingues, P. and Marques, P. and Silva, L. , "DGSchedSim: a trace-driven simulator to evaluate scheduling algorithms for desktop grid environments", 2006 [citation][year=2013]Gil, Joon-Min and Kim, SungSuk and Lee, JongHyuk, ”Task Replication and Scheduling Based on Nearest Neighbor Classification in Desktop Grids”, Ubiquitous Information Technologies and Applications, pp. 889-895, 2013, Springer. [citation][year=2012]Da Costa, Georges, ”Heterogeneity: the key to achieve Power-Proportional Computing”, 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp 656-662, 2013. [citation][year=2012]Pearce, Michael and Zeadally, Sherali and Hunt, Ray, ”Virtualization: Issues, security threats, and solutions”, ACM Computing Surveys (CSUR), vol. 45(2), 2013. [citation][year=2010]Al-Azzoni, I., Down, D.G., “Dynamic scheduling for heterogeneous Desktop Grids”, Journal of Parallel and Distributed Computing, 70(12), pp 1231-1240, 2010. DOI: 10.1016/j.jpdc.2010.08.001 [citation][year=2010]Farkas, Z., Marosi, A.C., Kacsuk, P., “Job Scheduling in Hierarchical Desktop Grids”, pp. 79-97, 2010. [citation][year=2010]Al-Daoud, H., Al-Azzoni, I., Down, D.G., “Power-Aware Linear Programming based Scheduling for heterogeneous computer clusters”, 2010 International Green Computing Conference, pp. 325-332, 2010. [citation][year=2010]Farkas, Z. and Marosi, A.C. and Kacsuk, P., “Job Scheduling in Hierarchical Desktop Grids”, Remote Instrumentation and Virtual Laboratories, pp. 79-97, 2010 [citation][year=2010]AL-DAOUD, HADIL, "POWER-AWARE SCHEDULING FOR SERVER CLUSTERS" (2010), Master Thesis. Open Access Dissertations and Theses. Paper 4101. http://digitalcommons.mcmaster.ca/opendissertations/4101 [citation][year=2009]Majd Kokaly, Issam Al Azzoni, Douglas G. Down, “MGST: A Framework for Performance Evaluation of Desktop Grids”, Proc. 3rd Workshop on Desktop Grids and Volunteer Computing Systems (PCGrid 2009), Rome, Italy, In Workshops Proceedings of the 23rd IEEE International Parallel and Distributed Processing Symposium, IEEE Computer Society. [citation][year=2009]Estrada, T., Taufer, M., Anderson, D.P.,” Performance Prediction and Analysis of BOINC Projects: An Empirical Study with EmBOINC”, Journal of Grid Computing, volume 7, issue 4, pp. 537-554, 2009, Springer. [citation][year=2008]I. Al-Azzoni and D.G. Down, Dynamic Scheduling for Heterogeneous Desktop Grids, The 9th IEEE/ACM International Conference on Grid Computing (Grid 2008), Tsukuba, Japan, October 2008. [citation][year=2007]K. Watanabe, M. Fukushi, S. Horiguchi, “Expected-credibility based Job Scheduling for Volunteer Computing Systems”, Proceedings of the 2nd International Conference on Advances in Information Technology (IAIT2007), pp 222-229, 2007. [publication]Domingues, P. and Silva, J.G. and Silva, L. , "Sharing Checkpoints to Improve Turnaround Time in Desktop Grid", in Advanced Information Networking and Applications (AINA\'06), vol. 1, 2006 [citation][year=2011]Zoran Constantinescu and Monica Vladoiu (2011). Using Open Source Desktop Grids in Scientific Computing and Visualization, Advances in Grid Computing, Zoran Constantinescu (Ed.), ISBN: 978-953-307-301-9, InTech, Available from: http://www.intechopen.com/articles/show/title/using-open-source-desktop-grids-in-scientific-computing-and-visualization [citation][year=2009]J.M. Gil, U.S Song, H.C. Yu, “Performance Evaluation of Scheduling Mechanism with Checkpoint Sharing and Task Duplication in P2P-Based PC Grid Computing?”, Advances in Grid and Pervasive Computing: 4th International Conference, GPC 2009, Geneva, Switzerland, May 4-8, 2009. [citation][year=2009]Anglano, C. and Canonico, M.,” Knowledge-Free Scheduling Algorithms for Multiple Bag-of-Task Applications on Desktop Grids”, 2009 [citation][year=2008]Constantinescu-Fuløp, Zoran, "A Desktop Grid Computing Approach for Scientific Computing and Visualization?, PhD Thesis, Norwegian University of Science and Technology, May 2008.( http://urn.ub.uu.se/resolve?urn=urn:nbn:no:ntnu:diva-2191) [publication]Domingues, P. and Araujo, F. and Silva, L. , "A DHT-based Infrastructure for Sharing Checkpoints in Desktop Grid Computing", in 2nd IEEE International Conference on e-Science and Grid Computing, 2006 [citation][year=2014]Effective load balancing for grid computing using grid control system D Ramesh - 2014 - shodhganga.inflibnet.ac.in Grid Computing is a growing technology which is one of the High Performance Computing branches used for solving complex problems Grid computing has a similar architecture to distributed computing and cloud computing It is differentiated from other distributed ... [citation][year=2011]Huan Wang, Hidenori Nakazato,Haatiem Mufti, Strategy for Checkpointing Peer Sharing in P2P-Grid System, Proc. of the 2011 IEICE General Conference, BS-4-20, March 2011. [citation][year=2009][PDF] Knowledge-Free Scheduling Algorithms for Multiple Bag-of-Task ?unipmn.it [PDF] C Anglano, M Canonico - di.unipmn.it Universit`a del Piemonte Orientale "A. Avogadro? Via Bellini 25/G, 15100 Alessandria http://www.di.unipmn.it ... Knowledge-Free Scheduling Algorithms for Multiple Bag-of-Task Applications on ... Desktop Grids Authors: Cosimo Anglano, Massimo Canonico {cosimo.anglano, ... Related articles - View as HTML [citation][year=2009][PDF] http://www.slideshare.net/brent.wilson/distributed-checkpointing-on-an-enterprise-desktop-grid Brent Wilson, “Distributed Checkpointing on an Enterprise Desktop Grid”, PhD Thesis, Colorado Technical University, 2009. [publication]Andrzejak, A. and Domingues, P. and Silva, L. , "Predicting Machine Availabilities in Desktop Pools", 2006 [citation][year=2013]Javadi, Bahman and Kondo, Derrick and Iosup, Alexandru and Epema, Dick, ”The Failure Trace Archive: Enabling the comparison of failure measurements and models of distributed systems”, Journal of Parallel and Distributed Computing, 2013, Elsevier. [citation][year=2011]Yi, S.; Andrzejak, A. & Kondo, D. Monetary cost-aware checkpointing and migration on Amazon cloud spot instances Services Computing, IEEE Transactions on, IEEE, 2011. DOI: 10.1109/TSC.2011.44 [citation][year=2010]Kondo, Derrick and Javadi, Bahman and Iosup, Alexandru and Epema, Dick, "The Failure Trace Archive: Enabling Comparative Analysis of Failures in Diverse Distributed Systems", 10th IEEE/ACM International Conference onCluster, Cloud and Grid Computing (CCGrid), 2010, DOI: 10.1109/CCGRID.2010.71. [citation][year=2010]Sangho Yi; Kondo, D.; Andrzejak, A, “Reducing Costs of Spot Instances via Checkpointing in the Amazon Elastic Compute Cloud”, 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD), pp 236-243, 2010, DOI: 10.1109/CLOUD.2010.35. [citation][year=2010]Garcia, J.R, Lerida, J.L, Hernandez, P., “Scheduling Soft Real-Time Applications on NOWs”, 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), 2010, DOI: 10.1109/PDP.2010.62. Toktam Ghafarian-M., Hossein Deldari, "Task Execution Availability Prediction in the Enterprise Desktop Grid", Proceedings of the 9th IASTED International Conference, Parallel and Distributed Computing and Networks (PDCN 2010), 2010. [citation][year=2010]Andrzejak, A.; Kondo, D.; Anderson, D.P.; “Exploiting non-dedicated resources for cloud computing”, 2010 IEEE Network Operations and Management Symposium (NOMS), pp 341 348, DOI: 10.1109/NOMS.2010.5488488. [citation][year=2010][PDF] http://profdoc.um.ac.ir/articles/a/1016838.pdf Toktam Ghafarian-M., Hossein Deldari, "Task Execution Availability Prediction in the Enterprise Desktop Grid", Proceedings of the 9th IASTED International Conference, Parallel and Distributed Computing and Networks (PDCN 2010), 2010. [publication]Domingues, P. and Andrzejak, A. and Silva, L. , "Using Checkpointing to Enhance Turnaround Time on Institutional Desktop Grids", 2006 [citation][year=2010]Abbes, H. and Cérin, C. and Jemni, M., “A decentralized and fault-tolerant Desktop Grid system for distributed applications”, Concurrency and Computation: Practice and Experience, volume 22, issue 3, pp. 261-277, 2010 [citation][year=2010]Yi, S. and Kondo, D. and Andrzejak, A., “Reducing costs of spot instances via checkpointing in the amazon elastic compute cloud”, 2010 IEEE 3rd International Conference on Cloud Computing, pp. 236-243, 2010 [citation][year=2010]Abbes, H. and Butelle, F. and Cérin, C., “Multithreading of Kostka Numbers Computation for the BonjourGrid Meta-desktop Grid Middleware”, Algorithms and Architectures for Parallel Processing, pp. 287-298, 2010 [citation][year=2009]Heithem Abbes, Christophe Cerin, Mohamed Jemni, “BonjourGrid: Orchestration of Multi-instances of Grid Middlewares on Institutional Desktop Grids”, Proc. 3rd Workshop on Desktop Grids and Volunteer Computing Systems (PCGrid 2009), Rome, Italy, In Workshops Proceedings of the 23rd IEEE International Parallel and Distributed Processing Symposium, IEEE Computer Society [citation][year=2009][PDF] http://www.slideshare.net/brent.wilson/distributed-checkpointing-on-an-enterprise-desktop-grid Brent Wilson, “Distributed Checkpointing on an Enterprise Desktop Grid”, PhD Thesis, Colorado Technical University, 2009. [citation][year=2008]Abbes, H. and Cérin, C. and Jemni, M., “BonjourGrid as a decentralised job scheduler”, 2008 IEEE Asia-Pacific Services Computing Conference, pp.89-94, 2008 [citation][year=2007]Y. Georgiou, O. Richard, N. Capit, "Evaluations of the Lightweight Grid CIGRI upon the Grid5000 Platform", IEEE International Conference on e-Science and Grid Computing, pp 279-286, December 2007 [publication]Hoarau, W. . and Tixeuil, S. and Moreno, N. and Sousa, D. and Silva, L. , "Benchmarking the OGSA-DAI Middleware", in Coregrid â?? 2nd Integration Workshop, 2006 [publication]Araujo, F. and Domingues, P. and Kondo, D. and Silva, L. , "Validating Desktop Grid Results by Comparing Intermediate Checkpoints", in Coregrid â?? 2nd Integration Workshop, 2006 [citation][year=2007]Xavier Dalem. "Implementation d"un Grid Peer-to-Peer". Travail de fin d'études. Licence en Informatique. Université de Liège. Juin 2007. [publication]Silva, L. and Madeira, H. and Silva, J.G. , "Software Aging and Rejuvenation in a SOAP-based Server", in IEEE-NCA, Network Computing and Applications, 2006 [citation][year=2007]Salvatore Orlando, "Software Aging Analysis of Off The Shelf Software Items?, PhD Thesis Salvatore Orlando, "FEDERICO II? University of Naples, Naples, Italy, October, 2007. [publication]Domingues, P. and Andrzejak, A. and Silva, L. , "Scheduling for Fast Turnaround Time on Institutional Desktop Grid", in 2nd CoreGRID Workshop on Grid and Peer To Peer Systems Architecture, 2006 [citation][year=2010]Xhafa, F. and Abraham, A., “Computational models and heuristic methods for Grid scheduling problems”, Future Generation Computer Systems, volume 26, issue 4, pp. 608-621, 2010 [citation][year=2010]Farkas, Z. and Marosi, A.C. and Kacsuk, P., “Job Scheduling in Hierarchical Desktop Grids”, Remote Instrumentation and Virtual Laboratories, pp. 79-97, 2010 [citation][year=2008]K Watanabe, M Fukushi, S Horiguchi, "Optimal spot-checking to minimize the computation time in volunteer computing?, International Symposium on Parallel and Distributed Processing (IPDPS 2008), 2008. [citation][year=2008]F Xhafa, A Abraham, "Metaheuristics for Scheduling in Distributed Computing Environments?, Chapter 1, Studies in Computational Intelligence, Vol. 146, Springer Verlag, 2008. [citation][year=2008]I. Al-Azzoni and D.G. Down, Dynamic Scheduling for Heterogeneous Desktop Grids, The 9th IEEE/ACM International Conference on Grid Computing (Grid 2008), Tsukuba, Japan, October 2008. [publication]Tixeuil, S. and Hoarau, W. . and Silva, L. , "An Overview of Existing Tools for Fault-Injection and Dependability Benchmarking in Grids", in 2nd CoreGRID Workshop on Grid and Peer To Peer Systems Architecture, 2006 [publication]Sousa, B. and Domingues, P. and Silva, L. , "Sabotage Tolerance and Trust Management in Desktop Grid Computing", in 2nd CoreGRID Workshop on Grid and Peer To Peer Systems Architecture, 2006 [citation][year=2013]TALAL H. NOOR , QUAN Z. SHENG, SHERALI ZEADALLY, IAN YU, "Trust Management of Services in Cloud Environments: Obstacles and Solutions", ACM Computing Surveys, Vol. 0, No. 0, 2013, Pages 1, 2013 [citation][year=2010]K Watanabe, M Fukushi, S Horiguchi, “Expected-Credibility-Based Job Scheduling for Reliable Volunteer Computing”, IEICE TRANSACTIONS on Information and Systems 93(2), pp 306-314, 2010. [citation][year=2010]K Watanabe, M Fukushi, “Generalized Spot-Checking for Reliable Volunteer Computing”, IEICE TRANSACTIONS on Information and Systems 93(12), pp 3164-3172, 2010. [citation][year=2010]F. Taoab, Y. Hub, D. Zhaoc, Z. Zhoub, “Study of failure detection and recovery in manufacturing grid resource service scheduling”, International Journal of Production Research 48(1), pp 69-94, 2010. doi:10.1080/00207540802275871 [citation][year=2010]K Watanabe, M Fukushi, S Horiguchi, “Generalized Spot-Checking for Sabotage-Tolerance in Volunteer Computing Systems”, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp 655-660, 2010. [citation][year=2010]Y. Bernard, L. Klejnowski, J. Hahner, C. Muller-Schloer, “Towards Trust in Desktop Grid Systems”, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp 637-642, 2010. [citation][year=2010]F. Georgatos, V. Gkamas, A. Ilias, G. Kouretis, E. Varvarigos, “A Grid-enabled CPU Scavenging Architecture and a Case Study of its Use in the Greek School Network”, Journal of Grid Computing 8(1), pp 61-75, 2010. [citation][year=2010]Junseok Hwang, Jihyoun Park, Jorn Altmann, “Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods”, in book “Information Systems, Technology and Management”, pp 187-197, 2010. [citation][year=2010]Wang, Y., Nakao, A., “Poisonedwater: An improved approach for accurate reputation ranking in P2P networks” Future Generation Computer Systems, volume 26, issue 8, year 2010, pp. 1317 – 1326. [citation][year=2010]Papaioannou, T.G., Stamoulis, G.D, “coverReputation-based estimation of individual performance in collaborative and competitive grids”, Future Generation Computer Systems, volume 26, issue 8, pp. 1327 – 1335, 2010. [citation][year=2010]Bernard, Y., Klejnowski, L., Hahner, J., Muller-Schloer, C., “Towards trust in desktop grid systems”, Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 637—642, 2010. [citation][year=2010]Choi, S.J. and Buyya, R., “Group-based adaptive result certification mechanism in Desktop Grids”, Future Generation Computer Systems, volume 26, issue 5, pp. 776—786, 2010. [citation][year=2010]Bendahmane, A., Essaaidi, M., El Moussaoui, A., Younes, A., “Compromised Resources Tolerance in Grid Computing Systems”, Intelligent Distributed Computing IV, pp. 145—154, 2010. [citation][year=2010]Antonopoulos, N., Rana, O.F., “Management and optimisation of P2P and Grid systems with network economics”, Future Generation Computer Systems, volume 26, issue 8, pp. 1282—1284, 2010. [citation][year=2010]Canon, Louis-Claude, Jeannot, Emmanuel, Weissman, Jon, “A Scheduling Algorithm for Defeating Collusion”, Research Report, INRIA, RR-7403, October 2010 [citation][year=2010]Hwang, J. and Kim, H.J. and Park, J., “Managing risks in an open computing environment using mean absolute deviation portfolio optimization”, Future Generation Computer Systems, volume 26, issue 8, pp. 1381-1390, 2010 [citation][year=2010]Hwang, J. and Park, J. and Altmann, J., “Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods”, Information Systems, Technology and Management, pp. 187-197, 2010 [citation][year=2010]Canon, L.C. and Jeannot, E. and Weissman, J., “A Scheduling Algorithm for Defeating Collusion”, 2010 [citation][year=2010]Bendahmane, A. and Essaaidi, M. and El Moussaoui, A. and Younes, A., “Reputation-based Majority Voting for Malicious Grid Resources Tolerance”, Scalable Computing, pp. 385, 2010. [citation][year=2010]Canon, L.C., “Outils et algorithmes pour gérer l’incertitude lors de l’ordonnancement d’application sur plateformes distribuées”, PhD Thesis, Université Henri Poincarré – Nancy 1, France, 2010. [citation][year=2010]Bendahmane, Mohammad Essaaidi, Ahmed El Moussaoui, Ali Younes, "Reputation-based Majority Voting for Malicious Grid Resources Tolerance", Ahmed Scientific International Journal for Parallel and Distributed Computing, Vol 11, No 4 (2010) - (http://www.scpe.org/index.php/scpe/article/view/669) 2005(5 publications) [publication]Domingues, P. and Marques, P. and Silva, L. , "Distributed Data Collection through Remote Probing in Windows Environments", in PDP'05, 2005 [citation][year=2013]Tie, Zhixin, ”Mobile-C Based Agent System for Detecting Improper Computer Usage at Computer Laboratories”, Journal of Software, 8(9), pp. 2262-2271, 2013. [citation][year=2011][PDF] http://www.csi.ucd.ie/Staff/jmurphy/publications/1721.pdf Jesus Omana Iglesias, James Thorburn, Trevor Parsons, John Murphy, and Patrick O’Sullivan, "Scoring System Utilization Through Business Profiles", IEEE CloudCom 2011, 2011. [citation][year=2011][PDF] http://www.cse.wustl.edu/~schmidt/PDF/RTCSA-2011.pdf James Hill and Douglas C. Schmidt Experiences with Service-Oriented Middleware for Dynamic Instrumentation of Enterprise Distributed Real-time and Embedded Systems, Proceedings of the 1st International Symposium on Secure Virtual Infrastructures (DOA-SVI'11), October 17-19, 2011, Crete, Greece. [citation][year=2009][PDF] http://doi.ieeecomputersociety.org/10.1109/ESIAT.2009.123 C. Fang, Y. Zhao, Z. Wang, “Research and Design of a Service Management System for Deadline Render Farm”, International Conference on Environmental Science and Information Application Technology, Wuhan, China, pp. 542-454, 2009. [citation][year=2009][PDF] http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5198525 Jinwei Wang, Huazhi Sun, Jianping Fan, "DUMS: A Dynamical Updatable Monitoring System for Desktop PCs Used for Distributed Computing", pp 309-310, Third IEEE International Symposium on, Theoretical Aspects of Software Engineering, 2009 (TASE 2009). DOI:10.1109/TASE.2009.44 [citation][year=2005][PDF] http://www-vs.informatik.uni-ulm.de/DE/intra/bib/2005/PDCS/466-153.pdf Jinwei Wang, Yuzhong Sun, Jianping Fan, "Analysis on Resource Utilization Patterns of Office Computer", Proceedings of the 17th IASTED International Conference Parallel and Distributed Computing and Systems, pp 626-631, 2005. [publication]Bruno Cabral and Marques, P. and Silva, L. , "RAIL: Code Instrumentation for .NET", in ACM Symposium On Applied Computing (SAC'05), 2005 [citation][year=2011]L . Liu, Multi-level Sandboxing Techniques for Execution-based Stealthy Malware Detection, PhD Thesis, George Mason University, 2011. [citation][year=2010]Y. Ba, Sampling-based Program Execution Monitoring, Masters Thesis of Applied Science in Electrical and Computer Engineering, Waterloo, Ontario, Canada, 2010. [citation][year=2010]Antonia Bertolino, Silvano Chiaradonna, Gabriele Costa, Felicita Di Giandomenico, Antinisca Di Marco, Paul Grace, Valerie Issarny, Marta Kwiatkowska, Fabio Martinelli, Paolo Masci, Ilaria Matteucci, Hongyang Qu, Mark Rouncefield, Rachid Saadi, Antonino Sabetta, Romina Spalazzese, Francois Taiani, Deliverable D5.2- Report on Conceptual Models for Assessment & Assurance of Dependability, Security and Privacy in the Eternal CONNECTed World, Antonia Bertolini (Editor), CONNECT – Emergent Connectors for Eternal Software Intensive Networked Systems, ICT FET IP Project, 2010. [citation][year=2010]Lei Liu, Xinwen Zhang, Guanhua Yan, and Songqing Chen. sePlugin: Towards transparently secure plugins in your internet explorers, In Proceedings of the 8th International Conference on Applied Cryptography and Network Security, 2010. 67 [citation][year=2008]N. Kumar, "SOURCE LEVEL DEBUGGING OF DYNAMICALLY TRANSLATED PROGRAMS", PhD Thesis, University of Pittsburgh, 2008 [citation][year=2008]T. Kempf, K. Karuri, and L. Gao, Software Instrumentation, in Wiley Encyclopedia of Computer Science and Engineering, pp1–11, 2008. [citation][year=2007]Fu, Xiang; Lu, Xin; Peltsverger, Boris; Chen, Shijun; Qian, Kai; Tao, Lixin; "A Static Analysis Framework For Detecting SQL Injection Vulnerabilities", in Proc. of the 31st International Computer Software and Applications Conference, July 2007 [citation][year=2007]Schmied, F. Cyment, A. ; " Aspect-oriented weaving and the .NET common language runtime", in IET Software, Vol. 1(6), IET, December 2007 [citation][year=2006]Joon S. Park, G. Jayaprakash, J. Giordano, "Component Integrity Check and Recovery Against Malicious Codes", in Proc. of the 20th IEEE International Conference on Advanced Information Networking and Applications (AINA'06), IEEE Press, Vienna, Austria, April 2006 [citation][year=2006]M. Lumpe, "Using Metadata Transformations to Integrate Class Extensions in an Existing Class Hierarchy", in Proceedings of Fourth ASIAN Symposium on Programming Languages and Systems (APLAS 2006), Naoki Kobayashi (Ed.), LNCS 4279, Springer, Sydney, Australia, November 2006 [citation][year=2006]Markus Lumpe; "Using Metadata Transformations as a Means to Integrate Class Extensions in an Existing Class Hierarchy", Technical Report #0602, Iowa State University, March 2006 [citation][year=2006]David Durand, "Gestion de la Qualité de Service dans les Applications Réparties sur Bus Middleware Orientés Objet -- Approche Dirigée par les Modèles.", PhD Thesis, Université de Picardie Jules Verne, November 2006. [citation][year=2006]J. S. Park, T.A. Suresh, G. An, and J. Giordano, "A Framework of Multiple-Aspect Component-Testing for Trusted Collaboration in Mission-Critical Systems", in Proceeding of the International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2006, pp.1-7, 17-20 Nov. 2006. [publication]Domingues, P. and Marques, P. and Silva, L. , "Resource usage of Windows computer laboratories", in ICPP 2005 - Workshops on Parallel Processing, 2005 [citation][year=2013]Da Costa, Georges, ”Heterogeneity: the key to achieve Power-Proportional Computing”, 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp 656-662, 2013. [citation][year=2013]Pearce, Michael and Zeadally, Sherali and Hunt, Ray, ”Virtualization: Issues, security threats, and solutions”, ACM Computing Surveys (CSUR), vol. 45(2), 2013. [citation][year=2012]Azab, Abdulrahman and Meling, Hein, Stroll: A Universal Filesystem-Based Interface for Seamless Task Deployment in Grid Computing, In Proceedings of Distributed Applications and Interoperable Systems, Lecture Notes in Computer Science, pages 162-176, 2012. DOI: 10.1007/978-3-642-30823-9 14 [citation][year=2012]Harold Castro, Mario Villamizar, German Sotelo, Cesar O. Diaz, Johnatan E. Pecero and Pascal Bouvry. ”Green flexible opportunistic computing with task consolidation and virtualization”, Cluster Computing, 2012. DOI: 10.1007/s10586-012-0222-y [citation][year=2012]Harold Castro, Mario Villamizar, German Sotelo, Cesar O. Diaz, Johnatan Pecero, Pascal Bouvry, and Samee U. Khan. ”GFOG: Green and Flexible Opportunistic Grids”, Chapter 18, Scalable Computing and Communications: Theory and Practice - Wiley. USA, June 1, 2012. [citation][year=2012]Hanappe, Peter, ”Fine-grained CPU Throttling to Reduce the Energy Footprint of Volunteer Computing”, Technical Report, Sony Computer Science Laboratory Paris, 2012. [citation][year=2012]Han, Dong and Gnawali, Omprakash, ”Understanding Desktop Energy Footprint in an Academic Computer Lab”, IEEE International Conference on Green Computing and Communications (GreenCom), pp. 541-548, 2012. [citation][year=2011][PDF] http://www.sciencedirect.com/science/article/pii/S0743731511002061 Daniel Lazaro, Derrick Kondo, Joan Manuel Marques, "Long-term availability prediction for groups of volunteer resources", Journal of Parallel and Distributed Computing, 2011, DOI: DOI;10.1016/j.jpdc.2011.10.007 [citation][year=2011][PDF] http://www.springerlink.com/content/5u71m8013150876g/ James H. Hill and Douglas C. Schmidt, Experiences with Service-Oriented Middleware for Dynamic Instrumentation of Enterprise DRE Systems, ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2011, Lecture Notes in Computer Science, 2011, Volume 7045/2011, 478-497, DOI: 10.1007/978-3-642-25106-1_5 [citation][year=2010][PDF] http://doi.ieeecomputersociety.org/10.1109/WSCAD-SCC.2010.24 Berto de Tácio Pereira Gomes, Gilberto Cunha Filho, Igor Ramos Campos, Jesseildo Figueredo Gonçalves, Francisco José da Silva e Silva, "Scheduling Strategies Evaluation for Opportunistic Grids," WSCAD-SCC, pp.88-95, 2010 11th Symposium on Computing Systems, 2010 [citation][year=2010][PDF] http://hdl.handle.net/10803/3066 José Ramón García Gutiérrez, “Planificación de Diferentes Clases de Aplicaciones en Entornos No Dedicados Considerando Procesadores Multicore”, PhD Thesis, Universitat Autónoma de Barcelona, 2010 [citation][year=2009][PDF] http://portal.acm.org/citation.cfm?id=1629036.1629044# Brent Wilson and Mary Jane Willshire, “EDGAR: grid computing project”, J. Comput. Small Coll. 25(2), pp 52-57, 2009. [citation][year=2009]T.F., Clayton, A.F. Murray, and I. Lindsay, “GP-GPU: Bridging the Gap between Modelling & Experimentation”, 2009 NASA/ESA Conference on Adaptive Hardware and Systems., pp 453-459, 2009. [citation][year=2009][PDF] http://hdl.handle.net/1842/4023 T.F., Clayton, “Enabling rapid iterative model design within the laboratory environment”, PhD Thesis, The University of Edinburgh, 2009 [citation][year=2009][PDF] http://hdl.handle.net/10803/5775 Josep Lluís Lérida Monsó, “Meta-Planificador Predictivo para Entornos Multicluster no Dedicados”, PhD Thesis, Universitat Autònoma de Barcelona, 2009 [citation][year=2009][PDF] http://www.tdx.cesca.es/TESIS_UAB/AVAILABLE/TDX-0527110-121159/jllm1de1.pdf Camargo, R.Y. and Castor, F. and Kon, F., “Reliable management of checkpointing and application data in opportunistic grids”, Journal of the Brazilian Computer Society, pp. 1 14, 2009. [citation][year=2008]Constantinescu-Fuløp, Zoran, "A Desktop Grid Computing Approach for Scientific Computing and Visualization?, PhD Thesis, Norwegian University of Science and Technology, May 2008. [citation][year=2008][PDF] http://www.dbpia.co.kr/view/ar_view.asp?arid=739548 Gandhi, P.J. and Munot, S.M. and Patel, S.A. and Memon, N.A., “Host Load Prediction Using Adaptive Models”, International Journal Of Computer Science And Applications, volume 1, issue 2, 2008. [citation][year=2007]J. Bustos-Jiménez, D. Caromel, J. M. Piquer, "Load Balancing: Towards the Infinite Network and Beyond?, Job Scheduling Strategies for Parallel Processing (selected paper of the 12th Workshop on Job Scheduling Strategies for Parallel Processing), Lecture Notes in Computer Science, 4376/2007: pp 176-191, Springer, 2007. [citation][year=2007]Raphael Yokoingawa de Camargo, "Armazenamento Distribuído de Dados e Checkpointing de Aplicações Paralelas em Grades Oportunistas?, PhD Thesis, Agosto 2007. [citation][year=2007]Raphael Y. de Camargo, Fabio Kon, "Design and Implementation of a Middleware for Data Storage in Opportunistic Grid," ccgrid, Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid '07), pp. 23-30, 2007. [citation][year=2007]Ju-Ho Hyun, Sunggu Lee, Sang Cheol Kim, Min-Gu Lee, "An Efficient Scheduling Method Taking into Account Resource Usage Patterns on Desktop Grids", DBPIA, Vol. 6, pp. 429-439, 2007 [citation][year=2006]J. Wang, L. Zang, Y. Han, "Client-Centric Adaptive Scheduling of Service-Oriented Applications", Journal of Computer Science and Technology, 21(4): pp 537-546, Springer, 2006. [citation][year=2006]J. Bustos-Jiménez, "Dynamic Load Balancing for Active Objects on Computer Grids?, PhD Thesis, Université de Nice-Sophia Antipolis, France, December 2006. [citation][year=2006]J. Bustos-Jiménez, D. Caromel, A. Iosup, M. Leyton, J.M. Piquer, “The rocking chair and the grid: Balancing load across project grids”, Integrated Research in Grid Computing, CoreGrid Integration Workshop, pp. 117-128, 2006. [publication]Tixeuil, S. and Silva, L. and Hoarau, W. . , "Fault-Injection and Dependability Benchmarking for Grid Computing Middleware", in Workshop of Integrated Research in Grid Computing, 2005 [publication]Andrzejak, A. and Domingues, P. and Silva, L. , "Classifier-Based Capacity Prediction for Desktop Grids", in Workshop of Integrated Research in Grid Computing, 2005 2004(1 publication) [publication]Bruno Cabral and Marques, P. and Silva, L. , "RAIL: Code Instrumentation for .NET (extended abstract)", in ACM OOPSLA'04 Conference Companion, 2004 [citation][year=2007]Schmied, F. Cyment, A. ; " Aspect-oriented weaving and the .NET common language runtime", in IET Software, Vol. 1(6), IET, December 2007 [citation][year=2006]Joon S. Park, Gautam Jayaprakash, Joseph Giordano, "Component Integrity Check and Recovery Against Malicious Codes," aina, pp. 466-470, 20th International Conference on Advanced Information Networking and Applications - Volume 2 (AINA'06), 2006 [citation][year=2006]J. Park, A. Suresh, G. An, J. Giordano, "A Framework of Multiple-Aspect Component-Testing for Trusted Collaboration in Mission-Critical Systems", in Proc. 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2006 2003(6 publications) [publication]Domingues, P. and Silva, L. and Silva, J.G. , "DRMonitor - A Distributed Resource Monitoring System", in 11th Euromicro Parallel, Distributed and Network-Based Processing, 2003 [citation][year=2013]Tie, Zhixin, ”Mobile-C Based Agent System for Detecting Improper Computer Usage at Computer Laboratories”, Journal of Software, 8(9), pp. 2262-2271, 2013. [citation][year=2012]Sarada Prasad Gochhayat, Pallapa Venkataram, ”Performance analysis of a node monitoring protocol in ubiquitous networks”, 2012. [citation][year=2012]Orozco, J Mart´ ?n Serrano,”Convergence in IT and Telecommunications”, Applied Ontology Engineering in Cloud Services, Networks and Management Systems, pp. 1-9, 2012 (DOI: 10.1007/978-1-4614-2236-5 1). [citation][year=2012]Orozco, J Mart´ ?n Serrano, ”The Role of Semantics in ICT at the Cloud Era”, Applied Ontology Engineering in Cloud Services, Networks and Management Systems, pp 11-53, 2012, Springer. [citation][year=2012]Gochhayat, Sarada Prasad and Venkataram, Pallapa, ”A method of developing an agent based ubiquitous node monitoring protocol”, Conference on Communications (NCC), 2012. [citation][year=2011]Iglesias, J.O.; Thorburn, J.; Parsons, T.; Murphy, J.; O'Sullivan, P.; , "Scoring System Utilization through Business Profiles," Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on , vol., no., pp.482-488, Nov. 29 2011-Dec. 1 2011, doi: 10.1109/CloudCom.2011.71 [citation][year=2009]Gao, C. and Li, Z. and Chen, L., “Host risk evaluation framework based on multi-source information”, Computing, Communication, Control, and Management, 2009. CCCM 2009. ISECS International Colloquium on, volume 1, pp. 249-252, 2009 [citation][year=2009]Yang, G. and Wang, K. and Zhou, X.,” An Adaptive Resource Monitoring Method for Distributed Heterogeneous Computing Environment”, 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, pp. 40-44, 2009 [citation][year=2009]Gao, C. and Li, Z. and Song, H., “Security Evaluation Method Based on Host Resource Availability”, 2009 Third International Conference on Multimedia and Ubiquitous Engineering, pp. 499-504, 2009 [citation][year=2008]EH Song, LT Yang, YS Jeong, “3-Hierarchical resource management model on web grid service architecture”, The Journal of Supercomputing, 46(3), pp 257-275, Springer Verlag, 2008. [citation][year=2006]J. Wang, Xingshe Zhou, Xiaoan Shi, "Policy-based Distributed Resource Monitoring Technology", Computer Engineering, 32(1), pp 34-36, 2006. [citation][year=2005]Hai-jing Zhang, Yao-wu Chen, Le-Yu Wang, "The Software Design of Network-based Elevator Alarm System", Modern Machinery, (3), pp 40-41, 2005. [citation][year=2005]Córdoba, A. and Villadangos, J. and Astrain, JJ and Armendáriz, JE, “A b2b replication service”, Parallel, Distributed and Network-Based Processing, 2005. PDP 2005. 13th Euromicro Conference on, pp. 337-343, 2005 [publication]Santos, A. and Silva, L. and Martins, P. and Martins, P. and P. Carvalho , "Frequency-based Watermarking with Spatial Masking for DRM of MMS Content", in Int. Conf. on Image and Signal Processing, 2003 [publication]Santos, N. and Marques, P. and Silva, L. , "Dynamic Deployment of Services on Mobile Agents Systems", 2003 [publication]Santos, N. and Silva, L. and Pereira, P. and Pereira, P. , "A Generic DRM Framework for J2ME Applications", in First International Mobile IPR Workshop: Rights Management of Information Products on the Mobile Internet, 2003 [publication]Silva, L. and Carvalho, N. and Santos, A. and P. Carvalho , "MMS Content Copyright Protection using Watermarking", in First International Mobile IPR Workshop: Rights Management of Information Products on the Mobile Internet, 2003 [publication]Silva, L. and Carvalho, N. , "PAMM Platform: DRM Protection for MMS Content", in Proceedings of the International Conference on Mobile-Business 2003, 2003 2002(5 publications) [publication]Simões, P. and Rodrigues, J. and Silva, L. and Boavida, F. , "Distributed Retrieval of Management Information: Is it About Mobility, Locality or Distribution?", 2002 [citation][year=2006]SILVA, Fabrício Aguiar ; BRAGA, Thais Regina de Moura ; RUIZ, Linnyer Beatriz ; NOGUEIRA, J. M. Avaliação de abordagens de coleta e processamento de dados em redes de sensores sem fio. In: WGRS, 2006, Curitiba. XI Workshop de Gerência de Redes e Serviços/Simpósio Brasileiro de Redes de Computadores, 2006. [citation][year=2006]KL Calvert, J Griffioen, S Wen, Scalable Network Management Using Lightweight Programmable Network Services, Journal of Network and Systems Management, Springer, Volume 14, Number 1, March, 2006. [citation][year=2006]Fabrício Aguiar Silva, Avaliação de Abordagens de Gerenciamento para Redes de Sensores Sem Fio, Dissertação de Mestrado (Ciência da Computação), Universidade Federal de Minas Gerais, Brasil, Agosto de 2006. [citation][year=2004]Herbert Bos, Willem de Bruijn, Jon Moore, "Splash: SNMP Plus a Lightweight API for SNAP Handling?, Proceedings of the Proceedings of the 2004 IEEE/IFIP Network Operations and Management Symposium (NOMS'2004), Seoul, Korea, Abril de 2004. [citation][year=2004]Emmanuel Reuter, Agents Mobiles: Itinéraires pour l"administration système et réseau, PhD thesis, Université de Nice Sophia Antipolis, May 2004. [citation][year=2003]Rui Pedro Lopes, "Gestão Distribuída em SNMP?, Tese de Doutoramento, Universidade de Aveiro, 2003. [citation][year=2003]Bohoris C., Pavlou G., Liotta A., "Mobile Agent-based Performance Management for the Virtual Home Environment?, Journal of Network and System Management, Vol. 11, No. 2, Junho de 2003. [citation][year=2003]Christos Bohoris, "Network Performance Management Using Mobile Software Agents?, PhD Thesis, University of Surrey, Junho de 2003. [citation][year=2002]Bohoris C., Pavlou G., Liotta A., "A Hybrid Approach to Network Performance Monitoring Based on Mobile Agents and CORBAâ?, Proceedings of the IEEE/ACM International Workshop on Mobile Agents for Telecommunication Applications (MATA'02), Barcelona, Spain, Springer, pp. 151-162, October 2002. [citation][year=2002]E. Reuter, F. Baude, "A mobile-agent and SNMP based management platform built with the java ProActive library", Proceedings of the 2002 IEEE Workshop on IP Operations and Management (IPOM 2002), October 2002, Dallas, pp. 140-145. [publication]Simões, P. and Rodrigues, J. and Silva, L. and Boavida, F. , "Modelos de Distribuição para Recolha de Informação de Gestão (Models for the Distribution and Collection of Management Information)", 2002 [publication]Marques, P. and Fonseca, R. and Simões, P. and Silva, L. and Silva, J.G. , "A Component-Based Approach for Integrating Mobile Agents Into the Existing Web Infrastructure", 2002 [citation][year=2015]M. M. Nasr, "A proposed paradigm for tracing the effect of security threats in various mobile agent systems," 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), Riyadh, 2015, pp. 1-8. doi: 10.1109/NSITNSW.2015.7176428 [citation][year=2013]Mauro Dragone, Building Self-adaptive Software Systems with Component, Services & Agents Technologies: Self-OSGi, Agents and Artificial Intelligence, Communications in Computer and Information Science Volume 358, 2013, pp 300-316, http://dx.doi.org/10.1007/978-3-642-36907-0_20 [citation][year=2010]Qusay H. Mahmoud and Leslie Yu, Integrating the Havana agent platform into the existing web infrastructure, International Journal of Wireless and Mobile Computing, Volume 4, Number 4 / 2010, pp. 290–304, Indescience. [citation][year=2009]Oscar Urra, Sergio Ilarri, Raquel Trillo and Eduardo Mena, Mobile Agents and Mobile Devices: Friendship or Difficult Relationship?, Journal of Physical Agents, Vol. 3 No. 2 May 2009. [citation][year=2008]Tong-Seng Quah, Chye-Huang Leow, Linking Business for Competitive Advantage: a Mobile Agent-Based Approach. In Electronic Business: Concepts, Methodologies, Tools, and Applications, I. Lee (Ed.), pp. 117-141, Idea Group Inc (IGI), 2008. [citation][year=2007]WANG Xiaohu, WU Jianbin, Research of an Agent platform based on Web services, Journal of Zheijiang Normal University (Natural Sciences), 2007 (30)2, 10.3969/j.issn.1001-5051.2007.02.014 [citation][year=2007]1. I.E. Foukarakis, A.I. Kostaridis, C.G. Biniaris, D.I. Kaklamani, and I.S. Venieris; "Webmages: An agent platform based on web services"; in Computer Communications, Volume 30, Issue 3, February 2007 [citation][year=2005]Mona Nasr, A Simulation-based Model for Tracing the Effect of Masquerading Security Threat in Mobile Agent Systems; In Proc the 13th Int. Conf. on Artificial Applications, ICAIA’05, American University in Cairo (AUC), Egypt, February 2005. [citation][year=2005]1. M. Eid, H. Artail, A. Kayssi, and A. Chehab, "Trends in Mobile Agent Applications", in Journal of Research and Practice in Information Technology, Vol. 37, No. 4, November 2005 [citation][year=2004]V. Tan, "Interaction Tracing for Mobile Agent Security", PhD Thesis, University of Southampton, Southampton, UK, March 2004 [citation][year=2003]I.E. Foukarakis, A.I. Kostaridis, C.G. Biniaris, D.I. Kaklamani, I.S. Venieris, "Implementation of a Mobile Agent Platform Based on Web Services", Proc. Mobile Agents for Telecommunication Applications MATA-03, Lecture Notes in Computer Science, Volume 2881 / 2003, Springer-Verlag Heidelberg. [citation][year=2003]Odysseas Papapetrou, Location Aware Web-Crawling With the Use of Migrating Crawlers, Master Thesis, University of Cyprus, Department of Computer Science, December 2003. [publication]Santos, N. and Marques, P. and Silva, L. and Silva, J.G. , "A Framework for Smart Proxies and Interceptors in RMI", 2002 [citation][year=2008]1. A. Stevenson and S. MacDonald, "Smart Proxies in Java RMI with Dynamic Aspect-Oriented Programming", in Proceedings of the 10th International Workshop on Java and Components for Parallelism, Distribution, and Concurrency (IWJPDC 2008), Miama, FL, April 2008. [citation][year=2008]2. A. Stevenson and S. MacDonald, "Dynamic Aspect-Oriented Load Balancing in Java RMI", in Proceedings of the 2008 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA 2008), Las Vegas, NV, July 2008, pages 485-491. [citation][year=2008]3. A. Stevenson, "Aspect-Oriented Smart Proxies in Java RMI", M.Sc. Thesis, University of Waterloo, Waterloo, Ontario, Canada, 2008 [citation][year=2007]1. Buyya, R. Venugopal, S., " Smart Proxies for Accessing Replicated Web Services", in IEEE Distributed Systems Online, Vol. 8(12), IEEE, December 2007 [citation][year=2006]1. J. Junior, G. Carmo, M. Valente, \\\"Invocation of replicated web services using smart proxies\\\", in Proceedings of the 12th Brazilian symposium on Multimedia and the Web, ACM Press, Natal, Rio Grande do Norte, Brazil, November 2006 [citation][year=2006]2. Y. Wang, J. Wei, Z. Wang. \"An architecture for extensible and configurable event notification service\", in Journal of Software, Vol. 17(3), pgs. 638-648, 2006. [citation][year=2005]1. Güray Yilmaz and Nadia Erdogan, "DCOBE: Distributed Composite Object-Based Environment?, in The Computer Journal, Vol. 48(3):273-291, 2005 [citation][year=2005]2. R. Kapitza, M. Kirstein, H. Schmidt, F. Hauck, "FORMI: an RMI extension for adaptive applications", in Proceedings of the 4th Workshop on Reflective and Adaptive Middleware Systems, ACM Press, Grenoble, France, 2005 [citation][year=2004]1. M. Keidl and A. Kemper, "Towards Context-Aware Adaptable Web Services?, in Proc. 13th International Conference on World Wide Web (WWW"04), ACM Press, New York, USA, May 2004 [citation][year=2003]H. Reiser, F. Hauck, R. Kapitza, and A. Schmied, "Integrating Fragmented Objects into a CORBA Environment?, in Proc. Net.Objects Days 2003, Erfurt, Germany, September 2003. [citation][year=2003]S. Schulz, M. Friedrich, W. Küchlin, and T. Hüttner, "A RMI-Security-Extension Using the PERMI Framework?, in Proc. Net.Objects Days 2003, Erfurt, Germany, September 2003. [citation][year=2003]J. Hallstrom, W. Leal, A. Arora, "Scalable Evolution of Highly Available Systems?, in IEICE/IEEE Joint Special Issue on Assurance Systems and Networks, E86-D(10), 2154 " 2166 (October 2003) [publication]Marques, P. and Santos, P. and Silva, L. and Silva, J.G. , "Supporting Disconnected Computing in Mobile Agent Systems", 2002 2001(6 publications) [publication]Marques, P. and Simões, P. and Silva, L. and Silva, J.G. and Boavida, F. , "Towards Manageable Mobile Agent Infrastructures", 2001 [citation][year=2004]Emmanuel Reuter, Agents Mobiles: Itinéraires pour l"administration système et réseau, PhD thesis, Université de Nice Sophia Antipolis, May 2004. [citation][year=2003]1. Rui Pedro Lopes, José Luis Oliveira, "A Mobile Agent Manager", Proc. MATA-2003, Mobile Agents for Telecommunication Applications, Oct 2003, Lecture Notes in Computer Science, Volume 2881 / 2003, Springer-Verlag [publication]Marques, P. and Simões, P. and Silva, L. and Boavida, F. and Silva, J.G. , "Providing Applications With Mobile Agent Technology", 2001 [citation][year=2016]Muhammad Saleh Kaukab, Sabih Khan Afridi, Yaqoob Wani and Khalid Hussain, A Comprehensive Analysis of Agent Based Backup Management System, International Journal of Scientific & Engineering Research, Volume 7, Issue 3, pp. 530-536, March-2016, ISSN 2229-5518 [citation][year=2015]Nai-Ching Chao, A Research on the Implementation of Enterprise BOYD Policy, These for Master of Business Administration – Department of Information Management, Tatung University, January 2015. [citation][year=2014]Miada Al-masre, Fathy Alburi. Manager Architecture for Mobile Cloud Computing-Cloudlet based. Asian Journal of Computer and Information Systems (ISSN: 2321 – 5658), Vol. 02 – Issue 01, February 2014. [citation][year=2013]Atul Srivastava, Manpreet Singh, Mamta Sharma and Manali Aggarwal, Mobile Agents and their Application in Distributed Crawling, Proceedings of the 2nd National Conference on Recent Trends in Computer Science and Information Technology (RTCSIT-2013), Excel India Publishers, pp. 68-70, October 2013. [citation][year=2012]Bhattacharya, A., Mobile agent based elastic executor service, Computer Science and Software Engineering (JCSSE), 2012 Int. Joint Conf. on, 2012, pp. 351-356, DOI: 10.1109/JCSSE.2012.6261978 [citation][year=2010]Mohammad Hasan Samadani and Mehdi Shajari. 2010. Path reduction in complex grid service provision. In Proceedings of the 12th International Conference on Electronic Commerce: Roadmap for the Future of Electronic Business (ICEC '10). ACM, New York, NY, USA, 88-93. DOI=10.1145/2389376.2389388 http://doi.acm.org/10.1145/2389376.2389388 [citation][year=2010]Saifur Rahman, Manisa Pipattanasomporn, Modeling and Simulation of a Distributed Generation-Integrated Intelligent Microgrid, SERDP Project SI-1650 (Final Report), Virginia Tech, February 2010. [citation][year=2009]Zhiqiang Wei; Yewei Feng, "A Mobile Agent Sub-optimal Migration Algorithm Based on Probability," Web Information Systems and Mining, 2009. WISM 2009. International Conference on, vol., no., pp.413,417, 7-8 Nov. 2009, doi: 10.1109/WISM.2009.90 [citation][year=2009]Hassan Feroze, "Multi-Agent Systems in Microgrids: Design and Implementation?, Masters thesis in Electrical Engineering, Faculty of the Virginia Polytechnic Institute and State University, USA, August 2009. [citation][year=2009]B. Molina, S.F. Pileggi, M. Esteve, C.E. Palau, "A negotiation framework for content distribution in mobile transient networks?, Journal of Network and Computer Applications, Volume 32, Issue 5, September 2009. [citation][year=2009]Daniele Puccinelli (editor), Specification of the ADULT-Haggle, Haggle Deliverable D1.4, European Union FP6 Project 027918, http://www.haggleproject.org/, September 2009. [citation][year=2008]Molina, B., Pileggi, S. F., Palau, C. E., and Esteve, M. 2008. A social framework for content distribution in mobile transient networks. In Proceedings of the Third international Workshop on Use of P2p, Grid and Agents For the Development of Content Networks (Boston, MA, USA, June 23 - 23, 2008). UPGRADE '08. ACM, New York, NY, 29-36. DOI= http://doi.acm.org/10.1145/1384209.1384216. [citation][year=2008]Shamila Makki, Subbarao Wunnava, Next Generation Networks and Code Mobility. ISAST Transactions on Communications and Networking, No.1 Vol. 2, 2008. [citation][year=2007]Liam Cragg, Huosheng Hu and Norbert Voelker, Modularity and Mobility of Distributed Control Software for Networked Mobile Robots, Software Engineering for Experimental Robotics, Springer Tracts in Advanced Robotics, 2007, Volume 30/2007, 459-484, DOI: 10.1007/978-3-540-68951-5_26 [citation][year=2006]Jinghao Ju; Dong Wang; Huanye Sheng. RFID Data Collection and Integration Based on Mobile Agent," IEEE Conference on Cybernetics and Intelligent Systems (ICCIS 2006), June 2006 [citation][year=2006]D. Gavalas, C. Politi, Low-Cost Itineraries for Multi-Hop Agents Designed for Scalable Monitoring of Multiple Subnets, Computer Networks, Elsevier Science , 50(16), pp. 2937-2952, November 2006. [citation][year=2006]Xi-Cheng Tan and Fu-Ling Bian, "P2P and Agent Service Based On-Line 3DGIS�?�, Lecture Notes in Computer Science Volume 4295/2006 Book Web and Wireless Geographical Information Systems ISBN978-3-540-49466-9, 2006. [citation][year=2005]1. J Ko, BD Gerardo, J Lee, JJ Hwang, The Information Search System Using Neural Network and Fuzzy Clustering Based on Mobile Agent, in O. Gervasi et al. (Eds.): ICCSA 2005, LNCS 3481, pp. 205"214, Springer-Verlag Berlin Heidelberg 2005. [citation][year=2005]2. X Wang, A Jiang, S Wang; Mobile agent based wireless sensor network for intelligent maintenance, in DS Huang, XP Zhang, GB Huang (Eds.): Advances in Intelligent Computing, International Conference on Intelligent Computing, ICIC 2005, Hefei, China, August 23-26, 2005, Part II, LNCS 3645, pp. 316"325, Springer-Verlag Berlin Heidelberg 2005. [citation][year=2005]3. Christophe Cubat Dit Cros, Agents Mobiles Coopérants pour les Environnements Dynamiques, PhD thesis, Institut National Polytechnique de Toulouse, France, December 2005. [citation][year=2005]4. W. Buchanan, J. Graves, L. Saliou, H. Al Sebea, N. Migas, Agent-based Forensic Investigations with an Integrated Framework, Proc. of the Proceedings of the 5th European Conference on Information Warfare and Security (ECIW 2005), Academic Conferences, 2005. [citation][year=2005]5. C. Diaz, SWAM: Un lengua je para la programacíon de agentes móviles inteligentes en la Web Semántica, Tesis sometida a evaluacíon como requisito parcial para la obtencíon del grado de Magister en Ingeniería de Sistemas, Universidad Nacional Del Centro de la Provincia de Buenos Aires, Argentina, 2005. [citation][year=2004]1. Aneiba, J. Rees, "Mobile Agent Technology and Mobility?, in Proc. of the 5th Annual Postgraduate Symposium on the Convergence of Telecommunications (PGNet 2004), Networking and Broadcasting, pp. 14-20, Liverpool, June 2004 [citation][year=2004]2. S. S. Manvi, P. Venkataram: "Applications of agent technology in communications: a review". Computer Communications 27(15): 1493-1508 (2004) [citation][year=2004]3. Damianos Gavalas, "Network Management Itineraries for Mobile Agents?, Proceedings of the 2nd Internation Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET-NETs"04), Ilkley, West Yorkshire, UK, 26-28 July, 2004. [citation][year=2003]L. Cragg, P. Tsui, and H. Hu, "Building a Fault Tolerant Architecture for Internet Robots Using Mobile Agentsâ?, in Proc. 1st British Workshop on Internet and Online Robots (IORW"03), Reading, UK, 2003 [citation][year=2003]C. Hsu, H. Hsu, D. Yang, and F. Wang, "Constructing a Multiple Mobile-BDI Agent Systemâ?, in Proc. of 14th Workshop on Object-Oriented Technology and Applications (OOTA'2003), 2003. [citation][year=2003]M. Chuang and W. Chang, "Performance Monitoring Web Applications via a Mobile-Agent Approachâ?, in Tunghai Science Journal, Vol. 5, pp. 21-41, July 2003 [citation][year=2003]A. Boulis, C.-C. Han, and M.B. Srivastava, "Design and Implementation of a Framework for Efficient and Programmable Sensor Networks", in Proceedings of First International Conference on Mobile Systems, Applications, and Services (MobiSys), May 2003. [citation][year=2002]A. Boulis and M. B. Srivastava, "A Framework for Efficient and Programmable Sensor Networksâ?, in Proc. 5th IEEE International Conference on Open Architectures and Network Programming (OpenArch'02), IEEE Computer Press, New York, June, 2002 [citation][year=2002]Required reading in the graduate course "Desenvolvimento de Software Baseado em Agentes Móveisâ?, of the Universidade Federal de Campina Grande, Brazil. 2002. (http://www.dsc.ufcg.edu.br/~patricia/ma/) [citation][year=2001]Damianos Gavalas, Mobile Software Agents for Network Monitoring and Performance Management, PhD Thesis, University of Essex, UK, 2001. [publication]Simões, P. and Silva, L. and Boavida, F. , "Mobile Agent Infrastructures: a Solution for Management or a Problem to Manage?", 2001 [citation][year=2010]Micha? Komorowski. 2010. Configuration management of mobile agents based on SNMP. In Proceedings of the 7th international conference on Rough sets and current trends in computing (RSCTC'10), Marcin Szczuka, Marzena Kryszkiewicz, Sheela Ramanna, Richard Jensen, and Qinghua Hu (Eds.). Springer-Verlag, Berlin, Heidelberg, 456-465. [citation][year=2003]Rui Pedro Lopes, "Gestão Distribuída em SNMP?, Tese de Doutoramento, Universidade de Aveiro, 2003. [citation][year=2002]White T., Pagurek B. and Deugo D., "Management of Mobile Agent Systems using Social Insect Metaphorsâ?. In Proceedings of the International Workshop on Self-Repairing and Self-Configurable Distributed Systems (RCDS 2002), Osaka Japan, October 2002. [citation][year=2002]T. White, B. Pagurek, and D. Deugo, "Management of Mobile Agent Systems: Learning from the Antsâ?. In Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA 2002), Las Vegas, June 24-27 2002. [citation][year=2002]R. P. Lopes and J. L. Oliveira, "Multi-Management Schemes for MAF Platformsâ?, in International Workshop on Mobile Agents for Telecommunications Applications (MATA'2002), Barcelona, Spain, 2002. [publication]Marques, P. and Santos, N. and Silva, L. and Silva, J.G. , "The Security Architecture of the M&M Mobile Agent Framework", 2001 [citation][year=2007]1. Adam Pridgen and Christine Julien; "SMASH: Modular Security for Mobile Agents"; in Lecture Notes in Computer Science 4408, Springer-Verlag, August 2007 [citation][year=2006]1. A. Pridgen and C. Julien, "A Secure Modular Mobile Agent System", Technical Report TR-UTEDGE-2006-003, University of Texas at Austin, 2006 [citation][year=2006]2. Adam Pridgen and Christine Julien; "A Secure Modular Mobile Agent System?; in Proceedings of the 2006 International Workshop on Software Engineering for Large-Scale Multi-agent Systems; ACM, May 2006 [citation][year=2004]1. Elmarie Biermann, "A Framework for the Protection of Mobile Agents Against Malicious Hosts?, Ph.D Thesis, University of South Africa, September 2004 [publication]Marques, P. and Fonseca, R. and Simões, P. and Silva, L. and Silva, J.G. , "Integrating Mobile Agents into Off-the-Shelf Web Servers: The M&M Approach", in Munich, Germany, 2001 [citation][year=2005]R.D.G Jayarathne, Dynamic Server Access by Mobile Agents Using Attribute Certificates, 7th International Information Technology Conference (IITC), Sri Lanka, 9-10 November 2005. [citation][year=2005]1. Qusay H. Mahmoud, Leslie Yu, "An Architecture and Business Model for Making Software Agents Commercially Viable", in Proc. of the 38th Hawaii International Conference on System Sciences, 2005 [citation][year=2004]Q. Mahmoud, L. Yu, "Havana: a mobile agent platform for seamless integration with the existing Web infrastructure", in Proc. of the 2004 Canadian Conference on Electrical and Computer Engineering, Niagara Falls, Ontario, Canada, May 2004. [citation][year=2002]S. Arumugam, A. Helal, A. Nalla, "aZIMAs: Web Mobile Agent System", in Proceedings of the 6th IEEE International Conference on Mobile Agents (MA'02), Barcelona, Spain, October, 2002 [citation][year=2002]Subramanian Arumugam, "aZIMAS: Web Mobile Agent Systemâ?, MsC Thesis, Science University of Florida, 2002. [publication]Marques, P. and Fonseca, R. and Silva, L. and Silva, J.G. , "Integrating Mobile Agents With Off-the-shelf Web-servers", in Systems and Applications (INBOSA\'2001), 2001 2000(12 publications) [publication]Marques, P. and Silva, L. and Silva, J.G. , "A Flexible Mobile-Agent Framework for Accessing Information Systems in Disconnected Computing Environments", 2000 [citation][year=2004]1. M. Ho, Y. Chang, S. Yuan, "EMARE: An Email-based Mobile Agent Runtime Environment for Information Retrieval on the Internet?, in Proc. 2nd IEEE International Workshop on Wireless and Mobile Technologies in Education, Taoyuan, TAIWAN, March 2004. [citation][year=2002]S. Choudhury, A. Dan, "Downloadable Service Contracts for Disconnected Transactionsâ?, in Proc. 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems (RIDE'02), San Jose, California, February 2002 [citation][year=2002]S da Costa Cortes, Sérgio Lifschitz, "Sistemas de Gerencia de Banco de Dados baseados em Agentes para um Ambiente de Computacao Movel", Technical Report MCC1/02, Departamento de Informática da Universidade PUC-Rio, Rio de Janeiro, Brasil, Junho 2002 [citation][year=2001]1. S da Costa Cortes, CJP de Lucena, "Um Framework para construcao de Sistemas de Banco de Dados Movel com Regras Ativas", Technical Report MCC35/01, Departamento de Informática da Universidade PUC-Rio, Rio de Janeiro, Brasil, Outubro 2001 [publication]Marques, P. and Silva, L. and Silva, J.G. , "Building Domain-Specific Mobile Agent Platforms from Reusable Software Components", 2000 [publication]Marques, P. and Silva, L. and Silva, J.G. , "Going Beyond Mobile Agent Platforms: Component-Based Development of Mobile Agent Systems", 2000 [citation][year=2004]1. V. Tan, "Interaction Tracing for Mobile Agent Security", PhD Thesis, University of Southampton, Southampton, UK, March 2004. [publication]Marques, P. and Silva, L. and Silva, J.G. , "Addressing the Question of Platform Extensibility in Mobile Agent Systems", 2000 [publication]Simões, P. and Silva, L. and Boavida, F. , "A Generic Management Model for Mobile Agent Infrastructures", 2000 [citation][year=2016]Muhammad Saleh Kaukab, Sabih Khan Afridi, Yaqoob Wani and Khalid Hussain, A Comprehensive Analysis of Agent Based Backup Management System, International Journal of Scientific & Engineering Research, Volume 7, Issue 3, pp. 530-536, March-2016, ISSN 2229-5518 [citation][year=2004]Emmanuel Reuter, Agents Mobiles : Itinéraires pour l"administration système et réseau, PhD thesis, Université de Nice Sophia Antipolis, May 2004. [citation][year=2003]Michael Sievert, "Managing Communication Resources?, MsC Thesis, Mälardalen University, Sweden, 2003. [publication]Simões, P. and Lourenço, E. and Pereira, P. and Pereira, P. and Silva, L. and Boavida, F. , "J.AgentX: Uma Ferramenta Para Extensão Dinâmica de Agentes SNMP", 2000 [citation][year=2000]Frank Straus, Jurgen Schonwalder, Sven Mertens, JAX " A Java Agent X Subagent Toolkit, Proceedings of IPOM"2000 " IEEE Workshop on IP-oriented Operations & Management, Cracow, Poland, September 2-4, 2000. [publication]Simões, P. and Lourenço, E. and Pereira, P. and Pereira, P. and Silva, L. and Boavida, F. , "J.AgentX: a Tool for Dynamic Deployment of Open Management Services", 2000 [citation][year=2000]Frank Straus, Jurgen Schonwalder, Sven Mertens, "JAX " A Java Agent X Subagent Toolkit?, Proceedings of IPOM"2000 " IEEE Workshop on IP-oriented Operations & Management, Cracow, Poland, September 2-4, 2000. [publication]Marques, P. and Simões, P. and Silva, L. and Boavida, F. and Silva, J.G. , "Mobile Agent Systems: From Technology to Applications", in OOPSLA'2000 Workshop on Experiences with Autonomous Mobile Objects and Agent Based Systems, 2000 [citation][year=2003]1. M. Bisignano, G. Di Modica, and O. Tomarchio, "Mobile Agent Location Management: a Comparison Between CORBA and P2P Based Systems?, in Proc. 8th IEEE International Symposium on Computers and Communication (ISCC"2003), KEMER, TURKEY, June 2003. [citation][year=2001]1. O. Tomarchio, L. Vita, A. Puliafito, "Mobile Agents and Legacy Systems: How to Integrate Alternative Communication Paradigms?. in Proceedings of the 3rd International Workshop on Mobile Agents for Telecommunication Applications (MATA2001), Montreal (Canada), August 2001. [publication]Silva, L. and Batista, V. and Silva, J.G. , "Fault-Tolerant Execution of Mobile Agents", in DSN-00 - International Conference on Dependable Systems and Networks, 2000 [citation][year=2004]1. Taesoon Park, Ilsoo Byun and Heon Y. Yeom "Lazy Agent Replication and Asynchronous Consensus for the Fault-Tolerant Mobile Agent System" NETWORKING 2004, Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004. [citation][year=2004]2. Sung Jin Choi, Maeng Soon Baik, Hong Soo Kim, Jun Weon Yoon, Jin Gon Shon, Chong Sun Hwang, "Region-based stage construction protocol for fault tolerant execution of mobile agent", Proc. 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004. March 2004 [citation][year=2003]Marin, O.; Bertier, M.; Sens, P.; "DARX - a framework for the fault-tolerant support of agent software" Software Reliability Engineering, 2003. ISSRE 2003. 14th International Symposium on , 17-20 Nov. 2003, Pages:406 - 416. [citation][year=2003]Toan Phung; Loke, S.W.; Harland, J.; "Adding flexibility using structured goals: the case of itinerant mobile agents" Intelligent Agent Technology, 2003. IAT 2003. IEEE/WIC International Conference on , 13-16 Oct. 2003, Pages:562 - 565 [citation][year=2003]Maeng Soon Baik, In Sung Kang, Yun Hee Kang and Chong Sun Kang, "Optimistic Fault-Tolerant Approach for Mobile Agent in Multi-Region Mobile Agent Computing Environment", In the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA-03, 2003 [citation][year=2003]Pears, S. Jie Xu Boldyreff, C., "A dynamic shadow approach for mobile agents to survive crash failures", Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, May 2003. [citation][year=2003]Zahia Guessoum, Jean-Pierre Briot, Olivier Marin, Athmane Hamel, Pierre Sens. "Dynamic and Adaptive Replication for Large-Scale Reliable Multi-agent Systems", in Software Engineering for Large-Scale Multi-Agent Systems: Research Issues and Practical Applications, Lecture Notes in Computer Science, Volume 2603 / 2003, August 2003, Springer-Verlag Heidelberg [citation][year=2003]Overeinder, B. Brazier, F. Marin, O., "Fault tolerance in scalable agent support systems: integrating DARX in the AgentScape framework", 3rd IEEE/ACM International Symposium onCluster Computing and the Grid, 2003. Proceedings. CCGrid 2003, May 2003 [citation][year=2003]Pears, S., Jie Xu, Boldyreff, C., "Mobile agent fault tolerance for information retrieval applications: an exception handling approach", The Sixth International Symposium on Autonomous Decentralized Systems, 2003. ISADS April 2003. [citation][year=2003]Pleisch, S., Schiper, A., "Fault-tolerant mobile agent execution", IEEE Transactions on Computers, Feb. 2003, pages 209-222, Volume: 52, Issue: 2 [citation][year=2002]1. Hyunjoo Kim, Heon Y. Yeom, Taesoon Park , "The Cost of Checkpointing , Logging and Recovery for the Mobile Agent Systems", Pacific Rim International Symposium on Dependable Computing(PRDC02), Dec. 2002, Tokyo, Japan [citation][year=2002]2. Taesoon Park, Ilsoo Byun, Hyunjoo Kim, Heon Y. Yeom, "The Performance of Checkpointing and Replication Schemes for Fault Tolerant Mobile Agent Systems", Proc. 21st IEEE Symposium on Reliable Distributed Systems (SRDS'02), October 2002, Osaka University, Suita, Japan [citation][year=2002]3. P. Dasgupta, "Fault tolerance in MAgNET: A Mobile Agent E-commerce System," Proceedings of the Sixth International Conference on Internet Computing, Las Vegas, NV, June 2002, pp. 733-739 [citation][year=2002]4. Jian Chen "A Hierarchical Fault-Tolerance Framework for Mobile Intelligent Agent Systems" PhD Thesis, The University of British Columbia, Canada, April 2002. [citation][year=2002]5. Stefan Pleisch "Fault-Tolerant and Transactional Mobile Agent Execution" PhD Thesis, Ã?cole Polytechnique Fédérale de Lausanne, Thèse nr. 2654 (2002). [citation][year=2001]1. Stefan Pleisch, André Schiper "FATOMAS - A Fault-Tolerant Mobile Agent System Based on the Agent-Dependent Approach" Proceedings of the 2001 International Conference on Dependable Systems and Networks, 1-4 July 2001, Göteborg, Sweden, IEEE Computer Society, ISBN 0-7695-1101-5, pp. 215-224. [citation][year=2001]2. Erica Y. Tang, Jie Xu, Keith Bennett "The SeCode Approach: Towards Fault-Tolerant and Secure Execution of Mobile Code" Supplement of the 2001 International Conference on Dependable Systems and Networks, 1-4 July 2001, Göteborg, Sweden, IEEE Computer Society, pp B-74,B-75. [citation][year=2001]3. Prithviraj(Raj) Dasgupta "Mobile Software Agent Enabled E-commerce: System Design and Profit Maximizing Algorithms" PhD Thesis, University of California, Santa Barbara, June 2001. [citation][year=2001]4. S. Mishra, "Agent Fault Tolerance Using Group Communication". Proceedings of the 2001 International Conference on Parallel and Distributed Processing Techniques and Application (PDPTA 2001), Las Vegas, NV (June 2001). [citation][year=2001]5. Daria Chacón, Benjamin Bell, and John McCormick "Using Autonomous Agents to Improve Efficiency and Robustness in Slow, Unreliable, Networks," AAAI 2001 Spring Symposium on robust Autonomy, March 2001 Stanford University. [citation][year=2001]6. Stefan Pleisch, Andre Schiper "Approaches to Fault-Tolerant Mobile Agent Execution" Research Report, IBM Research, RZ 3333 (# 93379) 03/19/01 [publication]Marques, P. and Silva, L. and Silva, J. and Silva, J. , "Application Centric Mobile Agent Systems: Bringing the Focus Back to the Applications", in presented at the poster session of the Second Joint Symposium on Agent Systems and Applications/Mobile Agents (ASA/MA\'2000), 2000 [publication]Távora, V.M.N. and Silva, L. and Silva, J.G. , "Distributed Checkpointing Mechanism for a Parallel File System", in EuroPVM/MPI\'2000, 2000 [publication]Távora, V.M.N. and Silva, L. and Silva, J.G. , "Fault Tolerance for Parallel Systems", in Proc. Int. Conference on Parallel and Distributed Computing and Systems, 2000 1999(16 publications) [publication]Reis, R. and Simões, P. and Silva, L. and Boavida, F. , "Desenvolvimento e Integracao de Serviços SNMP numa Plataforma de Agentes Móveis", 1999 [publication]Silva, L. and Simões, P. and Silva, J. and Silva, J. and Renato, C. and Rebham, J. and Monteiro, P. and Almeida, L. and Stohr, N. , "Using Mobile Agents for the Management of Telecommunication Networks", 1999 [citation][year=2004]A. Pashalidis, M. Fleury, "Secure Network Management within an Open-source Mobile Agent Framework?, Journal of Network and Systems Management, Vol. 12, No. 1, 2004. [publication]Silva, L. and Simões, P. and Soares, G. and Martins, P. and Batista, V. and Renato, C. and Almeida, L. and Stohr, N. , "JAMES: A Platform of Mobile Agents for the Management of Telecommunication Networks", 1999 [citation][year=2015]Abderrahim Siam, Approche basée Agents Mobiles et Composants pour développer des applications ouvertes et adaptables, PhD Thesis, Université Constantine 2 Mahri Abdelhamid, Feb. 2015. [citation][year=2014]Naveen Kumar Ghondi, Mobile Agent based Intelligent System for Autonomic Network Management, PhD Thesis, Kumaun University, India, 2014 (http://shodhganga.inflibnet.ac.in/handle/10603/20760). [citation][year=2014]Neelam Dayal, Lalit Kumar Aswathi, Solutions for Security in Mobile Agent System, Proc. of Int. Conf. on Internet Computing and Information Communications Advances in Intelligent Systems and Computing, Vol. 216, 2014, pp. 103-110, Springer. http://dx.doi.org/10.1007/978-81-322-1299-7_10 [citation][year=2014]Xie Guang-qiang, Zhang-Yun, Li Yang, Tian Jian-Feng, Zeng An, “Research of Visual Simulation Platform for Consensus Protocol of Multiagent System”, J. of Computer Science, Vol. 41, N. 1 pp. 146-151, January 2014, ISSN: 1002-137X. [citation][year=2013]Bassey Echeng Isong and Eyaye Bekele, “A systematic review of fault tolerance in mobile agents”, American Journal of Software Engineering and Applications, 2013; 2(5): 111-124 [citation][year=2012]Al-Shrouf, Faiz; Turani, Aiman, “ANALYSIS OF MOBILE AGENT SYSTEMS PERFORMANCE USING LINEAR PREDICTION MODEL”, International Journal of Reviews in Computing. December 2012, Vol. 12, p38-43. [citation][year=2012]Prakash V. Rajguru and Sushant B. Deshmukh, “Current trends and analysis of mobile agent application”, World Journal of Science and Technology 2012, 2(3):01-06. [citation][year=2010]Cucurull, J., Navarro-Arribas, G., Martí, R., Robles, S. and Borrell, J. (2010), An efficient and secure agent code distribution service. Software: Practice and Experience, 40: 363–386. doi: 10.1002/spe.963 [citation][year=2010]SungJin Choi, MaengSoon Baik, HongSoo Kim, EunJoung Byun, Hyunseung Choo, "A Reliable Communication Protocol for Multiregion Mobile Agent Environments," IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 1, pp. 72-85, Jan. 2010, doi:10.1109/TPDS.2009.48 [citation][year=2009]Dewi Agushinta R., Adang Suhendra, Addien Febrinata, Anne Yuliyanti, "Secure Mobile Agent System in Peer-to-Peer Networks: A Review of Security Mechanisms Based on Several Security Issues," wcse, vol. 1, pp.212-216, World Congress on Software Engineering, 2009 [citation][year=2009]SungJin Choi, Hyunseung Choo, MaengSoon Baik, HongSoo Kim and EunJoung Byun, “ODDUGI: Ubiquitous Mobile Agent System”, Computational Science and Its Applications – ICCSA 2009, Springer LNCS 5593, pp. 393-407, 2009. [citation][year=2009]Wu Jiehong, Liu Cheng, and Gao Fuxiang. 2009. Study of MA protection technology of extending inheritance hierarchy trees in IDC network management. In Proceedings of the 21st annual international conference on Chinese Control and Decision Conference (CCDC'09). IEEE Press, 616-619. [citation][year=2009]Wu Jiehong, and Gao Fuxiang. 2009. Study of MA protection technology of extending inheritance hierarchy trees in IDC network management. In Proc. of Int. Conf. on Management and Service Science, (MASS '09), . [citation][year=2009]SungJin Choi, MaengSoon Baik, HongSoo Kim, EunJoung Byun, Hyunseung Choo, "A Reliable Communication Protocol for Multiregion Mobile Agent Environments," IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 1, pp. 72-85, Jan. 2010, doi:10.1109/TPDS.2009.48 [citation][year=2008]Alla Talal Yassin, Naeem Th Yousir AL-Rubaie, Employing Mobile Agents (MAs) In the Internet services, Baghdad College of Economic sciences University, ISSN: 2072778X, 2008 V. 16, pp. 339-361 [citation][year=2007]A. Genco (Ed.), Mobile Agents: Principles of Operation and Applications (Advances in Management Information), pp. 139-180, WIT Press, 2007. ISBN 978-1845640606. [citation][year=2006]Hon F. Li, Zunce Wei, Dhrubajyoti Goswami, "Quasi-atomic recovery for distributed agents?, Parallel Computing Volume 32 , Issue 10, Pages: 733-758, November 2006 [citation][year=2006]Dow, C.-R. Li, Y.-H. Bai, J.-Y., "A Virtual Laboratory for Digital Signal Processing?, INTERNATIONAL JOURNAL OF DISTANCE EDUCATION TECHNOLOGIES, VOL 4; NUMB 2, pages 31-43, 2006. [citation][year=2005]Mohamad Eid, Hassan Artail, Ayman Kayssi, and Ali Chehab, Trends in Mobile Agent Applications, Journal of Research and Practice in Information Technology, Vol. 37, No. 4, pp. 323-351, November 2005. [citation][year=2005]Alexandru Suna, CLAIM et SyMPA : Un environnement pour la programmation d'agents intelligents et mobiles, PhD Thesis, LIP6 " Université Paris 6 - Pierre et Marie Curie, December 2005. [citation][year=2004]Pauline P.L. Siu, N. Belaramani, C.L. Wang, and F.C.M. Lau, Context-Aware State Management for Ubiquitous Applications. LNCS 3207 (EUC2004), pp. 776-785, Springer 2004. [citation][year=2004]Yuk Chow, Wenzhang Zhu, Cho-Li Wang, Francis C. M. Lau, State-On-Demand Execution for Adaptive Component-based Mobile Agent Systems. 10th International Conference on Parallel and Distributed Systems (ICPADS'04), pp.46, IEEE, 2004. [citation][year=2004]Jin Ho Ahn, Decentralized Inter-agent Message Forwarding Protocols for Mobile Agent Systems. Springer LNCS 3045 (Computational Science and its Applications, ICCSA 2004, Vol. III) pp. 376-386, Springer 2004. [citation][year=2004]Sergio Pozo, Rafael. M. Gasca, and María Teresa Gómez, Securing Mobile Agent Based Tele-Assistance Systems. Proceedings of the 1st International Workshop on Tele-Care and Collaborative Virtual Communities in Elderly Care, TELECARE 2004 (In conjunction with ICEIS 2004). April 2004. ISBN: 972-8865-10-4. [citation][year=2004]Pere Vilá, Dynamic Management and Restoration of Virtual Paths in Broadband Networks based on Distributed Software Agents. PhD Thesis, Universitat de Girona, 2004. [citation][year=2004]Sergio Pozo Hidalgo, Técnicas Automáticas para la Diagnosis de Consistencia y Conformidad en Políticas de Control de Acceso, PhD Thesis, University of Sevilla, 2004. [citation][year=2003]Michael Sievert, Managing Communication Resources, MsC Thesis, Mälardalen University, Sweden, 2003. [citation][year=2003]Jonathan Lefebvre, Steven Chamberland and Samuel Pierre, A Network Management Framework Using Mobile Agents, Journal of Computer Science 2 (8): 646-659, 2006, ISSN 1549-3636, Science Publications (also appears on Canadian Conference on Electrical and Computer Engineering, 2003. IEEE CCECE 2003, Vol. 2, pp- 737-740). [citation][year=2002]Sandhya Sriraman, "An Annotated Bibliography of Mobile Agents in Networks?, Thesis Prepared for the Degree of Master Science, University of North Texas, Dezembro de 2002. [citation][year=2002]Steffen Lipperts, Mobile Agent Support Services. PhD Thesis, Rheinisch-Westfälischen Technischen Hochschule Aachen, 2002. [citation][year=2001]Marcelo Gonçalves Rubinstein, Avaliação do Desempenho do Desempenho de Agentes Móveis no Gerenciamento de Redes, Tese de Doutoramento, Universidade Federal do Rio de Janeiro, Março de 2001. [citation][year=2001]Kenneth, Andrews, Network node management system and method using proxy by extensible agents, Patent EP1158720, November 2001. [citation][year=2001]Friedrich van Megen, Mobile Agenten im Internet Infrastruktur und Interaktion, Universität Kaiserslautern, (Interner Bericht 314/2001), Outubro de 2001. [citation][year=2001]Vikram Jamwal, Mobile agents for distance evaluation, MsC Thesis, IIT Bombay, 2001. [citation][year=2001]Damianos Gavalas, Mobile Software Agents for Network Monitoring and Performance Management, PhD Thesis, University of Essex, UK, 2001. [citation][year=2000]P. Rivalta, "Mobile Agent Management?, MsC Thesis, Carleton University, Outubro de 2000. [publication]Simões, P. and Silva, L. and Boavida, F. , "Integrating SNMP into a Mobile Agent Infrastructure", 1999 [citation][year=2014]Naveen Kumar Ghondi, Mobile Agent based Intelligent System for Autonomic Network Management, PhD Thesis, Kumaun University, India, 2014 (http://shodhganga.inflibnet.ac.in/handle/10603/20760). [citation][year=2006]Shamila Makki, Subbarao V. Wunnava, "Application of Mobile Agents in Managing the Traffic in the Network and Improving the Reliability and Quality of Service?, IAENG International Journal of Computer Science, Volume 32, Issue 4, 12 November 2006. [citation][year=2004]Herbert Bos, Willem de Bruijn, Jon Moore, "Splash: SNMP Plus a Lightweight API for SNAP Handling?, Proceedings of the Proceedings of the 2004 IEEE/IFIP Network Operations and Management Symposium (NOMS'2004), Seoul, Korea, Abril de 2004. [citation][year=2004]Emmanuel Reuter, Agents Mobiles: Itinéraires pour l"administration système et réseau, PhD thesis, Université de Nice Sophia Antipolis, Maio de 2004. [citation][year=2003]Suchindra Katageri, Standards-based Infrastructure for Dynamic Extension of Network Management Services Using Mobile Code, MSc Thesis, University of Florida, 2003. [citation][year=2003]Rui Pedro Lopes, "Gestão Distribuída em SNMP�?�, Tese de Doutoramento, Universidade de Aveiro, 2003. [citation][year=2003]R. P. Lopes and J. L. Oliveira, "A Mobile Agent Navigation Manager�?�, in 5th International Workshop on Mobile Agents for Telecomunication Applications (MATA'2003), Marrakech, Morocco, LNCS vol. 2881, pp. 220-229, ISBN 3-540-20298-6, 2003. [citation][year=2003]Michael Sievert, "Managing Communication Resources�?�, MsC Thesis, Mälardalen University, Sweden, 2003. [citation][year=2002]M.-S. Su, K. Thulasiraman, and A. Das, "A Scalable On-Line and Multi-Level Distributed Fault Detection/Monitoring System based on the SNMP Protocolâ?, IEEE GlobeCom2002, Novembro de 2002, Taipei, Taiwan. [citation][year=2002]Jonathan T. Moore, Jessica Kornblum Moore, and Scott Nettles, "Predictable, Lightweight Management Agentsâ?, Proceedings of the IFIP-TC6 Fourth International Working Conference (IWAN"02), Dezembro de 2002. [citation][year=2002]Sandhya Sriraman, "An Annotated Bibliography of Mobile Agents in Networksâ?, Thesis Prepared for the Degree of Master Science, University of North Texas, Dezembro de 2002. [citation][year=2002]R. P. Lopes and J. L. Oliveira, "Multi-Management Schemes for MAF Platformsâ?, in International Workshop on Mobile Agents for Telecommunications Applications (MATA'2002), Barcelona, Spain, 2002. [citation][year=2001]Damianos Gavalas, Mobile Software Agents for Network Monitoring and Performance Management, PhD Thesis, University of Essex, UK, 2001. [citation][year=2001]J. Kornblum, D. Raz, Y. Shavitt, "The active process interaction with its environment?, Computer Networks 36 (2001), pp. 21-34, Elsevier Science. [citation][year=2001]C. Huang, C. Pattinsion, "Using Mobile Agent Techniques for Distributed Manufacturing Network Management?, Proceedings of the PGNET"2001 Symposium, Junho de 2001. [citation][year=2001]Jonathan T. Moore, Jessica Kornblum Moore, and Scott Nettles. "Scalable Distributed Management with Lightweight Active Packets? Technical Report MS-CIS-01-26, Department of Computer and Information Science, University of Pennsylvania, September, 2001. [citation][year=2001]Juliana Amaral Arantes, Agentes Móveis versus SNMP – uma avaliação de desempenho analítica, Dissertação submetida à Universidade Federal de Santa Catarina como parte dos requisitos para a obtenção do grau de Mestre em Ciência da Computação, Florianópolis, Novembro de 2001. [citation][year=2000]B. Pagurek, Y. Wang, T. White, "Integration of Mobile Agents With SNMP: Why and How?, Proceedings of NOMS"2000, IEEE Press. [citation][year=2000]P. Rivalta, "Mobile Agent Management?, MsC Thesis, Carleton University, Outubro de 2000. [publication]Simões, P. and Reis, R. and Silva, L. and Boavida, F. , "Enabling Mobile Agent Technology for Legacy Network Management Frameworks", 1999 [citation][year=2017]Wafa Ghonaim, Ahmed Al-Ghamdi, A Smart Multi-Agent Controller Model for Large Scale Network Management, Proc. of the Int'l Conf. Internet Computing and Internet of Things (ICOMP'17), pp. 65-71, ISBN: 1-60132-461-8, CSREA Press. [citation][year=2012]Stanic, M. Mitic, D. Lebl, A., A Mobile Agents Framework for Integration of Legacy Telecommunications Network Management Systems, Przeglad Elektrotechniczny, 2012, R. 88, N. 6, pp 337-341, ISSN 0033-2097. [citation][year=2011]Praveena Chaturvedi, Nipu, Mobile Agent Cloning: An Application to Network Management, Pragyaan: Journal of Information Technology", Vol. 9, N. 1, June 2011. ISSN: 0974-5513. [citation][year=2006]Feng Lu and Kris Bubendorfer. 2006. A JMX toolkit for merging network management systems. In Proceedings of the 29th Australasian Computer Science Conference - Volume 48 (ACSC '06), Vladimir Estivill-Castro and Gillian Dobbie (Eds.), Vol. 48. Australian Computer Society, Inc., Darlinghurst, Australia, Australia, 147-156. [citation][year=2006]H. M. Kelash, H. M. Faheem, and M. Amoon, A Multiagent System for Distributed Systems Management, Proceedings of World Academy of Science, Engineering and Technology, Volume 11, ISSN 1307-6884, February 2006. [citation][year=2005]Feng Lu, Integration of Mobile Agents with JMX, MSc Thesis, Victoria University of Wellington, 2005. [citation][year=2005]M. Eid, H. Artail, A. Kayssi, A. Chehab, Trends in Mobile Agent Applications, Journal of Research and Practice in Information Technology. Vol. 37, no. 4, pp. 323-351. November 2005. [citation][year=2005]H. M. Kelash, M Amoon, G. M. Ali, H. M. Faheem, "A Social Agent Interface for Resource Management in Distributed Systems," cimca,pp.390-395, International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce Vol-2 (CIMCA-IAWTIC'05), 2005. [citation][year=2004]Emmanuel Reuter, Agents Mobiles : Itinéraires pour l"administration système et réseau, PhD thesis, Université de Nice Sophia Antipolis, May 2004. [citation][year=2003]Suchindra Katageri, Standards-based Infrastructure for Dynamic Extension of Network Management Services Using Mobile Code, MSc Thesis, University of Florida, 2003. [citation][year=2003]Michael Sievert, "Managing Communication Resources?, MsC Thesis, Mälardalen University, Sweden, 2003. [citation][year=2002]E. Reuter, F. Baude, "System and Network Management Itineraries for Mobile Agents?, Proceedings of the 4th International Workshop on Mobile Agents for Telecommunications Applications, MATA 2002, Barcelona, Spain. LNCS vol. 2521, pp. 227-238, October 2002. [citation][year=2002]Sandhya Sriraman, "An Annotated Bibliography of Mobile Agents in Networks?, Thesis Prepared for the Degree of Master Science, University of North Texas, Dezembro de 2002. [citation][year=2002]Steffen Lipperts, Mobile Agent Support Services. PhD Thesis, Rheinisch-Westfälischen Technischen Hochschule Aachen, 2002. [citation][year=2001]Kenneth, Andrews, Network node management system and method using proxy by extensible agents, Patent EP1158720, November 2001. [citation][year=2000]B. Pagurek, Y. Wang, T. White, "Integration of Mobile Agents With SNMP: Why and How?, Proceedings of NOMS"2000, IEEE Press. [citation][year=2000]P. Rivalta, "Mobile Agent Management?, MsC Thesis, Carleton University, Outubro de 2000. [publication]Marques, P. and Silva, L. and Silva, J.G. , "Security Mechanisms for Using Mobile Agents in Electronic Commerce", 1999 [citation][year=2006]1. T. Chen, \"A Noval Key Management and Access Control Method for Mobile Agent\", Master\'s Thesis, Institute of Communicational Engineering, 2006. [citation][year=2005]1. W Qu, H Shen, J Sum, ""Stochastic analysis of mobile agent-based e-shopping", in International Journal of Electronic Business, Vol. 3, Nos. 3/4, 2005 [citation][year=2004]1. S. Guan, F. Zhu, and M. Maung, "A Factory-based Approach to Support E-Commerce Agent Fabrication?, in Electronic Commerce Research and Applications Journal, Vol. 3(1), Elsevier Science, pp. 39-53, Spring 2004 [citation][year=2003]S. Guan, T. Wang, S. Ong, "Migration Control for Mobile Agents Based on Passport and Visa?, in Future Generation Computer Systems, pp. 173-186, Elsevier Science, ISSN:0167-739X, 2003 [citation][year=2003]C. Wang, F. Zhang and Y. Wang, "Secure Web Transaction with Anonymous Mobile Agent over the Internet?, in Journal of Science and Technology, Vol. 18(1), pp. 84-89, ISSN 1000-9000, January 2003. [citation][year=2002]L. Korba "Privacy in Distributed Electronic Commerce" Proceedings of th 35th Hawaii International Conference on System Science, Hawaii, January 7-11, 2002, NRC 44891. [citation][year=2002]Wang TH, Guan SU, Chan TK, "Integrity protection for Code-on-Demand mobile agents in e-commerce" JOURNAL OF SYSTEMS AND SOFTWARE 60 (3): 211-221 FEB 15 2002. [citation][year=2002]S. Guan, T. Wang and S. Ong, "A Secure Approach for Mobile Agent Migration Control?, in Proc. of the Seventh International Symposium on Computers and Communications (ISCC"02), IEEE Press, Taormina/Giardini Naxos, Italy, July 2002 [citation][year=2002]O. Tomarchio and A. Puliafito. "Design and development of a practical security model for a mobile agent system?, in IEEE Symposium on Computer Communications (ISCC2002), Taormina (Italy), July 2002. [citation][year=2002]I. Lin, H. Ou, and M Hwang, "Two Secure Transportation Schemes for Mobile Agents?, in Information & Security Journal, Vol. 8(1), pp. 87-97, ISSN 1311-1493, 2002. [citation][year=2002]Required reading in the graduate courses "COS496V/W?, "INF414H? and "INF416H? ("Special Topic with Focus: Mobile Agent Security?), of the University of South Africa, South Africa. Fall 2002. (http://osprey.unisa.ac.za/~elsabe/download/MAsecurityInstructions.pdf) [citation][year=2002]SHENG-UEI GUAN and FANGMING ZHU, "Agent Fabrication and Its Implementation for Agent-Based Electronic Commerce?, in International Journal of Information Technology & Decision Making, Vol. 1, No. 3 (2002) 473"489, World Scientific Publishing Company, 2002 [citation][year=2001]1. O. Onbilger, R. Newman, and R. Chow, "A Distributed and Compromise-tolerant Mobile Agent Protection Schemeâ?, in International Conference on Intelligent Agents, Web Technology and Internet Commerce (IAWTIC'2001), Las Vegas, USA, July 2001. [citation][year=2000]S. Guan, F. Zhu, and C. Ko, "Agent Fabrication and Authorization in Agent-based Electronic Commerce?, in Proc. International ICSC Congress on Intelligent Systems and Applications, Wollongong, Australia, December 2000. [citation][year=2000]Required reading in the "EE657: Parallel Processing? course at the University of Southern California, USA. Fall 2000. (http://www-classes.usc.edu/engr/ee-s/657h/) [citation][year=2000]IEEE Chiper Reader"s Guide to Security and Privacy Conference Papers (http://www.ieee-security.org/Cipher/ReadersGuide/conferences-save.html) [publication]Silva, L. and Silva, J.G. , "An Experimental Evaluation of Coordinated Checkpointing in a Parallel Machine", in Third European Dependable Computing Conference (EDCC-3), vol. 1667, 1999 [citation][year=2000]1. Julia L. Lawall, Gilles Muller, "Efficient Incremental Checkpointing of Java Programs" Proc. of DSN-2000 - The International Conference on Dependable Systems and Networks (FTCS-30, DCCA-8), 25-28 June 2000, New York, USA, IEEE Computer Society Press, ISBN 0-7695-0707-7, pp. 61-70. [publication]Silva, L. and Silva, J.G. , "The Performance of Coordinated and Independent Checkpointing", in IPPS/SPDP 1999, 1999 [citation][year=2003]1. Himadri Sekhar Paul, Arobinda Gupta, R. Badrinath "Performance comparison of checkpoint and recovery protocols", Concurrency and Computation: Practice and Experience, Volume 15, Issue 15, Date: 25 December 2003, Pages: 1363-1386 [publication]Marques, P. and Silva, L. and Silva, J.G. , "Establishing a Secure Open-Environment for the Computations of Mobile Agents", in In Proceedings of ASA/MAâ??99, 1999 [publication]Silva, L. and Martins, P. and Batista, V. , "The Performance of Mobile Agent Platforms", in In Proceedings of ASA/MAâ??99, 1999 [publication]Silva, L. , "The Advantages of Using Mobile Agents in Software for Telecommunications", in In Proceedings of ICCCâ??99, 1999 [publication]Silva, L. and Silva, J.G. , "An Experimental Evaluation of Coordinated Checkpointing in a Parallel Machine", in In Proceedings of EDCC-3, European Dependable Computing Conference, vol. 1667, 1999 [publication]Silva, L. and Martins, P. and Batista, V. , "Using Mobile Agents for Parallel Processing", in International Symposium on Distributed Objects and Applications, 1999 [publication]Silva, L. and Silva, J.G. , "Using Message Semantics for Fast-Output Commit in Checkpointing-and-Rollback Recovery", in Proceedings of the Hawaii International Conference on System Sciences, IEEE, 1999 [publication]Silva, L. and Silva, J.G. , "Using Mobile Agents for the Management of Telecommunications", in Proceedings of ConfTele99, 1999 [publication]Silva, L. , "Optimizing the Migration of Mobile Agents", in Mobile Agents for Telecommunication Applications, 1999 1998(12 publications) [publication]Bizarro, P. and Silva, L. and Silva, J.G. , "JWarp: A Java Library For Parallel Discrete-Event Simulations", 1998 [publication]Bizarro, P. and Silva, L. and Silva, J.G. , "Implementing the Time-Warp Simulation Model in Java", in VECPARâ??98 - 3rd International Meeting on Vector and Parallel Processing, 1998 [publication]Batista, V. and Silva, L. and Silva, J.G. , "Checkpointing Java-based Parallel Applications", in 11th Parallel and Distributed Computing Systems, PDCS'98, 1998 [citation][year=2002]Bohn CA, Lamont GB, "Load balancing for heterogeneous clusters of PCs" FUTURE GENER COMP SY 18 (3): 389-400 JAN 2002 [publication]Silva, L. and Silva, J.G. , "System-Level versus User-Defined Checkpointing", in 17th IEEE Symposium on Reliable Distributed Systems, SRDS'98, 1998 [citation][year=2004]Sriram Krishnan and Dennis Gannon. Checkpoint and Restart for Distributed Components in XCAT3. In Grid 2004, 5th IEEE/ACM International Workshop on Grid Computing. IEEE Computer Society Press, November 2004. [citation][year=2004]Pawel Czarnul, Arkadiusz Urbaniak, Marcin Fraczak, Maciej Dyczkowski, Bartlomiej Balcerek, "Towards Easy-to-Use Checkpointing of MPI Applications within CLUSTERIX", International Conference on Parallel Computing in Electrical Engineering, PARELEC'04, September 2004, Dresden, Germany [citation][year=2004]Ashwin Raju Jeyakumar, "Metamori: A library for Incremental File Checkpointing", MSc Thesis Faculty of the Virginia Polytechnic Institute and State University, Virginia Tech, Blacksburg, VA, June 3, 2004 [citation][year=2004]J. T. Rough, A. M. Goscinski, "The development of an efficient checkpointing facility exploiting operating systems services of the GENESIS cluster operating system ", Future Generation Computer Systems, Special issue: Advanced services for clusters and internet computing, Volume 20 , Issue 4 (May 2004) [citation][year=2003]1. Yuan Zijing, "Load Management System for Distributed Simulation", MSc Thesis School of Computer Engineering Nanyang Technological University, July 2003 [citation][year=2000]E. Gendelman, L. F. Bic, M. Dillencourt. "An Application-Transparent, Platform Independent Approach to Rollback-Recovery for Mobile Agent Systems" 20 th IEEE International Conference on Distributed Computing Systems. Taipei, Taiwan 2000. [citation][year=2000]Kuo-Feng Ssu, "HETEROGENEOUS AND MOBILE RECOVERY", PhD Thesis University of Illinois at Urbana-Champaign, 2000 [citation][year=2000]Xinfeng Ye, "A Checkpointing Scheme for Internet-based Computing Systems", Proceedings of International Conference on Software of 16th IFIP Congress, pp.539-546, 2000 [citation][year=1999]K. F. Ssu, B. Yao and W. K. Fuchs. An Adaptive Checkpointing Protocol to Bound Recovery Time with Message Logging. In Proceeding of the 18th IEEE Symposium on Reliable Distributed Systems, Lausanne, Switzerland, October, 1999. [citation][year=1999]Mootaz Elnozahy, Lorenzo Alvisi, Yi-Min Wang, David B. Johnson "A Survey of Rollback-Recovery Protocols in Message Passing Systems", CMU Technical Report CMU-CS-99-148, June 1999, Carbegie-Mellon University, USA. [publication]Silva, L. and Martins, P. and Silva, J.G. , "Merging Web-based with Cluster-based Computing", in Second International Symposium on Computing in Object-Oriented Parallel Environments ISCOPE'98, 1998 [citation][year=2002]Patrick H. Fry. "Nomadic Metacomputing". PhD Thesis Proposal Department of Computer Science, Rensselaer Polytechnic Institute, NY, USA, 2002 [publication]Martins, P. and Silva, L. and Silva, J.G. , "A Java Interface for WMPI", in EuroPVM/MPI 98, 1998 [citation][year=2003]1. Taboada GL, Tourino J, Doallo R "Performance modeling and evaluation of Java message-passing primitives on a cluster" RECENT ADVANCES IN PARALLEL VIRTUAL MACHINE AND MESSAGE PASSING INTERFACE LECTURE NOTES IN COMPUTER SCIENCE 2840: 29-36 2003 [citation][year=2002]1. M. Lobosco, C. Amorim, O. Loques "Java for high-performance network-based computing: a survey", Concurrency and Computation: Practice and Experience, Volume 14, Issue 1, Date: January 2002, Pages: 1-31. [citation][year=2000]J. A. Mathew and H. A. James and K. A. Hawick, "Development Routes for Message Passing Parallelism in Java", Proc. of the ACM Java Grande 2000 Conference, 2000. [citation][year=1999]Mark Baker, Bryan Carpenter, Geoffrey Fox, Sung Hoon Ko, Sang Lim "mpiJava: An object-oriented Java interface to MPI" in "Parallel and Distributed Processing" José Rolim (Ed.)Lecture Notes in Computer Science - 1586, 1999, pp 748-761, ISBN 3-540-65831-9. [citation][year=1999]K. A. Hawick and H. A. James. A Java-Based Parallel Programming Support Environment. Technical Report DHPC-0xx, Department of Computer Science, The University of Adelaide, November 1999. [publication]Silva, L. and Silva, J.G. , "An Experimental Study about Diskless Checkpointing", in Euromicro Workshop on Dependable Computer Systems, 1998, 1998 [citation][year=1999]1. Mootaz Elnozahy, Lorenzo Alvisi, Yi-Min Wang, David B. Johnson "A Survey of Rollback-Recovery Protocols in Message Passing Systems", CMU Technical Report CMU-CS-99-148, June 1999, Carbegie-Mellon University, USA. [publication]Soares, F. and Silva, L. and Silva, J.G. , "How to Get Volunteers for Web-based Computing", in DCW'98, Workshop on Distributed Computing on the Web, 1998 [citation][year=2002]1. Patrick H. Fry. "Nomadic Metacomputing". PhD Thesis Proposal Department of Computer Science, Rensselaer Polytechnic Institute, NY, USA, 2002 [publication]Silva, L. and Silva, J.G. , "Avoiding Checkpoint Contamination in Parallel Systems", in 28th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-28, 1998 [citation][year=2004]1. Hadjicostis CN "Coding techniques for fault-tolerant parallel prefix computations in Abelian groups" Computer Journal, 47 (3): 329-341 May 2004. [citation][year=2000]1. Peter Sobe, "Reaching Efficient Fault-Tolerance for Cooperative Applications". Proc. 4th International Computer Performance & Dependability Symposium IPDS, March 27-29, Proceedings, 48-57, IEEE Computer Society, Chicago, IL, USA 2000 [citation][year=1999]Mootaz Elnozahy, Lorenzo Alvisi, Yi-Min Wang, David B. Johnson "A Survey of Rollback-Recovery Protocols in Message Passing Systems", CMU Technical Report CMU-CS-99-148, June 1999, Carbegie-Mellon University, USA. [citation][year=1999]Peter Sobe, "Forward Error Recovery of Parallel Processes", Proc. 29th Annual International Symposium on Fault Tolerant Computing - FTCS-29, 1999 [publication]Silva, L. , "Number-Crunching using Java Applications", in Proc. Int. Conf. on Parallel and Distributed Processing, Techniques and Applications, PDPTAâ??98, 1998 [publication]Pedroso, H. and Pedroso, H. and Silva, J.G. and Silva, L. , "JET: Massively Parallel Computing with Java", in Proc. 3rd Int. Conference on Massively Parallel Computing Systems, MPCSâ??98, 1998 [publication]Silva, L. and Batista, V. and Martins, P. and Pedroso, H. and Pedroso, H. , "Parallel Computing over the Internet with Java", in Proc. 3rd Int. Conference Meeting on Vector and Parallel Processing, VECPARâ??98, 1998 1997(2 publications) [publication]Pedroso, H. and Pedroso, H. and Silva, L. and Silva, J.G. , "Web-based Metacomputing with JET", in ACM 1997 Workshop on Java for Science and Engineering Computation, 1997 [citation][year=1999]Michael May "Locust: A Brokerage System for Accessing Idle Resources for Web-Computing" 25th Euromicro Conference (EUROMICRO '99) 8 - 10 September, 1999, Milan, Italy. [citation][year=1999]Mark Clement, Quinn Snell, Glenn Judd "High Performance Computing for the Masses" in "Parallel and Distributed Processing" José Rolim (Ed.)Lecture Notes in Computer Science - 1586, 1999, pp 748-761, ISBN 3-540-65831-9. [citation][year=1999]Michael May, "Idle Computing Resources as Micro-Currencies - Bartering CPU Time for Online Content", WebNet 1999: Honolulu, Hawaii, USA - Volume 1, pp. 723-728, 1999. [citation][year=1999]Michael May, "Distributed RC5 Decrypting as a Consumer for Idle-time Brokerage" DCW 99, Workshop on Distributed Computing on the Web, Rostock, Germany, June, 21nd-23rd 1999 [citation][year=1998]1. G. Judd, M. Clement, Q. Snell, "The DOGMA Approach to High-Utilization Supercomputing", The Seventh IEEE International Symposium on High Performance Distributed Computing, July 1998, Chicago, Illinois [publication]Silva, L. and Pedroso, H. and Pedroso, H. and Silva, J.G. , "The Design of JET: A Java Library for Embarrassingly Parallel Applications", in Wotug-20 - Parallel Programming and Java, vol. 50, 1997 [citation][year=2001]1. Philipp Drum, "Effiziente Methoden für global verteiltes wissenschaftliches Rechnen", PhD Dissertation, Technischen Universität München, May 2001 [citation][year=1998]Weidmann M, Drum P, Thomson N, Luksch P, "Towards real-world scientific Web computing?, Object-Oriented Technology Lecture Notes in Computer Science, Springer-Verlag Berlin, 1543, 1998, pp. 472-473. [citation][year=1998]Takagi H, Matsuoka S, Nakada H, Sekiguchi S, Satoh M, Nagashima U, "Ninflet: a migratable parallel objects framework using Java?, Concurrency-Practice and Experience, John Wiley & Sons Ltd, W Sussex, vol. 10, no.11-13, SEP-NOV 1998, pp. 1063-1078. [citation][year=1998]Glenn Judd, Mark Clement and Quinn Snell "DOGMA: Distributed Object Group Metacomputing Architecture' Concurrency: Practice and Experience, Vol 10(1),1-7 (1998). [citation][year=1998]H.Takagi, S. Matsuoka, H. Nakada, S. Sekiguchi, M. Satoh, U. Nagashima. "Ninflet: a Migratable Parallel Objects Framework using Java", ACM 1998 Workshop on Java for High-Performance Network Computing, Palo Alto California, February 1998. [citation][year=1997]1. Pedro Abílio Duarte de Medeiros "Suporte à Execução de Programas em Arquitecturas Paralelas Heterogéneas", Tese de Doutoramento, Faculdade de Ciências e Tecnologia, Universidade Nova de Lisboa, 1997. 1996(4 publications) [publication]Silva, L. and Silva, J.G. , "A Checkpoint Facility for an Heterogeneous DSM System", in Ninth ISCA International Conference on Parallel and Distributed Computing Systems (PDCS 96), 1996 [citation][year=1999]1. Mootaz Elnozahy, Lorenzo Alvisi, Yi-Min Wang, David B. Johnson "A Survey of Rollback-Recovery Protocols in Message Passing Systems", CMU Technical Report CMU-CS-99-148, June 1999, Carbegie-Mellon University, USA. [publication]Silva, L. and Silva, J.G. and Chapple, S. , "Implementing Distributed Shared Memory on top of MPI: the DSMPI library", in 4th Euromicro Workshop on Parallel and Distributed Processing (PDP'96), 1996 [citation][year=1998]1. Djemame K, Gilles DC, Mackenzie LM, Bettaz M, "Performance comparison of high-level algebraic nets distributed simulation protocols?, Journal of Systems Architecture, vol. 44, no. 6-7, MAR 1998, pp. 457-472. [publication]Silva, L. and Silva, J.G. , "Portable Transparent Checkpointing for Distributed Shared Memory", in Fifth IEEE International Symposium on High Performance Distributed Computing (HPDC-5), 1996 [citation][year=1999]1. Mootaz Elnozahy, Lorenzo Alvisi, Yi-Min Wang, David B. Johnson "A Survey of Rollback-Recovery Protocols in Message Passing Systems", CMU Technical Report CMU-CS-99-148, June 1999, Carbegie-Mellon University, USA. [citation][year=1998]1. Nitin H. Vaidya "A Case for Two-Level Recovery Schemes" IEEE TRANSACTIONS ON COMPUTERS Vol. 47, No. 6; JUNE 1998, pp. 656-666 [publication]Silva, L. and Távora, V.M.N. and Silva, J.G. , "Mechanisms of File-Checkpointing for Unix Applications", in 14th IASTED International Conference on Applied Informatics, 1996 [citation][year=1999]1. Mootaz Elnozahy, Lorenzo Alvisi, Yi-Min Wang, David B. Johnson "A Survey of Rollback-Recovery Protocols in Message Passing Systems", CMU Technical Report CMU-CS-99-148, June 1999, Carbegie-Mellon University, USA. 1995(3 publications) [publication]Silva, L. and Silva, J.G. and Chapple, S. and Clarke, L. , "Portable Checkpointing and Recovery", in 4th IEEE International Symposium on High Performance Distributed Computing (HPDC-4), 1995 [citation][year=2002]1. Karablieh, F. Bazzi, R.A., "Heterogeneous checkpointing for multithreaded applications", Proceedings. 21st IEEE Symposium on Reliable Distributed Systems, 2002, Tempe, Arizona, USA [citation][year=2001]1. F. Karablieh, R. Bazzi, M. Hicks, "Compiler-Assisted Heterogeneous Checkpointing", Proc. 20th IEEE Symposium on Reliable Distributed Systems (SRDS'01), October 2001, New Orleans, Louisiana [citation][year=1999]Casanova, H., Kim, M., Plank, J., Dongarra, J., "Adaptive Scheduling for Task Farming with Grid Middleware" International Journal of Supercomputer Applications and High-Performance Computing, Sage Publications Inc, Thousand Oaks, pp 231-240, Volume 13, Number 3, Fall 1999. [citation][year=1999]Mootaz Elnozahy, Lorenzo Alvisi, Yi-Min Wang, David B. Johnson "A Survey of Rollback-Recovery Protocols in Message Passing Systems", CMU Technical Report CMU-CS-99-148, June 1999, Carbegie-Mellon University, USA. [citation][year=1999]James S. Plank, Henri Casanova, Micah Beck and Jack Dongarra, "Deploying Fault Tolerance and Task Migration with NetSolve", Future Generation Computer Systems, Volume 15, 1999, pages 745 - 755. Elsevier. [citation][year=1999]Casanova H, Kim MH, Plank JS, Dongarra JJ, "Adaptive scheduling for task farming with Grid middlewareâ?, EURO-PAR'99: Parallel Processing Lecture Notes in Computer Science, 1685, 1999, pp. 30-43. [citation][year=1999]Plank JS, Chen YQ, Li K, Beck M, Kingsley G, "Memory exclusion: Optimizing the performance of checkpointing systemsâ?, Software-Practice & Experience, John Wiley & Sons Ltd, W Sussex, vol. 29, no. 2, FEB 1999, pp. 125-142. [citation][year=1999]Mootaz Elnozahy, Lorenzo Alvisi, Yi-Min Wang, David B. Johnson "A Survey of Rollback-Recovery Protocols in Message Passing Systems", CMU Technical Report CMU-CS-99-148, June 1999, Carbegie-Mellon University, USA. [citation][year=1998]Russ SH, Robinson J, Flachs BK, Heckel B, "The hector distributed run-time environment?, IEEE Transactions on Parallel and Distributed Systems, vol. 9, no. 11, NOV 1998, pp. 1102-1114. [citation][year=1998]J. A. Kohl, P. M. Papadopoulos, ``Efficient and Flexible Fault Tolerance and Migration of Scientific Simulations Using CUMULVS,' 2nd SIGMETRICS Symposium on Parallel and Distributed Tools, Welches, OR, August 1998. [citation][year=1998]Plank JS, Casanova H, Beck M, Dongarra J, "Deploying fault-tolerance and task migration with NetSolve?, Applied Parallel Computing, Lecture Notes in Computer Science, Springer-Verlag Berlin, 1541, 1998, pp. 418-432. [citation][year=1997]Samuel H. Russ, Jonathan Robinson, Matt Gleeson, Jose Figueroa "Dynamic Communication Mechanism Switching in Hector" Technical Report No. MSSU--EIRS--ERC--97--8 Mississippi State University, USA, 1997. [citation][year=1997]V. K. Naik, S. P. Midkiff, and J. E. Moreira, " A Checkpointing Strategy for Scalable Recovery on Distributed Parallel Systems," in the Proceedings of SC97:High Performance Networking and Computing, (San Jose, CA), Nov 1997. [citation][year=1997]James S. Plank and Youngbae Kim and Jack J. Dongarra"Fault-Tolerant Matrix Operations for Networks of Workstations Using Diskless Checkpointing", Journal of Parallel and Distributed Computing, Academic Press Inc, San Diego, vol. 43, no. 2, pp 125-138., Junho 15- 1997. [citation][year=1997]James S. Plank, "An Overview of Checkpointing in Uniprocessor and Distributed Systems, Focusing on Implementation and Performance", Technical Report of University of Tennessee, UT-CS-97-372, Jul. 1997. [citation][year=1997]Y.Kim, J.S.Plank, J.Dongarra. "Fault-Tolerant Matrix Operations for Networks of Workstations Using Multiple Checkpointing", Prof. High-Performance Computing on the Information Superhighway, HPC Asia'97, Seoul, Korea, April 1997 [citation][year=1997]V.Naik, S.Midkiff, J.Moreira: "A Checkpointing Strategy for Scalable Recovery on Distributed Parallel Systems", Proceedings of Supercomputing'97, 1997 [citation][year=1997]Bazzi, R.A. "Portable memory", Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems, 1997., Tunis , Tunisia [citation][year=1996]Y. Kim, J. S. Plank, and J. J. Dongarra. Fault tolerant matrix operations using checksum and reverse computation. In The 6th Symposium of The Frontiers of Massively Parallel Computation, pages 70--77, Annapolis MD, October 1996. [citation][year=1996]Youngbae Kim "Fault Tolerant Matrix Operations for Parallel and Distributed Systems" PhD Thesis, The University of Tennessee, USA, August 1996. [citation][year=1995]1. Samuel Russ, Brian Flachs,Jonathan Robinson, Bjorn Heckel "Hector: Automated Task Allocation for MPI" Mississipi State University Technical Report, MSSU-EIRS-ERC-95-6, September 19, 1995. [publication]Alves, A. and Silva, L. and Carreira, J. and Silva, J.G. , "WPVM: Parallel Computing for the People", in International Conference on High-Performance Computing and Networking (HPCN 95), vol. 919, 1995 [citation][year=2002]L. Góes, L. Ramos, C. Martins, "Performance Analysis of Parallel Programs Using Prober as a Single Aid Tool", Proc. 14th Symposium on Computer Architecture and High Performance Computing (SCAB-PAD'02), October 2002, Vitória, Brazil [citation][year=2002]Ramos, L.E.S. Goes, L.F.W. Martins, C.A.P.S., "Teaching and learning parallel processing through performance analysis using Prober", 32nd ASEE/IEEE Frontiers in Education Conference, 2002 [citation][year=2000]J. Barbosa, J. Tavares, A.J. Padilha, "Linear Algebra Algorithms in Heterogeneous Cluster of Personal Computers", Proceedings 9th Heterogeneous Computing Workshop, May 2000, Cancun, Mexico [citation][year=2000]Fadlallah, G. Lavoie, M. Dessaint, L.-A., "Parallel computing environments and methods", Proceedings. International Conference on Parallel Computing in Electrical Engineering, 2000. PARELEC-2000 [citation][year=1999]1. Dino Ahr, Andreas Bäcker, "Project Workspaces for Parallel Computing - The TRAPPER Approach", Proceedings of the 5th International Euro-Par Conference on Parallel Processing, Lecture Notes In Computer Science; Vol. 1685, 1999 [citation][year=1998]1. Mamontov YV, Willander M, "An algorithm to evaluate spectral densities of high-dimensional stationary diffusion stochastic processes with non-linear coefficients: The general scheme and issues on implementation with PVM?, Applied Parallel Computing, Lecture Notes in Computer Science, Springer-Verlag Berlin, Berlin, vol. 1541: 1998, pp. 315-321. [citation][year=1997]Luciano José Senger, "Avaliação de Desempenho do PVM-W95", Dissertação Mestrado, Instituto de Ciências Matemáticas de São Carlos da Universidade de São Paulo (ICMSC/USP), Novembro de 1997 [citation][year=1997]Paulo S. Souza, Luciano J. Senger, Marcos José Santana, Regina Helena Carlucci Santana, "Evaluating Personal High Performance Computing with PVM on Windows and LINUX Environments", Proceedings of the 4th European PVM/MPI Users' Group Meeting on Recent Advances in Parallel Virtual Machine and Message Passing Interface, Lecture Notes In Computer Science; Vol. 1332, 1997 [citation][year=1996]1. Yong Jae Kim, Tag Gon Kim "A Heterogeneous Distributed Simulation Framework Based on DEVS Formalism" AIS'96, pp. 116-121, Mar. 23, 1996, San Diego, CA. [publication]Silva, L. and Silva, J.G. and Clarke, L. and Chapple, S. , "Fault-Tolerance for Regular Decomposition Grid Applications", in Proceedings of the 3rd Euromicro Workshop on Parallel and Distributed Processing PDPâ??95, 1995 1994(9 publications) [publication]Carreira, J. and Silva, L. and Silva, J.G. , "On the design of Eilean: A Linda-like library for MPI", in IEEE Second Scalable Parallel Libraries Conference, 1994 [citation][year=2004]Russello G, Chaudron M, Van Steen M "Exploiting differentiated tuple distribution in shared data spaces" EURO-PAR 2004 Parallel Processing, Proceedings, Lecture Notes In Computer Science 3149: 579-586 2004 [citation][year=2004]Russello G, Chaudron M, Van Steen M "Dynamic adaptation of data distribution policies in a shared data space system" On The Move To Meaningful Internet Systems 2004: COOPLS, DOA, AND ODBASE, PT 2, Proceedings, Lecture Notes In Computer Science 3291: 1225-1242 2004 [citation][year=2000]Rocco De Nicola, Rosario Pugliese, Antony I. T. Rowstron. "Proving the Correctness of Optimising Destructive and Non-destructive Reads over Tuple Spaces", Lecture Notes In Computer Science; Vol. 1906, 2000, Proceedings of the 4th International Conference on Coordination Languages and Models, Lecture Notes In Computer Science; Vol. 1906, 2000 [citation][year=2000]Antony Rowstron, "Optimising the Linda in primitive: understanding tuple-space run-times", Proceedings of the 2000 ACM symposium on Applied computing, Como, Italy, ACM Press [citation][year=1999]1. Ronaldo Meneses "Resource Management In Tuple Space Systems" PhD. Thesis, University of York, Agosto de 1999. [citation][year=1997]Ronaldo Menezes and Alan Wood. Garbage Collection in Open Distributed Tuple Space Systems. In Proc. of 15th Brazilian Computer Networks Symposium - SBRC'97, pages 525--543, São Carlos - São Paulo - Brazil, May 1997. [citation][year=1997]Pedro Abílio Duarte de Medeiros "Suporte à Execução de Programas em Arquitecturas Paralelas Heterogéneas", Tese de Doutoramento, Faculdade de Ciências e Tecnologia, Universidade Nova de Lisboa, 1997 [citation][year=1997]Roel van der Goot, Jonathan Schaeffer, Gregory V. Wilson. "Safer Tuple Spaces", Proceedings of the Second International Conference on Coordination Languages and Models, Lecture Notes In Computer Science; Vol. 1282, 1997 [publication]Silva, J.G. and Silva, L. and Madeira, H. and Jorge Bernardino , "A fault-tolerant mechanism for simple controllers", in First European Dependable Computing Conference, 1994 [citation][year=2013]1 "A fault-tolerant mechanism for simple controllers [citation][year=2013]" 10763542558783255532 An evaluation of the error detection mechanisms in MARS using software-implemented fault injection http://link.springer.com/chapter/10.1007/3-540-61772-8_31 E Fuchs Dependable Computing?EDCC-2 1996 Springer 2 "A fault-tolerant mechanism for simple controllers [citation][year=2013]" 10763542558783255532 Roll-forward error recovery in embedded real-time systems http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=517589 J Xu, B Randell Parallel and Distributed Systems, 1996. … 1996 ieeexplore.ieee.org 3 "A fault-tolerant mechanism for simple controllers [citation][year=2013]" 10763542558783255532 On structuring cooperative and competitive concurrent systems http://comjnl.oxfordjournals.org/content/42/8/627.short A Romanovsky The Computer Journal 1999 Br Computer Soc 4 "A fault-tolerant mechanism for simple controllers [citation][year=2013]" 10763542558783255532 Responsive Roll-Forward Recovery in Embedded Real-Time Systems http://www.cs.ncl.ac.uk/publications/trs/papers/515.pdf J Xu, B Randell Publication/NA 1995 cs.ncl.ac.uk 5 "A fault-tolerant mechanism for simple controllers [citation][year=2013]" 10763542558783255532 Software diversity as a way to well-structured concurrent software http://dl.acm.org/citation.cfm?id=206848 AB Romanovsky ACM SIGOPS Operating Systems Review 1995 dl.acm.org 6 "A fault-tolerant mechanism for simple controllers [citation][year=2013]" 10763542558783255532 Computing Science http://www.cs.ncl.ac.uk/publications/trs/papers/682.pdf OS Cooperative Publication/NA 1999 cs.ncl.ac.uk 7 "A fault-tolerant mechanism for simple controllers [citation][year=2013]" 10763542558783255532 An Efficient Forward Recovery Checkpointing Scheme in Dissimilar Redundancy Computer System http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5366252 W Guodong, Z Zhengjun, H Tao… … , 2009. CiSE 2009. … 2009 ieeexplore.ieee.org 8 "A fault-tolerant mechanism for simple controllers [citation][year=2013]" 10763542558783255532 Adaptable fault tolerance for distributed process control using exclusively standard components http://link.springer.com/chapter/10.1007/3-540-61772-8_28 J Bohne, R Grönberg Dependable Computing?EDCC-2 1996 Springer [citation][year=1999]1. Romanovsky A, "On structuring cooperative and competitive concurrent systems?, Computer Journal, Oxford Univ Press, Oxford, vol. 42, no. 8, 1999, pp. 627-637, ISSN: 0010-4620 [citation][year=1998]1. Romanovsky AB, "Predictable toleration of design faults: recovery blocks in real time systems?, Computer Systems Science and Engineering, CRL Publishing Ltd, Market Harborough, vol. 13, no. 6, Novembro 1998, pp. 369-377, ISSN: 0267-6192 [citation][year=1996]1. Emmerich Fuchs "An Evaluation of the Error Detection Mechanisms in MARS Using Software-Implemented Fault Injection" Proc. Second European Dependable Computing Conference, Taormina, Itália, Outubro 1996, Lecture Notes in Computer Science 1150, Springer Verlag, pp. 73-90, ISBN 3-540-61772-8. [citation][year=1996]2. J. Xu and B. Randell, "Roll-Forward Error Recovery in Embedded Real-Time Systems", Proc. Int. Conf. on Parallel & Distributed Systems. Tokyo, Japan. June,1996, pages 414--421. [citation][year=1996]3. Jürgen Bohne, Reny Grönberg "Adaptable Fault Tolerance for Distributed Process Control Using Exclusively Standard Components" Proc. Second European Dependable Computing Conference, Taormina, Itália, Outubro 1996, Lecture Notes in Computer Science 1150, Springer Verlag, pp. 21-34, ISBN 3-540-61772-8. [citation][year=1995]1. J. Xu and B. Randell. "Responsive Roll--Forward Recovery in Embedded Real--Time Systems" Technical report, Dept. of Computer Science.- University of Newcastle upon Tyne, UK, 1995 [publication]Silva, L. and Silva, J.G. , "On the Optimum Recovery of Distributed Programs", in 20th EUROMICRO Conference, 1994 [citation][year=1999]1. Mootaz Elnozahy, Lorenzo Alvisi, Yi-Min Wang, David B. Johnson "A Survey of Rollback-Recovery Protocols in Message Passing Systems", CMU Technical Report CMU-CS-99-148, June 1999, Carbegie-Mellon University, USA. [citation][year=1998]1. N. Neves and W. K. Fuchs, "Coordinated Checkpointing without Direct Coordination," Proceedings of IEEE International Computer Performance & Dependability Symposium, pp. 23--31, Sept. 1998. [publication]Silva, L. and Silva, J.G. , "Checkpointing Pipeline Applications", in 1994 World Transputer Congress, vol. 41, 1994 [citation][year=1999]1. Mootaz Elnozahy, Lorenzo Alvisi, Yi-Min Wang, David B. Johnson "A Survey of Rollback-Recovery Protocols in Message Passing Systems", CMU Technical Report CMU-CS-99-148, June 1999, Carbegie-Mellon University, USA [publication]Silva, L. and Veer, B. and Silva, J.G. , "Checkpointing SPMD Applications on Transputer Networks", in 1994 Scalable High Performance Computing Conference (SHPCC 94), 1994 [citation][year=1999]Mootaz Elnozahy, Lorenzo Alvisi, Yi-Min Wang, David B. Johnson "A Survey of Rollback-Recovery Protocols in Message Passing Systems", CMU Technical Report CMU-CS-99-148, June 1999, Carbegie-Mellon University, USA. [citation][year=1999]James S. Plank, Henri Casanova, Micah Beck and Jack Dongarra, "Deploying Fault Tolerance and Task Migration with NetSolve", Future Generation Computer Systems, Volume 15, 1999, pages 745 - 755. Elsevier. [citation][year=1999]Hsu ST, Chang RC, "An implementation of using remote memory to checkpoint processes?, Software-Practice & Experience, John Wiley & Sons Ltd, W Sussex, vol. 29, no, 11, SEP 1999, pp. 985-1004. [citation][year=1998]Plank JS, Casanova H, Beck M, Dongarra J, "Deploying fault-tolerance and task migration with NetSolve?, Applied Parallel Computing Lecture Notes in Computer Science, Springer-Verlag Berlin, 1541, 1998, pp. 418-432. [citation][year=1998]James S. Plank, Kai Li, Michael Puening "Diskless Checkpointing" IEEE Trans. on Parallel and Distributed Systems, Vol.9, No.10, Outubro 1998, pp. 972-986 [citation][year=1997]Y.Chen, J.Plank, K.Li: "CLIP: A Checkpointing Tool for Message-Passing Parallel Programs", Proceedings of Supercomputing'97, 1997 [citation][year=1997]V.Naik, S.Midkiff, J.Moreira: "A Checkpointing Strategy for Scalable Recovery on Distributed Parallel Systems", Proceedings of Supercomputing'97, 1997. [citation][year=1997]Adam Beguelin, Erik Seligman and Peter Stephan "Application Level Fault Tolerance in Heterogeneous Networks of Workstations", Journal of Parallel and Distributed Computing, vol. 43, no. 2, pp.147--155,1997 [citation][year=1996]J. S. Plank. Improving the performance of coordinated checkpointers on networks of workstations using RAID techniques. In 15th Symposium on Reliable Distributed Systems, pages 76--85, October 1996. [citation][year=1996]Tzi-cker Chiueh, Peitao Deng "Evaluation of Checkpoint Mechanisms for Massively Parallel Machines" Proc. Twenty-Six Annual International Symposium on Fault-Tolerant Computing (FTCS-26), Junho 25-26, 1996, Sendai, Japão, IEEE Computer Society, ISBN 0-8186-7261-7, pp 370-371. [citation][year=1996]J. Gehring, A. Reinefeld. "MARS - A Framework for Minimizing the Job Execution Time in a Metacomputing Environment" Future Generation Computer Systems, FGCS-12,1 (1996), Elsevier, pp. 87-99. [citation][year=1996]J. Arabe, A. Beguelin, B. Lowekamp, E. Seligman, M. Starkey, and P. Stephan "Dome: Parallel programming in a heterogeneous multi-user environment?, Proceedings of the International Parallel Processing Symposium (IPPS), April 1996, Honolulu, Hawaii. [citation][year=1996]Youngbae Kim, "Fault Tolerant Matrix Operations for Parallel and Distributed Systems?, Phd Thesis, University of Tennessee, Knoxville, 1996 [citation][year=1995]J.Planck, Y. Kim, J.J.Dongarra "Algorithm-Based Diskless Checkpointing for Fault-Tolerant Matrix Operations" Proceedings of the 25th International Symposium on Fault-Tolerant Computing(FTCS-25), California, USA, June 1995, pp. 151-360, IEEE Computer Society. [citation][year=1995]José Nagib Cotrim Árabe, Adam Beguelin, Bruce Lowekamp, Erik Seligman, Michael Starkey, and Peter Stephan. "Dome: Parallel programming in a heterogeneous multi-user environment". Technical Report CMU-CS95 -137, Carnegie Mellon University, April 1995. [citation][year=1995]J.Plank, M.Beck, G.Kingley, K.Li "Libckpt: Transparent Checkpointing under Unix" Proceedings of the Usenix Winter 1995 Technical Conference, New Orleans, January 1995. [citation][year=1994]Seligman E., Beguelin A. High-Level Fault Tolerance in Distributed Programs. Technical Report CMU-CS-94-223, Carnegie-Mellon University, December 1994. [citation][year=1994]E.Seligman, A.Beguelim "High-Level Fault-Tolerance in Distributed Programs" Tech Report Carnegie Mellon University, CMU-CS-94-223. [citation][year=1994]M.Beck, J.Plank, G.Kingsley. "Compiler-Assisted Checkpointing" University of Tennessee, Tech. Report CS-94-269, December 1994. [publication]Silva, L. and Silva, J.G. and Veer, B. , "The Helios Tuple Space Library", 1994 [publication]Silva, L. and Silva, J.G. , "Integrating a Checkpointing and Rollback-Recovery Algorithm with a Causal Order Protocol", 1994 [publication]Silva, L. and Silva, J.G. , "PipeLib: A Parallel Library for Writing Pipeline Applications", 1994 [publication]Silva, L. and Silva, J.G. and Veer, B. , "A Fault-Tolerant Tuple Space Library", vol. 41, 1994 1993(2 publications) [publication]Silva, L. and Silva, J.G. , "How to Get a Fault-Tolerant Farm", in 1993 World Transputer Congress, vol. 2, 1993 [citation][year=2004]1. Valentino Pietrobon, Salvatore Orlando, "Resource Fault Prediction Models", Technical Report CS-2004-3, Università Ca" Foscari di Venezia, May 2004 [citation][year=2001]1. Wael R. Elwasif, James S. Plank, Rich Wolski, "Data Staging Effects in Wide Area Task Farming Applications", Proc. 1st International Symposium on Cluster Computing and the Grid, May 2001, Brisbane, Australia [citation][year=1999]Casanova, H., Kim, M., Plank, J., Dongarra, J., "Adaptive Scheduling for Task Farming with Grid Middleware" International Journal of Supercomputer Applications and High-Performance Computing, pp 231-240, Volume 13, Number 3, Fall 1999. [citation][year=1999]Casanova H, Kim MH, Plank JS, Dongarra JJ, "Adaptive scheduling for task farming with Grid middlewareâ?, EURO-PAR'99: Parallel Processing Lecture Notes in Computer Science, 1685, 1999, pp. 30-43. [citation][year=1998]1. Richard Laundy, "Implementation of Parallel Branch and BoundAlgorithms in XPRESS-MP", Dash Internal Report no. DA/TR-101, January 1998, www.dashoptimization.com [publication]Silva, L. and Silva, J.G. , "DIP: Distributed Diagnosis Protocol", in Microprocessing and Microprogramming, vol. 38, 1993 1992(1 publication) [publication]Silva, L. and Silva, J.G. , "Global Checkpointing for Distributed Programs", in IEEE 11th Symposium on Reliable Distributed Systems SRDS-11, 1992 [citation][year=2003]Hai Jin, Kai Hwang, "Distributed Checkpointing on Clusters with Dynamic Striping and Staggering", Lecture Notes in Computer Science, Springer-Verlag Heidelberg,Volume 2550 / 2002, July 2003 [citation][year=2003]G Cao, M Singhal, "Checkpointing with mutable checkpoints", in Theoretical Computer Science 290 (2003) 1127"1148 [citation][year=2003]Weigang Ni, Vrbsky, S.V. Ray, S., "Low-cost coordinated non-blocking checkpointing in mobile computing systems", Proceedings. Eighth IEEE International Symposium on Computers and Communication, 2003. (ISCC 2003), June 2003 [citation][year=2001]Guohong Cao, Mukesh Singhal "Mutable Checkpoints: A New Checkpointing Approach for Mobile Computing Systems" IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 12, NO. 2, FEBRUARY 2001. [citation][year=2001]Osada S, Higaki H "QoS-based checkpoint protocol for multimedia network systems" ADVANCES IN MUTLIMEDIA INFORMATION PROCESSING - PCM 2001, PROCEEDINGS LECTURE NOTES IN COMPUTER SCIENCE, 2195: 574-581 2001 [citation][year=2001]Yoshinori Morita, Hiroaki Higaki, "Hybrid Checkpoint Protocol for Supporting Mobile-to-Mobile Communication", The 15th International Conference on Information Networking (ICOIN'01), January 2001, Beppu City, Oita, Japan [citation][year=2001]Kengo Hiraga, Hiroaki Higaki, "Consistent Global Checkpoints in Multimedia Network Systems", The 15th International Conference on Information Networking (ICOIN'01), January 2001, Beppu City, Oita, Japan [citation][year=2001]Yoshinori Morita, Hiroaki Higaki, "Checkpoint-Recovery for Mobile Computing Systems", 21st International Conference on Distributed Computing Systems Workshops (ICDCSW '01), April 2001, Mesa, Arizona [citation][year=2000]E. Gendelman, L. F. Bic, M. Dillencourt. "An Application-Transparent, PlatformIndependent Approach to Rollback-Recovery for Mobile Agent Systems" 20 th IEEE International Conference on Distributed Computing Systems. Taipei, Taiwan 2000. [citation][year=2000]Kalaiselvi S, Rajaraman V "A survey of checkpointing algorithms for parallel and distributed computers" SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES 25: 489-510 Part 5 OCT 2000 [citation][year=2000]JW Lin, SY Kuo, "Resolving error propagation in distributed systems", Information Processing Letters 74 (2000) 257"262. [citation][year=2000]T Osman, A Bargiela, "FADI: A fault tolerant environment for open distributed computing", Software Journal, IEE Proceedings, June 2000, Volume 147, Issue 3 [citation][year=2000]Kuo-Feng Ssu, "HETEROGENEOUS AND MOBILE RECOVERY". PhD Thesis, University of Illinois at Urbana-Champaign, 2000 [citation][year=1999]D. Manivannan, Mukesh Singhal "Quasi-Synchronous Checkpointing: Models, Characterization, and Classification" IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, Vol. 10, No. 7; JULY 1999, pp. 703-713. [citation][year=1999]B. Yao, K. F. Ssu, and W. K. Fuchs, "Message Logging in Mobile Computing," Proceedings of IEEE Fault-Tolerant Computing Symposium, pp. 294--301, June 1999. [citation][year=1999]Mootaz Elnozahy, Lorenzo Alvisi, Yi-Min Wang, David B. Johnson "A Survey of Rollback-Recovery Protocols in Message Passing Systems", CMU Technical Report CMU-CS-99-148, June 1999, Carbegie-Mellon University, USA. [citation][year=1999]E. Gendelman, L. F. Bic, M. Dillencourt. "An Efficient Checkpointing Algorithm for Distributed Systems Implementing Reliable Communication Channels." 18th Symposium on Reliable Distributed Systems, Lausanne, Switzerland 1999, pp 290-291. [citation][year=1999]Lorenzo Alvisi, Sriram Rao, Syed Amir Husain, Asanka de Mel, Elmootazbellah Elnozahy, "An Analysis of Communication-Induced Checkpointing", Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing, June 1999, Madison, Wisconsin [citation][year=1998]N. Neves and W. K. Fuchs, "Coordinated Checkpointing without Direct Coordination," Proceedings of IEEE International Computer Performance & Dependability Symposium, pp. 23--31, Sept. 1998. [citation][year=1998]Guohong Cao, Mukesh Singhal "On Coordinated Checkpointing in Distributed Systems" IEEE Transactions on Parallel and Distributed Systems, Vol 9, no 12, December 1998, pp 1213,1225. [citation][year=1998]B. Ramamurthy, S.J.Upadhyaya "Hardware Assisted Fast Recovery in Distributed Systems" Dependable Computing for Critical Applications 5, R.K.Iyer, M.Morganti, W.K.Fuchs,V.Gligor (Eds), IEEE Computer Society Press, 1998, ISBN 0-8186-7803-8 , pp. 224-241. [citation][year=1998]Denis Conan, Guy Bernard, "La reprise sur erreur par recouvrement arrière automatique dans les systèmes répartis", em: ""Parallèlisme et Répartition', Ed. J.-F. Myoupo, Hermès, pages 91-123, Avril 1998. [citation][year=1998]Guohong Cao, Mukesh Singhal, "On the Impossibility of Min-Process Non-Blocking Checkpointing and An Efficient Checkpointing Algorithm for Mobile Computing Systems", 1998 International Conference on Parallel Processing, August 1998, Minneapolis, Minnesota [citation][year=1997]Adam Beguelin, Erik Seligman and Peter Stephan "Application Level Fault Tolerance in Heterogeneous Networks of Workstations", Journal of Parallel and Distributed Computing, vol. 43, no. 2, pp.147--155,1997 [citation][year=1997]G.G.Richard III, M. Singhal "Complete Process Recovery: Using Vector Time to Handle Multiple Failures in Distributed Systems" IEEE Concurrency, Vol. 5, No. 2, April-June 1997, pp. 50-59. [citation][year=1997]Marc Zweiacker "The Persistent Object Group Service: An Approach to Fault Tolerance of Open Distributed Applications" Proc. 1997 IFIG WG 6.1 International Conference on Open Distributed Processing (ICODP'97) 27-30 Maio 1997, Toronto, Canada. [citation][year=1997]N. Neves and W. K. Fuchs. Adaptive recovery for mobile environments. Communications of the ACM, 40(1):68--74, January 1997 [citation][year=1996]E. N. Elnozahi, D.B. Johnson, Y.M.Wang "A Survey of Rollback-Recovery Protocols in Message-Passing Systems" Carnegie Mellon University, School of Computer Science, Report CMU-CS-96-181, October 1996. [citation][year=1996]N.Neves, W.K.Fuchs. "Using Time to Improve the Performance of Coordinated Checkpointing", Proceedings of the International Performance and Dependability Symposium, IPDS96, Illinois, September 1996. [citation][year=1996]A. Moustefaoui, Michel Raynal "Efficient Message Logging for Uncoordinated Checkpointing Protocols" Proc. Second European Dependable Computing Conference, Taormina, Itália, Outubro 1996, Lecture Notes in Computer Science 1150, Springer Verlag, pp. 353-364, ISBN 3-540-61772-8. [citation][year=1996]G. Muller, M. Banâtre , N. Peyrouz and B. Rochat. "Lessons from FTM: an experiment in design and implementation of a low-cost fault-tolerant system." In IEEE Transactions on Reliability, 45(2):332---340, Jun. 1996 [citation][year=1996]Knop P, Rego V, Sunderam V, "Fail-safe concurrency in the EcliPSe system?, Concurrency-Practice and Experience, John Wiley & Sons Ltd, W Sussex, vol. 8, no. 4, MAY 1996, pp. 283-312. [citation][year=1996]D. Manivannan and M. Singhal, "Quasi-synchronous checkpointing: Models, characterization, and classification ", Ohio State University, Tech. Rep. OSU-CISRC-5/96TR33, 1996. [citation][year=1996]J. Arabe, A. Beguelin, B. Lowekamp, E. Seligman, M. Starkey, and P. Stephan "Dome: Parallel programming in a heterogeneous multi-user environment?, Proceedings of the International Parallel Processing Symposium (IPPS), April 1996, Honolulu, Hawaii. [citation][year=1995]Ganesha Beedubail, Anish Karmarkar, Anil Gurijala, Willis Marti and Udo Pooch, "An Algorithm for Supporting Fault Tolerant Objectsin Distributed Object Oriented Operating Systems", Technical Report (TR 95-019) April 1995, Department of Computer Science, Texas A&M University,College Station, TX - 77843. [citation][year=1995]G. Cabillic, G.Muller, I. Puaut "The Performance of Consistent Checkpointing in Distributed Shared Memory Systems" IEEE 14th Symposium on Reliable Distributed Systems, Bad Neuenhar, RFA - 13-15 de Setembro, 1995, IEEE Computer Society Press, ISBN 0-8186-7153-X. [citation][year=1995]G.Deconinck, J.Vounckx, R.Lauwereins, J.A.Peperstraete. "A User-Triggered Checkpointing Library for Computation-Intensive Applications", Proc. 7th Int. Conf. on Parallel and Distributed Computing and Systems, Washington DC, pp. 321-324, Oct. 1995 [citation][year=1995]J. Ouyang and G. Heiser, "Checkpointing and Recovery for Distributed Shared Memory Applications", Proc. of the Fourth Int'l Workshop on Object Orientation in Operating Systems ({IWOOOS}'95), pp 191-199, 1995. [citation][year=1995]G. Beedubail et al., "An algorithm for supporting fault tolerant objects in distributed object oriented operating systems," In Proc. of International Workshop on Object-Orientation in Operating Systems, August 1995. [citation][year=1995]José Nagib Cotrim Árabe, Adam Beguelin, Bruce Lowekamp, Erik Seligman, Michael Starkey, and Peter Stephan. Dome: Parallel programming in a heterogeneous multi-user environment. Technical Report CMU-CS95 -137, Carnegie Mellon University, April 1995. [citation][year=1995]Y. Yong "Replay and Distributed Breakpoints in an OSF DCE Environment" M.Math Thesis, University of Waterloo, Ontario, Canada, 1995. [citation][year=1994]Seligman E., Beguelin A. High-Level Fault Tolerance in Distributed Programs. Technical Report CMU-CS-94-223, Carnegie-Mellon University, December 1994. [citation][year=1994]E. N. Elnozahi, W. Zaenepoel "On the Use and Implementation of Message Logging" Proceedings of the 24th Annual International Symposium on Fault-Tolerant Computing (FTCS-24), Austin, Texas, USA, 15-17 June 1994, pp. 298-307, IEEE Computer Society Press, ISBN 0-8186-5520-8. [citation][year=1994]Gilles Muller, Mireille Hue, Nadine Peyrouze "Performance of Consistent Checkpointing in a Modular Operating System: Results of the FTM Experiment" in "Dependable Computing - EDCC-1" Klaus Echtle, Dieter Hammer, David Powell (Eds.) Lecture Notes in Computer Science 852, Springer Verlag, 1994, pág. 491-508. ISBN 3-540-58426-9. [citation][year=1994]J.Leon, "An Application-Oriented Toolkit for Highly Available Distributed Scientific Computing", PhD Thesis Proposal, Department of Computer Science, Carnegie-Mellon University, 1994. [citation][year=1994]K.S.Toi, C.J.Hou "Effective and Concurrent Checkpointing and Rollback Recovery in Distributed Systems" Tech. Report TR-ECE-94-05, Univ. of Wisconsin, Madison, March 1994. [citation][year=1994]P.Krishna, N.H.Vaidya, D.K.Pradhan "Recovery in Multicomputers with Finite Error Detection Latency" Proceedings of the 23rd International Conference on Parallel Processing, August 1994 [citation][year=1994]E.Seligman, A.Beguelim "High-Level Fault-Tolerance in Distributed Programs" Tech Report Carnegie Mellon University, CMU-CS-94-223 [citation][year=1993]David B. Johnson "Efficient Transparent Optimistic Rollback Recovery for Distributed Application Programs" Proceedings of the 12th Symposium on Reliable Distributed Systems, IEEE Computer Society, October 1993. [citation][year=1993]P. Krishna, Nitin H. Vaidya, D.K.Pradhan "Independent Checkpointing and Recovery Scheme for Fail-Slow Processors" Technical Report 93-028, Dept. of Computer Science, Texas A&M University, College Station, USA. [citation][year=1993]G. Deconinck, J. Vounckx, R. Lauwereins, and J. A. Peperstraete. Survey of backward error recovery techniques for multicomputers based on checkpointing and rollback. In Proc. IASTED Int. Conf. on Modelling and Simulation, pages 262--265, May 1993. [citation][year=1993]Nitin H. Vaydya "Dynamic Cluster-Based Recovery: Pessimistic and Optimistic Schemes" Technical Report 93-027, Dept. of Computer Science, Texas A&M University, College Station, USA. [citation][year=1993]G.Richard III, M.Singhal "Complete Process Recovery in Distributed Systems using Vector Time" Tech Report, Dept. Computer and Information Science, The Ohio State University. USA. Book Chapters 2008(1 publication) [publication]Silaghi, G.C. and Silva, L. and Domingues, P. and Arenas, A.E. , "Tackling the Collusion Threat in P2P-Enhanced Internet Desktop Grids", in Making Grids Work, pp. 392-402, 2008 2007(1 publication) [publication]Marques, P. and Silva, L. , "Component Agent Systems: Building a Mobile Agent Architecture That You Can Reuse", in Architectural Design of Multi-Agent Systems: Technologies and Techniques, 2007 2006(1 publication) [publication]Tixeuil, S. and Silva, L. and Hoarau, W. . , "Advanced Research on Grid Computing", in Fault-Injection and Dependability Benchmarking for Grid Computing Middleware, 2006 1999(2 publications) [publication]Silva, L. , "Parallel Programming Paradigms", in High Performance Cluster Computing: The Programming and Application Issue, vol. 2, 1999 [publication]Silva, L. , "Web-based Parallel Computing with Java", in High Performance Cluster Computing: The Programming and Application Issues, vol. 2, 1999 Tech Report 2007(1 publication) [publication]Silva, L. , "Reputation-based trust management systems and their applicability to grids", 2007 2005(1 publication) [publication]Domingues, P. and Marques, P. and Silva, L. , "Resources Usage of Windows Computer Laboratories (technical report)", 2005