Journal Articles 2011(1 publication) [publication]Araujo, F. and Farinha, J. and Domingues, P. and Silaghi, G.C. and Kondo, D. , "A maximum independent set approach for collusion detection in voting pools", Journal of Parallel and Distributed Computing, 2011 [citation][year=2015]A job server for parallel and concurrent execution of Möbius simulators R Wright - 2015 - ideals.illinois.edu Möbius is an extensible modeling environment used to validate the reliability, availability, security, and performance of computer systems. It provides graphical editors through which users can construct system models or compositions of several models, and it provides ... Related articles All 3 versions Cite Save [citation][year=2014][PDF] GroupTie: toward hidden collusion group discovery in app stores Z Xie, S Zhu - Proceedings of the 2014 ACM conference on Security …, 2014 - cse.psu.edu ABSTRACT The current centralized application (or app) markets provide convenient ways to distribute mobile apps. Their vendors maintain rating systems, which allow customers to leave ratings and reviews. Since positive ratings and reviews can lead to more downloads ... Cite Save More [citation][year=2014][PDF] from illinois.edu [PDF] A JOB SERVER FOR PARALLEL AND CONCURRENT EXECUTION OF MOBIUS SIMULATORS RJ WRIGHT - perform.illinois.edu ABSTRACT Möbius is an extensible modeling environment used to validate the reliability, availability, security, and performance of computer systems. It provides graphical editors through which users can construct system models or compositions of several models, and ... Cite Save More [citation][year=2014]The Effectiveness of Reputation-based Voting for Collusion Tolerance in Large-Scale Grids M Essaaidi, A Bendahmane, A El Moussaoui, Y Ali - ieeexplore.ieee.org Abstract—Large scale grids permit to share grid resources spread over different autonomous administrative sites in the internet. The rapid progress of grid systems opens the door for numerous companies to adopt this technology in their business development. ... Cite Save [citation][year=2013]Watanabe, Kan and Fukushi, Masaru and Funabiki, Nobuo and Nakanishi, Toru, ”Performance Evaluation of Check-By-Voting for Colluding Attack in Volunteer Computing Systems”, AENG Transactions on Engineering Technologies, pp. 33-48, 2013, Springer. [citation][year=2013]Watanabe, Kan and Funabiki, Nobuo and Nakanishi, Toru and Fukushi, Masaru, ”Optimal Spot-Checking for Delayed Attack on Desktop Grid Systems”, UKSim, pp. 600-605, 2013. [citation][year=2012][PDF] http://www.iaeng.org/publication/IMECS2012/IMECS2012_pp1658-1663.pdf Kan Watanabe, Nobuo Funabiki, Toru Nakanishi and Masaru Fukushi, "Modeling and Performance Evaluation of Colluding Attack in Volunteer Computing Systems", Proceedings of the International MultiConference of Engineers and Computer Scientists 2012, Vol. II, IMECS 2012, March 14-16, 2012, Hong Kong. [citation][year=2012]Toktam Ghafarian, Hossein Deldari, Bahman Javadi, Mohammad H. Yaghmaee, Rajkumar Buyya, ”CycloidGrid: A proximity-aware P2P-based resource discovery architecture in volunteer computing systems”, Future Generation Computer Systems, ISSN 0167-739X, 10.1016/j.future.2012.08.010, 2012. 2009(1 publication) [publication]Silaghi, G.C. and Araujo, F. and Silva, L. and Domingues, P. and Arenas, A.E. , "Defeating colluding nodes in desktop grid computing platforms", Journal of Grid Computing, vol. 7, pp. 555-573, 2009 [citation][year=2014][PDF] Reliable peer-to-peer computing system M ZOCHNIAK, B SAWICKI - red.pe.org.pl Abstract. Paper discuss a heterogeneous, distributed computing system commonly referred as a volunteer computing. Mechanism of determining correctness of results, based on replication and trust modeling, is proposed. In presented solution owners of computational ... Cited by 1 Related articles All 4 versions Cite Save More [citation][year=2014]The Effectiveness of Reputation-based Voting for Collusion Tolerance in Large-Scale Grids M Essaaidi, A Bendahmane, A El Moussaoui, Y Ali - ieeexplore.ieee.org Abstract—Large scale grids permit to share grid resources spread over different autonomous administrative sites in the internet. The rapid progress of grid systems opens the door for numerous companies to adopt this technology in their business development. ... Cite Save Create alert [citation][year=2013]Algorithmic Mechanisms for Reliable Internet-based Computing under Collusion http://arxiv.org/abs/1307.1650 AF Anta, C Georgiou, MA Mosteiro arXiv preprint arXiv:1307.1650 2013 arxiv.org [citation][year=2012]Xu Ling, ”Security Mechanisms for Distributed Computing Systems”, PhD Thesis, Tohoku University, 2012. (http://hdl.handle.net/10097/53937) [citation][year=2011]Gianluca Ciccarelli, Renato Lo Cigno, Collusion in peer-to-peer systems, Computer Networks, Volume 55, Issue 15, 27 October 2011, pp 3517-3532, ISSN 1389-1286, 10.1016/j.comnet.2011.06.028. [citation][year=2011]Canon, L., Jeannot, E., Weissman, J., "A Scheduling and Certification Algorithm for Defeating Collusion in Desktop Grids", 31st International Conference on Distributed Computing Systems (ICDCS), pp 343-352, 2011 [citation][year=2010]REPORTS ON SYSTEMS AND COMMUNICATIONS http://gsyc.es/tr-docs/RoSaC-2010-1.pdf AF Anta, A Milani, MA Mosteiro, S Zaks - http://gsyc.es/tr-docs/RoSaC-2010-1.pdf [citation][year=2010]Safety in Numbers http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=ADA532995 D Melski, D Cok, J Phillips, S Wisniewski, SH Yong… Publication/NA 2010 [citation][year=2010]L.-C. Canon. Coping with uncertainty in scheduling problems. In {em Parallel Distributed Processing, Workshops and Phd Forum (IPDPSW), 2010 IEEE International Symposium on}, pages 1 --4, April 2010. [citation][year=2010]L.-C. Canon, E.~Jeannot, and J.~Weissman. A dynamic approach for characterizing collusion in desktop grids. In {em Parallel Distributed Processing (IPDPS), 2010 IEEE International Symposium on}, pages 1 --12, April 2010. [citation][year=2010]{L}ouis-{C}laude {C}anon, {E}mmanuel {J}eannot, and {J}on {W}eissman. {A} {S}cheduling {A}lgorithm for {D}efeating {C}ollusion. Research Report {RR}-7403, INRIA, 10 2010. [citation][year=2010]Eugen Staab. {em Reliable Information Acquisition in the Presence of Malicious Sources}. PhD thesis, University of Luxembourg, April 2010. Online Version, 2010-04-22. [citation][year=2010]Canon, L.C., “Outils et algorithmes pour gérer l’incertitude lors de l’ordonnancement d’application sur plateformes distribuées”, PhD Thesis, Université Henri Poincarré – Nancy 1, France, 2010. [citation][year=2009]Eugen Staab and Thomas Engel. Collusion detection for grid computing. In Franck Cappello, Cho-Li Wang, and Rajkumar Buyya, editors, {\em Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid CCGrid '09)}, pages 412--419. IEEE Computer Society, May 2009. [citation][year=2009]Kan Watanabe, Masaru Fukushi, and Susumu Horiguchi. Collusion-resistant sabotage-tolerance mechanisms for volunteer computing systems. e-Business Engineering, IEEE International Conference on, 0:213--218, 2009. [citation][year=2008]Eugen Staab, Volker Fusenig, and Thomas Engel. Using correlation for collusion detection in grid settings, 2008. 2007(1 publication) [publication]Domingues, P. and Silva, L. and Sousa, B. , "Sabotage-Tolerance and Trust Management in Desktop Grid Computing", Journal on Future Generation Computer Systems, vol. 23, 2007 [citation][year=2015]Pareek, Gaurav, Chetanya Goyal, and Mukesh Nayal. "A Result Verification Scheme for MapReduce Having Untrusted Participants." Intelligent Distributed Computing. Springer International Publishing, 2015. 11-19. [citation][year=2014]Wang, Yongzhi, Jinpeng Wei, and Yucong Duan. "Securing MapReduce Result Integrity via Verification-based Integrity Assurance Framework." International Journal of Grid & Distributed Computing 7.6 (2014). [citation][year=2014]Essaaidi, Mohamed, et al. "The Effectiveness of Reputation-based Voting for Collusion Tolerance in Large-Scale Grids.", 2014. [citation][year=2014]Mehta, Hemant Kumar, and Rohit Ahuja. "A Holistic Trust Management Leasing Algorithm for IaaS Cloud." International Journal of Systems and Service-Oriented Engineering (IJSSOE) 4.2 (2014): 1-12. [citation][year=2014]McGilvary, Gary Andrew. "Ad hoc cloud computing." (2014). [citation][year=2014]ZOCHNIAK, Micha?, and Bartosz SAWICKI. "Reliable peer-to-peer computing system." Przeglad Elektrotechniczny (2014). [citation][year=2013]Christoforou, Evgenia and Anta, Antonio Fernandez and Georgiou, Chryssis and Mosteiro, Miguel A et al., ”Reputation-based Mechanisms for Evolutionary Master-Worker Computing”,arXiv preprint arXiv:1307.2783, 2013. [citation][year=2013]Muszynski, Jakub and Varrette, Sébastien and Bouvry, Pascal, ”Expected running time of parallel evolutionary algorithms on unimodal pseudo-boolean functions over small-world networks”, IEEE Congress on Evolutionary Computation (CEC), pp. 2588-2594, 2013. [citation][year=2013]Watanabe, Kan and Fukushi, Masaru and Funabiki, Nobuo and Nakanishi, Toru,”Performance Evaluation of Check-By-Voting for Colluding Attack in Volunteer Computing Systems”, IAENG Transactions on Engineering Technologies, pp.33-48, 2013. [citation][year=2013]Watanabe, Kan and Funabiki, Nobuo and Nakanishi, Toru and Fukushi, Masaru, ”Optimal Spot-Checking for Delayed Attack on Desktop Grid Systems”, UKSim, pp.600-605, 2013. [citation][year=2012]Kan Watanabe, Nobuo Funabiki, Toru Nakanishi and Masaru Fukushi, ”Modeling and Performance Evaluation of Colluding Attack in Volunteer Computing Systems”, Proceedings of the International MultiConference of Engineers and Computer Scientists 2012, Vol. II, IMECS 2012, March 14-16, 2012, Hong Kong. [citation][year=2012]Silaghi C. Gheorghe, Dependable Resource Management Tools towards Automated Collaboration in Heterogeneous Computing Environments, Habilitation Thesis, Babes Bolyai University, Romenia, 2012. [citation][year=2012]Christoforou, Evgenia and Fernández Anta, Antonio and Georgiou, Chryssis and Mosteiro, Miguel A. Algorithmic Mechanisms for Reliable Master-Worker Internet-based Computing. IEEE Transactions on Computers. ISSN 0018-9340, 2012. [citation][year=2012]Fernández Anta, Antonio and Georgiou, Chryssis and López, Luis and Santos, Agustin (2012) Reliable Internet-based Master-Worker Computing in the Presence of Malicious Workers. Parallel Processing Letters, 22 (1). [citation][year=2012]Bendahmane, Ahmed and Essaaidi, Mohammad and Younes, Ali et al., ”A new mechanism to ensure integrity for MapReduce in cloud computing”, 2012 International Conference on Multimedia Computing and Systems (ICMCS), pp 785–790, 2012. [citation][year=2012]Bendahmane, Ahmed and Essaaidi, Mohammad and Moussaoui, Ahmed El and Younes, Ali, ”Result verification mechanism for MapReduce computation integrity in cloud computing”, 2012 International Conference on Complex Systems (ICCS), 2012. [citation][year=2012]W Viriyasitavat, A Martin, "A survey of trust in workflows and relevant contexts", Communications Surveys & Tutorials, 2012 [citation][year=2012]Y Cui, M Li, Y Xiang, Y Ren et al. "A QoS-based fine-grained reputation system in the grid environment", 2012, Wiley. [citation][year=2012]A Mohaisen, "Towards Trustworthy Computing on Social Networks: Measurements and New Applications" [citation][year=2012]A Bendahmane, M Essaaidi et al., "A new mechanism to ensure integrity for MapReduce in cloud computing" [citation][year=2012]A Bendahmane, M Essaaidi et al., "Result verification mechanism for MapReduce computation integrity in cloud computing" [citation][year=2012]AJ Sánchez-Santiago, "Planificación local de tareas con sistemas basados en reglas borrosas. Aplicación a la detección de defectos en tableros de fibra" [citation][year=2011]K., Watanabe, and Fukushi, M. and Kameyama, M., “Adaptive Group-Based Job Scheduling for High Performance and Reliable Volunteer Computing”, Journal of Information Processing, volume 19, pp. 39-51, 2011 [citation][year=2011]Moca, M.; Silaghi, G.C.; Fedak, G.;Babes-Bolyai , “Distributed results checking for MapReduce in volunteer computing”, Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium o. May 2011. (DOI: 10.1109/IPDPS.2011.351) [citation][year=2011]Yongzhi Wang, Jinpeng Wei, "VIAF: Verification-Based Integrity Assurance Framework for MapReduce", Cloud Computing (CLOUD), 2011 IEEE International Conference on. DOI: 10.1109/CLOUD.2011.33 [citation][year=2011]Hailong Sun, Jinpeng Huai, Xudong Liu, Jing Li, “RECON: a novel approach to fighting unreliability in peer-to-peer grids”, International Journal of Grid and Utility Computing (ISSN:1741-847X), pp 77-84, Volume 2, Number 2/2011, DOI: 10.1504/IJGUC.2011.040595 (http://inderscience.metapress.com/content/7w548p44225284w6/) [citation][year=2011]Viriyasitavat, W. Martin, A., "A Survey of Trust in Workflows and Relevant Contexts", Communications Surveys & Tutorials, IEEE, pp 1-30, Issue 99, 2011, DOI: 10.1109/SURV.2011.072811.00081 [citation][year=2011]Wander, M.; Weis, T.; Wacker, A.; “Detecting Opportunistic Cheaters in Volunteer Computing”, Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), 2011, pp 1-6, DOI: 10.1109/ICCCN.2011.6006040 [citation][year=2011]Bendahmane, A.; Essaaidi, M.; Moussaoui, A.E.; Younes, A., "Tolerating malicious resources to ensure safe computations in grid systems", 2011 International Conference on Multimedia Computing and Systems (ICMCS), DOI: 10.1109/ICMCS.2011.5945679 [citation][year=2011]Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim, “SocialCloud: Using Social Networks for Building Distributed Computing Services”, CoRR, 2011. [citation][year=2011]Viriyasitavat, W.; Martin, A.; , "A Survey of Trust in Workflows and Relevant Contexts," Communications Surveys & Tutorials, IEEE , vol.PP, no.99, pp.1-30, 2011. (doi:10.1109/SURV.2011.072811.00081) [citation][year=2010]Junseok Hwang, Jihyoun Park, Jorn Altmann, “Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods”, in book “Information Systems, Technology and Management”, pp 187-197, 2010. [citation][year=2010]Wang, Y., Nakao, A., “Poisonedwater: An improved approach for accurate reputation ranking in P2P networks” Future Generation Computer Systems, volume 26, issue 8, year 2010, pp. 1317 – 1326. [citation][year=2010]Papaioannou, T.G., Stamoulis, G.D, “coverReputation-based estimation of individual performance in collaborative and competitive grids”, Future Generation Computer Systems, volume 26, issue 8, pp. 1327 – 1335, 2010. [citation][year=2010]Bernard, Y., Klejnowski, L., Hahner, J., Muller-Schloer, C., “Towards trust in desktop grid systems”, Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 637—642, 2010. [citation][year=2010]Choi, S.J. and Buyya, R., “Group-based adaptive result certification mechanism in Desktop Grids”, Future Generation Computer Systems, volume 26, issue 5, pp. 776—786, 2010. [citation][year=2010]Bendahmane, A., Essaaidi, M., El Moussaoui, A., Younes, A., “Compromised Resources Tolerance in Grid Computing Systems”, Intelligent Distributed Computing IV, pp. 145—154, 2010. [citation][year=2010]Antonopoulos, N., Rana, O.F., “Management and optimisation of P2P and Grid systems with network economics”, Future Generation Computer Systems, volume 26, issue 8, pp. 1282—1284, 2010. [citation][year=2010]Canon, Louis-Claude, Jeannot, Emmanuel, Weissman, Jon, “A Scheduling Algorithm for Defeating Collusion”, Research Report, INRIA, RR-7403, October 2010 [citation][year=2010]Hwang, J. and Kim, H.J. and Park, J., “Managing risks in an open computing environment using mean absolute deviation portfolio optimization”, Future Generation Computer Systems, volume 26, issue 8, pp. 1381-1390, 2010 [citation][year=2010]Hwang, J. and Park, J. and Altmann, J., “Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods”, Information Systems, Technology and Management, pp. 187-197, 2010 [citation][year=2010]Canon, L.C. and Jeannot, E. and Weissman, J., “A Scheduling Algorithm for Defeating Collusion”, 2010 [citation][year=2010]Bendahmane, A. and Essaaidi, M. and El Moussaoui, A. and Younes, A., “Reputation-based Majority Voting for Malicious Grid Resources Tolerance”, Scalable Computing, pp. 385, 2010. [citation][year=2010]Canon, L.C., “Outils et algorithmes pour gérer l’incertitude lors de l’ordonnancement d’application sur plateformes distribuées”, PhD Thesis, Université Henri Poincarré – Nancy 1, France, 2010. [citation][year=2010]Bendahmane, Mohammad Essaaidi, Ahmed El Moussaoui, Ali Younes, "Reputation-based Majority Voting for Malicious Grid Resources Tolerance", Ahmed Scientific International Journal for Parallel and Distributed Computing, Vol 11, No 4 (2010) - (http://www.scpe.org/index.php/scpe/article/view/669) [citation][year=2010]K Watanabe, M Fukushi, S Horiguchi, “Expected-Credibility-Based Job Scheduling for Reliable Volunteer Computing”, IEICE TRANSACTIONS on Information and Systems 93(2), pp 306-314, 2010. [citation][year=2010]K Watanabe, M Fukushi, “Generalized Spot-Checking for Reliable Volunteer Computing”, IEICE TRANSACTIONS on Information and Systems 93(12), pp 3164-3172, 2010. [citation][year=2010]F. Taoab, Y. Hub, D. Zhaoc, Z. Zhoub, “Study of failure detection and recovery in manufacturing grid resource service scheduling”, International Journal of Production Research 48(1), pp 69-94, 2010. doi:10.1080/00207540802275871 [citation][year=2010]K Watanabe, M Fukushi, S Horiguchi, “Generalized Spot-Checking for Sabotage-Tolerance in Volunteer Computing Systems”, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp 655-660, 2010. [citation][year=2010]Y. Bernard, L. Klejnowski, J. Hahner, C. Muller-Schloer, “Towards Trust in Desktop Grid Systems”, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp 637-642, 2010. [citation][year=2010]F. Georgatos, V. Gkamas, A. Ilias, G. Kouretis, E. Varvarigos, “A Grid-enabled CPU Scavenging Architecture and a Case Study of its Use in the Greek School Network”, Journal of Grid Computing 8(1), pp 61-75, 2010. [citation][year=2009]J. Hwang, H.J. Kim, J. Park “Managing risks in an open computing environment using mean absolute deviation portfolio optimization”, Future Generation Computer Systems, 2009. [citation][year=2009]Y. Wang, A. Nakao, “Poisonedwater: An improved approach for accurate reputation ranking in P2P networks”, Future Generation Computer Systems, 2009. [citation][year=2009]Ana Cristina Oliveira, Lívia Sampaio, Stênio Flávio Fernandes, Francisco Brasileiro, "Adaptive Sabotage-Tolerant Scheduling for Peer-to-Peer Grids," ladc, pp.25-32, 2009 Fourth Latin American Symposium on Dependable Computing, 2009 [citation][year=2009]S.J. Choi, R. Buyya, “Group-based adaptive result certification mechanism in Desktop Grids”, Future Generation Computer Systems, 2009. [citation][year=2009]T.G. Papaioannou, G.D. Stamoulis, “Reputation-based estimation of individual performance in collaborative and competitive grids”, Future Generation Computer Systems, 2009. [citation][year=2009]K Watanabe, M Fukushi, S Horiguchi, “Optimal Spot-checking for Computation Time Minimization in Volunteer Computing”, Journal of Grid Computing 7(4), pp 575-600, 2009. [citation][year=2009]W. Wei, J. Du, T. Yu, X. Gu, “SecureMR: A Service Integrity Assurance Framework for MapReduce”, Proceedings of the 2009 Annual Computer Security Applications Conference, pp 73-82, 2009. [citation][year=2009]K Watanabe, M Fukushi, S Horiguchi, “Collusion-Resistant Sabotage-Tolerance Mechanisms for Volunteer Computing Systems”, 2009 IEEE International Conference on e-Business Engineering, pp. 213-218, 2009. [citation][year=2009]J. Hwang, , H.J. Kim, J. Park, “Managing risks in an open computing environment using mean absolute deviation portfolio optimization”, Future Generation Computer Systems, 2009. [citation][year=2009]Oliveira, A.C. and Sampaio, L. and Fernandes, S.F. and Brasileiro, F., “Adaptive Sabotage-Tolerant Scheduling for Peer-to-Peer Grids”, 2009 Fourth Latin-American Symposium on Dependable Computing, pp. 25-32, 2009 [citation][year=2008]Constantinescu-Fuløp, Zoran, "A Desktop Grid Computing Approach for Scientific Computing and Visualization?, PhD Thesis, Norwegian University of Science and Technology, May 2008 [citation][year=2008]Syed Naqvi, Stephane Mouton, Philippe Massonet, Gheorghe Cosmin Silaghi, Dominic Battré, Matthias Hovestadt, Karim Djemame, "Using SLA- Based Approach To Handle Sabotage Tolerance In The Grids?, From Grids to Service and Pervasive Computing, pp 153 162, Thierry Priol and Marco Vanneschi (eds), Springer-Verlag, ISBN: 978-0-387-09454-0, 2008. Conference Articles 2011(1 publication) [publication]Ferreira, D. and Araujo, F. and Domingues, P. , "libboincexec: A generic virtualization approach for the BOINC middleware", in 5th Workshop on Desktop Grids and Volunteer Computing Systems (PCGrid 2011), 2011 [citation][year=2014]A scalable blackbox-oriented e-learning system based on desktop grid over private cloud LP Chen, JA Lin, KC Li, CH Hsu, ZX Chen - Future Generation Computer …, 2014 - Elsevier Abstract Traditional web-based e-learning system suffers from unstable workloads and security risks of incorporating external executable objects to servers. This paper addresses these issues with emerging technologies, as desktop grid and cloud computing. Learning ... Related articles Cite Save [citation][year=2014][PDF] from ed.ac.uk Ad hoc cloud computing GA McGilvary - 2014 - era.lib.ed.ac.uk Commercial and private cloud providers offer virtualized resources via a set of co-located and dedicated hosts that are exclusively reserved for the purpose of offering a cloud service. While both cloud models appeal to the mass market, there are many cases where ... Cite Save [citation][year=2014]The Cost of Virtualization Implementation in Volunteer Computing M Anjomshoa, M Salleh, MP Kermani - ieeexplore.ieee.org Abstract—The advantages of using virtualization can be impaired if it can not deliver sufficient performance. Running applications in virtualized environment incur performance overheads regarding to the virtualization functionalities like initialization virtual machine ... Cite Save [citation][year=2013]14811620328353250200 V-BOINC: The Virtualization of BOINC http://arxiv.org/abs/1306.0846 GA McGilvary, A Barker, A Lloyd, M Atkinson arXiv preprint arXiv: … 2013 arxiv.org [citation][year=2012]14811620328353250200 Towards a volunteer cloud system http://www.sciencedirect.com/science/article/pii/S0167739X12000660 A Marosi, J Kovács, P Kacsuk Future Generation Computer Systems 2012 Elsevier 2010(1 publication) [publication]Ferreira, D. and Araujo, F. and Domingues, P. , "Custom execution environments in the BOINC middleware", in 4th Iberian Grid Infrastructure Conference (IBERGRID 2010), 2010 2009(2 publications) [publication]Domingues, P. and Araujo, F. and Silva, L. , "Evaluating the Performance and Intrusiveness of Virtual Machines for Desktop Grid Computing", in 3rd Workshop on Desktop Grids and Volunteer Computing Systems (PCGrid 2009), 2009 [citation][year=2016]Evaluating performance degradation in NoSQL databases generated by virtualization G Martins, P Bezerra, R Gomes… - … 2015 Latin American, 2015 - ieeexplore.ieee.org Abstract-There are many services in Cloud Systems currently on the market for hosting servers with different purposes. These environments are IT infrastructures frequently deployed in large data centers using Virtual Machines. Moreover, an increasing number of ... Cite Save [citation][year=2016]Harvesting idle CPU resources for desktop grid computing while limiting the slowdown generated to end-users E Rosales, G Sotelo, A de la Vega, CO Díaz… - Cluster …, 2015 - Springer Abstract We address the challenge of both harvesting idle CPU resources on off-the-shelf desktops donated to Desktop Grid Computing while at once limiting the slowdown generated to the resource owner, also known as end-user, to customized values. In this ... Cite Save [citation][year=2014]DS-VBF: Dual sink vector-based routing protocol for underwater wireless sensor network KM Pouryazdanpanah, M Anjomshoa… - Control and System …, 2014 - ieeexplore.ieee.org Abstract—Underwater wireless sensor networks (UWSNs) have become the seat of researchers' attention recently due to their proficiency to explore underwater areas and design different applications for marine discovery and oceanic surveillance. One of the ... Cite Save [citation][year=2014]Implications of CPU Dynamic Performance and Energy-Efficient Technologies on the Intrusiveness Generated by Desktop Grids Based on Virtualization G Sotelo, E Rosales, H Castro - High Performance Computing, 2014 - Springer Abstract We evaluate how dynamic performance and energy-efficient technologies, as features introduced in modern processor architectures, affect the intrusiveness that Desktop Grids based on virtualization generate on desktops. Such intrusiveness is defined as ... Cite Save [citation][year=2014][PDF] from ed.ac.uk Ad hoc cloud computing GA McGilvary - 2014 - era.lib.ed.ac.uk Commercial and private cloud providers offer virtualized resources via a set of co-located and dedicated hosts that are exclusively reserved for the purpose of offering a cloud service. While both cloud models appeal to the mass market, there are many cases where ... Cite Save [citation][year=2014]The Cost of Virtualization Implementation in Volunteer Computing M Anjomshoa, M Salleh, MP Kermani - ieeexplore.ieee.org Abstract—The advantages of using virtualization can be impaired if it can not deliver sufficient performance. Running applications in virtualized environment incur performance overheads regarding to the virtualization functionalities like initialization virtual machine ... Cite Save [citation][year=2014][PDF] from ual.es [CITATION] Gestión de la información espacial en sistema P2P J Vallecillos Ruiz - 2014 - repositorio.ual.es Resumen—La gestión de datos espaciales es útil hoy en d?a en muchos campos de aplicación, tales como la geociencia, CAD, la robótica o la protección del medio ambiente por mencionar algunos. Tratar con este tipo de datos (puntos, l?neas, pol?gonos, regiones, ... Cite Save [citation][year=2013]McGilvary, Gary A and Barker, Adam and Lloyd, Ashley and Atkinson, Malcolm, ”V-BOINC: The Virtualization of BOINC”, Proceedings of the 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2013), 2013. [citation][year=2013]Open-source virtualization : Functionality and performance of Qemu/KVM, Xen, Libvirt and VirtualBox [citation][year=2013]Opsahl, Jan Magnus Granberg Master thesis Date: 2013 Permanent link: http://urn.nb.no/URN:NBN:no-39029 Show full item record [citation][year=2012]Liang, Jhe-Ming and Zhan, Ren-Hao and Chen, Wei-Mei, ”Dynamic power scheduling for VM-based multi-core systems”, Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th InternationalConference on, pp. 379-386, 2012. [citation][year=2012]Tómasson, Gromur and Sigurórsson, Hlynur and Jónsson, Björn ór and Amsaleg, Laurent, ”TECHNICAL REPORT/RUTR-CS12002”, Reykjavik University, Iceland, ISSN 1670-5777, 2012. [citation][year=2012][PDF] ftp://www.kom.tu-darmstadt.de/papers/LMR+12.pdf Ulrich Lampe, André Miede, Nils Richerzhagen, Dieter Schuller, Ralf Steinmetz, "THE VIRTUAL MARGIN OF ERROR - On the Limits of Virtual Machines in Scientific Research". In: Frank Leymann, Ivan Ivanov, Marten van Sinderen: Proceedings of the 2nd International Conference on Cloud Computing and Services Science (CLOSER 2012), April 2012. [citation][year=2011]David Day, Benjamin Burns, "A Performance Analysis of Snort and Suricata Network Intrusion Detection and Prevention Engines", pp 187-192, ICDS 2011, The Fifth International Conference on Digital Society, 2011. [citation][year=2010]Shang, Ling, "Experiences et paradigmes de programmation pour calcul scientifique à grande échelle sur les grilles, les grilles de PC et les nuages informatique privés", PhD Thesis, Université Lille 1, France, 2010. [citation][year=2010]Rasmus Andersen and Brian Vinter, "Performance and Portability of the SciBy Virtual Machine", "2010 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises", pp. 252-257, 2010.(eScience Centre, University of Copenhagen, Copenhagen, Denmark) [citation][year=2010]Shang, L. and Petiton, S. and Emad, N. and Yang, X., " YML-PC: A Reference Architecture Based on Workflow for Building Scientific Private Clouds", Cloud Computing: Principles, Systems and Applications, Computer Systems and Networks, pp. 145-162, Springer, 2010. DOI: http://dx.doi.org/10.1007/978-1-84996-241-4_9 [citation][year=2010]Johannes Morgenroth, Sebastian Schildt, Lars Wolf. 2010. “HYDRA: virtualized distributed testbed for DTN simulations”. In Proceedings of the fifth ACM international workshop on Wireless network testbeds, (WiNTECH '10). ACM, pp. 71-78. DOI=10.1145/1860079.1860092 http://doi.acm.org/10.1145/1860079.1860092 [citation][year=2009]Carlos Pérez-Miguel, José Miguel-Alonso y Alexander Mendiburu, "Informe sobre Sistemas de Computación en Redes P2P", Technical Report EHU-KAT-IK-04-09, UPV/EHU, 2009 (http://www.sc.ehu.es/ccwbayes/members/cperezmig/pubs/p2p.pdf) [publication]Araujo, F. and Santiago, D. and Ferreira, D. and Farinha, J. and Silva, L. and Domingues, P. and Urbah, E. and Lodygensky, O. and Marosi, A. and Gombás, G. and Balaton, Z. and Farkas, Z. and Kacsuk, P. , "Monitoring the EDGeS Project Infrastructure", in 3rd Workshop on Desktop Grids and Volunteer Computing Systems (PCGrid 2009), 2009 [citation][year=2014]An effective monitoring framework and user interface design TY Chen, HL Yeh, HW Wei, M Sun… - Software: Practice …, 2014 - Wiley Online Library SUMMARY A distributed environment requires a monitoring system to oversee the operation of various distributed nodes. A monitoring service is crucial because it ensures a high- quality computing environment and a reliable service. The interface and framework ... Related articles Cite Save 2008(2 publications) [publication]Araujo, F. and Domingues, P. and Kondo, D. and Silva, L. , "Using cliques of nodes to store desktop grid checkpoints", in Coregrid Integration Workshop, 2008 [citation][year=2012]Ahmad Al-Shishtawy, ”Self-Management for Large-Scale Distributed Systems”, PhD Thesis, KTH School of Information and Communication Technology, Stockholm, Sweden, 2012. [citation][year=2010]Fedak, G., “Recent Advances and Research Challenges in Desktop Grid and Volunteer Computing", Grids, P2P and Services Computing, pp. 171-185, 2010 [citation][year=2009]Hóglund, J. and Al-Shishtawy, A. and Parlavantzas, N., “D1. 5: Full Specification & Final Prototypes of Overlay Services”, 2009 [citation][year=2008]Ahmad Al-Shishtawy, Joel Höglund, Konstantin Popov, Nikos Parlavantzas, Vladimir Vlassov, Per Brand, "Enabling Self-Management Of Component Based Distributed Applications?, From Grids to Service and Pervasive Computing, pp 163 174, Thierry Priol and Marco Vanneschi (eds), Springer-Verlag, ISBN: 978-0-387-09454-0, 2008 [citation][year=2008][PDF] D1. 5: Full Specification & Final Prototypes of Overlay Servicesgrid4all.eu [PDF] D Level - grid4all.eu Page 1. Project no. 034567 Grid4All Specific Targeted Research Project (STREP) Thematic Priority 2: Information Society Technologies D1.5: Full Specification & Final Prototypes of Overlay Services Due date of deliverable: 1st December 2008. ... Related articles - View as HTML [publication]Silaghi, G.C. and Araujo, F. and Domingues, P. and Silva, L. and Arenas, A.E. , "Defeating Colluding Nodes in Desktop Grid Computing Platforms", in Workshop on Desktop Grids and Volunteer Computing Systems (PCGrid 2008), 2008 [citation][year=2015][HTML] Algorithmic Mechanisms for Reliable Crowdsourcing Computation under Collusion AF Anta, C Georgiou, MA Mosteiro, D Pareja - PloS one, 2015 - dx.plos.org Abstract We consider a computing system where a master processor assigns a task for execution to worker processors that may collude. We model the workers' decision of whether to comply (compute the task) or not (return a bogus result to save the computation cost) as ... Cited by 1 Related articles All 9 versions Cite Save More [citation][year=2015][PDF] from inria.fr Contributions to Desktop Grid Computing G Fedak - 2015 - hal.inria.fr Since the mid 90's, Desktop Grid Computing-ie the idea of using a large number of remote PCs distributed on the Internet to execute large parallel applications-has proved to be an efficient paradigm to provide a large computational power at the fraction of the cost of a ... Cite Save [citation][year=2015]Virtual Screening in a Desktop Grid: Replication and the Optimal Quorum I Chernov, N Nikitina - Parallel Computing Technologies, 2015 - Springer Abstract We propose a mathematical model of a desktop grid computing system that solves tasks with two possible answers. Replication is used in order to reduce the error risk: wrong answers are returned with some known probabilities and penalty is added to the ... Cited by 2 Cite Save [citation][year=2015]A MapReduce-based algorithm for parallelizing collusion detection in Hadoop M Mortazavi, BT Ladani - Information and Knowledge …, 2015 - ieeexplore.ieee.org Abstract—MapReduce as a programming model for parallel data processing has been used in many open systems such as cloud computing and service-oriented computing. Collusive behavior of worker entities in MapReduce model can violate integrity concern of open ... Cite Save [citation][year=2013]@article{DBLP:journals/corr/AntaGM13, author = {Antonio Fern{\'a}ndez Anta and Chryssis Georgiou and Miguel A. Mosteiro}, title = {Algorithmic Mechanisms for Reliable Internet-based Computing under Collusion}, journal = {CoRR}, volume = {abs/1307.1650}, year = {2013}, ee = {http://arxiv.org/abs/1307.1650}, bibsource = {DBLP, http://dblp.uni-trier.de} } [citation][year=2010]Eugen Staab, “Reliable Information Acquisition in the Presence of Malicious Sources”, PhD Thesis, University of Luxembourg, Luxembourg, April 2010 [citation][year=2010]Canon, L.C. and Jeannot, E. and Weissman, J.,” A Scheduling Algorithm for Defeating Collusion”, 2010 [citation][year=2010]Canon, L.C., “Coping with uncertainty in scheduling problems”, Parallel & Distributed Processing, Workshops and PhD Forum (IPDPSW), 2010 IEEE International Symposium on, pp.1-4, 2010 [citation][year=2010]Melski, D., “Safety in Numbers”, 2010 [citation][year=2010]Canon, L.C. and Jeannot, E. and Weissman, J., "A Dynamic Approach for Characterizing Collusion in Desktop Grids", Proceedings of the 2010 IEEE International Parallel and Distributed Processing (IPDPS), 2010 [citation][year=2010]Canon, L.C., “Outils et algorithmes pour gérer l’incertitude lors de l’ordonnancement d’application sur plateformes distribuées”, PhD Thesis, Université Henri Poincarré – Nancy 1, France, 2010 [citation][year=2009]Collusion detection for grid computinguni.lu [PDF] E Staab, T Engel - Proceedings of the 2009 9th IEEE/ACM ?, 2009 - portal.acm.org A common technique for result verification in grid com- puting is to delegate a computation redundantly to different workers and apply majority voting to the returned results. However, the technique is sensitive to "collusion? where a majority of malicious workers collectively returns the ... Cited by 3 - Related articles - All 4 versions [citation][year=2008][PDF] ►Using correlation for collusion detection in grid settings E Staab, V Fusenig, T Engel - wiki.uni.lu Eugen Staab, Volker Fusenig and Thomas Engel ... Faculty of Sciences, Technology and Communication University of Luxembourg 6, rue R. Coudenhove-Kalergi 1359 Luxembourg Luxembourg ... Using Correlation for ... Cited by 2 - Related articles - View as HTML - Web Search [citation][year=2008][PDF] ►Grid Architectural Issues: State-of-the-art and Future Trends A Andrzejak, C Mastroianni, P Fragopoulou, D Kondo ? - coregrid.net 1 Zuse-Institute Berlin, Takustr. 7, 14195 Berlin, Germany andrzejak@zib.de 2 ICAR-CNR Via P. Bucci 41C, 87036 Rende (CS) Italy mastroianni@dns.icar.cnr.it 3 Foundation for Research and Technology-Hellas, Institute of Computer ... Related articles - View as HTML - Web Search [citation][year=2008][PDF] ►Collusion Detection E Staab - wiki.uni.lu Page 1. Collusion Detection For Acquisition of Unverifiable Information Eugen Staab University of Luxembourg eugen.staab@uni.lu SECAN-Lab day Amneville-Les-Thermes, France, June 30, 2008 Page 2. ... Related articles - View as HTML - Web Search   2007(3 publications) [publication]Kondo, D. and Araujo, F. and Malecot, P. and Domingues, P. and Silva, L. and Fedak, G. and Capello, F. , "Characterizing Result Errors in Internet Desktop Grids", in 13th International EuroPar Conference 2007, 2007 [citation][year=2015][HTML] Algorithmic Mechanisms for Reliable Crowdsourcing Computation under Collusion AF Anta, C Georgiou, MA Mosteiro, D Pareja - PloS one, 2015 - dx.plos.org Abstract We consider a computing system where a master processor assigns a task for execution to worker processors that may collude. We model the workers' decision of whether to comply (compute the task) or not (return a bogus result to save the computation cost) as ... Cited by 1 Related articles All 9 versions Cite Save More [PDF] from inria.fr Contributions to Desktop Grid Computing [citation][year=2015]Multi-round Master-Worker Computing: a Repeated Game Approach AF Anta, C Georgiou, MA Mosteiro, D Pareja - arXiv preprint arXiv: …, 2015 - arxiv.org Abstract: We consider a computing system where a master processor assigns tasks for execution to worker processors through the Internet. We model the workers decision of whether to comply (compute the task) or not (return a bogus result to save the computation ... Cite Save [citation][year=2015]Result Verification Scheme with Resource Clustering in Desktop Grids JM Gil, YH Cho, SH Hong - Advanced Multimedia and Ubiquitous …, 2015 - Springer Abstract In desktop grids, it is important to guarantee the verification of task results in the presence of dynamic properties, such as volatility and heterogeneity. To achieve this objective, we propose the result-verification scheme with resource clustering that can ... Related articles All 2 versions Cite Save [citation][year=2015]An implementation of credibility-based job scheduling method in volunteer computing systems S Tani, Y Nogami, M Fukushi - Consumer Electronics-Taiwan ( …, 2015 - ieeexplore.ieee.org Abstract—This paper addresses a job scheduling problem in Volunteer Computing (VC) systems, where some malicious participant may return incorrect results (sabotaging). Credibilitybased job scheduling method, namely ENR-ECJ, is a promising approach to ... Cite Save [citation][year=2015]Virtual Screening in a Desktop Grid: Replication and the Optimal Quorum I Chernov, N Nikitina - Parallel Computing Technologies, 2015 - Springer Abstract We propose a mathematical model of a desktop grid computing system that solves tasks with two possible answers. Replication is used in order to reduce the error risk: wrong answers are returned with some known probabilities and penalty is added to the ... Cited by 2 Cite Save [citation][year=2015]Dynamic Job Scheduling Method Based on Expected Probability of Completion of Voting in Volunteer Computing Y MIYAKOSHI, S YASUDA, K WATANABE… - … on Information and …, 2015 - search.ieice.org This paper addresses the problem of job scheduling in volunteer computing (VC) systems where each computation job is replicated and allocated to multiple participants (workers) to remove incorrect results by a voting mechanism. In the job scheduling of VC, the number ... Cite Save [citation][year=2014]Reputation-Based Mechanisms for Reliable Crowdsourcing Computation E Christoforou, A Fernández Anta, G Chryssis… - 2014 - eprints.networks.imdea.org We consider an Internet-based Master-Worker framework, for machine-oriented computing tasks (ie SETI@ home) or human intelligence tasks (ie Amazon's Mechanical Turk). In this framework a master sends tasks to unreliable workers, and the workers execute and ... Cite Save [citation][year=2014]The Effectiveness of Reputation-based Voting for Collusion Tolerance in Large-Scale Grids M Essaaidi, A Bendahmane, A El Moussaoui, Y Ali - ieeexplore.ieee.org Abstract—Large scale grids permit to share grid resources spread over different autonomous administrative sites in the internet. The rapid progress of grid systems opens the door for numerous companies to adopt this technology in their business development. ... Cite Save [citation][year=2014]A Group Based Replication Mechanism to Reduce the Wastage of Processing Cycles in Volunteer Computing MK Khan, SI Hyder, GU Ahmed, S Begum… - Wireless Personal …, 2014 - Springer Abstract Volunteer Computing is an exciting discipline for high throughput applications but due to inherent resource volatility, several issues arises such as tasks failure due to host/CPU unavailability, results validation etc. Replication is a solution to most of these ... [citation][year=2013]Christoforou, Evgenia and Anta, Antonio Fernandez and Georgiou, Chryssis and Mosteiro, Miguel A et al., ”Reputation-based Mechanisms for Evolutionary Master-Worker Computing”,arXiv preprint arXiv:1307.2783, 2013. [citation][year=2013]Muszynski, Jakub and Varrette, Sébastien and Bouvry, Pascal, ”Expected running time of parallel evolutionary algorithms on unimodal pseudo-boolean functions over small-world networks”, IEEE Congress on Evolutionary Computation (CEC), pp. 2588-2594, 2013. [citation][year=2013]Watanabe, Kan and Fukushi, Masaru and Funabiki, Nobuo and Nakanishi, Toru,”Performance Evaluation of Check-By-Voting for Colluding Attack in Volunteer Computing Systems”, IAENG Transactions on Engineering Technologies, pp.33-48, 2013. [citation][year=2013]Watanabe, Kan and Funabiki, Nobuo and Nakanishi, Toru and Fukushi, Masaru, ”Optimal Spot-Checking for Delayed Attack on Desktop Grid Systems”, UKSim, pp.600-605, 2013. [citation][year=2012]Silaghi C. Gheorghe, Dependable Resource Management Tools towards Automated Collaboration in Heterogeneous Computing Environments, Habilitation Thesis, Babes Bolyai University, Romenia, 2012. [citation][year=2012]Christoforou, Evgenia and Fernández Anta, Antonio and Georgiou, Chryssis and Mosteiro, Miguel A. Algorithmic Mechanisms for Reliable Master-Worker Internet-based Computing. IEEE Transactions on Computers. ISSN 0018-9340, 2012. [citation][year=2012]Fernández Anta, Antonio and Georgiou, Chryssis and López, Luis and Santos, Agustin (2012) Reliable Internet-based Master-Worker Computing in the Presence of Malicious Workers. Parallel Processing Letters, 22 (1). [citation][year=2012]Bendahmane, Ahmed and Essaaidi, Mohammad and Younes, Ali et al., ”A new mechanism to ensure integrity for MapReduce in cloud computing”, 2012 International Conference on Multimedia Computing and Systems (ICMCS), pp 785–790, 2012. [citation][year=2012]Bendahmane, Ahmed and Essaaidi, Mohammad and Moussaoui, Ahmed El and Younes, Ali, ”Result verification mechanism for MapReduce computation integrity in cloud computing”, 2012 International Conference on Complex Systems (ICCS), 2012. [citation][year=2012][PDF] http://www.iaeng.org/publication/IMECS2012/IMECS2012_pp1658-1663.pdf Kan Watanabe, Nobuo Funabiki, Toru Nakanishi and Masaru Fukushi, "Modeling and Performance Evaluation of Colluding Attack in Volunteer Computing Systems", Proceedings of the International MultiConference of Engineers and Computer Scientists 2012, Vol. II, IMECS 2012, March 14-16, 2012, Hong Kong. [citation][year=2011]Watanabe, K. and Fukushi, M. and Kameyama, M., “Adaptive Group-Based Job Scheduling for High Performance and Reliable Volunteer Computing”, Journal of Information Processing, Volume 19, pp. 39-51, 2011 [citation][year=2011]Christoforou, E.; Anta, A.F.; Georgiou, C.; Mosteiro, M.A.; "Algorithmic mechanisms for internet supercomputing under unreliable communication", Network Computing and Applications (NCA), 2011 10th IEEE International Symposium on, pp 275-280, DOI: 10.1109/NCA.2011.46, 2011 (http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=6038615) [citation][year=2011]E. Christoforou, AF Anta, C Georgiou, Miguel A. Mosteiro, "Efficient Mechanisms for Single-task Reliable-communication Master-Worker Computing with Malicious and Rational Workers", Technical Report TR-11-04, Department of Computer Science, University of Cyprus, May 2011 (http://www.cs.ucy.ac.cy/ric/publications/UCY-CS-TR-11-04.pdf) [citation][year=2011]Heien, Eric and Kondo, Derrick and Gainaru, Ana and LaPine, Dan and Kramer, Bill and Cappello, Franck, "Modeling and tolerating heterogeneous failures in large parallel systems", Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis, pp 1(45)-11(45), SC'11, 2011. [citation][year=2011]Christoforou, Evgenia and Fernández Anta, Antonio and Georgiou, Chryssis and Mosteiro, Miguel, Algorithmic Mechanisms for Internet-Based Computing under Unreliable Communication, Lecture Notes in Computer Science, pp 147-149 (DOI:10.1007/978-3-642-24100-0_13), 2011 [citation][year=2010]Ahmed Bendahmane, Mohammad Essaaidi, Ahmed El~Moussaoui, and Ali Younes. Compromised resources tolerance in grid computing systems. In Mohammad Essaaidi, Michele Malgeri, and Costin Badica, editors, {em Intelligent Distributed Computing IV}, volume 315 of {em Studies in Computational Intelligence}, pages 145--154. Springer Berlin / Heidelberg, 2010. [citation][year=2010]Eugen Staab. {em Reliable Information Acquisition in the Presence of Malicious Sources}. PhD thesis, University of Luxembourg, April 2010. Online Version, 2010-04-22. [citation][year=2010]Bendahmane, A. and Essaaidi, M. and El Moussaoui, A. and Younes, A., “Compromised Resources Tolerance in Grid Computing Systems”, Intelligent Distributed Computing IV, pp. 145-154, 2010 [citation][year=2010]Tang, B. and Moca, M. and Chevalier, S. and He, H. and Fedak, G., “Towards mapreduce for desktop grid computing”, IEEE Computer Society, 2010 [citation][year=2010]Bendahmane, A. and Essaaidi, M. and El Moussaoui, A. and Younes, A., “Reputation-based Majority Voting for Malicious Grid Resources Tolerance”, SCALABLE COMPUTING, pp. 385, 2010 [citation][year=2010]Canon, L.C., “Outils et algorithmes pour gérer l’incertitude lors de l’ordonnancement d’application sur plateformes distribuées”, PhD Thesis, Université Henri Poincarré – Nancy 1, France, 2010. [citation][year=2010]Watanabe, K. and Fukushi, M. and Horiguchi, S., “Expected-credibility-based Job Scheduling for Reliable Volunteer Computing”, IEICE Transactions on Information and Systems, volume 93, issue 2, pp. 306-314, 2010 [citation][year=2010]Watanabe, K. and Fukushi, M., “Generalized Spot-checking for Sabotage-tolerance in Volunteer Computing Systems”, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 655-660, 2010 [citation][year=2010]Watanabe, K. and Fukushi, M., “Generalized Spot-Checking for Reliable Volunteer Computing”, IEICE TRANSACTIONS on Information and Systems, volume 93, issue 12, pp. 3164-3172, 2010 [citation][year=2009]\item Rim Chayeh, Christophe Cerin, and Mohamed Jemni. A probabilistic fault-tolerant recovery mechanism for task and result certification of large-scale distributed applications. In Nabil Abdennadher and Dana Petcu, editors, {\em Advances in Grid and Pervasive Computing}, volume 5529 of {\em Lecture Notes in Computer Science}, pages 471--482. Springer Berlin / Heidelberg, 2009. [citation][year=2009]\item Mark Silberstein, Artyom Sharov, Dan Geiger, and Assaf Schuster. Gridbot: Execution of bags of tasks in multiple grids. In {\em SC '09 Proceedings of the Conference on High Performance Computing Networking, Storage and Analysis}, 2009. [citation][year=2009]\item Eugen Staab. {\em Reliable Information Acquisition in the Presence of Malicious Sources}. PhD thesis, University of Luxembourg, April 2010. Online Version, 2010-04-22. \item Eugen Staab and Thomas Engel. Collusion detection for grid computing. In Franck Cappello, Cho-Li Wang, and Rajkumar Buyya, editors, {\em Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid '09)}, pages 412--419. IEEE Computer Society, May 2009. [citation][year=2009]\item Eugen Staab and Thomas Engel. Tuning evidence-based trust models. {\em Computational Science and Engineering, IEEE International Conference on}, 3:92--99, 2009. [citation][year=2009]In {\em e-Business Engineering, 2009. ICEBE '09. IEEE International Conference on}, pages 213 --218, October 2009. [citation][year=2008]Defeating colluding nodes in Desktop Grid computing platforms - ►coregrid.net [PDF]  GC Silaghi, F Araujo, LM Silva, P Domingues, AE ? - IEEE International Symposium on Parallel and Distributed ?, 2008 - ieeexplore.ieee.org Page 1. 978-1-4244-1694-3/08/$25.00 ©2008 IEEE Defeating Colluding Nodes in Desktop Grid Computing Platforms Gheorghe Cosmin Silaghi Dept. of Business Information Systems Babes . -Bolyai University, Cluj, Romania gsilaghi@econ.ubbcluj.ro . [citation][year=2008][PDF] ►Using correlation for collusion detection in grid settings E Staab, V Fusenig, T Engel - wiki.uni.lu Eugen Staab, Volker Fusenig and Thomas Engel ... Faculty of Sciences, Technology and Communication University of Luxembourg 6, rue R. Coudenhove-Kalergi 1359 Luxembourg Luxembourg ... Using Correlation for ... Cited by 2 - Related articles - View as HTML - Web Search [citation][year=2008]BitDew: a programmable environment for large-scale data management and distribution - ►lri.fr [PDF]  G Fedak, H He, F Cappello - Proceedings of the 2008 ACM/IEEE conference on ?, 2008 - portal.acm.org Abstract"Desktop Grids use the computing, network and storage resources from idle desktop PC"s distributed over multiple-LAN"s or the Internet to compute a large variety of resource-demanding distributed applications. While these ... Cited by 2 - Related articles - Web Search - All 5 versions [citation][year=2008][CITATION] Priority based list scheduling for sabotage-tolerance with deadline tasks in desktop grids HS Kim, CS Hwang, S Lee, SJ Choi, JM Gil - International Journal of Computer Systems Science & ?, 2008 - CRL Publishing Ltd, PO Box 31, Market Harborough, Leics, LE 16 9 ? Related articles - Web Search - BL Direct [citation][year=2008]USING SLA BASED APPROACH TO HANDLE SABOTAGE TOLERANCE IN THE GRIDS S Naqvi, S Mouton, P Massonet, GC Silaghi, D ? - Springer Syed Naqvi, Stephane Mouton, Philippe Massonet Centre of Excellence in Information and Communication Technologies, Belgium { syed.naqvi, stephane.mouton, philippe.massonet } @cetic.be ... Gheorghe Cosmin Silaghi ... Related articles - Web Search [citation][year=2008][PDF] ►BitDew: A Programmable Environment for Large-Scale Data Management and Distribution GFHHF Cappello - inria.ccsd.cnrs.fr Page 1. apport de recherche I S S N 0 2 4 9 - 6 3 9 9 I S R N I N R I A / R R - - 6 4 2 7 - - F R + E N G Thème SYM INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE BitDew: A Programmable Environment for ... Related articles - View as HTML - Web Search - All 6 versions [citation][year=2008][PDF] ►BitDew: a Programmable Environment for Data Desktop Grids G Fedak, D Kondo, F Cappello - gforge.inria.fr Page 1. BitDew : a Programmable Environment for Data Desktop Grids Gilles Fedak, Derrick Kondo, Paul Malecot, Franck Cappello Grand-Large/INRIA-Futurs Laboratoire de Recherche en Informatique Universite Paris XI Tsukuba 2006, Japan ... Related articles - View as HTML - Web Search - All 2 versions [citation][year=2008][PDF] ►Collusion Detection E Staab - wiki.uni.lu Page 1. Collusion Detection For Acquisition of Unverifiable Information Eugen Staab University of Luxembourg eugen.staab@uni.lu SECAN-Lab day Amneville-Les-Thermes, France, June 30, 2008 Page 2. ... Related articles - View as HTML - Web Search [citation][year=2008][PDF] ARC INRIA PROPOSAL labri.fr [PDF] G IPT, M IPT, A IPT - 2008 - labri.fr A grid is a set of distributed and heterogeneous resources. In recent years, a lot of work has been done to efficiently manage and use such resources. However, most of the models, algorithms, protocols and programs designed and developed in this context do not take ... View as HTML [publication]Mendes, S. and Domingues, P. and Pereira, D. and Vale, R. and Gomez-Pulido, J.A. and Silva, L. and Vega-Rodríguez, M.A. and Sánchez-Pérez, J.M. , "Omni-directional RND Optimisation using Differential Evolution: In-depth Analysis via High Throughput Computing", in EPIA 2007 - Portuguese Conference on Artificial Intelligence., 2007 [publication]Kondo, D. and Araujo, F. and Silva, L. and Domingues, P. , "Result Error Detection on Heterogeneous and Volatile Resources via Intermediate Checkpointing", in CoreGRID Workshop on Grid Programming Model/Grid and P2P Systems Architecture/Grid Systems, Tools and Environments, 2007 [citation][year=2010]SungJin Choi, Rajkumar Buyya, Group-based adaptive result certification mechanism in Desktop Grids, Future Generation Computer Systems, Volume 26, Issue 5, May 2010, Pages 776-786, ISSN 0167-739X, 10.1016/j.future.2009.05.025. (http://www.sciencedirect.com/science/article/pii/S0167739X09000557) [citation][year=2009]A Probabilistic Fault-Tolerant Recovery Mechanism for Task and Result ? R Chayeh, C Cerin, M Jemni - ? of the 4th International Conference on ?, 2009 - Springer Abstract. This paper deals with fault tolerant recovery mechanisms and prob- abilistic results certification issues on large scale architectures. The related works in the result certification domain are based on a total or a partial duplica- tion of the application. However, they are limited ... Related articles - All 3 versions [citation][year=2009]Group-based adaptive result certification mechanism in Desktop Gridsgridbus.org [PDF] SJ Choi, R Buyya - Future Generation Computer Systems, 2009 - Elsevier A Grid system is a platform that provides access to various computing resources owned by institutions by making virtual organizations [15] and [16]. In contrast, a Desktop Grid system is a platform that achieves high throughput computing by harvesting a number of idle desktop ... Related articles - All 5 versions 2006(8 publications) [publication]Domingues, P. and Marques, P. and Silva, L. , "DGSchedSim: a trace-driven simulator to evaluate scheduling algorithms for desktop grid environments", 2006 [citation][year=2013]Gil, Joon-Min and Kim, SungSuk and Lee, JongHyuk, ”Task Replication and Scheduling Based on Nearest Neighbor Classification in Desktop Grids”, Ubiquitous Information Technologies and Applications, pp. 889-895, 2013, Springer. [citation][year=2012]Da Costa, Georges, ”Heterogeneity: the key to achieve Power-Proportional Computing”, 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp 656-662, 2013. [citation][year=2012]Pearce, Michael and Zeadally, Sherali and Hunt, Ray, ”Virtualization: Issues, security threats, and solutions”, ACM Computing Surveys (CSUR), vol. 45(2), 2013. [citation][year=2010]Al-Azzoni, I., Down, D.G., “Dynamic scheduling for heterogeneous Desktop Grids”, Journal of Parallel and Distributed Computing, 70(12), pp 1231-1240, 2010. DOI: 10.1016/j.jpdc.2010.08.001 [citation][year=2010]Farkas, Z., Marosi, A.C., Kacsuk, P., “Job Scheduling in Hierarchical Desktop Grids”, pp. 79-97, 2010. [citation][year=2010]Al-Daoud, H., Al-Azzoni, I., Down, D.G., “Power-Aware Linear Programming based Scheduling for heterogeneous computer clusters”, 2010 International Green Computing Conference, pp. 325-332, 2010. [citation][year=2010]Farkas, Z. and Marosi, A.C. and Kacsuk, P., “Job Scheduling in Hierarchical Desktop Grids”, Remote Instrumentation and Virtual Laboratories, pp. 79-97, 2010 [citation][year=2010]AL-DAOUD, HADIL, "POWER-AWARE SCHEDULING FOR SERVER CLUSTERS" (2010), Master Thesis. Open Access Dissertations and Theses. Paper 4101. http://digitalcommons.mcmaster.ca/opendissertations/4101 [citation][year=2009]Majd Kokaly, Issam Al Azzoni, Douglas G. Down, “MGST: A Framework for Performance Evaluation of Desktop Grids”, Proc. 3rd Workshop on Desktop Grids and Volunteer Computing Systems (PCGrid 2009), Rome, Italy, In Workshops Proceedings of the 23rd IEEE International Parallel and Distributed Processing Symposium, IEEE Computer Society. [citation][year=2009]Estrada, T., Taufer, M., Anderson, D.P.,” Performance Prediction and Analysis of BOINC Projects: An Empirical Study with EmBOINC”, Journal of Grid Computing, volume 7, issue 4, pp. 537-554, 2009, Springer. [citation][year=2008]I. Al-Azzoni and D.G. Down, Dynamic Scheduling for Heterogeneous Desktop Grids, The 9th IEEE/ACM International Conference on Grid Computing (Grid 2008), Tsukuba, Japan, October 2008. [citation][year=2007]K. Watanabe, M. Fukushi, S. Horiguchi, “Expected-credibility based Job Scheduling for Volunteer Computing Systems”, Proceedings of the 2nd International Conference on Advances in Information Technology (IAIT2007), pp 222-229, 2007. [publication]Domingues, P. and Silva, J.G. and Silva, L. , "Sharing Checkpoints to Improve Turnaround Time in Desktop Grid", in Advanced Information Networking and Applications (AINA\'06), vol. 1, 2006 [citation][year=2011]Zoran Constantinescu and Monica Vladoiu (2011). Using Open Source Desktop Grids in Scientific Computing and Visualization, Advances in Grid Computing, Zoran Constantinescu (Ed.), ISBN: 978-953-307-301-9, InTech, Available from: http://www.intechopen.com/articles/show/title/using-open-source-desktop-grids-in-scientific-computing-and-visualization [citation][year=2009]J.M. Gil, U.S Song, H.C. Yu, “Performance Evaluation of Scheduling Mechanism with Checkpoint Sharing and Task Duplication in P2P-Based PC Grid Computing?”, Advances in Grid and Pervasive Computing: 4th International Conference, GPC 2009, Geneva, Switzerland, May 4-8, 2009. [citation][year=2009]Anglano, C. and Canonico, M.,” Knowledge-Free Scheduling Algorithms for Multiple Bag-of-Task Applications on Desktop Grids”, 2009 [citation][year=2008]Constantinescu-Fuløp, Zoran, "A Desktop Grid Computing Approach for Scientific Computing and Visualization?, PhD Thesis, Norwegian University of Science and Technology, May 2008.( http://urn.ub.uu.se/resolve?urn=urn:nbn:no:ntnu:diva-2191) [publication]Domingues, P. and Araujo, F. and Silva, L. , "A DHT-based Infrastructure for Sharing Checkpoints in Desktop Grid Computing", in 2nd IEEE International Conference on e-Science and Grid Computing, 2006 [citation][year=2014]Effective load balancing for grid computing using grid control system D Ramesh - 2014 - shodhganga.inflibnet.ac.in Grid Computing is a growing technology which is one of the High Performance Computing branches used for solving complex problems Grid computing has a similar architecture to distributed computing and cloud computing It is differentiated from other distributed ... [citation][year=2011]Huan Wang, Hidenori Nakazato,Haatiem Mufti, Strategy for Checkpointing Peer Sharing in P2P-Grid System, Proc. of the 2011 IEICE General Conference, BS-4-20, March 2011. [citation][year=2009][PDF] Knowledge-Free Scheduling Algorithms for Multiple Bag-of-Task ?unipmn.it [PDF] C Anglano, M Canonico - di.unipmn.it Universit`a del Piemonte Orientale "A. Avogadro? Via Bellini 25/G, 15100 Alessandria http://www.di.unipmn.it ... Knowledge-Free Scheduling Algorithms for Multiple Bag-of-Task Applications on ... Desktop Grids Authors: Cosimo Anglano, Massimo Canonico {cosimo.anglano, ... Related articles - View as HTML [citation][year=2009][PDF] http://www.slideshare.net/brent.wilson/distributed-checkpointing-on-an-enterprise-desktop-grid Brent Wilson, “Distributed Checkpointing on an Enterprise Desktop Grid”, PhD Thesis, Colorado Technical University, 2009. [publication]Andrzejak, A. and Domingues, P. and Silva, L. , "Predicting Machine Availabilities in Desktop Pools", 2006 [citation][year=2013]Javadi, Bahman and Kondo, Derrick and Iosup, Alexandru and Epema, Dick, ”The Failure Trace Archive: Enabling the comparison of failure measurements and models of distributed systems”, Journal of Parallel and Distributed Computing, 2013, Elsevier. [citation][year=2011]Yi, S.; Andrzejak, A. & Kondo, D. Monetary cost-aware checkpointing and migration on Amazon cloud spot instances Services Computing, IEEE Transactions on, IEEE, 2011. DOI: 10.1109/TSC.2011.44 [citation][year=2010]Kondo, Derrick and Javadi, Bahman and Iosup, Alexandru and Epema, Dick, "The Failure Trace Archive: Enabling Comparative Analysis of Failures in Diverse Distributed Systems", 10th IEEE/ACM International Conference onCluster, Cloud and Grid Computing (CCGrid), 2010, DOI: 10.1109/CCGRID.2010.71. [citation][year=2010]Sangho Yi; Kondo, D.; Andrzejak, A, “Reducing Costs of Spot Instances via Checkpointing in the Amazon Elastic Compute Cloud”, 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD), pp 236-243, 2010, DOI: 10.1109/CLOUD.2010.35. [citation][year=2010]Garcia, J.R, Lerida, J.L, Hernandez, P., “Scheduling Soft Real-Time Applications on NOWs”, 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), 2010, DOI: 10.1109/PDP.2010.62. Toktam Ghafarian-M., Hossein Deldari, "Task Execution Availability Prediction in the Enterprise Desktop Grid", Proceedings of the 9th IASTED International Conference, Parallel and Distributed Computing and Networks (PDCN 2010), 2010. [citation][year=2010]Andrzejak, A.; Kondo, D.; Anderson, D.P.; “Exploiting non-dedicated resources for cloud computing”, 2010 IEEE Network Operations and Management Symposium (NOMS), pp 341 348, DOI: 10.1109/NOMS.2010.5488488. [citation][year=2010][PDF] http://profdoc.um.ac.ir/articles/a/1016838.pdf Toktam Ghafarian-M., Hossein Deldari, "Task Execution Availability Prediction in the Enterprise Desktop Grid", Proceedings of the 9th IASTED International Conference, Parallel and Distributed Computing and Networks (PDCN 2010), 2010. [publication]Domingues, P. and Andrzejak, A. and Silva, L. , "Using Checkpointing to Enhance Turnaround Time on Institutional Desktop Grids", 2006 [citation][year=2010]Abbes, H. and Cérin, C. and Jemni, M., “A decentralized and fault-tolerant Desktop Grid system for distributed applications”, Concurrency and Computation: Practice and Experience, volume 22, issue 3, pp. 261-277, 2010 [citation][year=2010]Yi, S. and Kondo, D. and Andrzejak, A., “Reducing costs of spot instances via checkpointing in the amazon elastic compute cloud”, 2010 IEEE 3rd International Conference on Cloud Computing, pp. 236-243, 2010 [citation][year=2010]Abbes, H. and Butelle, F. and Cérin, C., “Multithreading of Kostka Numbers Computation for the BonjourGrid Meta-desktop Grid Middleware”, Algorithms and Architectures for Parallel Processing, pp. 287-298, 2010 [citation][year=2009]Heithem Abbes, Christophe Cerin, Mohamed Jemni, “BonjourGrid: Orchestration of Multi-instances of Grid Middlewares on Institutional Desktop Grids”, Proc. 3rd Workshop on Desktop Grids and Volunteer Computing Systems (PCGrid 2009), Rome, Italy, In Workshops Proceedings of the 23rd IEEE International Parallel and Distributed Processing Symposium, IEEE Computer Society [citation][year=2009][PDF] http://www.slideshare.net/brent.wilson/distributed-checkpointing-on-an-enterprise-desktop-grid Brent Wilson, “Distributed Checkpointing on an Enterprise Desktop Grid”, PhD Thesis, Colorado Technical University, 2009. [citation][year=2008]Abbes, H. and Cérin, C. and Jemni, M., “BonjourGrid as a decentralised job scheduler”, 2008 IEEE Asia-Pacific Services Computing Conference, pp.89-94, 2008 [citation][year=2007]Y. Georgiou, O. Richard, N. Capit, "Evaluations of the Lightweight Grid CIGRI upon the Grid5000 Platform", IEEE International Conference on e-Science and Grid Computing, pp 279-286, December 2007 [publication]Araujo, F. and Domingues, P. and Kondo, D. and Silva, L. , "Validating Desktop Grid Results by Comparing Intermediate Checkpoints", in Coregrid â?? 2nd Integration Workshop, 2006 [citation][year=2007]Xavier Dalem. "Implementation d"un Grid Peer-to-Peer". Travail de fin d'études. Licence en Informatique. Université de Liège. Juin 2007. [publication]Domingues, P. and Andrzejak, A. and Silva, L. , "Scheduling for Fast Turnaround Time on Institutional Desktop Grid", in 2nd CoreGRID Workshop on Grid and Peer To Peer Systems Architecture, 2006 [citation][year=2010]Xhafa, F. and Abraham, A., “Computational models and heuristic methods for Grid scheduling problems”, Future Generation Computer Systems, volume 26, issue 4, pp. 608-621, 2010 [citation][year=2010]Farkas, Z. and Marosi, A.C. and Kacsuk, P., “Job Scheduling in Hierarchical Desktop Grids”, Remote Instrumentation and Virtual Laboratories, pp. 79-97, 2010 [citation][year=2008]K Watanabe, M Fukushi, S Horiguchi, "Optimal spot-checking to minimize the computation time in volunteer computing?, International Symposium on Parallel and Distributed Processing (IPDPS 2008), 2008. [citation][year=2008]F Xhafa, A Abraham, "Metaheuristics for Scheduling in Distributed Computing Environments?, Chapter 1, Studies in Computational Intelligence, Vol. 146, Springer Verlag, 2008. [citation][year=2008]I. Al-Azzoni and D.G. Down, Dynamic Scheduling for Heterogeneous Desktop Grids, The 9th IEEE/ACM International Conference on Grid Computing (Grid 2008), Tsukuba, Japan, October 2008. [publication]Sousa, B. and Domingues, P. and Silva, L. , "Sabotage Tolerance and Trust Management in Desktop Grid Computing", in 2nd CoreGRID Workshop on Grid and Peer To Peer Systems Architecture, 2006 [citation][year=2013]TALAL H. NOOR , QUAN Z. SHENG, SHERALI ZEADALLY, IAN YU, "Trust Management of Services in Cloud Environments: Obstacles and Solutions", ACM Computing Surveys, Vol. 0, No. 0, 2013, Pages 1, 2013 [citation][year=2010]K Watanabe, M Fukushi, S Horiguchi, “Expected-Credibility-Based Job Scheduling for Reliable Volunteer Computing”, IEICE TRANSACTIONS on Information and Systems 93(2), pp 306-314, 2010. [citation][year=2010]K Watanabe, M Fukushi, “Generalized Spot-Checking for Reliable Volunteer Computing”, IEICE TRANSACTIONS on Information and Systems 93(12), pp 3164-3172, 2010. [citation][year=2010]F. Taoab, Y. Hub, D. Zhaoc, Z. Zhoub, “Study of failure detection and recovery in manufacturing grid resource service scheduling”, International Journal of Production Research 48(1), pp 69-94, 2010. doi:10.1080/00207540802275871 [citation][year=2010]K Watanabe, M Fukushi, S Horiguchi, “Generalized Spot-Checking for Sabotage-Tolerance in Volunteer Computing Systems”, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp 655-660, 2010. [citation][year=2010]Y. Bernard, L. Klejnowski, J. Hahner, C. Muller-Schloer, “Towards Trust in Desktop Grid Systems”, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp 637-642, 2010. [citation][year=2010]F. Georgatos, V. Gkamas, A. Ilias, G. Kouretis, E. Varvarigos, “A Grid-enabled CPU Scavenging Architecture and a Case Study of its Use in the Greek School Network”, Journal of Grid Computing 8(1), pp 61-75, 2010. [citation][year=2010]Junseok Hwang, Jihyoun Park, Jorn Altmann, “Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods”, in book “Information Systems, Technology and Management”, pp 187-197, 2010. [citation][year=2010]Wang, Y., Nakao, A., “Poisonedwater: An improved approach for accurate reputation ranking in P2P networks” Future Generation Computer Systems, volume 26, issue 8, year 2010, pp. 1317 – 1326. [citation][year=2010]Papaioannou, T.G., Stamoulis, G.D, “coverReputation-based estimation of individual performance in collaborative and competitive grids”, Future Generation Computer Systems, volume 26, issue 8, pp. 1327 – 1335, 2010. [citation][year=2010]Bernard, Y., Klejnowski, L., Hahner, J., Muller-Schloer, C., “Towards trust in desktop grid systems”, Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 637—642, 2010. [citation][year=2010]Choi, S.J. and Buyya, R., “Group-based adaptive result certification mechanism in Desktop Grids”, Future Generation Computer Systems, volume 26, issue 5, pp. 776—786, 2010. [citation][year=2010]Bendahmane, A., Essaaidi, M., El Moussaoui, A., Younes, A., “Compromised Resources Tolerance in Grid Computing Systems”, Intelligent Distributed Computing IV, pp. 145—154, 2010. [citation][year=2010]Antonopoulos, N., Rana, O.F., “Management and optimisation of P2P and Grid systems with network economics”, Future Generation Computer Systems, volume 26, issue 8, pp. 1282—1284, 2010. [citation][year=2010]Canon, Louis-Claude, Jeannot, Emmanuel, Weissman, Jon, “A Scheduling Algorithm for Defeating Collusion”, Research Report, INRIA, RR-7403, October 2010 [citation][year=2010]Hwang, J. and Kim, H.J. and Park, J., “Managing risks in an open computing environment using mean absolute deviation portfolio optimization”, Future Generation Computer Systems, volume 26, issue 8, pp. 1381-1390, 2010 [citation][year=2010]Hwang, J. and Park, J. and Altmann, J., “Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods”, Information Systems, Technology and Management, pp. 187-197, 2010 [citation][year=2010]Canon, L.C. and Jeannot, E. and Weissman, J., “A Scheduling Algorithm for Defeating Collusion”, 2010 [citation][year=2010]Bendahmane, A. and Essaaidi, M. and El Moussaoui, A. and Younes, A., “Reputation-based Majority Voting for Malicious Grid Resources Tolerance”, Scalable Computing, pp. 385, 2010. [citation][year=2010]Canon, L.C., “Outils et algorithmes pour gérer l’incertitude lors de l’ordonnancement d’application sur plateformes distribuées”, PhD Thesis, Université Henri Poincarré – Nancy 1, France, 2010. [citation][year=2010]Bendahmane, Mohammad Essaaidi, Ahmed El Moussaoui, Ali Younes, "Reputation-based Majority Voting for Malicious Grid Resources Tolerance", Ahmed Scientific International Journal for Parallel and Distributed Computing, Vol 11, No 4 (2010) - (http://www.scpe.org/index.php/scpe/article/view/669) 2005(3 publications) [publication]Domingues, P. and Marques, P. and Silva, L. , "Distributed Data Collection through Remote Probing in Windows Environments", in PDP'05, 2005 [citation][year=2013]Tie, Zhixin, ”Mobile-C Based Agent System for Detecting Improper Computer Usage at Computer Laboratories”, Journal of Software, 8(9), pp. 2262-2271, 2013. [citation][year=2011][PDF] http://www.csi.ucd.ie/Staff/jmurphy/publications/1721.pdf Jesus Omana Iglesias, James Thorburn, Trevor Parsons, John Murphy, and Patrick O’Sullivan, "Scoring System Utilization Through Business Profiles", IEEE CloudCom 2011, 2011. [citation][year=2011][PDF] http://www.cse.wustl.edu/~schmidt/PDF/RTCSA-2011.pdf James Hill and Douglas C. Schmidt Experiences with Service-Oriented Middleware for Dynamic Instrumentation of Enterprise Distributed Real-time and Embedded Systems, Proceedings of the 1st International Symposium on Secure Virtual Infrastructures (DOA-SVI'11), October 17-19, 2011, Crete, Greece. [citation][year=2009][PDF] http://doi.ieeecomputersociety.org/10.1109/ESIAT.2009.123 C. Fang, Y. Zhao, Z. Wang, “Research and Design of a Service Management System for Deadline Render Farm”, International Conference on Environmental Science and Information Application Technology, Wuhan, China, pp. 542-454, 2009. [citation][year=2009][PDF] http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5198525 Jinwei Wang, Huazhi Sun, Jianping Fan, "DUMS: A Dynamical Updatable Monitoring System for Desktop PCs Used for Distributed Computing", pp 309-310, Third IEEE International Symposium on, Theoretical Aspects of Software Engineering, 2009 (TASE 2009). DOI:10.1109/TASE.2009.44 [citation][year=2005][PDF] http://www-vs.informatik.uni-ulm.de/DE/intra/bib/2005/PDCS/466-153.pdf Jinwei Wang, Yuzhong Sun, Jianping Fan, "Analysis on Resource Utilization Patterns of Office Computer", Proceedings of the 17th IASTED International Conference Parallel and Distributed Computing and Systems, pp 626-631, 2005. [publication]Domingues, P. and Marques, P. and Silva, L. , "Resource usage of Windows computer laboratories", in ICPP 2005 - Workshops on Parallel Processing, 2005 [citation][year=2013]Da Costa, Georges, ”Heterogeneity: the key to achieve Power-Proportional Computing”, 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp 656-662, 2013. [citation][year=2013]Pearce, Michael and Zeadally, Sherali and Hunt, Ray, ”Virtualization: Issues, security threats, and solutions”, ACM Computing Surveys (CSUR), vol. 45(2), 2013. [citation][year=2012]Azab, Abdulrahman and Meling, Hein, Stroll: A Universal Filesystem-Based Interface for Seamless Task Deployment in Grid Computing, In Proceedings of Distributed Applications and Interoperable Systems, Lecture Notes in Computer Science, pages 162-176, 2012. DOI: 10.1007/978-3-642-30823-9 14 [citation][year=2012]Harold Castro, Mario Villamizar, German Sotelo, Cesar O. Diaz, Johnatan E. Pecero and Pascal Bouvry. ”Green flexible opportunistic computing with task consolidation and virtualization”, Cluster Computing, 2012. DOI: 10.1007/s10586-012-0222-y [citation][year=2012]Harold Castro, Mario Villamizar, German Sotelo, Cesar O. Diaz, Johnatan Pecero, Pascal Bouvry, and Samee U. Khan. ”GFOG: Green and Flexible Opportunistic Grids”, Chapter 18, Scalable Computing and Communications: Theory and Practice - Wiley. USA, June 1, 2012. [citation][year=2012]Hanappe, Peter, ”Fine-grained CPU Throttling to Reduce the Energy Footprint of Volunteer Computing”, Technical Report, Sony Computer Science Laboratory Paris, 2012. [citation][year=2012]Han, Dong and Gnawali, Omprakash, ”Understanding Desktop Energy Footprint in an Academic Computer Lab”, IEEE International Conference on Green Computing and Communications (GreenCom), pp. 541-548, 2012. [citation][year=2011][PDF] http://www.sciencedirect.com/science/article/pii/S0743731511002061 Daniel Lazaro, Derrick Kondo, Joan Manuel Marques, "Long-term availability prediction for groups of volunteer resources", Journal of Parallel and Distributed Computing, 2011, DOI: DOI;10.1016/j.jpdc.2011.10.007 [citation][year=2011][PDF] http://www.springerlink.com/content/5u71m8013150876g/ James H. Hill and Douglas C. Schmidt, Experiences with Service-Oriented Middleware for Dynamic Instrumentation of Enterprise DRE Systems, ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2011, Lecture Notes in Computer Science, 2011, Volume 7045/2011, 478-497, DOI: 10.1007/978-3-642-25106-1_5 [citation][year=2010][PDF] http://doi.ieeecomputersociety.org/10.1109/WSCAD-SCC.2010.24 Berto de Tácio Pereira Gomes, Gilberto Cunha Filho, Igor Ramos Campos, Jesseildo Figueredo Gonçalves, Francisco José da Silva e Silva, "Scheduling Strategies Evaluation for Opportunistic Grids," WSCAD-SCC, pp.88-95, 2010 11th Symposium on Computing Systems, 2010 [citation][year=2010][PDF] http://hdl.handle.net/10803/3066 José Ramón García Gutiérrez, “Planificación de Diferentes Clases de Aplicaciones en Entornos No Dedicados Considerando Procesadores Multicore”, PhD Thesis, Universitat Autónoma de Barcelona, 2010 [citation][year=2009][PDF] http://portal.acm.org/citation.cfm?id=1629036.1629044# Brent Wilson and Mary Jane Willshire, “EDGAR: grid computing project”, J. Comput. Small Coll. 25(2), pp 52-57, 2009. [citation][year=2009]T.F., Clayton, A.F. Murray, and I. Lindsay, “GP-GPU: Bridging the Gap between Modelling & Experimentation”, 2009 NASA/ESA Conference on Adaptive Hardware and Systems., pp 453-459, 2009. [citation][year=2009][PDF] http://hdl.handle.net/1842/4023 T.F., Clayton, “Enabling rapid iterative model design within the laboratory environment”, PhD Thesis, The University of Edinburgh, 2009 [citation][year=2009][PDF] http://hdl.handle.net/10803/5775 Josep Lluís Lérida Monsó, “Meta-Planificador Predictivo para Entornos Multicluster no Dedicados”, PhD Thesis, Universitat Autònoma de Barcelona, 2009 [citation][year=2009][PDF] http://www.tdx.cesca.es/TESIS_UAB/AVAILABLE/TDX-0527110-121159/jllm1de1.pdf Camargo, R.Y. and Castor, F. and Kon, F., “Reliable management of checkpointing and application data in opportunistic grids”, Journal of the Brazilian Computer Society, pp. 1 14, 2009. [citation][year=2008]Constantinescu-Fuløp, Zoran, "A Desktop Grid Computing Approach for Scientific Computing and Visualization?, PhD Thesis, Norwegian University of Science and Technology, May 2008. [citation][year=2008][PDF] http://www.dbpia.co.kr/view/ar_view.asp?arid=739548 Gandhi, P.J. and Munot, S.M. and Patel, S.A. and Memon, N.A., “Host Load Prediction Using Adaptive Models”, International Journal Of Computer Science And Applications, volume 1, issue 2, 2008. [citation][year=2007]J. Bustos-Jiménez, D. Caromel, J. M. Piquer, "Load Balancing: Towards the Infinite Network and Beyond?, Job Scheduling Strategies for Parallel Processing (selected paper of the 12th Workshop on Job Scheduling Strategies for Parallel Processing), Lecture Notes in Computer Science, 4376/2007: pp 176-191, Springer, 2007. [citation][year=2007]Raphael Yokoingawa de Camargo, "Armazenamento Distribuído de Dados e Checkpointing de Aplicações Paralelas em Grades Oportunistas?, PhD Thesis, Agosto 2007. [citation][year=2007]Raphael Y. de Camargo, Fabio Kon, "Design and Implementation of a Middleware for Data Storage in Opportunistic Grid," ccgrid, Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid '07), pp. 23-30, 2007. [citation][year=2007]Ju-Ho Hyun, Sunggu Lee, Sang Cheol Kim, Min-Gu Lee, "An Efficient Scheduling Method Taking into Account Resource Usage Patterns on Desktop Grids", DBPIA, Vol. 6, pp. 429-439, 2007 [citation][year=2006]J. Wang, L. Zang, Y. Han, "Client-Centric Adaptive Scheduling of Service-Oriented Applications", Journal of Computer Science and Technology, 21(4): pp 537-546, Springer, 2006. [citation][year=2006]J. Bustos-Jiménez, "Dynamic Load Balancing for Active Objects on Computer Grids?, PhD Thesis, Université de Nice-Sophia Antipolis, France, December 2006. [citation][year=2006]J. Bustos-Jiménez, D. Caromel, A. Iosup, M. Leyton, J.M. Piquer, “The rocking chair and the grid: Balancing load across project grids”, Integrated Research in Grid Computing, CoreGrid Integration Workshop, pp. 117-128, 2006. [publication]Andrzejak, A. and Domingues, P. and Silva, L. , "Classifier-Based Capacity Prediction for Desktop Grids", in Workshop of Integrated Research in Grid Computing, 2005 2003(1 publication) [publication]Domingues, P. and Silva, L. and Silva, J.G. , "DRMonitor - A Distributed Resource Monitoring System", in 11th Euromicro Parallel, Distributed and Network-Based Processing, 2003 [citation][year=2013]Tie, Zhixin, ”Mobile-C Based Agent System for Detecting Improper Computer Usage at Computer Laboratories”, Journal of Software, 8(9), pp. 2262-2271, 2013. [citation][year=2012]Sarada Prasad Gochhayat, Pallapa Venkataram, ”Performance analysis of a node monitoring protocol in ubiquitous networks”, 2012. [citation][year=2012]Orozco, J Mart´ ?n Serrano,”Convergence in IT and Telecommunications”, Applied Ontology Engineering in Cloud Services, Networks and Management Systems, pp. 1-9, 2012 (DOI: 10.1007/978-1-4614-2236-5 1). [citation][year=2012]Orozco, J Mart´ ?n Serrano, ”The Role of Semantics in ICT at the Cloud Era”, Applied Ontology Engineering in Cloud Services, Networks and Management Systems, pp 11-53, 2012, Springer. [citation][year=2012]Gochhayat, Sarada Prasad and Venkataram, Pallapa, ”A method of developing an agent based ubiquitous node monitoring protocol”, Conference on Communications (NCC), 2012. [citation][year=2011]Iglesias, J.O.; Thorburn, J.; Parsons, T.; Murphy, J.; O'Sullivan, P.; , "Scoring System Utilization through Business Profiles," Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on , vol., no., pp.482-488, Nov. 29 2011-Dec. 1 2011, doi: 10.1109/CloudCom.2011.71 [citation][year=2009]Gao, C. and Li, Z. and Chen, L., “Host risk evaluation framework based on multi-source information”, Computing, Communication, Control, and Management, 2009. CCCM 2009. ISECS International Colloquium on, volume 1, pp. 249-252, 2009 [citation][year=2009]Yang, G. and Wang, K. and Zhou, X.,” An Adaptive Resource Monitoring Method for Distributed Heterogeneous Computing Environment”, 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, pp. 40-44, 2009 [citation][year=2009]Gao, C. and Li, Z. and Song, H., “Security Evaluation Method Based on Host Resource Availability”, 2009 Third International Conference on Multimedia and Ubiquitous Engineering, pp. 499-504, 2009 [citation][year=2008]EH Song, LT Yang, YS Jeong, “3-Hierarchical resource management model on web grid service architecture”, The Journal of Supercomputing, 46(3), pp 257-275, Springer Verlag, 2008. [citation][year=2006]J. Wang, Xingshe Zhou, Xiaoan Shi, "Policy-based Distributed Resource Monitoring Technology", Computer Engineering, 32(1), pp 34-36, 2006. [citation][year=2005]Hai-jing Zhang, Yao-wu Chen, Le-Yu Wang, "The Software Design of Network-based Elevator Alarm System", Modern Machinery, (3), pp 40-41, 2005. [citation][year=2005]Córdoba, A. and Villadangos, J. and Astrain, JJ and Armendáriz, JE, “A b2b replication service”, Parallel, Distributed and Network-Based Processing, 2005. PDP 2005. 13th Euromicro Conference on, pp. 337-343, 2005 Book Chapters 2012(1 publication) [publication]Araujo, F. and Domingues, P. , " Desktop Grid Computing, chapter 10: Security and Result Certification", in Desktop Grid Computing, vol. 1, pp. 211-235, 2012 2008(1 publication) [publication]Silaghi, G.C. and Silva, L. and Domingues, P. and Arenas, A.E. , "Tackling the Collusion Threat in P2P-Enhanced Internet Desktop Grids", in Making Grids Work, pp. 392-402, 2008 PhD Theses 2009(1 publication) [publication]Domingues, P. , "Dependability Mechanisms for Desktop Grids", 2009 Tech Report 2005(1 publication) [publication]Domingues, P. and Marques, P. and Silva, L. , "Resources Usage of Windows Computer Laboratories (technical report)", 2005