Journal on Future Generation Computer Systems, Vol. 23, #7, August 2007
Cited by
Year 2015 : 1 citations
Pareek, Gaurav, Chetanya Goyal, and Mukesh Nayal. "A Result Verification Scheme for MapReduce Having Untrusted Participants." Intelligent Distributed Computing. Springer International Publishing, 2015. 11-19.
Year 2014 : 5 citations
Wang, Yongzhi, Jinpeng Wei, and Yucong Duan. "Securing MapReduce Result Integrity via Verification-based Integrity Assurance Framework." International Journal of Grid & Distributed Computing 7.6 (2014).
Essaaidi, Mohamed, et al. "The Effectiveness of Reputation-based Voting for Collusion Tolerance in Large-Scale Grids.", 2014.
Mehta, Hemant Kumar, and Rohit Ahuja. "A Holistic Trust Management Leasing Algorithm for IaaS Cloud." International Journal of Systems and Service-Oriented Engineering (IJSSOE) 4.2 (2014): 1-12.
McGilvary, Gary Andrew. "Ad hoc cloud computing." (2014).
Christoforou, Evgenia and Anta, Antonio Fernandez and Georgiou, Chryssis and Mosteiro, Miguel A et al., ”Reputation-based Mechanisms for Evolutionary Master-Worker Computing”,arXiv preprint arXiv:1307.2783, 2013.
Muszynski, Jakub and Varrette, Sébastien and Bouvry, Pascal, ”Expected running time of parallel evolutionary algorithms on unimodal pseudo-boolean functions over small-world networks”, IEEE Congress on Evolutionary Computation (CEC), pp. 2588-2594, 2013.
Watanabe, Kan and Fukushi, Masaru and Funabiki, Nobuo and Nakanishi, Toru,”Performance Evaluation of Check-By-Voting for Colluding Attack in Volunteer Computing Systems”, IAENG Transactions on Engineering Technologies, pp.33-48, 2013.
Watanabe, Kan and Funabiki, Nobuo and Nakanishi, Toru and Fukushi, Masaru, ”Optimal Spot-Checking for Delayed Attack on Desktop Grid Systems”, UKSim, pp.600-605, 2013.
Year 2012 : 12 citations
Kan Watanabe, Nobuo Funabiki, Toru Nakanishi and Masaru Fukushi, ”Modeling and Performance Evaluation of Colluding Attack in Volunteer Computing Systems”, Proceedings of the International MultiConference of Engineers and Computer Scientists 2012, Vol. II, IMECS 2012, March 14-16, 2012, Hong Kong.
Silaghi C. Gheorghe, Dependable Resource Management Tools towards Automated Collaboration in Heterogeneous Computing Environments, Habilitation Thesis, Babes Bolyai University, Romenia, 2012.
Christoforou, Evgenia and Fernández Anta, Antonio and Georgiou, Chryssis and Mosteiro, Miguel A. Algorithmic Mechanisms for Reliable Master-Worker Internet-based Computing. IEEE Transactions on Computers. ISSN 0018-9340, 2012.
Fernández Anta, Antonio and Georgiou, Chryssis and López, Luis and Santos, Agustin (2012) Reliable Internet-based Master-Worker Computing in the Presence of Malicious Workers. Parallel Processing Letters, 22 (1).
Bendahmane, Ahmed and Essaaidi, Mohammad and Younes, Ali et al., ”A new mechanism to ensure integrity for MapReduce in cloud computing”, 2012 International Conference on Multimedia Computing and Systems (ICMCS), pp 785–790, 2012.
Bendahmane, Ahmed and Essaaidi, Mohammad and Moussaoui, Ahmed El and Younes, Ali, ”Result verification mechanism for MapReduce computation integrity in cloud computing”, 2012 International Conference on Complex Systems (ICCS), 2012.
W Viriyasitavat, A Martin, "A survey of trust in workflows and relevant contexts", Communications Surveys & Tutorials, 2012
Y Cui, M Li, Y Xiang, Y Ren et al. "A QoS-based fine-grained reputation system in the grid environment", 2012, Wiley.
A Mohaisen, "Towards Trustworthy Computing on Social Networks: Measurements and New Applications"
A Bendahmane, M Essaaidi et al., "A new mechanism to ensure integrity for MapReduce in cloud computing"
A Bendahmane, M Essaaidi et al., "Result verification mechanism for MapReduce computation integrity in cloud computing"
AJ Sánchez-Santiago, "Planificación local de tareas con sistemas basados en reglas borrosas. Aplicación a la detección de defectos en tableros de fibra"
Year 2011 : 9 citations
K., Watanabe, and Fukushi, M. and Kameyama, M., “Adaptive Group-Based Job Scheduling for High Performance and Reliable Volunteer Computing”, Journal of Information Processing, volume 19, pp. 39-51, 2011
Moca, M.; Silaghi, G.C.; Fedak, G.;Babes-Bolyai , “Distributed results checking for MapReduce in volunteer computing”, Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium o. May 2011. (DOI: 10.1109/IPDPS.2011.351)
Yongzhi Wang, Jinpeng Wei, "VIAF: Verification-Based Integrity Assurance Framework for MapReduce", Cloud Computing (CLOUD), 2011 IEEE International Conference on. DOI: 10.1109/CLOUD.2011.33
Hailong Sun, Jinpeng Huai, Xudong Liu, Jing Li, “RECON: a novel approach to fighting unreliability in peer-to-peer grids”, International Journal of Grid and Utility Computing (ISSN:1741-847X), pp 77-84, Volume 2, Number 2/2011, DOI: 10.1504/IJGUC.2011.040595 (http://inderscience.metapress.com/content/7w548p44225284w6/)
Viriyasitavat, W. Martin, A., "A Survey of Trust in Workflows and Relevant Contexts", Communications Surveys & Tutorials, IEEE, pp 1-30, Issue 99, 2011, DOI: 10.1109/SURV.2011.072811.00081
Wander, M.; Weis, T.; Wacker, A.; “Detecting Opportunistic Cheaters in Volunteer Computing”, Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), 2011, pp 1-6, DOI: 10.1109/ICCCN.2011.6006040
Bendahmane, A.; Essaaidi, M.; Moussaoui, A.E.; Younes, A., "Tolerating malicious resources to ensure safe computations in grid systems", 2011 International Conference on Multimedia Computing and Systems (ICMCS), DOI: 10.1109/ICMCS.2011.5945679
Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim, “SocialCloud: Using Social Networks for Building Distributed Computing Services”, CoRR, 2011.
Viriyasitavat, W.; Martin, A.; , "A Survey of Trust in Workflows and Relevant Contexts," Communications Surveys & Tutorials, IEEE , vol.PP, no.99, pp.1-30, 2011. (doi:10.1109/SURV.2011.072811.00081)
Year 2010 : 20 citations
Junseok Hwang, Jihyoun Park, Jorn Altmann, “Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods”, in book “Information Systems, Technology and Management”, pp 187-197, 2010.
Wang, Y., Nakao, A., “Poisonedwater: An improved approach for accurate reputation ranking in P2P networks” Future Generation Computer Systems, volume 26, issue 8, year 2010, pp. 1317 – 1326.
Papaioannou, T.G., Stamoulis, G.D, “coverReputation-based estimation of individual performance in collaborative and competitive grids”, Future Generation Computer Systems, volume 26, issue 8, pp. 1327 – 1335, 2010.
Bernard, Y., Klejnowski, L., Hahner, J., Muller-Schloer, C., “Towards trust in desktop grid systems”, Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 637—642, 2010.
Choi, S.J. and Buyya, R., “Group-based adaptive result certification mechanism in Desktop Grids”, Future Generation Computer Systems, volume 26, issue 5, pp. 776—786, 2010.
Bendahmane, A., Essaaidi, M., El Moussaoui, A., Younes, A., “Compromised Resources Tolerance in Grid Computing Systems”, Intelligent Distributed Computing IV, pp. 145—154, 2010.
Antonopoulos, N., Rana, O.F., “Management and optimisation of P2P and Grid systems with network economics”, Future Generation Computer Systems, volume 26, issue 8, pp. 1282—1284, 2010.
Canon, Louis-Claude, Jeannot, Emmanuel, Weissman, Jon, “A Scheduling Algorithm for Defeating Collusion”, Research Report, INRIA, RR-7403, October 2010
Hwang, J. and Kim, H.J. and Park, J., “Managing risks in an open computing environment using mean absolute deviation portfolio optimization”, Future Generation Computer Systems, volume 26, issue 8, pp. 1381-1390, 2010
Hwang, J. and Park, J. and Altmann, J., “Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods”, Information Systems, Technology and Management, pp. 187-197, 2010
Canon, L.C. and Jeannot, E. and Weissman, J., “A Scheduling Algorithm for Defeating Collusion”, 2010
Bendahmane, A. and Essaaidi, M. and El Moussaoui, A. and Younes, A., “Reputation-based Majority Voting for Malicious Grid Resources Tolerance”, Scalable Computing, pp. 385, 2010.
Canon, L.C., “Outils et algorithmes pour gérer l’incertitude lors de l’ordonnancement d’application sur plateformes distribuées”, PhD Thesis, Université Henri Poincarré – Nancy 1, France, 2010.
Bendahmane, Mohammad Essaaidi, Ahmed El Moussaoui, Ali Younes, "Reputation-based Majority Voting for Malicious Grid Resources Tolerance", Ahmed Scientific International Journal for Parallel and Distributed Computing, Vol 11, No 4 (2010) - (http://www.scpe.org/index.php/scpe/article/view/669)
K Watanabe, M Fukushi, S Horiguchi, “Expected-Credibility-Based Job Scheduling for Reliable Volunteer Computing”, IEICE TRANSACTIONS on Information and Systems 93(2), pp 306-314, 2010.
K Watanabe, M Fukushi, “Generalized Spot-Checking for Reliable Volunteer Computing”, IEICE TRANSACTIONS on Information and Systems 93(12), pp 3164-3172, 2010.
F. Taoab, Y. Hub, D. Zhaoc, Z. Zhoub, “Study of failure detection and recovery in manufacturing grid resource service scheduling”, International Journal of Production Research 48(1), pp 69-94, 2010. doi:10.1080/00207540802275871
K Watanabe, M Fukushi, S Horiguchi, “Generalized Spot-Checking for Sabotage-Tolerance in Volunteer Computing Systems”, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp 655-660, 2010.
Y. Bernard, L. Klejnowski, J. Hahner, C. Muller-Schloer, “Towards Trust in Desktop Grid Systems”, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp 637-642, 2010.
F. Georgatos, V. Gkamas, A. Ilias, G. Kouretis, E. Varvarigos, “A Grid-enabled CPU Scavenging Architecture and a Case Study of its Use in the Greek School Network”, Journal of Grid Computing 8(1), pp 61-75, 2010.
Year 2009 : 10 citations
J. Hwang, H.J. Kim, J. Park “Managing risks in an open computing environment using mean absolute deviation portfolio optimization”, Future Generation Computer Systems, 2009.
Y. Wang, A. Nakao, “Poisonedwater: An improved approach for accurate reputation ranking in P2P networks”, Future Generation Computer Systems, 2009.
Ana Cristina Oliveira, Lívia Sampaio, Stênio Flávio Fernandes, Francisco Brasileiro, "Adaptive Sabotage-Tolerant Scheduling for Peer-to-Peer Grids," ladc, pp.25-32, 2009 Fourth Latin American Symposium on Dependable Computing, 2009
S.J. Choi, R. Buyya, “Group-based adaptive result certification mechanism in Desktop Grids”, Future Generation Computer Systems, 2009.
T.G. Papaioannou, G.D. Stamoulis, “Reputation-based estimation of individual performance in collaborative and competitive grids”, Future Generation Computer Systems, 2009.
K Watanabe, M Fukushi, S Horiguchi, “Optimal Spot-checking for Computation Time Minimization in Volunteer Computing”, Journal of Grid Computing 7(4), pp 575-600, 2009.
W. Wei, J. Du, T. Yu, X. Gu, “SecureMR: A Service Integrity Assurance Framework for MapReduce”, Proceedings of the 2009 Annual Computer Security Applications Conference, pp 73-82, 2009.
K Watanabe, M Fukushi, S Horiguchi, “Collusion-Resistant Sabotage-Tolerance Mechanisms for Volunteer Computing Systems”, 2009 IEEE International Conference on e-Business Engineering, pp. 213-218, 2009.
J. Hwang, , H.J. Kim, J. Park, “Managing risks in an open computing environment using mean absolute deviation portfolio optimization”, Future Generation Computer Systems, 2009.
Oliveira, A.C. and Sampaio, L. and Fernandes, S.F. and Brasileiro, F., “Adaptive Sabotage-Tolerant Scheduling for Peer-to-Peer Grids”, 2009 Fourth Latin-American Symposium on Dependable Computing, pp. 25-32, 2009
Year 2008 : 2 citations
Constantinescu-Fuløp, Zoran, "A Desktop Grid Computing Approach for Scientific Computing and Visualization?, PhD Thesis, Norwegian University of Science and Technology, May 2008
Syed Naqvi, Stephane Mouton, Philippe Massonet, Gheorghe Cosmin Silaghi, Dominic Battré, Matthias Hovestadt, Karim Djemame, "Using SLA- Based Approach To Handle Sabotage Tolerance In The Grids?, From Grids to Service and Pervasive Computing, pp 153 162, Thierry Priol and Marco Vanneschi (eds), Springer-Verlag, ISBN: 978-0-387-09454-0, 2008.