Search For:

Displaying 1-50 out of 64 total
The Horus and Ensemble Projects: Accomplishments and Limitations
Found in: DARPA Information Survivability Conference and Exposition,
By Ken Birman, Bob Constable, Mark Hayden, Jason Hickey, Christoph Kreitz, Robbert Van Renesse, Ohad Rodeh, Werner Vogels
Issue Date:January 2000
pp. 0149
No summary available.
 
Amoeba: A Distributed Operating System for the 1990s
Found in: Computer
By Sape J. Mullender, Guido van Rossum, Andrew S. Tanenbaum, Robbert van Renesse, Hans van Staveren
Issue Date:May 1990
pp. 44-53
<p>A description is given of the Amoeba distributed operating system, which appears to users as a centralized system but has the speed, fault tolerance, security safeguards, and flexibility required for the 1990s. The Amoeba software is based on obje...
 
Workshop on Reliable Peer-to-Peer Distributed Systems
Found in: Reliable Distributed Systems, IEEE Symposium on
By Ozalp Babaoglu, Anne-Marie Kermarrec, Robbert van Renesse, Luis Rodrigues, Maarten van Steen, Amin Vadhat
Issue Date:October 2002
pp. 316
No summary available.
   
An Experiment in Formal Design Using Meta-Properties
Found in: DARPA Information Survivability Conference and Exposition,
By Mark Bickford, Christoph Kreitz, Robbert Van Renesse, Robert Constable
Issue Date:June 2001
pp. 1100
Abstract: Formal methods tools have greatly influenced our ability to increase the reliability of software and hardware systems by revealing errors and clarifying critical concepts. In this article we show how a rich specification language and a theorem pr...
 
Ironstack: Performance, Stability and Security for Power Grid Data Networks
Found in: 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Zhiyuan Teo,Vera Kutsenko,Ken Birman,Robbert Van Renesse
Issue Date:June 2014
pp. 792-797
Operators of the nationwide power grid use proprietary data networks to monitor and manage their power distribution systems. These purpose-built, wide area communication networks connect a complex array of equipment ranging from PMUs and synchrophasers to ...
 
The Energy Efficiency of Database Replication Protocols
Found in: 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Nicolas Schiper,Fernando Pedone,Robbert Van Renesse
Issue Date:June 2014
pp. 407-418
Replication is a widely used technique to provide high-availability to online services. While being an effective way to mask failures, replication comes at a price: at least twice as much hardware and energy are required to mask a single failure. In a cont...
 
Developing Correctly Replicated Databases Using Formal Tools
Found in: 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Nicolas Schiper,Vincent Rahli,Robbert Van Renesse,Marck Bickford,Robert L. Constable
Issue Date:June 2014
pp. 395-406
Fault-tolerant distributed systems often contain complex error handling code. Such code is hard to test or model-check because there are often too many possible failure scenarios to consider. As we will demonstrate in this paper, formal methods have evolve...
 
Scalable State-Machine Replication
Found in: 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Carlos Eduardo Bezerra,Fernando Pedone,Robbert Van Renesse
Issue Date:June 2014
pp. 331-342
State machine replication (SMR) is a well-known technique able to provide fault-tolerance. SMR consists of sequencing client requests and executing them against replicas in the same order, thanks to deterministic execution, every replica will reach the sam...
 
Application-driven TCP recovery and non-stop BGP
Found in: 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Robert Surton,Ken Birman,Robbert van Renesse
Issue Date:June 2013
pp. 1-12
Some network protocols tie application state to underlying TCP connections, leading to unacceptable service outages when an endpoint loses TCP state during fail-over or migration. For example, BGP ties forwarding tables to its control plane connections so ...
 
Secure Abstraction with Code Capabilities
Found in: 2013 21st Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP)
By Robbert van Renesse,Havard Johansen,Nihar Naigaonkar,Dag Johansen
Issue Date:February 2013
pp. 542-546
We propose embedding executable code fragments in cryptographically protected capabilities to enable flexible discretionary access control in cloud-like computing infrastructures. We demonstrate how such a code capability mechanism can be implemented compl...
 
A diversified and correct-by-construction broadcast service
Found in: 2012 20th IEEE International Conference on Network Protocols (ICNP)
By Vincent Rahli,Nicolas Schiper,Robbert Van Renesse,Mark Bickford,Robert L. Constable
Issue Date:October 2012
pp. 1-6
We present a fault-tolerant ordered broadcast service that is correct-by-construction. Our broadcast service allows for diversity in space, whereby the participants in the broadcast protocol run different code, as well as in time, whereby the protocol itse...
 
Routers for the Cloud: Can the Internet Achieve 5-Nines Availability?
Found in: IEEE Internet Computing
By Andrei Agapi,Ken Birman,Robert M. Broberg,Chase Cotton,Thilo Kielmann,Martin Millnert,Rick Payne,Robert Surton,Robbert van Renesse
Issue Date:September 2011
pp. 72-77
Today's Internet often suffers transient outages, but as increasingly critical services migrate to the cloud, much higher levels of Internet availability will be necessary.
 
Slicing Distributed Systems
Found in: IEEE Transactions on Computers
By Vincent Gramoli, Ymir Vigfusson, Ken Birman, Anne-Marie Kermarrec, Robbert van Renesse
Issue Date:November 2009
pp. 1444-1455
Peer-to-peer (P2P) architectures are popular for tasks such as collaborative download, VoIP telephony, and backup. To maximize performance in the face of widely variable storage capacities and bandwidths, such systems typically need to shift work from poor...
 
A Scalable Services Architecture
Found in: Reliable Distributed Systems, IEEE Symposium on
By Tudor Marian, Ken Birman, Robbert van Renesse
Issue Date:October 2006
pp. 289-300
Data centers constructed as clusters of inexpensive machines have compelling cost-performance benefits, but developing services to run on them can be challenging. This paper reports on a new framework, the Scalable Services Architecture (SSA), which helps ...
 
Defense against Intrusion in a Live Streaming Multicast System
Found in: Peer-to-Peer Computing, IEEE International Conference on
By Maya Haridasan, Robbert van Renesse
Issue Date:June 2006
pp. 185-192
Application-level multicast systems are vulnerable to attacks that impede nodes from receiving desired data. Live streaming protocols are especially susceptible to packet loss induced by malicious behavior. We describe SecureStream, an application-level li...
 
Adding High Availability and Autonomic Behavior to Web Services
Found in: Software Engineering, International Conference on
By Ken Birman, Robbert van Renesse, Werner Vogels
Issue Date:May 2004
pp. 17-26
Rapid acceptance of the Web Services architecture promises to make it the most widely supported and popular object-oriented architecture to date. One consequence is that a wave of mission-critical Web Services applications will certainly be deployed in com...
 
Collaborative Networking in an Uncooperative Internet
Found in: Reliable Distributed Systems, IEEE Symposium on
By Robbert van Renesse, Dan Dumitriu
Issue Date:October 2002
pp. 51
Collaborative applications often require peer-to-peer interaction and peer discovery mechanisms. In today?s Internet, Firewall and NAT technology, and a lack of support of IP multicast, have made it very difficult to support such applications. Application ...
 
Implementing IPv6 as a Peer-to-Peer Overlay Network
Found in: Reliable Distributed Systems, IEEE Symposium on
By Lidong Zhou, Robbert van Renesse, Michael Marsh
Issue Date:October 2002
pp. 347
This paper proposes to implement an IPv6 routing infrastructure as a self-organizing overlay network on top of the current IPv4 infrastructure. The overlay network builds upon a distributed IPv6 edge router with a master/slave architecture. We show how dif...
 
Power-Aware Epidemics
Found in: Reliable Distributed Systems, IEEE Symposium on
By Robbert van Renesse
Issue Date:October 2002
pp. 358
Epidemic protocols have been heralded as appropriate for wireless sensor networks. The nodes in such networks have limited battery resources. In this paper, we investigate the use of power in three styles of epidemic protocols: basic epidemics, neighborhoo...
 
A Collaborative Infrastructure for Scalable and Robust News Delivery
Found in: Distributed Computing Systems Workshops, International Conference on
By Werner Vogels, Chris Re, Robbert van Renesse, Ken Birman
Issue Date:July 2002
pp. 655
In this paper we describe the model used for the NewsWire collaborative content delivery system. The system builds on the robustness and scalability of Astrolabe to weave a peer-to-peer infrastructure for real-time delivery of news items. The goal of the s...
 
Optimizing Buffer Management for Reliable Multicast
Found in: Dependable Systems and Networks, International Conference on
By Zhen Xiao, Kenneth P. Birman, Robbert van Renesse
Issue Date:June 2002
pp. 187
<p>Reliable multicast delivery requires that a multicast message be received by all members in a group. Hence certain or all members need to buffer messages for possible retransmissions. Designing an efficient buffer management algorithm is challengi...
 
Scalable Fault-Tolerant Aggregation in Large Process Groups
Found in: Dependable Systems and Networks, International Conference on
By Indranil Gupta, Robbert Van Renesse, Kenneth P. Birman
Issue Date:July 2001
pp. 0433
Abstract: This paper discusses fault-tolerant, scalable solutions to the problem of accurately and scalably calculating global aggregate functions in large process groups communicating over unreliable networks. These groups could represent sensors or proce...
 
Spinglass: Secure and Scalable Communication Tools for Mission-Critical Computing
Found in: DARPA Information Survivability Conference and Exposition,
By Kenneth P. Birman, Robbert Van Renesse, Werner Vogels
Issue Date:June 2001
pp. 1085
Abstract: Most existing communications technologies are either not scalable at all, or scale only under carefully controlled conditions. This threatens an emerging generation of mission-critical but very large computing systems, which will need communicati...
 
Protocol Switching: Exploiting Meta-Properties
Found in: Distributed Computing Systems Workshops, International Conference on
By Xiaoming Liu, Robbert van Renesse, Mark Bickford, Christoph Kreitz, Robert Constable
Issue Date:April 2001
pp. 0037
Abstract: As we see a growing variety of network and application behaviors, it becomes more important that protocols adapt to their surroundings. Building adaptive protocols is complicated, and therefore we have considered building hybrid protocols that sw...
 
Scalable and Secure Resource Location
Found in: Hawaii International Conference on System Sciences
By Robbert Van Renesse
Issue Date:January 2000
pp. 4012
In this paper we present Captain Cook, a service that continuously monitors resources in the Internet, and allows clients to locate resources using this information. Captain Cook maintains a tree-based representation of all the collected resource informati...
   
Six Misconceptions about Reliable Distributed Computing
Found in: High-Performance Distributed Computing, International Symposium on
By Werner Vogels, Robbert Van Renesse, Ken Birman
Issue Date:August 1999
pp. 36
This paper describes how experiences with building industrial strength distributed applications have dramatically changed the assumptions about what tools are needed to build these systems.
 
An Execution Service for a Partitionable Low Bandwidth Network
Found in: Fault-Tolerant Computing, International Symposium on
By Takako M. Hickey, Robbert Van Renesse
Issue Date:June 1999
pp. 174
As the amount of scientific data grows to the point where the Internet bandwidth no longer supports its transfer, it becomes necessary to make powerful computational services available near data repositories. Such services allow remote researchers to start...
 
The Hierarchical Daisy Architecture for Causal Delivery
Found in: Distributed Computing Systems, International Conference on
By Roberto Baldoni, Roy Friedman, Robbert van Renesse
Issue Date:May 1997
pp. 570
In this paper, we propose the hierarchical daisy architecture, which provides causal delivery of messages sent to any subset of processes. The architecture provides fault tolerance and maintains the amount of control information within a reasonable size. I...
 
Implementing distributed algorithms using remote procedure calls
Found in: Managing Requirements Knowledge, International Workshop on
By Henri E. Bal, Robbert van Renesse, Andrew S. Tanenbaum
Issue Date:June 1987
pp. 499
No summary available.
   
Omni-Kernel: An Operating System Architecture for Pervasive Monitoring and Scheduling
Found in: IEEE Transactions on Parallel and Distributed Systems
By Age Kvalnes,Dag Johansen,Robbert van Renesse,Steffen Valvag,Fred Schneider
Issue Date:February 2015
pp. 1
This paper presents the omni-kernel architecture, a novel operating system architecture designed around the basic premise of pervasive monitoring and scheduling. Motivated by new requirements in virtualized environments, the architecture ensures that all r...
 
Navigating in the Storm: Using Astrolabe for Distributed Self-Configuration, Monitoring and Adaptation
Found in: International Workshop on Active Middleware Services
By Kenneth P. Birman, Robbert van Renesse, James Kaufman, Werner Vogels
Issue Date:June 2003
pp. 4
The dramatic growth of computer networks creates both an opportunity and a daunting distributed computing problem for users seeking to build applications that can configure themselves and adapt as disruptions occur. The problem is that data often resides o...
 
Packing Messages as a Tool for Boosting the Performance of Total Ordering Protocls
Found in: High-Performance Distributed Computing, International Symposium on
By Toy Friedman, Robbert Van Renesse
Issue Date:August 1997
pp. 233
This paper compares the throughput and latency of four protocols that provide total ordering. Two of these protocols are measured with and without message packing. We used a technique that buffers application messages for a short period of time before send...
 
Optimizing Layered Communication Protocols
Found in: High-Performance Distributed Computing, International Symposium on
By Mark Hayden, Robbert Van Renesse
Issue Date:August 1997
pp. 169
Layering of communication protocols offers many well-known advantages but typically leads to performance inefficiencies. We present a model for layering, and point out where the performance problems occur in stacks of layers using this model. We then inves...
 
FLIP: an internetwork protocol for supporting distributed systems
Found in: ACM Transactions on Computer Systems (TOCS)
By Andrew S. Tanenbaum, Hans van Staveren, M. Frans Kaashoek, Robbert van Renesse
Issue Date:February 1992
pp. 73-106
Most modern network protocols give adequate support for traditional applications such as file transfer and remote login. Distributed applications, however, have different requirements (e.g., efficient at-most-once remote procedure call even in the face of ...
     
An analysis of Facebook photo caching
Found in: Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles (SOSP '13)
By Harry C. Li, Ken Birman, Qi Huang, Robbert van Renesse, Sanjeev Kumar, Wyatt Lloyd
Issue Date:November 2013
pp. 167-181
This paper examines the workload of Facebook's photo-serving stack and the effectiveness of the many layers of caching it employs. Facebook's image-management infrastructure is complex and geographically distributed. It includes browser caches on end-user ...
     
Refining the way to consensus
Found in: Proceedings of the 28th ACM symposium on Principles of distributed computing (PODC '09)
By Robbert Van Renesse
Issue Date:August 2009
pp. 1-1
In the movie "The Matrix," our hero Neo must choose between taking the Blue Pill and continuing to live in an online, synthesized fantasy world, or taking the Red Pill and joining the real world. The fantasy world appears to those living in it to be full o...
     
Using live distributed objects for office automation: demo proposal
Found in: Proceedings of the ACM/IFIP/USENIX international middleware conference companion on Middleware '08 Companion (Companion '08)
By Jong Hoon Ahnn, Ken Birman, Krzysztof Ostrowski, Robbert Van Renesse
Issue Date:December 2008
pp. 31-36
Web services and platforms such as .NET make it easy to integrate interactive end-user applications with backend services. However, it remains hard to build collaborative applications in which information is shared within teams. We present a new drag-and-d...
     
Using live distributed objects for office automation
Found in: Proceedings of the ACM/IFIP/USENIX international middleware conference companion on Middleware '08 Companion (Companion '08)
By Jong Hoon Ahnn, Ken Birman, Krzysztof Ostrowski, Robbert Van Renesse
Issue Date:December 2008
pp. 31-36
Web services and platforms such as .NET make it easy to integrate interactive end-user applications with backend services. However, it remains hard to build collaborative applications in which information is shared within teams. This paper introduces a new...
     
Efficient reconciliation and flow control for anti-entropy protocols
Found in: Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware (LADIS '08)
By Chris Thomas, Dan Dumitriu, Robbert van Renesse, Valient Gough
Issue Date:September 2008
pp. 1-36
The paper shows that anti-entropy protocols can process only a limited rate of updates, and proposes and evaluates a new state reconciliation mechanism as well as a flow control scheme for anti-entropy protocols.
     
Challenges facing tomorrow's datacenter: summary of the LADiS workshop
Found in: Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware (LADIS '08)
By Christopher Stewart, Doug Terry, Franco Travostino, Mike Spreitzer, Robbert van Renesse, Rodrigo Rodrigues
Issue Date:September 2008
pp. 1-36
The 2008 workshop on Large-Scale Distributed Systems and Middleware (LADiS) addressed challenges facing tomorrow's datacenter. Over the course of three days, attendees laid forth an ambitious research agenda that covered hot topics, ranging from fault-tole...
     
A fast distributed slicing algorithm
Found in: Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing (PODC '08)
By Anne-Marie Kermarrec, Ken Birman, Robbert van Renesse, Vincent Gramoli, Ymir Vigfusson
Issue Date:August 2008
pp. 13-14
Atomic (linearizable) read/write memory is a fundamental abstractions in distributed computing. Following a seminal implementation of atomic memory of Attiya et al. [6], a folklore belief developed that in messaging-passing atomic memory implementations "r...
     
MISTRAL:: efficient flooding in mobile ad-hoc networks
Found in: Proceedings of the seventh ACM international symposium on Mobile ad hoc networking and computing (MobiHoc '06)
By Ken Birman, Mahesh Balakrishnan, Robbert van Renesse, Stefan Pleisch
Issue Date:May 2006
pp. 1-12
Flooding is an important communication primitive in mobile ad-hoc networks and also serves as a building block for more complex protocols such as routing protocols. In this paper, we propose a novel approach to flooding, which relies on proactive compensat...
     
APSS: proactive secret sharing in asynchronous systems
Found in: ACM Transactions on Information and System Security (TISSEC)
By Fred B. Schneider, Lidong Zhou, Robbert Van Renesse
Issue Date:August 2005
pp. 259-286
APSS, a proactive secret sharing (PSS) protocol for asynchronous systems, is explained and proved correct. The protocol enables a set of secret shares to be periodically refreshed with a new, independent set, thereby thwarting mobile-adversary attacks. Pro...
     
Environment mobility: moving the desktop around
Found in: Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing
By Dag Johansen, Havard Johansen, Robbert van Renesse
Issue Date:October 2004
pp. 150-154
In this position paper, we focus on issues related to middleware support for software mobility in ad hoc and pervasive systems. In particular, we are interested in moving the computational environment of a mobile user following his or her trajectory. We pr...
     
SelectCast: a scalable and self-repairing multicast overlay routing facility
Found in: Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security (SSRS '03)
By Adrian Bozdog, Dan Dumitriu, Robbert van Renesse
Issue Date:October 2003
pp. 33-42
In this paper we describe SelectCast, a self-repairing multicast overlay routing facility for supporting publish/subscribe applications. Select Cast is a peer-to-peer protocol, and lever-ages Astrolabe, a secure distributed information management system. S...
     
Distributing media transformation over multiple media gateways
Found in: Proceedings of the ninth ACM international conference on Multimedia (MULTIMEDIA '01)
By Robbert van Renesse, Wei Tsang Ooi
Issue Date:September 2001
pp. 159-168
Media gateways have been proposed as a solution to the network heterogeneity problem in media multicasting. Services on the gateways transform media streams as they flow through the gateways. In this paper, we present our work on composable services in med...
     
An adaptive protocol for locating programmable media gateways
Found in: Proceedings of the eighth ACM international conference on Multimedia (MULTIMEDIA '00)
By Robbert van Renesse, Wei Tsang Ooi
Issue Date:October 2000
pp. 137-145
We describe a new control protocol called Adaptive Gateway Location Protocol (AGLP). In this protocol, a client requests a computation on a multimedia stream. AGLP discovers programmable Internet servers that process multimedia streams, and assigns the com...
     
Fast protocol transition in a distributed environment (brief announcement)
Found in: Proceedings of the nineteenth annual ACM symposium on Principles of distributed computing (PODC '00)
By Robbert van Renesse, Xiaoming Liu
Issue Date:July 2000
pp. 341
Adaptivity is a desired feature of the distributed systems. Because many characteristics of the environment (network topology, active process distribution, etc.) may change from time to time, a good system should be able to adapt itself and perform suffici...
     
Building reliable, high-performance communication systems from components
Found in: Proceedings of the seventeenth ACM symposium on Operating systems principles (SOSP '99)
By Christoph Kreitz, Jason Hickey, Kenneth Birman, Mark Hayden, Robbert van Renesse, Robert Constable, Xiaoming Liu
Issue Date:December 1999
pp. 180-189
Although building systems from components has attractions, this approach also has problems. Can we be sure that a certain configuration of components is correct? Can it perform as well as a monolithic system? Our paper answers these questions for the Ensem...
     
Six misconceptions about reliable distributed computing
Found in: Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications (EW-8)
By Ken Birman, Robbert van Renesse, Werner Vogels
Issue Date:September 1998
pp. 276-279
The predominant use of point-to-point communication protocols on the global Internet, combined with the communication patterns imposed by the World Wide Web, make inefficient use of the Internet's increasingly scarce network bandwidth. While more network f...
     
 1  2 Next >>