Advertisement

Research problems of decentralized systems with largely autonomous nodes

  • J. H. Saltzer
Chapter 4: Future Outlook And Research Problems
Part of the Lecture Notes in Computer Science book series (LNCS, volume 60)

Abstract

The various problems suggested here are by no means independent of one another, although each seems to have a flavor of its own. In addition, they probably do not span the complete range of issues that should be explored in establishing an appropriate semantics for expressing computations in a confederacy of loosely coupled, autonomous computer systems. Further, some are recognizable as problems of semantics of centralized systems that were never solved very well. But they do seem to represent a starting point that can to lead to more carefully framed questions and eventually some new conceptual insight.

Keywords

Entry Cost Distribute Computing System Decentralize System Operating System Principle Stanford Research Institute 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alsberg, P.A., Belford, G.G., Day, J.D., and Grapa, E., "Multi-Copy Resiliency Techniques," University of Illinois Center for Advanced Computation Document #202, May, 1976.Google Scholar
  2. Arvind, et al., "Programming in a viable data flow language," Univ. of Calif. (Irvine) Department of Information and Computer Science, Technical Report 89.Google Scholar
  3. Bishop, P.B., "Computer Systems with a Very Large Address Space and Garbage Collection," Ph.D. thesis, M.I.T. Department of Electrical Engineering and Computer Science, May, 1977, also Laboratory for Computer Science Technical Report TR-178.Google Scholar
  4. Branstad, D.K., "Encryption Protection in Computer Data Communications," Proc. Fourth Data Communications Symposium, Quebec, October, 1975, pp. 8.1–8.7.Google Scholar
  5. Cerf, V.G., and Kahn, R.E., "A Protocol for Packet Network Interconnection," IEEE Trans. on Communications 22, 5 (May, 1974) pp. 637–648.Google Scholar
  6. d'Oliveira, C., "A Conjecture About Computer Decentralization," B.S. thesis, M.I.T. Department of Electrical Engineering and Computer Science, August, 1977.Google Scholar
  7. Dennis, J.B., "First Version of a Data Flow Procedure Language," M.I.T. Laboratory for Computer Science Technical Memo TM-61, May, 1975.Google Scholar
  8. Diffie, W., and Hellman, M.E., "New Directions in Cryptography," IEEE Trans. on Info. Theory 22, 6 (November, 1976) pp. 644–654.Google Scholar
  9. Donnelley, J.E., "A Distributed Capability Computing System (DCCS)," ARPANET Request for Comments #712, Network Information Center, Stanford Research Institute, Menlo Park, California, February, 1976.Google Scholar
  10. Ellis, C.A., "Consistency and Correctness of Duplicate Database Systems," Sixth ACM Symposium on Operating System Principles, November, 1977, pp. 67–84.Google Scholar
  11. Eswaran, K.P., et al., "The Notions of Consistency and Predicate Locks in a Database System," Comm. of ACM 19, 11 (November, 1976) pp. 624–633.Google Scholar
  12. Farber, D.J., and Heinrich, F.R., "The Structure of a Distributed Computer System: The Distributed File System," Proc. First Int. Conf. on Computer Comm., 1972, pp. 364–370.Google Scholar
  13. Feinler, E., and Postel, J., ARPANET Protocol Handbook, NIC 7104, Network Information Center, Stanford Research Institute, Menlo Park, California, April, 1976.Google Scholar
  14. Hewitt, C., "Viewing Control Structures as Patterns of Passing Messages," to be published in A.I. Journal.Google Scholar
  15. Karger, P., "Non-Discretionary Access Control for Decentralized Computing Systems," M.S. thesis, M.I.T. Department of Electrical Engineering and Computer Science, May, 1977, also Laboratory for Computer Science Technical Report TR-179.Google Scholar
  16. Kent, S.T., "Encryption-Based Protection Protocols for Interactive User-Computer Communication," S.M. thesis, M.I.T. Department of Electrical Engineering and Computer Science, May, 1976, also Laboratory for Computer Science Technical Report TR-162.Google Scholar
  17. Lamport, L., "Time, Clocks, and the Ordering of Events in a Distributed System," Mass. Computer Associates Technical Report CA-7603-2911, March, 1976.Google Scholar
  18. Lamport, L., "The Synchronization of Independent Processes," Acta Informatica, 7, 1976, pp. 15–34.Google Scholar
  19. Lampson, B., and Sturgis, H., "Crash Recovery in a Distributed Data Storage System," to be published in the Comm. of ACM.Google Scholar
  20. Levine, P.H., "Facilitating Interprocess Communication in a Heterogeneous Network Environment," S.M. thesis, M.I.T. Department of Electrical Engineering and Computer Science, June, 1977.Google Scholar
  21. Liskov, B.H., and Zilles, S., "Specification Techniques for Data Abstraction," IEEE Trans. Software Engineering SE-1, 1, (1975) pp. 7–19.Google Scholar
  22. Liskov, B.H., et al., "Abstraction Mechanisms in CLU," Comm. of ACM 20, 8 (August, 1977), pp. 564–576.Google Scholar
  23. Metcalfe, R.M., and Boggs, D.R., "Ethernet: Distributed Packet Switching for Local Computer Networks," Comm. of ACM 19, 7 (July, 1976) pp. 395–404.Google Scholar
  24. Millstein, R.E., "Second Semi-Annual Report," Massachusetts Computer Associates Report CADD-7608-1611, August, 1976.Google Scholar
  25. Montgomery, W., "Measurements of Sharing in Multics," Sixth ACM Symposium on Operating Systems Principles, November, 1977, pp. 85–90.Google Scholar
  26. Reed, D.P., and Kanodia, R.J., "Synchronization with Eventcounts and Sequencers," to appear in the Comm. of ACM.Google Scholar
  27. Rothnie, J.B., et al., "The Redundant Update Methodology of SDD-1: A System for Distributed Databases," Computer Corporation of America Report CCA-77-02, February, 1977.Google Scholar
  28. Rowe, L.A., Hopwood, M.D., and Farber, D.J., "Software Methods for Achieving Fail-Soft Behavior in the Distributed Computing System," Proc. IEEE Symposium on Computer Software Reliability, 1973, pp. 7–11.Google Scholar
  29. Stearns, R.E., et al., "Concurrency Control for Database Systems," extended abstract, IEEE Symposium on Foundations of Computer Science, CH1133-8 C, October, 1976, pp. 19–32.Google Scholar
  30. Thomas, R.H., "A Resource Sharing Executive for the ARPANET," Proc. AFIPS Nat. Comp. Conf., 1973, pp. 155–163.Google Scholar
  31. Thomas, R.H., "A Solution to the Update Problem for Multiple Copy Data Bases Which Use Distributed Control," Bolt Beranek and Newman Report #3340, July, 1976.Google Scholar
  32. Wulf, W.A., et al., "An Introduction to the Construction and Verification of Alphard Programs," IEEE Trans. on Software Engineering SE-2, 4 (December, 1976) pp. 253–265.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1978

Authors and Affiliations

  • J. H. Saltzer
    • 1
  1. 1.Massachusetts Institute of TechnologyCambridgeUSA

Personalised recommendations