2001
DOI: 10.1016/s1389-1286(00)00178-x
|View full text |Cite
|
Sign up to set email alerts
|

Hitting the distributed computing sweet spot with TSpaces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0
2

Year Published

2002
2002
2017
2017

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 64 publications
(37 citation statements)
references
References 3 publications
0
32
0
2
Order By: Relevance
“…These proposals for security in the tuple space model have a very limited focus since they consider only simple attacks like invalid access or use weak cryptography mechanisms, which are not enough to ensure the security of the stored information. Other systems provide some level of faulttolerance by using the concept of transactions [35][36][37]. Table 4 compares the features provided by these tuple space approaches and the solutions proposed in this paper.…”
Section: Related Workmentioning
confidence: 99%
“…These proposals for security in the tuple space model have a very limited focus since they consider only simple attacks like invalid access or use weak cryptography mechanisms, which are not enough to ensure the security of the stored information. Other systems provide some level of faulttolerance by using the concept of transactions [35][36][37]. Table 4 compares the features provided by these tuple space approaches and the solutions proposed in this paper.…”
Section: Related Workmentioning
confidence: 99%
“…tuple spaces, or "blackboards", a concurrent access memory implementation, as originally provided by Linda [10], and now available in JavaSpaces [8] (Java/Jini), TSpaces [20] (Java), Rinda [30] (Ruby); 2. a relational database management system (RDBMS), for a query oriented approach; 3. conventional object-oriented collections, with external state represented as an opaque object (the structure being defined by the agents), directly stored in the collection; such collections can be made to operate atomically; the requirement for the environment server to augment the states with additional information can be supported using the Decorator pattern [9].…”
Section: Repositorymentioning
confidence: 99%
“…Finally, as shown in Figure 15 the data layer can be implemented with a wide variety of mechanisms. These range from centralized memory based data structures (such as a hash map), to traditional forms of persistent storage (such as network file systems, or relational databases), or distributed storage systems (such as Linda-like tuple spaces [11] like TSpaces [29] or JavaSpaces [16])…”
Section: State Information Storagementioning
confidence: 99%