1998
DOI: 10.1109/71.735957
|View full text |Cite
|
Sign up to set email alerts
|

The Hector distributed run-time environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

1999
1999
2007
2007

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…There have been several e orts to make theories practical and to compare these protocols 4,10,11,15,17,18,20]. The previous works employed some subset of recovery protocols, and evaluated their performance using applications running on small datasets.…”
Section: Introductionmentioning
confidence: 99%
“…There have been several e orts to make theories practical and to compare these protocols 4,10,11,15,17,18,20]. The previous works employed some subset of recovery protocols, and evaluated their performance using applications running on small datasets.…”
Section: Introductionmentioning
confidence: 99%
“…At present, research is on-going to develop intelligent agents to perform task allocation for a heterogeneous computing environment [10]. Implementation of many of the functions of the human immune system described in this paper are being demonstrated in an H-cell implementation based on a hierarchical ART architecture [11].…”
Section: H-cells and S-cells As Intelligent Agents For Task Allocationmentioning
confidence: 99%
“…An intelligent control agent (ICA) based on the H-cell is being implemented to replace the slave agent used in the HECTOR system that helps globally manage the heterogeneous system [10]. The artificial immune based scheduling system is designed around the decentralized decision-making of the ICAs.…”
Section: Implementation In the Hector Environmentmentioning
confidence: 99%
“…Thus, it cannot manage hardware failures. Hector [16] performs a coordinated checkpointing using hierarchical process managers which create and migrate application processes. Before the checkpointing, every process closes its channel connections to ensure that there is no in-transit messages left in the network.…”
Section: Related Workmentioning
confidence: 99%