Filters








3,492 Hits in 3.4 sec

System support for object groups

Rachid Guerraoui, Pascal Felber, Benoît Garbinato, Karim Mazouni
1998 SIGPLAN notices  
It was quite easy to achieve group transparency but we were confronted with a strong mismatch between the rigidity of the process group model and the flexible nature of object interactions.  ...  Our first experience aimed at building support for Smalltalk object replication using the Isis process group toolkit.  ...  Since our objective is to compare the cost of a transparent group invocation with that of a standard remote invocations (i.e., with the invocation of a non-replicated object), we measured only failure-free  ... 
doi:10.1145/286942.286961 fatcat:xbeg4cezmjep7izha6zs7qvga4

System support for object groups

Rachid Guerraoui, Pascal Felber, Benoît Garbinato, Karim Mazouni
1998 Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications - OOPSLA '98  
It was quite easy to achieve group transparency but we were confronted with a strong mismatch between the rigidity of the process group model and the flexible nature of object interactions.  ...  Our first experience aimed at building support for Smalltalk object replication using the Isis process group toolkit.  ...  Since our objective is to compare the cost of a transparent group invocation with that of a standard remote invocations (i.e., with the invocation of a non-replicated object), we measured only failure-free  ... 
doi:10.1145/286936.286961 dblp:conf/oopsla/GuerraouiFGM98 fatcat:ocs4yu2ffbcbrn6cn3pjnpnsde

The Jgroup Distributed Object Model [chapter]

Alberto Montresor
1999 Distributed Applications and Interoperable Systems II  
Jgroup consists of a partitionable group communication service that simplifies the cooperation among groups of replicated server objects, and a client-side mechanism to transparently invoke methods on  ...  object groups as if they were single, non-replicated entities.  ...  Each stub contains a remote reference that identifies the remote object and is responsible for the invocation protocol.  ... 
doi:10.1007/978-0-387-35565-8_31 fatcat:pqxb5eaf5vdxvj6r5ieegc6kk4

Integrating Distributed Composite Objects into Java Environment [chapter]

Guray Yilmaz, Nadia Erdogan
2004 Lecture Notes in Computer Science  
It allows the representation of an object as a collection of sub-objects and enhances the object distribution concept by implementing replication at the sub-object level and only when demanded.  ...  This paper introduces a new programming model for distributed systems, distributed composite objects (DCO), to meet efficient implementation, transparency, and performance demands of distributed applications  ...  With this replication scheme, SOs are replicated dynamically on remote address spaces upon method invocation requests.  ... 
doi:10.1007/978-3-540-30198-1_33 fatcat:hdbjthkfy5bwvccdd4qc44cdbe

A Concept of Replicated Remote Method Invocation [chapter]

Jerzy Brzezinski, Cezary Sobaniec
2004 Lecture Notes in Computer Science  
In this paper we present a new infrastructure for building distributed applications that communicate through remote objects.  ...  The objects are available by the use of the Java RMI, enhanced by replication. Shared objects may be arbitrary complex with references to other objects allowing nested invocations.  ...  Replicated Remote Method Invocation (RRMI) is an efficient object replication infrastructure that will increase the availability of shared remote objects.  ... 
doi:10.1007/978-3-540-24688-6_13 fatcat:umui37ho5nhifmobyawsez5fjy

FORMI

Rüdiger Kapitza, Michael Kirstein, Holger Schmidt, Franz J. Hauck
2005 Proceedings of the 4th workshop on Reflective and adaptive middleware systems - ARM '05  
RMI is a well-known middleware that smoothly integrates into Java. RMI uses classical RPC-based client-server interaction, precisely remote method calls.  ...  structure (e.g., replicated servers, smart proxies, hierarchical servers).  ...  Thus, these helper objects enable distribution-transparent invocations on remote objects.  ... 
doi:10.1145/1101516.1101518 dblp:conf/middleware/KapitzaKSH05 fatcat:3ulwwul4gvhn5kpxsfsoijr3ta

How to avoid the cost of causal communication in large-scale systems

Luis Rodrigues, Paulo Veríssimo
1994 Proceedings of the 6th workshop on ACM SIGOPS European workshop Matching operating systems to application needs - EW 6  
The protocol, called GRIP, provides flexible support for the construction of replication-transparent remote invocation of replicated services.  ...  We have recently developed a remote invocation protocol having large-scale in mind [12] .  ... 
doi:10.1145/504390.504420 dblp:conf/sigopsE/RodriguesV94 fatcat:xsb7bwzq7nfchasvz2r6mhfere

DCOBE: Distributed Composite Object-Based Environment

G. Yilmaz
2005 Computer journal  
Remote method invocation basically uses the same technique as RPC [7] and, when combined with object serialization (JAVA RMI), it forms a powerful technique for transparently invoking remote objects.  ...  The majority of work on distributed object models follows an approach that allows clients to transparently access an object through remote method invocations.  ...  With this replication scheme, subobjects are dynamically replicated on remote address spaces upon method invocation requests.  ... 
doi:10.1093/comjnl/bxh084 fatcat:3oed4e6pqrhy7d25r7p7ldelr4

Middleware for dependable network services in partitionable distributed systems

Alberto Montresor, Renzo Davoli, Özalp Babaoğlu
2001 ACM SIGOPS Operating Systems Review  
Jgroup supports a programming paradigm called object groups and enables development of dependable network services based on replication.  ...  Among the novel features of Jgroup is a uniform object-oriented interface for programming both services and their clients.  ...  The remote method invocation facility of JavaGroups is not transparent, as it is based on the exchange of objects that encode method invocation descriptions.  ... 
doi:10.1145/371455.371463 fatcat:4vbkfipz4zeqbgsdgemo4rhtia

Friends: A flexible architecture for implementing fault tolerant and secure distributed applications [chapter]

Jean-Charles Fabre, Tanguy Pérennou
1996 Lecture Notes in Computer Science  
Flexibility is increased by a recursive use of metaobjects. Examples and experiments are also described.  ...  Transparency and separation of concerns is provided not only to the application programmer but also to the programmers implementing metaobjects for fault tolerance, secure communication and distribution  ...  Handling Distribution The idea here is to provide a set of metaobjects classes providing access to remote, replicated and/or shared objects.  ... 
doi:10.1007/3-540-61772-8_27 fatcat:i3qggtbxx5fchjsuzb2n3nnipm

FlexiNet: A Flexible, Component-Oriented Middleware System [chapter]

Richard Hayton, Andrew Herbert
2000 Lecture Notes in Computer Science  
For example, all the layers in a typical remote method invocation stack could be implemented as one module, in order to increase performance.  ...  We use the ODP notion of interfaces as the access points for objects, and provide transparent interface proxies, so that objects may be accessed remotely.  ... 
doi:10.1007/3-540-46475-1_21 fatcat:7ssca73kcnbutgnyc3spnbwnva

Distributed Composite Objects: A New Object Model for Cooperative Applications [chapter]

Guray Yilmaz, Nadia Erdogan
2004 Lecture Notes in Computer Science  
This paper introduces a new programming model for distributed systems, distributed composite objects (DCO), to meet efficient implementation, transparency, and performance demands of distributed applications  ...  It allows the representation of an object as a collection of sub-objects and enhances the object distribution concept by implementing replication at the sub-object level and only when demanded.  ...  With this replication scheme, SOs are replicated dynamically on remote address spaces upon method invocation requests.  ... 
doi:10.1007/978-3-540-24639-8_10 fatcat:54cmvfklkzfyrfzhjyt4nw5c7i

A metaobject architecture for fault-tolerant distributed systems: the FRIENDS approach

J.-C. Fabre, T. Perennou
1998 IEEE transactions on computers  
So, we make a distinction between transparency from a usage viewpoint and visibility from a configuration viewpoint. metaobjects.  ...  Metaobjects can be used transparently by applications and can be composed according to the needs of a given application, a given architecture, and its underlying properties.  ...  For example, a client object can interact with a remote object backed with a stable storage and with another remote object replicated according to the primary-backup model.  ... 
doi:10.1109/12.656088 fatcat:f5vpg76unbh2jizgwv62cjcbyy

FORMI: Integrating Adaptive Fragmented Objects into Java RMI

Rudiger Kapitza, Jorg Domaschka, Franz Hauck, Hans Reiser, Holger Schmidt
2006 IEEE Distributed Systems Online  
Distributed object-oriented applications are commonly implemented atop middleware platforms such as CORBA, .NET Remoting, and Java remote method invocation (RMI).  ...  Thus, the distribution of fragments and the remote interaction between fragments is fully transparent to clients.  ...  Holger Schmidt is a PhD student in the Distributed Systems Lab at Ulm University. His research interests include mobile object systems, adaptive middleware systems, and multimedia communication.  ... 
doi:10.1109/mdso.2006.61 fatcat:73zp6bdqrve4nep72nvzp7ftvq

Globe: a wide area distributed system

M. van Steen, P. Homburg, A.S. Tanenbaum
1999 IEEE Concurrency  
This view leads to the remote-object model in which a remote-method invocation is made transparent using RPC-like techniques, as is done in DCOM. 4 However, this approach is the major obstacle to scale  ...  Remote invocation requeststhat is, requests that replication subobjects pass in remote address spaces-are eventually passed to the control subobject through handle_request.  ... 
doi:10.1109/4434.749137 fatcat:lbelvwppubdh3ede2s75znysve
« Previous Showing results 1 — 15 out of 3,492 results