000 -LEADER |
fixed length control field |
07448cam a22004094a 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250307093433.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr aa aaaaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250307b ||||| |||| 00| 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2011012243 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781848212503 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781848212503 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
184821250X |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.D5 |
Item number |
D6144 2011 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004/.33 |
Edition number |
22 |
245 00 - TITLE STATEMENT |
Title |
Distributed systems : |
Remainder of title |
design and algorithms / |
Statement of responsibility, etc |
edited by Serge Haddad [and others] |
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Hoboken, NJ : |
Name of publisher, distributor, etc |
John Wiley & Sons ; |
Place of publication, distribution, etc |
London : |
Name of publisher, distributor, etc |
ISTE, |
Date of publication, distribution, etc |
2013. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource (334 pages) : |
Other physical details |
illustrations |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent. |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia. |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
505 0# - CONTENTS |
Formatted contents note |
Table of Contents<br/>Foreword 9<br/><br/>Chapter 1. Introduction 13<br/>Serge HADDAD, Fabrice KORDON, Laurent PAUTET and Laure PETRUCCI<br/><br/>FIRST PART. LARGE SCALE PEER-TO-PEER DISTRIBUTED SYSTEMS 19<br/><br/>Chapter 2. Introduction to Large-Scale Peer-to-Peer Distributed Systems 21<br/>Fabrice KORDON<br/><br/>2.1. “Large-Scale” distributed systems? 21<br/><br/>2.2. Consequences of “large-scale” 22<br/><br/>2.3. Some large-scale distributed systems 23<br/><br/>2.4. Architectures of large scale distributed systems 26<br/><br/>2.5. Objective of Part 1 30<br/><br/>2.6. Bibliography 31<br/><br/>Chapter 3. Design Principles of Large-Scale Distributed System 33<br/>Xavier BONNAIRE and Pierre SENS<br/><br/>3.1. Introduction to peer-to-peer systems 33<br/><br/>3.2. The peer-to-peer paradigms 34<br/><br/>3.3. Services on structured overlays 41<br/><br/>3.4. Building trust in P2Psystems 43<br/><br/>3.5. Conclusion 52<br/><br/>3.6. Bibliography 53<br/><br/>Chapter 4. Peer-to-Peer Storage 59<br/>Olivier MARIN, Sébastien MONNET and Gaël THOMAS<br/><br/>4.1. Introduction 59<br/><br/>4.2. BitTorrent 60<br/><br/>4.3. Gnutella 66<br/><br/>4.4. Conclusion 79<br/><br/>4.5. Bibliography 79<br/><br/>Chapter 5. Large-Scale Peer-to-Peer Game Applications 81<br/>Sébastien MONNET and Gaël THOMAS<br/><br/>5.1. Introduction 81<br/><br/>5.2. Large-scale game applications: model and specific requirements 83<br/><br/>5.3. Overview of peer-to-peer overlays for large-scale game applications 90<br/><br/>5.4. Overlays for FPS games 93<br/><br/>5.5. Overlays for online life-simulation games 95<br/><br/>5.6. Conclusion 100<br/><br/>5.7. Bibliography 101<br/><br/>SECOND PART. DISTRIBUTED, EMBEDDED AND REAL-TIME SYSTEMS 105<br/><br/>Chapter 6. Introduction to Distributed Embedded and Real-time Systems 107<br/>Laurent PAUTET<br/><br/>6.1. Distributed real-time embedded systems 108<br/><br/>6.2. Safety critical systems as examples of DRE systems 109<br/><br/>6.3. Design process of DRE systems 112<br/><br/>6.4. Objectives of Part 2 114<br/><br/>6.5. Bibliography 115<br/><br/>Chapter 7. Scheduling in Distributed Real-Time Systems 117<br/>Emmanuel GROLLEAU, Michaël RICHARD, and Pascal RICHARD<br/><br/>7.1. Introduction 117<br/><br/>7.2. Generalities about real-time systems 118<br/><br/>7.3. Temporal correctness 122<br/><br/>7.4. WCRT of the tasks 126<br/><br/>7.5. WCRT of the messages 142<br/><br/>7.6. Case study 149<br/><br/>7.7. Conclusion 154<br/><br/>7.8. Bibliography 155<br/><br/>Chapter 8. Software Engineering for Adaptative Embedded Systems 159<br/>Etienne BORDE<br/><br/>8.1. Introduction 159<br/><br/>8.2. Adaptation, an additional complexity factor 160<br/><br/>8.3. Theoretical aspects of adaptation management 163<br/><br/>8.4. Technical solutions for the design of adaptative embedded systems 171<br/><br/>8.5. An example of adaptative system from the robotic domain 176<br/><br/>8.6. Applying MDE techniques to the design of the robotic use-case 177<br/><br/>8.7. Exploitation of the models 184<br/><br/>8.8. Conclusion 188<br/><br/>8.9. Bibliography 189<br/><br/>Chapter 9. The Design of Aerospace Systems 191<br/>Maxime PERROTIN, Julien DELANGE, and Jérôme HUGUES<br/><br/>9.1. Introduction 191<br/><br/>9.2. Flight software typical architecture 193<br/><br/>9.3. Traditional development methods and their limits 195<br/><br/>9.4. Modeling a software system using TASTE: philosophy 197<br/><br/>9.5. Common solutions 199<br/><br/>9.6. What TASTE specifically proposes 200<br/><br/>9.7. Modeling process and tools 201<br/><br/>9.8. Technology 208<br/><br/>9.9. Model transformations 209<br/><br/>9.10. The TASTE run-time 213<br/><br/>9.11. Illustrating our process by designing heterogeneous systems 215<br/><br/>9.12. First user feedback and TASTE future 224<br/><br/>9.13. Conclusion 225<br/><br/>9.14. Bibliography 226<br/><br/>THIRD PART. SECURITY IN DISTRIBUTED SYSTEMS 229<br/><br/>Chapter 10. Introduction to Security Issues in Distributed Systems 231<br/>Laure PETRUCCI<br/><br/>10.1. Problem 231<br/><br/>10.2. Secure data exchange 233<br/><br/>10.3. Security in specific distributed systems 234<br/><br/>10.4. Outline of art III 234<br/><br/>10.5. Bibliography 235<br/><br/>Chapter 11. Practical Security in Distributed Systems 237<br/>Benoît BERTHOLON, Christophe CÉRIN, Camille COTI, and Sébastien VARRETTE, Jean-Christophe DUBACQ<br/><br/>11.1. Introduction 237<br/><br/>11.2. Confidentiality 249<br/><br/>11.3. Authentication 252<br/><br/>11.4. Availability and fault tolerance 261<br/><br/>11.5. Ensuring resource security 278<br/><br/>11.6. Result checking in distributed computations 283<br/><br/>11.7. Conclusion 291<br/><br/>11.8. Bibliography 292<br/><br/>Chapter 12. Enforcing Security with Cryptography 301<br/>Sami HARARI and Laurent POINSOT<br/><br/>12.1. Introduction 301<br/><br/>12.2. Cryptography: from a general perspective 303<br/><br/>12.3. Symmetric encryption schemes 308<br/><br/>12.4. Prime numbers and public key cryptography 324<br/><br/>12.5. Conclusion 328<br/><br/>12.6. Bibliography 329<br/><br/>Index 333 |
520 ## - SUMMARY, ETC. |
Summary, etc |
In today’s digital environment, distributed systems are increasingly present in a wide variety of environments, ranging from public software applications to critical systems.<br/>Distributed Systems introduces the underlying concepts, the associated design techniques and the related security issues.<br/>Distributed Systems: Design and Algorithms, is dedicated to engineers, students, and anyone familiar with algorithms and programming, who want to know more about distributed systems.<br/>These systems are characterized by: several components with one or more threads, possibly running on different processors; asynchronous communications with possible additional assumptions (reliability, order preserving, etc.); local views for every component and no shared data between components. This title presents distributed systems from a point of view dedicated to their design and their main principles: the main algorithms are described and placed in their application context, i.e. consistency management and the way they are used in distributed file-systems. |
545 0# - BIOGRAPHICAL OR HISTORICAL DATA |
Biographical or historical note |
About the Author<br/>Fabrice Kordon is a full-time professor at Université P. & M. Curie (UPMC).<br/><br/>Serge Haddad is a full-time professor at école Normale Supérieure de Cachan, a member of the CNRS laboratory LSV, and a member of the INRIA team MExICo.<br/><br/>Laurent Pautet is a full-time professor at Télécom ParisTech and a member of the CNRS laboratory LTCI.<br/><br/>Laure Petrucci is a full-time professor at University Paris 13 in France and a member of the CNRS laboratory LIPN. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Electronic data processing |
General subdivision |
Distributed processing. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Peer-to-peer architecture (Computer networks) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer algorithms. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Embedded computer systems. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Real-time data processing. |
655 #4 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic books. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Haddad, Serge. |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
https://onlinelibrary.wiley.com/doi/book/10.1002/9781118601365 |
Link text |
Full text is available at Wiley Online Library Click here to view |
942 ## - ADDED ENTRY ELEMENTS |
Source of classification or shelving scheme |
|
Item type |
EBOOK |