Proceedings. Eighth Heterogeneous Computing Workshop (HCW'99)
DOI: 10.1109/hcw.1999.765132
|View full text |Cite
|
Sign up to set email alerts
|

An overview of MSHN: the Management System for Heterogeneous Networks

Abstract: The

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(16 citation statements)
references
References 37 publications
0
16
0
Order By: Relevance
“…In some systems, a job's priority may depend upon'the particular operating mode of the network [8] . Also, the different data formats of a multiple-format job may have different preferences (e.g., assigned by a user or "hard wired" as part of the application or job-scheduler database), and different levels of resource usage [ 101 [ 121 .…”
Section: Summary Of Security Vectormentioning
confidence: 99%
“…In some systems, a job's priority may depend upon'the particular operating mode of the network [8] . Also, the different data formats of a multiple-format job may have different preferences (e.g., assigned by a user or "hard wired" as part of the application or job-scheduler database), and different levels of resource usage [ 101 [ 121 .…”
Section: Summary Of Security Vectormentioning
confidence: 99%
“…This research is part of three related DARPA programs: Quorum [HeK99], Battlefield Awareness and Data Dissemination (BADD) [DAR99,Roc96], and the Agile Information Control Environment (AICE) [AIC98]. In the Quorum environment, it is sometimes the case that not all tasks requested can achieve their most preferred QoS by their deadline.…”
Section: --2mentioning
confidence: 99%
“…A commander under attack at a foreign embassy might require the highest communication security; whereas a commander under attack on the battlefield might declare, "damn the security, full speed ahead!" The MSHN resource management system is an example of a system in which the management of mode vs. security requirements is designed to be handled automatically [8][9].…”
Section: Security Rangesmentioning
confidence: 99%