1999
DOI: 10.1016/s0167-739x(99)00018-7
|View full text |Cite
|
Sign up to set email alerts
|

Bayanihan: building and studying web-based volunteer computing systems using Java

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
85
0
1

Year Published

2000
2000
2017
2017

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 131 publications
(86 citation statements)
references
References 10 publications
0
85
0
1
Order By: Relevance
“…To enhance the inefficiency of the m-first voting, credibility-based voting [9] is proposed. This method defines a credibility for each system element such as worker, result, and job, and performs a weighted voting.…”
Section: Credibility-based Votingmentioning
confidence: 99%
See 1 more Smart Citation
“…To enhance the inefficiency of the m-first voting, credibility-based voting [9] is proposed. This method defines a credibility for each system element such as worker, result, and job, and performs a weighted voting.…”
Section: Credibility-based Votingmentioning
confidence: 99%
“…To enhance the inefficiency of the m-first voting, credibility-based voting [9] is proposed. This method performs a weighted voting based on each worker's credibility, the probability of returning correct results.…”
Section: Introductionmentioning
confidence: 99%
“…[19]. Other problems used in experiments were: DES code breaking [10], matrix multiplication [16] [68], Traveling Salesman Problem [16][24] [67], Mandelbrot generation [69] [70], searching for Mersenne primes using LucasLehmer primality test [56] [29], Collatz hypothesis verification [56], the factorization of large integer into two primes and Pearson correlation evaluation on set of genetic samples [9].…”
Section: Introductionmentioning
confidence: 99%
“…Several recent implementations of distributed computing platforms address the general issues of fault-tolerance [2,3,4,6,14,17], but assume a fault model in which errors that occur are not the result of malicious intent. The solutions presented are typically a combination of redundancy with voting and spot checking.…”
Section: Related Workmentioning
confidence: 99%
“…The past few years have seen the development of distributed computing platforms designed to utilize the spare processor cycles of a large number of personal computers attached to the Internet (see [2,3,4,6,14,17] for academic endeavors, [19] for a list of commercial platforms). The computing power harnessed by these systems can top several petaflops, making them well suited for solving some SIMD-style parallel computations that previously required the use of supercomputers.…”
Section: Introductionmentioning
confidence: 99%