Besides the complexity in time or in number of messages, a common approach for analyzing distributed algorithms is to look at their assumptions on the underlying network. This paper focuses on the study of such assumptions in dynamic networks, where the connectivity is expected to change, predictably or not, during the execution. Our main contribution is a… (More)
Traditional distributed frameworks such as DCOM, CORBA or EJB do not allow any object to become remote dynamically even if they were not designed for it. This is a major drawback solved by the active container concept presented in this article. The Java TM 1 implementation of this concept, JACOb, is also presented.
In this paper, we present the HPFIT project whose aim is to provide a set of interactive tools integrated in a single environment to help users to parallelize scientiic applications to be run on distributed memory parallel computers. HPFIT is built around a restructuring tool called TransTOOL which includes an editor, a parser, a dependenceanalysis tool and… (More)
—This paper proposes a new solution to the problem of self-deploying a network of wireless mobile robots with simultaneous consideration to several criteria, that are, the fault-tolerance (biconnectivity) of the resulting network, its coverage, its diameter, and the quantity of movement required to complete the deployment. These criteria have already been… (More)
Ensuring the security of services in a distributed system requires the collaboration of all the elements involved in providing this service. In this paper we present how the security of collaborative distributed services is ensured in the Java Card TM1 Grid project carried out at LaBRI, Labora-toire Bordelais de Recherche en Informatique. The aim of this… (More)
The work presented in this paper is part of the Java Card TM1 Grid project 2 carried out at LaBRI, Laboratoire Bordelais de Recherche en Informatique. The aim of this project is to build a hardware platform and the associated software components to experiment on the security features of distributed applications. To achieve this goal we use the hardware… (More)