Agent-Based Autonomous Result Verification Mechanism in Desktop Grid Systems

被引:0
|
作者
Kim, HongSoo [2 ]
Gil, JoonMin [3 ]
Hwang, ChongSun [2 ]
Yu, HeonChang [1 ]
Joung, SoonYoung [1 ]
机构
[1] Korea Univ, Dept Comp Sci Educ, 1 5 Ga Anam Dong, Seoul 136701, South Korea
[2] Korea Univ, Dept Comp Sci & Engn, Seoul 136701, South Korea
[3] Catholic Univ Daegu, Dept Comp Sci Educ, Gyongsan 712702, Gyeongbuk, South Korea
来源
AGENTS AND PEER-TO-PEER COMPUTING | 2010年 / 5319卷
关键词
COMPUTING SYSTEMS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we discuss the design of result verification in desktop grid systems. In this design, correctness and performance are considered as important issues. To guarantee the correctness of work results, sabotage-tolerant mechanisms have been mainly used, such as voting-based schemes and trust-based schemes. However, these mechanisms result in low scalability and high computation delay because they can not cope effectively with dynamic environments. In this paper, we propose a Sabotage-Tolerant Scheduling for Result Verification (STSRV), which is based on mobile agent technology. In STSRV, mobile agents are used to check periodically the credibility and availability of each volunteer. Using credibility and availability information, our desktop grid system can provide correctness of work results without a huge increase in the computation delay caused by result verification. Additionally, simulation results show that STSRV increases turnaround time for works from the viewpoint of credibility and availability, and thus enhances the overall performance of our desktop grid systems.
引用
收藏
页码:72 / +
页数:3
相关论文
共 50 条
  • [21] Analysing stream authentication protocols in autonomous agent-based systems
    Orgun, Mehmet A.
    Ma, Ji
    Liu, Chuchang
    Governatori, Guido
    DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 325 - +
  • [22] Agent-based Grid computing
    Zhang, HJ
    Shi, ZZ
    Dong, MK
    Sheng, QJ
    Jiang, YC
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XIV, PROCEEDINGS: COMPUTER SCIENCE, ENGINEERING AND APPLICATIONS, 2003, : 353 - 358
  • [23] Agent-based grid computing
    Shi, Zhongzhi
    Huang, He
    Luo, Jiewen
    Lin, Fen
    Zhang, Haijun
    APPLIED MATHEMATICAL MODELLING, 2006, 30 (07) : 629 - 640
  • [24] Decidable Verification of Agent-Based Data-Aware Systems
    Belardinelli, Francesco
    Malvone, Vadim
    PRINCIPLES AND PRACTICE OF MULTI-AGENT SYSTEMS (PRIMA 2019), 2019, 11873 : 52 - 68
  • [25] Verifiable Self-Aware Agent-Based Autonomous Systems
    Dennis, Louise A.
    Fisher, Michael
    PROCEEDINGS OF THE IEEE, 2020, 108 (07) : 1011 - 1026
  • [26] An Autonomy Viability Assessment Matrix for Agent-based Autonomous Systems
    Mostafa, Salama A.
    Ahmad, Mohd Sharifuddin
    Ahmad, Azhana
    Annamalai, Muthukkaruppan
    Gunasekaran, Saraswathy Shamini
    2015 INTERNATIONAL SYMPOSIUM ON AGENTS, MULTI-AGENT SYSTEMS AND ROBOTICS (ISAMSR), 2015, : 53 - 58
  • [27] An Agent-based Model for Autonomous Planning in Distrubuted Critical Systems
    Amato, Flora
    Moscato, Francesco
    Dario, Pianese
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 568 - 573
  • [28] Agent Verification Protocol in Agent-based IDS
    Nasir, LuqmanulHakim Mohd
    Seman, Kamaruzzaman
    Saudi, Madihah Mohd
    8TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY WORKSHOPS: CIT WORKSHOPS 2008, PROCEEDINGS, 2008, : 294 - 299
  • [29] Agent-based Decentralization of Applications in Distributed Smart Grid Systems
    Kienesberger, Georg
    Xypolytou, Evangelia
    Marchgraber, Jurgen
    Kaufmann, Thomas
    Prostejovsky, Alexander
    Faschang, Mario
    2015 INTERNATIONAL SYMPOSIUM ON SMART ELECTRIC DISTRIBUTION SYSTEMS AND TECHNOLOGIES (EDST), 2015, : 271 - 277
  • [30] A cooperation mechanism in agent-based autonomic storage systems
    Zhou, JL
    Liu, G
    Yu, SS
    Su, Y
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 1, PROCEEDINGS, 2005, 3801 : 416 - 421