{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:53:57Z","timestamp":1725512037710},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540693291"},{"type":"electronic","value":"9783540693307"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/978-3-540-69330-7_22","type":"book-chapter","created":{"date-parts":[[2007,5,14]],"date-time":"2007-05-14T17:16:20Z","timestamp":1179162980000},"page":"319-333","source":"Crossref","is-referenced-by-count":2,"title":["Lightweight Monitoring of the Progress of Remotely Executing Computations"],"prefix":"10.1007","author":[{"given":"Shuo","family":"Yang","sequence":"first","affiliation":[]},{"given":"Ali R.","family":"Butt","sequence":"additional","affiliation":[]},{"given":"Y. Charlie","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Samuel P.","family":"Midkiff","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Genome@home: Genome at home (December 16, 2004), http:\/\/www.stanford.edu\/group\/pandegroup\/genome\/index.html"},{"key":"22_CR2","unstructured":"SETI@home: Search for extraterrestrial intelligence at home (December 16, 2004), http:\/\/setiathome.ssl.berkeley.edu\/index.html"},{"key":"22_CR3","unstructured":"David, A.P.: BOINC:A System for Public-Resource Computing and Storage. In: Proc. 5th IEEE\/ACM International Workshop on Grid Computing (2004)"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Litzkow, M., Livny, M., Mutka, M.: Condor - A Hunter of Idle Workstations. In: Proc. 8th International Conference on Distributed Computing Systems, ICDCS 1988 (1988)","DOI":"10.1109\/DCS.1988.12507"},{"key":"22_CR5","unstructured":"Kannan, S., Roberts, M., Mayes, P., Brelsford, D., Skovira, J.F.: Workload Management with LoadLeveler. IBM International Technical Support Organization (2001), http:\/\/www.ibm.com\/redbooks (December 17, 2004), publication number SG24-6038-00"},{"key":"22_CR6","unstructured":"Butt, A.R., Fang, X., Hu, Y.C., Midkiff, S.: Java, Peer-to-Peer, and Accountability: Building Blocks for Distributed Cycle Sharing. In: Proc. of VM 2004 (2004)"},{"key":"22_CR7","unstructured":"Castro, M., Druschel, P., Hu, Y.C., Rowstron, A.: Exploiting Network Proximity in Distributed Hash Tables. In: International Workshop on Future Directions in Distributed Computing (2002)"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Lo, V., Zappala, D., Zhou, D., Liu, Y., Zhao, S.: Cluster Computing on the Fly: P2P Scheduling of Idle Cycles in the Internet. In: Proc. of IPTPS 2004 (2004)","DOI":"10.1007\/978-3-540-30183-7_22"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Minchew, C.H., Tai, K.C.: Experience with Porting the Portable C Compiler. In: ACM 1982: Proceedings of the ACM 1982 conference, New York, NY, USA (1982)","DOI":"10.1145\/800174.809758"},{"key":"22_CR10","unstructured":"PARISC-Linux: The PARISC-Linux Cross Compiler HOWTO (March 16, 2005), http:\/\/www.baldric.uwo.ca\/HOWTO\/PARISC-Linux-XC-HOWTO.html"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the Art of Virtualization. In: Proc. of SOSP 2003 (2003)","DOI":"10.1145\/945445.945462"},{"key":"22_CR12","unstructured":"Kamp, P.H., N.M. Watson, R.: Jails: Confining the Omnipotent Root. In: Proceedings of SANE 2000 Conference (2000)"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Miller, B.P., Christodorescu, M., Iverson, R., Kosar, T., Mirgorodskii, A., Popovici, F.: Playing Inside the Black Box: Using Dynamic Instrumentation to Create Security Holes. In: Proceedings of 2nd Los Alamos Computer Science Institute Symposium (2001)","DOI":"10.1142\/S0129626401000579"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Yang, S., Butt, A.R., Hu, Y.C., Midkiff, S.P.: Trust but Verify: Monitoring Remotely Executing Programs for Progress and Correctness. In: Proc. of PPOPP 2005 (2005)","DOI":"10.1145\/1065944.1065971"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Linn, C., Debray, S.: Obfuscation of Executable Code to Improve Resistance to Static Disassembly. In: Proc. of CCS 2003 (2003)","DOI":"10.1145\/948109.948149"},{"key":"22_CR16","unstructured":"Bailey, D., Barszcz, E., Barton, J., Browning, D., Carter, R., Dagum, L., Fatoohi, R., Fineberg, S., Frederickson, P., Lasinski, T., Schreiber, R., Simon, H., Venkatakrishnan, V., Weeratunga, S.: The NAS Parallel Benchmarks. Technical Report NAS Technical Report RNR-94-007, NASA Ames Center (1994)"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Sarmenta, L.F.: Sabotage Tolerance Mechanism for Volunteer Computing Systems. In: CCGrid 2001 (2001)","DOI":"10.1109\/CCGRID.2001.923211"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Du, W., Jia, J., Mangal, M., Murugesan, M.: Uncheatable Grid Computing. In: Proceedings of the 24th International Conference on Distributed Computing Systems, ICDCS 2004 (2004)","DOI":"10.1109\/ICDCS.2004.1281562"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. Journal of Computer Security\u00a06 (1998)","DOI":"10.3233\/JCS-980109"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Chen, H., Wagner, D.: MOPS: an Infrastructure for Examining Security Properties of Software. In: Proc. of CCS 2002 (2002)","DOI":"10.1145\/586110.586142"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Foster, I., Roy, A., Sander, V.: A Quality of Service Architecture that Combines Resource Reservation and Application Adaptation. In: Proc. 8th International Workshop on Quality of Service (2000)","DOI":"10.1109\/IWQOS.2000.847954"}],"container-title":["Lecture Notes in Computer Science","Languages and Compilers for Parallel Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69330-7_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:36:52Z","timestamp":1620002212000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69330-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540693291","9783540693307"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69330-7_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}