{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:35:50Z","timestamp":1750307750926,"version":"3.41.0"},"reference-count":22,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGOPS Oper. Syst. Rev."],"published-print":{"date-parts":[[2008,1]]},"abstract":"<jats:p>Mega grids span several continents and may consist of millions of nodes and billions of tasks executing at any point in time. This setup calls for scalable and highly available resource utilization control that adapts itself to dynamic changes in the grid environment as they occur. In this paper, we address the problem of enforcing upper bounds on the consumption of grid resources. We propose a grid-wide quota enforcement system, called GWiQ-P. GWiQ-P is light-weight, and in practice is infinitely scalable, satisfying concurrently any number of resource demands, all within the limits of a global quota assigned to each user. GWiQ-P adapts to dynamic changes in the grid as they occur, improving future performance by means of improved locality. This improved performance does not impair the system's ability to respond to current requests, tolerate failures, or maintain the allotted quota levels.<\/jats:p>","DOI":"10.1145\/1341312.1341339","type":"journal-article","created":{"date-parts":[[2008,2,8]],"date-time":"2008-02-08T15:32:16Z","timestamp":1202484736000},"page":"111-118","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["GWiQ-P"],"prefix":"10.1145","volume":"42","author":[{"given":"Kfir","family":"Karmon","sequence":"first","affiliation":[{"name":"Technion -- Israel Institute of Technology"}]},{"given":"Liran","family":"Liss","sequence":"additional","affiliation":[{"name":"Technion -- Israel Institute of Technology"}]},{"given":"Assaf","family":"Schuster","sequence":"additional","affiliation":[{"name":"Technion -- Israel Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2008,1]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"EGEE. http:\/\/www.eu-egee.org.  EGEE. http:\/\/www.eu-egee.org."},{"key":"e_1_2_1_2_1","unstructured":"TeraGrid. http:\/\/www.teragrid.org.  TeraGrid. http:\/\/www.teragrid.org."},{"key":"e_1_2_1_3_1","unstructured":"Condor manual version 6.6.6. https:\/\/www.cs.wisc.edu\/condor.  Condor manual version 6.6.6. https:\/\/www.cs.wisc.edu\/condor."},{"key":"e_1_2_1_4_1","unstructured":"OpenPBS. http:\/\/www.openpbs.org.  OpenPBS. http:\/\/www.openpbs.org."},{"key":"e_1_2_1_5_1","unstructured":"LSF. http:\/\/www.platform.com\/products\/lsf.  LSF. http:\/\/www.platform.com\/products\/lsf."},{"key":"e_1_2_1_6_1","unstructured":"Avaki. http:\/\/www.avaki.com.  Avaki. http:\/\/www.avaki.com."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1048935.1050192"},{"key":"e_1_2_1_8_1","first-page":"135","volume-title":"Proceedings of the 3rd USENIX Windows NT Symposium","author":"Hunt Galen","year":"1999","unstructured":"Galen Hunt and Doug Brubacher . Detours : Binary interception of Win32 functions . In Proceedings of the 3rd USENIX Windows NT Symposium , pages 135 -- 144 , 1999 . Galen Hunt and Doug Brubacher. Detours: Binary interception of Win32 functions. In Proceedings of the 3rd USENIX Windows NT Symposium, pages 135--144, 1999."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1111683.1111849"},{"key":"e_1_2_1_10_1","first-page":"172","volume-title":"ISSS","author":"Shinagawa Takahiro","year":"2002","unstructured":"Takahiro Shinagawa , Kenji Kono , and Takashi Masuda . Flexible and efficient sandboxing based on fine-grained protection domains . In ISSS , pages 172 -- 184 , 2002 . Takahiro Shinagawa, Kenji Kono, and Takashi Masuda. Flexible and efficient sandboxing based on fine-grained protection domains. In ISSS, pages 172--184, 2002."},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the 6th Usenix Security Symposium","author":"Goldberg Ian","year":"1996","unstructured":"Ian Goldberg , David Wagner , Randi Thomas , and Eric A. Brewer . A secure environment for untrusted helper applications . In Proceedings of the 6th Usenix Security Symposium , San Jose, CA, USA , 1996 . Ian Goldberg, David Wagner, Randi Thomas, and Eric A. Brewer. A secure environment for untrusted helper applications. In Proceedings of the 6th Usenix Security Symposium, San Jose, CA, USA, 1996."},{"key":"e_1_2_1_12_1","volume-title":"Jres: A resource accounting interface for java. Technical report","author":"Czajkowski Grzegorz","year":"1998","unstructured":"Grzegorz Czajkowski and Thorsten von Eicken . Jres: A resource accounting interface for java. Technical report , Cornell University , Ithaca, NY, USA , 1998 . Grzegorz Czajkowski and Thorsten von Eicken. Jres: A resource accounting interface for java. Technical report, Cornell University, Ithaca, NY, USA, 1998."},{"key":"e_1_2_1_13_1","first-page":"2","volume-title":"ASA\/MA 2000: Proceedings of the Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents","author":"Suri Niranjan","year":"2000","unstructured":"Niranjan Suri , Jeffrey Bradshaw , Maggie R. Breedy , Paul T. Groth , Gregory A. Hill , and Renia Jeffers . Strong mobility and fine-grained resource control in nomads . In ASA\/MA 2000: Proceedings of the Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents , pages 2 -- 15 , London, UK , 2000 . Springer-Verlag . ISBN 3-540-41052-X. Niranjan Suri, Jeffrey Bradshaw, Maggie R. Breedy, Paul T. Groth, Gregory A. Hill, and Renia Jeffers. Strong mobility and fine-grained resource control in nomads. In ASA\/MA 2000: Proceedings of the Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents, pages 2--15, London, UK, 2000. Springer-Verlag. ISBN 3-540-41052-X."},{"key":"e_1_2_1_14_1","unstructured":"VMWare. http:\/\/www.vmware.com.  VMWare. http:\/\/www.vmware.com."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_2_1_16_1","unstructured":"Qumranet Kernel based Virtual Machine (KVM). http:\/\/kvm.qumranet.com\/kvmwiki.  Qumranet Kernel based Virtual Machine (KVM). http:\/\/kvm.qumranet.com\/kvmwiki."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30186-8_20"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1982.1095632"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.2005.1520964"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/882459.882563"},{"key":"e_1_2_1_21_1","volume-title":"Distributed and multi-type resource management","author":"Moreau L.","year":"2002","unstructured":"L. Moreau and C. Queinnec . Distributed and multi-type resource management , 2002 . L. Moreau and C. Queinnec. Distributed and multi-type resource management, 2002."},{"key":"e_1_2_1_22_1","unstructured":"Moez A. Abdel-Gawad Shu Du and Khaled ElMeleegy. Decentralized past quota system.  Moez A. Abdel-Gawad Shu Du and Khaled ElMeleegy. Decentralized past quota system."}],"container-title":["ACM SIGOPS Operating Systems Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1341312.1341339","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1341312.1341339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:39:14Z","timestamp":1750253954000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1341312.1341339"}},"subtitle":["an efficient decentralized grid-wide quota enforcement protocol"],"short-title":[],"issued":{"date-parts":[[2008,1]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,1]]}},"alternative-id":["10.1145\/1341312.1341339"],"URL":"https:\/\/doi.org\/10.1145\/1341312.1341339","relation":{},"ISSN":["0163-5980"],"issn-type":[{"type":"print","value":"0163-5980"}],"subject":[],"published":{"date-parts":[[2008,1]]},"assertion":[{"value":"2008-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}