International audienceBy exploiting idle time on volunteer machines, desktop grids provide a way to execute large sets of tasks with negligible maintenance and low cost. Although desktop grids are attractive for their scalability and low cost, relying on external resources may compromise the correctness of application execution due to the well-known unreliability of nodes. In this paper, we consider a very challenging threat model: correlated errors caused either by organized groups of cheaters that may collude to produce incorrect results, or by buggy or so-called "unofficial" clients. By using a previously described on-line algorithm for detecting collusion and characterizing the participant behaviors, we propose a scheduling and result c...
International audienceWe study the scheduling of computational workflows on compute resources that e...
International audienceTolerating byzantine faults on a large scale is a challenge: in particular, De...
We describe different strategies a central authority, the boss, can use to distribute computation to...
By exploiting idle time on volunteer machines, desktop grids provide a way to execute large sets of ...
International audienceBy exploiting idle time on volunteer machines, desktop grids provide a way to ...
Abstract Desktop Grid systems reached a preeminent place among the most powerful computing platforms...
AbstractThis paper studies pipelined algorithms for protecting distributed grid computations from ch...
The success of grid computing in open environments like the Internet is highly dependent on the adop...
In this paper, we address the new problem of protecting volunteer computing systems from malicious v...
To achieve correct execution of peer-to-peer applications on non-reliable resources, we present a po...
This paper presents a design and analysis of scheduling techniques to cope with the inherent unrelia...
Abstract. This paper presents a new approach for certifying the cor-rectness of program executions i...
International audienceThis work deals with scheduling and checkpointing strategies to execute scient...
This thesis analyses the fault-tolerant nature of Evolutionary Algorithms (EAs) executed in a distri...
Desktop grids use the free resources in Intranet and Internet environments for large-scale computati...
International audienceWe study the scheduling of computational workflows on compute resources that e...
International audienceTolerating byzantine faults on a large scale is a challenge: in particular, De...
We describe different strategies a central authority, the boss, can use to distribute computation to...
By exploiting idle time on volunteer machines, desktop grids provide a way to execute large sets of ...
International audienceBy exploiting idle time on volunteer machines, desktop grids provide a way to ...
Abstract Desktop Grid systems reached a preeminent place among the most powerful computing platforms...
AbstractThis paper studies pipelined algorithms for protecting distributed grid computations from ch...
The success of grid computing in open environments like the Internet is highly dependent on the adop...
In this paper, we address the new problem of protecting volunteer computing systems from malicious v...
To achieve correct execution of peer-to-peer applications on non-reliable resources, we present a po...
This paper presents a design and analysis of scheduling techniques to cope with the inherent unrelia...
Abstract. This paper presents a new approach for certifying the cor-rectness of program executions i...
International audienceThis work deals with scheduling and checkpointing strategies to execute scient...
This thesis analyses the fault-tolerant nature of Evolutionary Algorithms (EAs) executed in a distri...
Desktop grids use the free resources in Intranet and Internet environments for large-scale computati...
International audienceWe study the scheduling of computational workflows on compute resources that e...
International audienceTolerating byzantine faults on a large scale is a challenge: in particular, De...
We describe different strategies a central authority, the boss, can use to distribute computation to...