Measured performance of an Ethernet local network
Communications of the ACM
Ethernet: distributed packet switching for local computer networks
Communications of the ACM
48-bit absolute internet and Ethernet host numbers
SIGCOMM '81 Proceedings of the seventh symposium on Data communications
Generative communication in Linda
ACM Transactions on Programming Languages and Systems (TOPLAS)
A Butler process for resource sharing on Spice machines
ACM Transactions on Information Systems (TOIS)
Personal distributed computing: the Alto and Ethernet software
HPW '86 Proceedings of the ACM Conference on The history of personal workstations
DPUP: a distributed processing utilities package
ACM SIGNUM Newsletter
KNOs: KNowledge acquisition, dissemination, and manipulation Objects
ACM Transactions on Information Systems (TOIS)
Using idle workstations in a shared computing environment
SOSP '87 Proceedings of the eleventh ACM Symposium on Operating systems principles
Attacking the process migration bottleneck
SOSP '87 Proceedings of the eleventh ACM Symposium on Operating systems principles
A survey of process migration mechanisms
ACM SIGOPS Operating Systems Review
Partitioning Techniques for Large-Grained Parallelism
IEEE Transactions on Computers
Strategies for decentralized resource management
SIGCOMM '87 Proceedings of the ACM workshop on Frontiers in computer communications technology
The internet worm program: an analysis
ACM SIGCOMM Computer Communication Review
Personal distributed computing: the alto and ethernet software
A history of personal workstations
Defending against viruses and worms
ACM SIGUCCS Newsletter
Viruses and worms - What can they do?
ACM SIGSAC Review
The “Worm” programs—early experience with a distributed intelligence
ACM SIGART Bulletin
Convert distributed processing with computer viruses
CRYPTO '89 Proceedings on Advances in cryptology
Some ideas on support for fault tolerance in COMANDOS, an object oriented distributed system
ACM SIGOPS Operating Systems Review
Spawn: A Distributed Computational Economy
IEEE Transactions on Software Engineering
Supercomputing out of recycled garbage: preliminary experience with Piranha
ICS '92 Proceedings of the 6th international conference on Supercomputing
A taxonomy of computer program security flaws
ACM Computing Surveys (CSUR)
Cluster-based scalable network services
Proceedings of the sixteenth ACM symposium on Operating systems principles
The simulation of a fault tolerant computer system
ANSS '85 Proceedings of the 18th annual symposium on Simulation
Preemptable remote execution facilities for the V-system
Proceedings of the tenth ACM symposium on Operating systems principles
Load balancing in NEST: a network of workstations
ACM '86 Proceedings of 1986 ACM Fall joint computer conference
Scalable scheduling on a network of workstations
ACM SIGOPS Operating Systems Review
ACM Computing Surveys (CSUR)
TOS: kernel support for distributed systems management
Proceedings of the 2001 ACM symposium on Applied computing
The worm program model: an application centred point of view for distributed architecture design
EW 3 Proceedings of the 3rd workshop on ACM SIGOPS European workshop: Autonomy or interdependence in distributed systems?
Some ideas on support for fault tolerance in COMANDOS, an object oriented distributed system
EW 4 Proceedings of the 4th workshop on ACM SIGOPS European workshop
SETI@home: an experiment in public-resource computing
Communications of the ACM
SIGMOD '84 Proceedings of the 1984 ACM SIGMOD international conference on Management of data
A Distributed Prolog System with And Parallelism
IEEE Software
IEEE Transactions on Parallel and Distributed Systems
Collecting Unused Processing Capacity: An Analysis of Transient Distributed Systems
IEEE Transactions on Parallel and Distributed Systems
Repeated Computation of Global Functions in a Distributed Environment
IEEE Transactions on Parallel and Distributed Systems
Code-Red: a case study on the spread and victims of an internet worm
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Free on the Range: Tom Malone on the Implication of the Digital Age
IEEE Internet Computing
Architecture of the Entropia Distributed Computing System
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
Open Packet Monitoring on FLAME: Safety, Performance, and Applications
IWAN '02 Proceedings of the IFIP-TC6 4th International Working Conference on Active Networks
Optimal F-Reliable Protocols for the Do-All Problem on Single-Hop Wireless Networks
ISAAC '02 Proceedings of the 13th International Symposium on Algorithms and Computation
Resource management in a decentralized system
SOSP '83 Proceedings of the ninth ACM symposium on Operating systems principles
Entropia: architecture and performance of an enterprise desktop grid system
Journal of Parallel and Distributed Computing - Special issue on computational grids
A Network Worm Vaccine Architecture
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Recent worms: a survey and trends
Proceedings of the 2003 ACM workshop on Rapid malcode
Hood: a neighborhood abstraction for sensor networks
Proceedings of the 2nd international conference on Mobile systems, applications, and services
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Proceedings of the 2004 ACM workshop on Rapid malcode
Application-Specific Scheduling for the Organic Grid
GRID '04 Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing
A holistic approach to service survivability
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
Resource Management for Rapid Application Turnaround on Enterprise Desktop Grids
Proceedings of the 2004 ACM/IEEE conference on Supercomputing
Journal of Computing Sciences in Colleges
Improving Performance of Virtual Reality Applications Through Parallel Processing
The Journal of Supercomputing
Encyclopedia of Computer Science
Future Generation Computer Systems - Special issue: P2P computing and interaction with grids
Flexible network monitoring with FLAME
Computer Networks: The International Journal of Computer and Telecommunications Networking - Active networks
Mobile objects and agents (MOA)
COOTS'98 Proceedings of the 4th conference on USENIX Conference on Object-Oriented Technologies and Systems - Volume 4
An object-oriented environment for OIS applications
VLDB '85 Proceedings of the 11th international conference on Very Large Data Bases - Volume 11
ACM SIGCAS Computers and Society
The Quest for Multi-headed Worms
DIMVA '08 Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Vigilante: End-to-end containment of Internet worm epidemics
ACM Transactions on Computer Systems (TOCS)
Network vaccination architecture
Proceedings of the International Conference on Advances in Computing, Communication and Control
Rhizoma: a runtime for self-deploying, self-managing overlays
Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware
System support for scalable and fault tolerant internet services
Middleware '98 Proceedings of the IFIP International Conference on Distributed Systems Platforms and Open Distributed Processing
Computer viruses as artificial life
Artificial Life
Rhizoma: a runtime for self-deploying, self-managing overlays
Middleware'09 Proceedings of the ACM/IFIP/USENIX 10th international conference on Middleware
Time-constrained high-fidelity rendering on local desktop grids
EG PGV'09 Proceedings of the 9th Eurographics conference on Parallel Graphics and Visualization
A building code for building code: putting what we know works to work
Proceedings of the 29th Annual Computer Security Applications Conference
Hi-index | 48.24 |
The “worm” programs were an experiment in the development of distributed computations: programs that span machine boundaries and also replicate themselves in idle machines. A “worm” is composed of multiple “segments,” each running on a different machine. The underlying worm maintenance mechanisms are responsible for maintaining the worm—finding free machines when needed and replicating the program for each additional segment. These techniques were successfully used to support several real applications, ranging from a simple multimachine test program to a more sophisticated real-time animation system harnessing multiple machines.