skip to main content
article

Unicorn: voluntary computing over Internet

Published: 01 April 2002 Publication History

Abstract

Unicorn provides an architecture using Java to harness the vast processing power on the Internet for distributed computing applications. It employs the code-shipping paradigm to broker this processing power. The client can either make use of the suite of applications provided by Unicorn or upload his own applications to the server together with the data to be processed. These tasks are distributed in parallel to idle hosts logged on to the Unicorn server. A set of Unicorn programming tools, including the Unicorn Application Interface and Broker ServerLite (a scaled-down version of Unicorn Broker Server), is distributed to clients to facilitate applications development. The framework handles all the communication needs of the broker and hosts, leaving the clients to concentrate on the functionality of their applications. In addition, a mechanism for resource pricing has been incorporated to provide incentives for sharing of processing power. The clients are charged and host systems are paid according to the resources used. The broker takes a commission in the transactions.

References

[1]
Distributed.net: Node Zero", http://www.distributed.net.
[2]
Kaliski B. S. Jr. and Yin Y. L., On the security of the RC5 encryption algorithm. RSA Technical Report TR-602 Version 1.0, September 1998.
[3]
Finkel D., Wills C. E., Brennan B., and Brennan C., Distriblets: Java based distributed computing on the Web. Internet Research: Electronic Networking Applications and Policy, Vol. 9, No. 1, 35-40, 1999.
[4]
Christiansen B. O., Capello P., Ionescu M. F., Neary M. O., Schauser K. E., and Wu D., Javelin: Internet based parallel computing using Java, Concurrency: Practice and Experience. Vol. 9(11), 1139-1160, November 1997.
[5]
Neary M. O., Brydon S. P., Kmiec P., Rollins S. and Cappello P., Javelin++: scalability issues in global computing. Concurrency: Practice and Experience, July 2000.
[6]
Sarmenta LFG, Hirano S., Bayanihan: Building and studying Web-based volunteer computing systems using Java. Future Generation Computer Systems 1999.
[7]
Hirano S, HORB: Extended execution of Java programs. 1st International Conference on World Wide Computing and its Applications (WWCA 97), 1997, http://ring.etl.go.jp/openlab/horb/.
[8]
Mcgraw G., Felten E. W., Java Security Hostile Applets, Holes and Antidotes, Wiley Computer Publishing, 1997.
[9]
Sun Microsystems Inc. Secure Computing with Java: Now and the Future, http://www.javasoft.com/marketing/collateral/security.html
[10]
Sun Micro Systems Inc. Frequently Asked Questions - Java Security, http://java.sun.com/sfaq/, 1997.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review  Volume 36, Issue 2
April 2002
63 pages
ISSN:0163-5980
DOI:10.1145/509526
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 April 2002
Published in SIGOPS Volume 36, Issue 2

Check for updates

Author Tags

  1. brokering of computing power
  2. internet computing
  3. java
  4. voluntary computing

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media