{"id":"https://openalex.org/W1501958750","doi":"https://doi.org/10.1109/prdc.2002.1185626","title":"Caveat emptor: making grid services dependable from the client side","display_name":"Caveat emptor: making grid services dependable from the client side","publication_year":2005,"publication_date":"2005-08-25","ids":{"openalex":"https://openalex.org/W1501958750","doi":"https://doi.org/10.1109/prdc.2002.1185626","mag":"1501958750"},"language":"en","primary_location":{"id":"doi:10.1109/prdc.2002.1185626","is_oa":false,"landing_page_url":"https://doi.org/10.1109/prdc.2002.1185626","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2002 Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042010270","display_name":"Miron Livny","orcid":"https://orcid.org/0000-0001-5444-7439"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"M. Livny","raw_affiliation_strings":["Computer Sciences Department, University of Wisconsin, Madison, USA"],"affiliations":[{"raw_affiliation_string":"Computer Sciences Department, University of Wisconsin, Madison, USA","institution_ids":["https://openalex.org/I135310074"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007301255","display_name":"Douglas Thain","orcid":"https://orcid.org/0000-0001-5218-1956"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"D. Thain","raw_affiliation_strings":["Computer Sciences Department, University of Wisconsin, Madison, USA"],"affiliations":[{"raw_affiliation_string":"Computer Sciences Department, University of Wisconsin, Madison, USA","institution_ids":["https://openalex.org/I135310074"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5042010270"],"corresponding_institution_ids":["https://openalex.org/I135310074"],"apc_list":null,"apc_paid":null,"fwci":0.7786,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.75982976,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"117","last_page":"118"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10715","display_name":"Distributed and Parallel Computing Systems","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10715","display_name":"Distributed and Parallel Computing Systems","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9726999998092651,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.946399986743927,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.797398567199707},{"id":"https://openalex.org/keywords/dependability","display_name":"Dependability","score":0.6547613143920898},{"id":"https://openalex.org/keywords/middleware","display_name":"Middleware (distributed applications)","score":0.6407102346420288},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6244655251502991},{"id":"https://openalex.org/keywords/grid-computing","display_name":"Grid computing","score":0.5802503228187561},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.48519280552864075},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.449179083108902},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4269860088825226},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4255763292312622},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.38023361563682556},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2815778851509094},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.24918559193611145}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.797398567199707},{"id":"https://openalex.org/C77019957","wikidata":"https://www.wikidata.org/wiki/Q2689057","display_name":"Dependability","level":2,"score":0.6547613143920898},{"id":"https://openalex.org/C169468491","wikidata":"https://www.wikidata.org/wiki/Q146923","display_name":"Middleware (distributed applications)","level":2,"score":0.6407102346420288},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6244655251502991},{"id":"https://openalex.org/C70429105","wikidata":"https://www.wikidata.org/wiki/Q249999","display_name":"Grid computing","level":3,"score":0.5802503228187561},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.48519280552864075},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.449179083108902},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4269860088825226},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4255763292312622},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38023361563682556},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2815778851509094},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.24918559193611145},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/prdc.2002.1185626","is_oa":false,"landing_page_url":"https://doi.org/10.1109/prdc.2002.1185626","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2002 Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.47999998927116394,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2169628522","https://openalex.org/W4252527915","https://openalex.org/W2409287660","https://openalex.org/W2233357156","https://openalex.org/W1976489385","https://openalex.org/W4256317220","https://openalex.org/W1506225852","https://openalex.org/W2141414364","https://openalex.org/W1485337887","https://openalex.org/W2162974494"],"abstract_inverted_index":{"Grid":[0,292],"computing":[1,126],"relies":[2],"on":[3],"fragile":[4],"partnerships.":[5],"Clients":[6],"with":[7,23,84,153],"hundreds":[8],"or":[9,371],"even":[10,63,340],"thousands":[11],"of":[12,37,78,99,106,136,160,198,200,256,288,331,364,377],"pending":[13],"service":[14],"requests":[15],"must":[16,81,233,295,312,320,355],"seek":[17],"out":[18],"and":[19,35,40,45,56,123,132,145,230,236,241,245,252,268,280,308,311,315,386],"form":[20],"temporary":[21],"alliances":[22],"remote":[24],"servers":[25,39,162,253],"eager":[26],"to":[27,61,150,206,218,261,324,359],"satisfy":[28],"them.":[29],"Yet,":[30],"despite":[31],"the":[32,64,104,109,117,133,147,158,161,171,179,257,284,362,369,373,383,387],"high":[33],"quality":[34],"reliability":[36,159],"these":[38,213,249],"their":[41,94],"software,":[42],"unexpected":[43],"events":[44],"behavior":[46],"are":[47,215,380],"common.":[48],"Communication":[49],"networks,":[50],"power":[51,105],"systems,":[52,54],"operating":[53],"middleware":[55],"operator":[57],"intervention":[58],"all":[59],"conspire":[60],"attack":[62],"most":[65,167,285],"carefully":[66],"arranged":[67],"client-server":[68],"interaction.":[69],"To":[70],"survive":[71],"in":[72,115,139,187,195,238,275,368,372,382],"such":[73,223,277,282],"an":[74],"imperfect":[75],"world,":[76],"customers":[77],"grid":[79,125,219],"resources":[80],"be":[82,234,313,333,338,349,357],"equipped":[83],"resilient":[85],"client":[86],"software":[87,155],"that":[88,102,156,163],"tolerates":[89],"failures":[90,303],"while":[91],"aggressively":[92],"representing":[93],"interests.":[95],"Following":[96],"our":[97,130],"tradition":[98],"developing":[100,116],"technology":[101],"harnesses":[103],"opportunistic":[107],"resources,":[108,265],"Condor":[110,181],"Project":[111,148],"is":[112,170,273],"actively":[113],"engaged":[114],"basic":[118,239],"mechanisms":[119],"for":[120,243],"building":[121],"dependable":[122,188],"effective":[124],"clients.":[127],"Guided":[128],"by":[129],"experience":[131],"practical":[134],"needs":[135],"production":[137],"users":[138,152],"disciplines":[140],"as":[141,143,224,278,283,299],"diverse":[142],"astronomy":[144],"sociology,":[146],"aims":[149],"equip":[151],"powerful":[154],"complements":[157],"they":[164],"exploit.":[165],"Our":[166],"visible":[168],"product":[169],"Condor-G":[172,279],"job":[173,374],"manager.":[174],"Other":[175],"research":[176],"ventures,":[177],"including":[178],"full":[180],"distributed":[182],"system,":[183],"offer":[184],"valuable":[185],"lessons":[186,211],"client-side":[189],"management.":[190],"Dependability":[191],"has":[192],"been":[193],"explored":[194],"a":[196,291,300,322,325,365],"number":[197],"branches":[199],"computing,":[201],"ranging":[202],"from":[203,212,341],"database":[204],"systems":[205,276,342],"programming":[207],"languages.":[208],"The":[209],"hard-earned":[210],"fields":[214],"also":[216],"essential":[217],"computing.":[220],"Fundamental":[221],"concepts":[222],"timeouts,":[225],"logging,":[226],"checkpoints,":[227],"transactions,":[228],"leases,":[229],"atomic":[231],"operations":[232],"employed":[235],"expressed":[237],"protocols":[240,281],"interfaces":[242],"CPU":[244],"I/O":[246],"access.":[247],"Without":[248],"techniques,":[250],"clients":[251],"lose":[254],"track":[255],"other\u2019s":[258],"state,":[259],"leading":[260],"missed":[262],"opportunities,":[263],"wasted":[264],"incorrect":[266],"results,":[267],"unnecessary":[269],"failures.":[270],"This":[271],"principle":[272,379],"espoused":[274],"recent":[286],"version":[287],"GRAM.":[289],"In":[290,352],"environment":[293],"we":[294,354],"never":[296],"view":[297],"failure":[298,319,332,366],"disaster.":[301],"Rather,":[302],"occur":[304],"at":[305],"every":[306,309],"level":[307],"interface,":[310],"expected":[314],"structured.":[316],"No":[317],"single":[318],"bring":[321],"computation":[323],"halt,":[326],"nor":[327],"can":[328],"any":[329],"type":[330],"retried":[334],"indefinitely.":[335],"Jobs":[336],"may":[337,348],"retracted":[339],"deemed":[343],"reliable":[344],"when":[345],"better":[346],"performance":[347],"found":[350,381],"elsewhere.":[351],"addition,":[353],"always":[356],"careful":[358],"determine":[360],"whether":[361],"source":[363],"lies":[367],"system":[370],"itself.":[375],"Examples":[376],"this":[378],"DAGMan":[384],"meta-scheduler":[385],"fault-tolerant":[388],"shell.":[389]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
