Abstract is missing.
- A Non-Blocking Recovery Algorithm for Causal Message LoggingJ. Roger Mitchell, Vijay K. Garg. 3-9
- The Cost of Recovery in Message Logging ProtocolsSriram Rao, Lorenzo Alvisi, Harrick M. Vin. 10-18
- An Efficient Algorithm for Causal Message LoggingByoungjoo Lee, Taesoon Park, Heon Young Yeom, Yookun Cho. 19-25
- ROI: An Invocation Mechanism for Replicated ObjectsFrancesc D. Muñoz-Escoí, Pablo Galdámez, José M. Bernabéu-Aubán. 29-35
- View Consistency for Optimistic ReplicationAshvin Goel, Calton Pu, Gerald J. Popek. 36-42
- Semi-Passive ReplicationXavier Défago, André Schiper, Nicole Sergent. 43-50
- Secure and Scalable Replication in PhalanxDahlia Malkhi, Michael K. Reiter. 51-58
- A VP-Accordant Checkpointing Protocol Preventing Useless CheckpointsRoberto Baldoni, Francesco Quaglia, Bruno Ciciani. 61-67
- System-Level Versus User-Defined CheckpointingLuís Moura Silva, João Gabriel Silva. 68-74
- Checkpoints-on-Demand with Active ReplicationSampath Rangarajan, Sachin Garg, Yennun Huang. 75-83
- Design and Analysis of a Hardware-Assisted Checkpointing and Recovery Scheme for Distributed ApplicationsBina Ramamurthy, Shambhu J. Upadhyaya, Bharat K. Bhargava. 84-90
- Checkpoint-Recovery Protocol for Reliable Mobile SystemsHiroaki Higaki, Makoto Takizawa. 93-99
- A Fault-Tolerant Protocol for Providing the Exactly-Once Property of Mobile AgentsKurt Rothermel, Markus Straßer. 100-108
- Tolerating Visitor Location Register Failures in Mobile EnvironmentsSaad Biaz, Nitin H. Vaidya. 109-117
- A Metaobject Protocol for Fault-Tolerant CORBA ApplicationsMarc-Olivier Killijian, Jean-Charles Fabre, Juan-Carlos Ruiz-Garcia, Shigeru Chiba. 127-134
- Safe and Efficient Active Network ProgrammingScott Thibault, Charles Consel, Gilles Muller. 135-143
- On Patterns for Practical Fault Tolerant Software in JavaGolden G. Richard III, Shengru Tu. 144-150
- Evolving Distributed Software Engineering EnvironmentsGeorge S. Cowan, Robert G. Reynolds. 151-157
- Failure Handling in an Optimized Two-Safe Approach to Maintaining Primary-Backup SystemsKexiang Hu, Sharad Mehrotra, Simon M. Kaplan. 161-167
- An Integration of the Primary-Shadow TMO Replication Scheme with a Supervisor-Based Network Surveillance Scheme and Its Recovery Time Bound AnalysisK. H. Kim, Chittur Subbaraman. 168-176
- Optimization of a Real-Time Primary-Backup Replication ServiceHengming Zou, Farnam Jahanian. 177-185
- A Multiprocessor Scheduling Algorithm for Low Overhead Fault-ToleranceKoji Hashimoto, Tatsuhiro Tsuchiya, Tohru Kikuno. 186-194
- A Security Auction-Like Negotiation Protocol for Agent-Based Internet TradingXun Yi, Xiao Feng Wang, Kwok-Yan Lam, Eiji Okamoto, D. Frank Hsu. 197-203
- Transformation-Based Reconstruction for Audio Transmissions over the InternetBenjamin W. Wah, Dong Lin. 211-217
- Tolerating Client and Communication Failures in Distributed Groupware SystemsHyong Sop Shim, Atul Prakash. 221-227
- Fault-Tolerant Total Order Multicast to Asynchronous GroupsUdo Fritzke Jr., Philippe Ingels, Achour Mostéfaoui, Michel Raynal. 228-234
- Architecture for Group Communication in Mobile SystemsRavi Prakash, Roberto Baldoni. 235-242
- Dependability Analysis of a Cache-Based RAID System via Fast Distributed SimulationYiqing Huang, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 254-260
- The Chameleon Infrastructure for Adaptive, Software Implemented Fault ToleranceSaurabh Bagchi, Keith Whisnant, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 261-267
- Survivable Consensus ObjectsDahlia Malkhi, Michael K. Reiter. 271-279
- Consensus in Asynchronous Systems Where Processes Can Crash and RecoverMichel Hurfin, Achour Mostéfaoui, Michel Raynal. 280-286
- A Distributed Version of the SequenceL LanguageDaniel E. Cooke, Vladik Kreinovich, Joseph E. Urban. 295-301
- Optimizing Join Index Based Join Processing: A Graph Partitioning ApproachSivakumar Ravada, Shashi Shekhar, Chang-Tien Lu, Sanjay Chawla. 302-308
- Load Balancing of Dynamic and Adaptive Mesh-Based ComputationsKirk Schloegel, George Karypis, Vipin Kumar. 311
- High Throughput Networks for Petaflops ComputingLarry D. Wittie, George N. Sazaklis, Yaping Zhou, Dmitry Zinoviev. 312-317
- Look-Ahead Traffic Distribution in Wormhole-Routed NetworksWei-Ming Lin, Chunhui Zhao. 318-323
- A Taxonomy for Describing Matching and Scheduling Heuristics for Mixed-Machine Heterogeneous Computing SystemsTracy D. Braun, Howard Jay Siegel, Noah Beck, Ladislau Bölöni, Muthucumaru Maheswaran, Albert I. Reuther, James P. Robertson, Mitchell D. Theys, Bin Yao. 330-335
- Extending the Coda File System to Handle Cache Misses on Isolated ClientsHiroshi Inamura. 336-340
- Cache Injection on Bus Based MultiprocessorsAleksandar Milenkovic, Veljko M. Milutinovic. 341-346
- Programming the Grid: Component Systems for Distributed ApplicationsDennis Gannon. 347-353
- The Relative Overhead of Piggybacking in Causal Message Logging ProtocolsKaran Bhatia, Keith Marzullo, Lorenzo Alvisi. 348-353
- Two Branch Predictor Schemes for Reduction of Misprediction Rate in Conditions of Frequent Context SwitchesMilena Petrovic, Igor Tartalja, Veljko M. Milutinovic. 354-359
- Off-Line Diagnosis of Parallel SystemsOum-El-Kheir Benkahla, Chantal Robach. 360-365
- Practical Parallel Algorithms for Minimum Spanning TreesFrank K. H. A. Dehne, Silvia Götz. 366-371
- Resource-Usage Prediction for Demand-Based Network-ComputingNirav H. Kapadia, Carla E. Brodley, José A. B. Fortes, Mark S. Lundstrom. 372-377
- An Efficient MPEG Video Encryption AlgorithmChanggui Shi, Bharat K. Bhargava. 381-386
- Security in the Large: Is Java s Sandbox Scalable?Qun Zhong, Nigel Edwards. 387-392
- Enforcing Security Policies in Large Scale Communication NetworksTheodore K. Apostolopoulos, Victoria C. Daskalou, Sokratis K. Katsikas, K. D. Moulinos. 393-397
- Managing Network Security-A Pragmatic ApproachRainer Falk, Markus Trommer. 398-402
- Requirements for a True Enterprise-Wide Security Infrastructure: The Play s the ThingDouglas C. Merrill, Alastair MacWillson, Gary Loveland. 403-406
- Security in Mobile SystemsVineeth Subramanyam, Anupam Joshi. 407-410
- Legal Reliability in Large-Scale Distributed SystemsPeter Sommer. 416-421
- End to End Reliable Multicast Transport Protocol Requirements for Collaborative Multimedia SystemsNadia Kauser, Jon Crowcroft. 425-430
- An Efficient Scheme to Reduce Handoff Dropping in LEO Satellite SystemsSuresh Kalyanasundaram, Edwin K. P. Chong, Ness B. Shroff. 431-436
- A Fragmentation Scheme for Multimedia Traffic in Active NetworksSheng-Yih Wang, Bharat K. Bhargava. 437-442
- CORBA Evaluation of Video Streaming wrt QoS ProvisioningWonjun Lee, Jaideep Srivastava. 443-448
- Evaluation of Filtering Mechanisms for MPEG Video CommunicationsSahra Sedigh, James Joshi, Ahmed Bashandy, Arif Ghafoor. 449-454
- Pixel Level Interleaving Schemes for Robust Image CommunicationRogelio Hasimoto-Beltran, Ashfaq A. Khokhar. 455-460
- Interactive Image Retrieval over the InternetJozsef Vass, Jia Yao, Anupam Joshi, Kannappan Palaniappan, Xinhua Zhuang. 461-466
- Issues in Multimedia Synchronization over Broadband NetworksShahab Baqai, M. Farrukh Khan, S. Shaikh. 467-472
- A Data Allocation Algorithm for Distributed Hypermedia DocumentsSiu-Kai So, Ishfaq Ahmad, Kamalakar Karlapalem. 473-478
- An Object Relational Database for Brain Aging ResearchTaehyung Wang, Phillip C.-Y. Sheu, Brian Cummings, Carl Cotman. 479-485
- Local Area Detection of Incoming War Dial ActivityEdward Amoroso, Eugene Kogan, Brenda McAnderson, Dan Powell, Brian Rexroad, Steve Schuster, Anthony Stramaglia. 486-491