Abstract is missing.
- Optimizing File Availability in a Secure Serverless Distributed File SystemJohn R. Douceur, Roger Wattenhofer. 4-13 [doi]
- Primary-Backup Replication: From a Time-Free Protocol to a Time-Based ImplementationRui Carlos Oliveira, José Orlando Pereira, André Schiper. 14-23 [doi]
- How to Select a Replication Protocol According to Scalability, Availability, and Communication OverheadRicardo Jiménez-Peris, Marta Patiño-Martínez, Bettina Kemme, Gustavo Alonso. 24 [doi]
- Quantifying Rollback Propagation in Distributed CheckpointingAdnan Agbaria, Hagit Attiya, Roy Friedman, Roman Vitenberg. 36-45 [doi]
- Continental ProntoSvend Frølund, Fernando Pedone. 46-55 [doi]
- Compiler-Assisted Heterogeneous CheckpointingFeras Karablieh, Rida A. Bazzi, Margaret Hicks. 56 [doi]
- Applying Fault-Tolerance Principles to Security ResearchAnjali Bhargava, Bharat K. Bhargava. 68-69 [doi]
- The Challenge of Creating Productive Collaborating Information Assurance Communities via Internet Research and StandardsJoseph Betser. 70-71 [doi]
- Can Reliability and Security be Joined Reliably and Securely?Kevin A. Kwiat. 72-73 [doi]
- Incorporation of Security and Fault Tolerance Mechanisms into Real-Time Component-Based Distributed Computing SystemsK. H. Kim. 74-75 [doi]
- Research in High-Confidence Distributed Information SystemsMukesh Singhal. 76-79 [doi]
- Detecting Heap Smashing Attacks through Fault Containment WrappersChristof Fetzer, Zhen Xiao. 80-89 [doi]
- Efficient Update Diffusion in Byzantine EnvironmentsDahlia Malkhi, Ohad Rodeh, Michael K. Reiter, Yaron Sella. 90-98 [doi]
- An Analytical Framework for Reasoning about IntrusionsShambhu J. Upadhyaya, Ramkumar Chinchani, Kevin A. Kwiat. 99 [doi]
- Optimistic Validation of Electronic TicketsFernando Pedone. 110-119 [doi]
- A Consensus Protocol Based on a Weak FailureDetector and a Sliding Round WindowMichel Hurfin, Achour Mostéfaoui, Michel Raynal, Raimundo A. Macêdo. 120-129 [doi]
- Polynomial Time Synthesis of Byzantine AgreementSandeep S. Kulkarni, Anish Arora, Arun Chippada. 130 [doi]
- Looking Ahead in Atomic Actions with Exception HandlingAlexander B. Romanovsky. 142-151 [doi]
- Assessing Inter-Modular Error Propagation in Distributed SoftwareArshad Jhumka, Martin Hiller, Neeraj Suri. 152-161 [doi]
- Designing a Robust Namespace for Distributed File ServicesZheng Zhang, Christos T. Karamanolis. 162 [doi]
- High-Quality Customizable Embedded Software from COTS ComponentsFarokh B. Bastani. 174-175 [doi]
- Application of Commercial-Grade Digital Equipment in Nuclear Power Plant Safety SystemsMatthew Chiramal. 176-178 [doi]
- Why Is It So Hard to Predict Software System Trustworthiness from Software Component Trustworthiness?Jeffrey M. Voas. 179 [doi]
- Message Logging Optimization for Wireless NetworksBin Yao, W. Kent Fuchs. 182-185 [doi]
- Reducing Noise in Gossip-Based Reliable BroadcastPetr Kouznetsov, Rachid Guerraoui, Sidath B. Handurukande, Anne-Marie Kermarrec. 186-189 [doi]
- Chasing the FLP Impossibility Result in a LAN or How Robust Can a Fault Tolerant Server Be?Péter Urbán, Xavier Défago, André Schiper. 190-193 [doi]
- Consensus with Written Messages Under Link FaultsBettina Weiss, Ulrich Schmid. 194-197 [doi]
- Efficient TDMA Synchronization for Distributed Embedded SystemsVilgot Claesson, Henrik Lönn, Neeraj Suri. 198-201 [doi]
- Efficient Recovery Information Management Schemes for the Fault Tolerant Mobile Computing SystemsTaesoon Park, Namyoon Woo, Heon Young Yeom. 202 [doi]
- Using the Timely Computing Base for Dependable QoS AdaptationAntonio Casimiro, Paulo Veríssimo. 208-217 [doi]
- A Microkernel Middleware Architecture for Distributed Embedded Real-Time SystemsUwe Brinkschulte, Aurelie Bechina, Florentin Picioroaga, Etienne Schneider, Theo Ungerer, Jochen Kreuzinger, Matthias Pfeffer. 218-226 [doi]
- Performance Analysis of the CORBA Notification Service Srinivasan Ramani, Kishor S. Trivedi, Balakrishnan Dasarathy. 227 [doi]
- Reliable Real-Time Cooperation of Mobile Autonomous SystemsStefan Schemmer, Edgar Nett, Michael Mock. 238-246 [doi]
- On the Effectiveness of a Counter-Based Cache Invalidation Scheme and Its Resiliency to Failures in Mobile EnvironmentsGuohong Cao, Chita R. Das. 247-256 [doi]
- Comparison-Based System-Level Fault Diagnosis in Ad Hoc NetworksStefano Chessa, Paolo Santi. 257-266 [doi]