Abstract is missing.
- Computation of Equilibria and Stable SolutionsMihalis Yannakakis. 2 [doi]
- A Geometry of NetworksYechiam Yemini. 3 [doi]
- Systematic Correct Construction of Self-stabilizing Systems: A Case StudyAnanda Basu, Borzoo Bonakdarpour, Marius Bozga, Joseph Sifakis. 4-18 [doi]
- A Fault-Resistant Asynchronous Clock FunctionEzra N. Hoch, Michael Ben-Or, Danny Dolev. 19-34 [doi]
- Self-stabilizing Leader Election in Dynamic NetworksAjoy Kumar Datta, Lawrence L. Larmore, Hema Piniganti. 35-49 [doi]
- Loop-Free Super-Stabilizing Spanning Tree ConstructionLélia Blin, Maria Gradinariu Potop-Butucaru, Stephane Rovedakis, Sébastien Tixeuil. 50-64 [doi]
- A New Technique for Proving Self-stabilizing under the Distributed SchedulerSven Köhler, Volker Turau. 65-79 [doi]
- A Tranformational Approach for Designing Scheduler-Oblivious Self-stabilizing AlgorithmsAbhishek Dhama, Oliver E. Theel. 80-95 [doi]
- On Byzantine Containment Properties of the ::::min:::: + 1 ProtocolSwan Dubois, Toshimitsu Masuzawa, Sébastien Tixeuil. 96-110 [doi]
- Efficient Self-stabilizing Graph Searching in Tree NetworksJean R. S. Blair, Fredrik Manne, Rodica Mihai. 111-125 [doi]
- Adaptive Containment of Time-Bounded Byzantine FaultsYukiko Yamauchi, Toshimitsu Masuzawa, Doina Bein. 126-140 [doi]
- Brief Announcement: Fast Convergence in Route-PreservationJorge Arturo Cobb. 141-143 [doi]
- Authenticated Broadcast with a Partially Compromised Public-Key InfrastructureS. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Arkady Yerukhimovich. 144-158 [doi]
- On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor NetworksTuan Manh Vu, Reihaneh Safavi-Naini, Carey Williamson. 159-175 [doi]
- Slow Is Fast for Wireless Sensor Networks in the Presence of Message LossesMahesh Arumugam, Murat Demirbas, Sandeep S. Kulkarni. 176-190 [doi]
- Modeling and Analyzing Periodic Distributed ComputationsAnurag Agarwal, Vijay K. Garg, Vinit A. Ogale. 191-205 [doi]
- Complexity Issues in Automated Model Revision without Explicit Legitimate StateFuad Abujarad, Sandeep S. Kulkarni. 206-220 [doi]
- Algorithmic Verification of Population ProtocolsIoannis Chatzigiannakis, Othon Michail, Paul G. Spirakis. 221-235 [doi]
- Energy Management for Time-Critical Energy Harvesting Wireless Sensor NetworksBo Zhang, Robert Simon, Hakan Aydin. 236-251 [doi]
- Stably Decidable Graph Languages by Mediated Population ProtocolsIoannis Chatzigiannakis, Othon Michail, Paul G. Spirakis. 252-266 [doi]
- Broadcasting in Sensor Networks of Unknown Topology in the Presence of SwampingEvangelos Kranakis, Michel Paquette. 267-281 [doi]
- Brief Announcement: Configuration of Actuated Camera Networks for Multi-target CoverageMatthew P. Johnson, Amotz Bar-Noy, Mani Srivastava. 282-284 [doi]
- Brief Announcement: On the Hardness of Topology InferenceHrishikesh B. Acharya, Mohamed G. Gouda. 285-287 [doi]
- Self-stabilizing Algorithm of Two-Hop Conflict ResolutionStéphane Pomportes, Joanna Tomasik, Anthony Busson, Véronique Vèque. 288-302 [doi]
- Low Memory Distributed Protocols for 2-ColoringAmos Israeli, Mathew D. McCubbins, Ramamohan Paturi, Andrea Vattani. 303-318 [doi]
- Connectivity-Preserving Scattering of Mobile Robots with Limited VisibilityTaisuke Izumi, Maria Gradinariu Potop-Butucaru, Sébastien Tixeuil. 319-331 [doi]
- Computing in Social NetworksAndrei Giurgiu, Rachid Guerraoui, Kévin Huguenin, Anne-Marie Kermarrec. 332-346 [doi]
- On Transactional Scheduling in Distributed Transactional Memory SystemsJunwhan Kim, Binoy Ravindran. 347-361 [doi]
- Recursion in Distributed ComputingEli Gafni, Sergio Rajsbaum. 362-376 [doi]
- On Adaptive Renaming under Eventually Limited ContentionDamien Imbs, Michel Raynal. 377-387 [doi]
- RobuSTM: A Robust Software Transactional MemoryJons-Tobias Wamhoff, Torvald Riegel, Christof Fetzer, Pascal Felber. 388-404 [doi]
- A Provably Starvation-Free Distributed Directory ProtocolHagit Attiya, Vincent Gramoli, Alessia Milani. 405-419 [doi]
- Lightweight Live Migration for High Availability Cluster ServiceBo Jiang, Binoy Ravindran, Changsoo Kim. 420-434 [doi]
- Approximation of ::::delta::::-TimelinessCarole Delporte-Gallet, Stéphane Devismes, Hugues Fauconnier. 435-451 [doi]
- A Framework for Adaptive Optimization of Remote Synchronous CSCW in the Cloud Computing EraJi Lu, Yaoxue Zhang, Yuezhi Zhou. 452-467 [doi]
- Chameleon-MAC: Adaptive and Self-* Algorithms for Media Access Control in Mobile Ad Hoc NetworksPierre Leone, Marina Papatriantafilou, Elad Michael Schiller, Gongxi Zhu. 468-488 [doi]
- A Comparative Study of Rateless Codes for P2P Persistent StorageHeverson Borba Ribeiro, Emmanuelle Anceaume. 489-503 [doi]
- Dynamically Reconfigurable Filtering ArchitecturesMathieu Valero, Luciana Arantes, Maria Gradinariu, Pierre Sens. 504-518 [doi]
- A Quantitative Analysis of Redundancy Schemes for Peer-to-Peer Storage SystemsYaser Houri, Bernhard Amann, Thomas Fuhrmann. 519-530 [doi]
- A Framework for Secure and Private P2P Publish/SubscribeSamuel Bernard, Maria Gradinariu Potop-Butucaru, Sébastien Tixeuil. 531-545 [doi]
- Snap-Stabilizing Linear Message ForwardingAlain Cournier, Swan Dubois, Anissa Lamani, Franck Petit, Vincent Villain. 546-559 [doi]
- Vulnerability Analysis of High Dimensional Complex SystemsVedant Misra, Dion Harmon, Yaneer Bar-Yam. 560-572 [doi]
- Storage Capacity of Labeled GraphsDana Angluin, James Aspnes, Rida A. Bazzi, Jiang Chen, David Eisenstat, Goran Konjevod. 573-587 [doi]
- Safe Flocking in Spite of Actuator FaultsTaylor Johnson, Sayan Mitra. 588-602 [doi]