Abstract is missing.
- Building a Self-Healing Operating SystemFrancis M. David, Roy H. Campbell. 3-10 [doi]
- Self-Configuration Techniques for MuniSocketNader Mohamed, Jameela Al-Jaroodi. 11-20 [doi]
- Incorporating Modular Imperfect Coverage into Dynamic Hierarchical Systems AnalysisPrashanthi Boddu, Liudong Xing. 21-28 [doi]
- A Coarse-Grained Pessimistic Message Logging Scheme for Improving Rollback Recovery EfficiencyJin-Min Yang, Kin Fun Li, Da-Fang Zhang, Jing Cheng. 29-36 [doi]
- A Byzantine Fault Tolerant Distributed Commit ProtocolWenbing Zhao 0001. 37-46 [doi]
- Compiler-Directed Region-Based Security for Low-Overhead Software ProtectionVijay Kongubangaram, Olga Gelbart, Rahul Simha, Bhagirath Narahari. 47-54 [doi]
- Towards a Proactive Fraud Management Framework for Financial Data StreamsMichael Edward Edge, Pedro R. Falcone Sampaio, Mohammed Choudhary. 55-64 [doi]
- Challenges and Best Practices in Policy-Based Autonomic ArchitecturesRadu Calinescu. 65-74 [doi]
- Using Atoms to Simplify Distributed Programs CheckingHon Fung Li, Eslam Al Maghayreh, Dhrubajyoti Goswami. 75-83 [doi]
- An Inference-based Collaborative Filtering ApproachJin-Min Yang, Kin Fun Li. 84-94 [doi]
- How to Update Dependable Secure Computing Systems from a Survivability Assessment Perspective?Li Bai, Saroj Biswas, Musoke Sendula. 95-99 [doi]
- Performance Analysis of CORBA Replication ModelsSwapna S. Gokhale, B. Dasarathy. 100-107 [doi]
- Byzantine Fault Tolerance for Nondeterministic ApplicationsWenbing Zhao 0001. 108-118 [doi]
- Employing Expert Opinion and Software Metrics for Reasoning About SoftwareNorita Ahmad, Phillip A. Laplante. 119-124 [doi]
- Hybrid Trust Information Exchange for Federated SystemsZhengping Wu, Alfred C. Weaver. 125-133 [doi]
- iKernel: Isolating Buggy and Malicious Device Drivers Using Hardware Virtualization SupportLin Tan, Ellick Chan, Reza Farivar, Nevedita Mallick, Jeffrey C. Carlyle, Francis M. David, Roy H. Campbell. 134-144 [doi]
- On TCP Performance in Flow-Based Mix NetworksXinwen Fu, Shu Jiang, Wei Yu, Steve Graham, Yong Guan. 145-152 [doi]
- FileWall: A Firewall for Network File SystemsStephen Smaldone, Aniruddha Bohra, Liviu Iftode. 153-162 [doi]
- Secure Multipath Routing Scheme for Mobile Ad Hoc NetworkBinod Vaidya, Jae-Young Pyun, Jong-An Park, Seung Jo Han. 163-171 [doi]
- MBDD versus MMDD for Multistate Systems AnalysisAkhilesh Shrestha, Liudong Xing, Yuanshun Dai. 172-180 [doi]