Abstract is missing.
- Taming the Dynamics of Distributed DataKrithi Ramamritham. 1 [doi]
- Data in Your SpaceVijay Kumar. 2-20 [doi]
- Enabling Technologies for Harnessing Information ExplosionSharma Chakravarthy. 21 [doi]
- Fair Leader Election by Randomized VotingSiddhartha Brahma, Sandeep Macharla, Sudebkumar Prasant Pal, Sudhir Kumar Singh. 22-31 [doi]
- An Efficient Leader Election Algorithm for Mobile Ad Hoc NetworksPradeep Parvathipuram, Vijay Kumar, Gi-Chul Yang. 32-41 [doi]
- Distributed Balanced Tables: A New ApproachAmiya K. Tripathy, Tripti Negi, Anil Singh. 42-49 [doi]
- Performance Evaluation of Gigabit Ethernet and SCI in a Linux ClusterRajesh Kalmady, Digamber Sonvane. 50-59 [doi]
- Performance Evaluation of a Modified-Cyclic-Banyan Based ATM/IP Switching FabricVijay Shanker Tripathi, Sudarshan Tiwari. 60-64 [doi]
- A Scalable and Roboust QoS Architecture for WiFi P2P NetworksSathish Rajasekhar, Ibrahim Khalil, Zahir Tari. 65-74 [doi]
- NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed ConnectivityShilpa Dhar, Krishnendu Roy, Rajgopal Kannan. 75-84 [doi]
- Energy Efficient Cache Invalidation in a Disconnected Mobile EnvironmentNarottam Chand, Ramesh C. Joshi, Manoj Misra. 85-95 [doi]
- An Efficient Data Dissemination Schemes for Location Dependent Information ServicesKwangJin Park, MoonBae Song, Chong-Sun Hwang. 96-105 [doi]
- A Publish/Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent AlertsSharma Chakravarthy, Nishant Vontella. 106-116 [doi]
- A Nested Transaction Model for LDAP TransactionsDebmalya Biswas, K. Vidyasankar. 117-126 [doi]
- Team Transaction: A New Transaction Model for Mobile Ad Hoc NetworksAnkur Gupta, Nitin Gupta, R. K. Ghosh, M. M. Gore. 127-134 [doi]
- An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed SystemsDiganta Goswami, S. Sahu. 135-144 [doi]
- Cybersecurity: Opportunities and ChallengesPradeep K. Khosla. 145 [doi]
- Vulnerabilities and Threats in Distributed SystemsBharat K. Bhargava, Leszek Lilien. 146-157 [doi]
- A TNATS Approcah to Hidden Web DocumentsYih-Ling Hedley, Muhammad Younas, Anne E. James. 158-167 [doi]
- Querying XML Documents from a Relational Database in the Presence of DTDsManjeet Rege, Izabell Caraconcea, Shiyong Lu, Farshad Fotouhi. 168-177 [doi]
- SAQI: Semantics Aware Query InterfaceM. K. MadhuMohan, Sujatha R. Upadhyaya, P. Sreenivasa Kumar. 178-193 [doi]
- Hybrid-Chord: A Peer-to-Peer System Based on ChordPaola Flocchini, Amiya Nayak, Ming Xie. 194-203 [doi]
- A Generic and Flexible Model for Replica Consistency ManagementCorina Ferdean, Mesaac Makpangou. 204-209 [doi]
- An Efficient Distributed Scheme for Source Routing Protocol in Communication NetworksVijayalakshmi Hadimani, R. C. Hansdah. 210-216 [doi]
- The Roles of Ontology and Metadata Registry for Interoperable DatabasesJeong-Oog Lee, Myeong-Cheol Ko, Woojin Paik, Heung Seok Jeon, Junghwan Kim, Hyun-Kyu Kang, Jinsoo Kim. 217-226 [doi]
- DHL: Semantically Rich Dynamic and Active HyperlinksGi-Chul Yang, Sanjay Kumar Madria. 227-236 [doi]
- User-Class Based Service Acceptance Policy Using Cluster AnalysisHea-Sook Park, Yan Ha, Soon-Mi Lee, Young-Whan Park, Doo-Kwon Baik. 237-242 [doi]
- Tools and Techniques for Multi-site Sotware DevelopmentSatish Chandra. 243 [doi]
- Specifying a Mobile Computing Infrastructure and ServicesSatyajit Acharya, Chris George, Hrushikesha Mohanty. 244-254 [doi]
- Generating a Prototype from a UML Model of System RequirementsXiaoshan Li, Zhiming Liu, Jifeng He, Quan Long. 255-265 [doi]
- A Type System for an Aspect Oriented Programming LanguageM. Devi Prasad, Banshi Dhar Chaudhary. 266-272 [doi]
- Secure Requirements Elicitation Through Triggered Message Sequence ChartsArnab Ray, Bikram Sengupta, Rance Cleaveland. 273-282 [doi]
- Framework for Safe Reuse of Software BinariesRamakrishnan Venkitaraman, Gopal Gupta. 283-293 [doi]
- Supporting Partial Component MatchingPadmanabhan Krishnan, Lei Wang. 294-303 [doi]
- A Novel Approach for Dynamic Slicing of Distributed Object-Oriented ProgramsDurga Prasad Mohapatra, Rajib Mall, Rajeev Kumar. 304-309 [doi]
- Pattern Semantic Link: A Reusable Pattern Representation in MDA ContextJianfei Yin, Heqing Guo, Xinyi Peng, Manshan Lin. 310-317 [doi]
- Compatibility Test and Adapter Generation for Interfaces of Software ComponentsJohannes Maria Zaha, Marco Geisenberger, Martin Groth. 318-328 [doi]
- A Modern Graphic Flowchart Layout ToolSukhamay Kundu. 329-335 [doi]
- A Flexible Authorization Framework for E-CommerceSushil Jajodia, Duminda Wijesekera. 336-345 [doi]
- Efficient Algorithms for Intrusion DetectionNiranjan K. Boora, Chiranjib Bhattacharyya, K. Gopinath. 346-352 [doi]
- Proxy-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion DetectionSamik Basu, Prem Uppuluri. 353-362 [doi]
- Using Schemas to Simplify Access Control for XML DocumentsIndrakshi Ray, Marianna Muller. 363-368 [doi]
- Automatic Enforcement of Access Control Policies Among Dynamic CoalitionsVijayalakshmi Atluri, Janice Warner. 369-378 [doi]
- Implementing Consistency Checking in Correlating AttacksKaushal Sarda, Duminda Wijesekera, Sushil Jajodia. 379-384 [doi]
- LSAD: Lightweight SYN Flooding Attack DetectorSeung-Won Shin, Ki-Young Kim, Jong-Soo Jang. 385-390 [doi]
- UGSP: Secure Key Establishment Protocol for Ad-Hoc NetworkNeelima Arora, R. K. Shyamasundar. 391-399 [doi]
- Tracing Attackers with Deterministic Edge Router Marking (DERM)Shravan K. Rayanchu, Gautam Barua. 400-409 [doi]
- Distributing Key Updates in Secure Dynamic GroupsSandeep S. Kulkarni, Bezawada Bruhadeshwar. 410-419 [doi]
- Succinct and Fast Accessible Data Structures for Database Damage AssessmentJing Zhou, Brajendra Panda, Yi Hu. 420-429 [doi]
- A Secure Checkpointing Protocol for Survivable Server DesignVamsi Kambhampati, Indrajit Ray, Eunjong Kim. 430-440 [doi]
- MobiCoin: Digital Cash for M-CommerceRanjit Abbadasari, Ravi Mukkamala, V. Valli Kumari. 441-451 [doi]
- Cellular Automata : An Ideal Candidate for a Block CipherDebdeep Mukhopadhyay, Dipanwita Roy Chowdhury. 452-457 [doi]
- NFD Technique for Efficient and Secured Information Hiding in Low Resolution ImagesS. N. Sivanandam, C. K. Gokulnath, K. Prasanna, S. Rajeev. 458-467 [doi]
- Improving Feature Selection in Anomaly Intrusion Detection Using SpecificationsYanxin Wang, Andrew S. Miner, Johnny Wong, Prem Uppuluri. 468 [doi]
- Towards Automatic Learning of Valid Services for HoneypotsVishal Chowdhary, Alok Tongaonkar, Tzi-cker Chiueh. 469-470 [doi]