Abstract is missing.
- Smart Dust - Hardware Limits to Wireless Sensor NetworksKristofer S. J. Pister. 2 [doi]
- Self-Stabilizing Smoothing and Counting Maurice Herlihy, Srikanta TirthapuraMaurice Herlihy, Srikanta Tirthapura. 4-11 [doi]
- Enabling Snap-StabilizatioAlain Cournier, Ajoy Kumar Datta, Franck Petit, Vincent Villain. 12-19 [doi]
- Efficient Self-stabilizing Algorithms for Tree NetworkJean R. S. Blair, Fredrik Manne. 20 [doi]
- PEAS: A Robust Energy Conserving Protocol for Long-lived Sensor NetworksFan Ye, Gary Zhong, Jesse Cheng, Songwu Lu, Lixia Zhang. 28-37 [doi]
- On Energy Efficiency And Network Connectivity Of Mobile Ad Hoc NetworksWing Ho A. Yuen, Chi Wan Sung. 38-45 [doi]
- SPEED: A Stateless Protocol for Real-Time Communication in Sensor NetworksTian He, John A. Stankovic, Chenyang Lu, Tarek F. Abdelzaher. 46 [doi]
- Partial Lookup ServiceQixiang Sun, Hector Garcia-Molina. 58-67 [doi]
- Mutual Anonymity Protocols for Hybrid Peer-to-Peer SystemsLi Xiao, Zhichen Xu, Xiaodong Zhang. 68-75 [doi]
- Updates in Highly Unreliable, Replicated Peer-to-Peer SystemsAnwitaman Datta, Manfred Hauswirth, Karl Aberer. 76 [doi]
- A Generic Framework for Indulgent ConsensusRachid Guerraoui, Michel Raynal. 88-95 [doi]
- Weakly-Connected Dominating Sets and Sparse Spanners in Wireless Ad Hoc NetworksKhaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder. 96-104 [doi]
- Software Fault Tolerance of Distributed Programs Using Computation SlicingNeeraj Mittal, Vijay K. Garg. 105 [doi]
- Optimal Distribution Tree for Internet Streaming MediaMin Sik Kim, Simon S. Lam, Dong-Young Lee. 116-125 [doi]
- Deliver Multimedia Streams with Flexible QoS via a Multicast DAGJiong Yang. 126-137 [doi]
- An Integrated Resource Sharing Policy for Multimedia Storage Servers Based on Network-Attached DisksNabil J. Sarhan, Chita R. Das. 136 [doi]
- Responsive Security for Stored DataSubramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran. 146-154 [doi]
- A graph-theoretical analysis of multicast authenticationAldar C.-F. Chan. 155-162 [doi]
- Performance Optimizations for Group Key Management SchemeSencun Zhu, Sanjeev Setia, Sushil Jajodia. 163 [doi]
- Scalable Resource Allocation for Multi-Processor QoS OptimizationSourav Ghosh, Ragunathan Rajkumar, Jeffery P. Hansen, John P. Lehoczky. 174-183 [doi]
- Scalable Service Differentiation in a Shared Storage CacheBong-Jun Ko, Kang-Won Lee, Khalil Amiri, Seraphin B. Calo. 184-193 [doi]
- QoS-Assured Service Composition in Managed Service Overlay NetworksXiaohui Gu, Klara Nahrstedt, Rong N. Chang, Christopher Ward. 194 [doi]
- Experiences With Monitoring OSPF on a Regional Service Provider NetworkDavid Watson, Farnam Jahanian, Craig Labovitz. 204-213 [doi]
- VirtualWire: A Fault Injection and Analysis Tool for Network ProtocolsPradipta De, Anindya Neogi, Tzi-cker Chiueh. 214-221 [doi]
- TCP-PR: TCP for Persistent Packet ReorderinStephan Bohacek, João P. Hespanha, Junsoo Lee, Chansook Lim, Katia Obraczka. 222 [doi]
- Efficient Content-Based Event Dispatching in the Presence of Topological ReconfigurationGian Pietro Picco, Gianpaolo Cugola, Amy L. Murphy. 234-243 [doi]
- Improving Application Throughput With Enterpris JavaBeans CachingAvraham Leff, James T. Rayfield. 244-251 [doi]
- NRMI: Natural and Efficient MiddlewareEli Tilevich, Yannis Smaragdakis. 252 [doi]
- Human Design: Wearable Computers for Human NetworkingAlex Pentland. 264 [doi]
- Evaluating Distributed Checkpointing ProtocolAdnan Agbaria, Ari Freund, Roy Friedman. 266-273 [doi]
- Synchronous Consensus for Dependent Process FailureFlavio Paiva Junqueira, Keith Marzullo. 274-283 [doi]
- Elastic Vector TimeChristof Fetzer, Michel Raynal. 284 [doi]
- A Context-Aware Data Management System for Ubiquitous Computing ApplicationChristopher K. Hess, Roy H. Campbell. 294-301 [doi]
- Impact of Data Compression on Energy Consumption of Wireless-Networked Handheld DevicesRong Xu, Zhiyuan Li, Cheng Wang, Peifeng Ni. 302-311 [doi]
- PARM: Power Aware Reconfigurable MiddlewareShivajit Mohapatra, Nalini Venkatasubramanian. 312 [doi]
- Protecting BGP Routes to Top Level DNS ServersLan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang. 322-331 [doi]
- A Path Information Caching and Aggregation Approach to Traffic Source IdentificationFu-Hau Hsu, Tzi-cker Chiueh. 332-339 [doi]
- On Effectiveness of Link Padding for Statistical Traffic Analysis AttacksXinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao. 340 [doi]
- An Integrated Approach to Modeling and Analysis of Embedded Real-Time Systems Based on Timed Petri NetZonghua Gu, Kang G. Shin. 350-359 [doi]
- Rate-monotonic scheduling on uniform multiprocessorSanjoy K. Baruah, Joël Goossens. 360-366 [doi]
- Effective Delay Control for High Rate Heterogeneous Real-time FlowsWeijia Jia, Hanxing Wang, Maoning Tang, Wei Zhao. 367 [doi]
- Performance Guarantees for Cluster-Based Internet ServicesChang Li, Gang Peng, Kartik Gopalan, Tzi-cker Chiueh. 378-385 [doi]
- Decision-Support Workload Characteristics on a Clustered Database Server from the OS PerspectiveYanyong Zhang, Jianyong Zhang, Anand Sivasubramaniam, Chun Liu, Hubertus Franke. 386-393 [doi]
- Integrated Access Control and Intrusion Detection for Web ServersTatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, Li Zhou. 394 [doi]
- Pragmatic Type InteroperabilitySébastien Baehni, Patrick Th. Eugster, Rachid Guerraoui, Philippe Altherr. 404-411 [doi]
- Efficiently Distributing Component-Based Applications Across Wide-Area EnvironmentsDeni Llambiri, Alexander Totok, Vijay Karamcheti. 412 [doi]
- Monitoring and Characterization of Component-Based Systems with Global Causality CaptureJun Li. 422 [doi]
- Remote Belief: Preserving Volition for Loosely Coupled ProcesseNuh Aydin, Paolo A. G. Sivilotti. 434-440 [doi]
- Enhancing The Fault-Tolerance of Nonmasking ProgramsSandeep S. Kulkarni, Ali Ebnenasir. 441-449 [doi]
- Modular Composition and Verification of Transaction Processing ProtocolsVasudevan Janarthanan, Purnendu Sinha. 450 [doi]
- A Generic Distributed Broadcast Scheme in Ad Hoc Wireless NetworksJie Wu, Fei Dai. 460-467 [doi]
- Fragmentation based D-MAC Protocol in Wireless Ad Hoc NetworkZhenmin Li, Pin Zhou, Jennifer C. Hou. 468-477 [doi]
- Cross-Feature Analysis for Detecting Ad-Hoc Routing AnomaliesYi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu. 478 [doi]
- PeerCQ: A Decentralized and Self-Configuring Peer-to-Peer Information Monitoring SystemBugra Gedik, Ling Liu. 490-499 [doi]
- Building Topology-Aware Overlays Using Global Soft-StatZhichen Xu, Chunqiang Tang, Zheng Zhang. 500-508 [doi]
- Neighbor Table Construction and Update in a Dynamic Peer-to-Peer NetworkHuaiyu Liu, Simon S. Lam. 509 [doi]
- The Conundrum of Distributed ComputingAlfred Z. Spector. 520 [doi]
- Obstruction-Free Synchronization: Double-Ended Queues as an ExampleMaurice Herlihy, Victor Luchangco, Mark Moir. 522-529 [doi]
- Scalable Distributed Concurrency Services for Hierarchical LockingNirmit Desai, Frank Mueller. 530-537 [doi]
- Local-spin Mutual Exclusion Using Fetch-and-/phi PrimitivesJames H. Anderson, Yong-Jik Kim. 538 [doi]
- A Case For Grid Computing On Virtual MachineRenato J. O. Figueiredo, Peter A. Dinda, José A. B. Fortes. 550-559 [doi]
- Efficient Distributed Shared State for Heterogeneous Machine ArchitecturesChunqiang Tang, DeQing Chen, Sandhya Dwarkadas, Michael L. Scott. 560-569 [doi]
- Group Membership and Wide-Area Master-Worker ComputationsKjetil Jacobsen, Xianan Zhang, Keith Marzullo. 570 [doi]
- Monotonicity and Partial Results Protection for Mobile AgentsBennet S. Yee. 582-591 [doi]
- Mobile Agent Rendezvous in a RingEvangelos Kranakis, Nicola Santoro, Cindy Sawchuk, Danny Krizanc. 592-599 [doi]
- Compiler Scheduling of Mobile Agents for Minimizing OverheadsXiaotong Zhuang, Santosh Pande. 600 [doi]
- Method Partitioning - Runtime Customization of Pervasive Programs without Design-time Application KnowledgeDong Zhou, Santosh Pande, Karsten Schwan. 610-619 [doi]
- Dynamic Module Replacement in Distributed ProtocolsNigamanth Sridhar, Scott M. Pike, Bruce W. Weide. 620-627 [doi]
- Analysis of Task Assignment with Cycle Stealing under Central QueueMor Harchol-Balter, Cuihong Li, Takayuki Osogami, Alan Scheller-Wolf, Mark S. Squillante. 628 [doi]
- Collision Avoidance in Single-Channel Ad Hoc Networks Using Directional AntennasYu Wang, J. J. Garcia-Luna-Aceves. 640-649 [doi]
- SmartNode: Achieving 802.11 MAC Interoperability in Power-efficient Ad Hoc Networks with Dynamic Range AdjustmentsEdmond Poon, Baochun Li. 650-657 [doi]
- Energy-Efficient Real-Time Scheduling in IEEE 802.11 Wireless LANsLynn Y. Zhang, Ye Ge, Jennifer C. Hou. 658 [doi]
- The Hash History Approach for Reconciling Mutual InconsistencyByunghoon Kang, Robert Wilensky, John Kubiatowicz. 670-677 [doi]
- New Algorithms for Content-Based Publication-Subscription SystemsAnton Riabov, Zhen Liu, Joel L. Wolf, Philip S. Yu, Li Zhang. 678-686 [doi]
- Trading Replication Consistency for Performance and Availability: an Adaptive ApproachChi Zhang, Zheng Zhang. 687-695 [doi]