Abstract is missing.
- Program and Organizing Committee [doi]
- Message from the General Chair [doi]
- Full Program Committee [doi]
- Program Co-chair's Message [doi]
- External Reviewers [doi]
- Analysis of the Message Waiting Time for the FioranoMQ JMS ServerMichael Menth, Robert Henjes. 1 [doi]
- Highly Available Long Running Transactions and Activities for J2EE ApplicationsFrancisco Perez-Sorrosal, Marta Patiño-Martínez, Ricardo Jiménez-Peris, Jaksa Vuckovic. 2 [doi]
- A Bridging Framework for Universal Interoperability in Pervasive SystemsJin Nakazawa, Hideyuki Tokuda, W. Keith Edwards, Umakishore Ramachandran. 3 [doi]
- A Loss and Queuing-Delay Controller for Router Buffer ManagementLong Le, Kevin Jeffay, F. Donelson Smith. 4 [doi]
- The Confluent Capacity of the Internet: Congestion vs. DilationJiangzhuo Chen, Ravi Sundaram, Madhav V. Marathe, Rajmohan Rajaraman. 5 [doi]
- FastFlow: A Framework for Accurate Characterization of Network TrafficSumantra R. Kundu, Bodhisatwa Chakravarty, Kalyan Basu, Sajal K. Das. 6 [doi]
- Autonomic Management of Stream Processing Applications via Adaptive Bandwidth ControlDimitrios E. Pendarakis, Jeremy Silber, Laura Wynter. 7 [doi]
- SysProf: Online Distributed Behavior Diagnosis through Fine-grain System MonitoringSandip Agarwala, Karsten Schwan. 8 [doi]
- A Hierarchical Optimization Framework for Autonomic Performance Management of Distributed Computing SystemsNagarajan Kandasamy, Sherif Abdelwahed, Mohit Khandekar. 9 [doi]
- Loud and Clear: Human-Verifiable Authentication Based on AudioMichael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun. 10 [doi]
- Design and Performance Evaluation of a Proxy-based Java Rewriting Security SystemYougang Song, Ying Xu, Brett D. Fleisch. 11 [doi]
- Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered StorageThomas J. E. Schwarz, Ethan L. Miller. 12 [doi]
- WhoPay: A Scalable and Anonymous Payment System for Peer-to-Peer EnvironmentsKai Wei, Alan J. Smith, Yih-Farn Robin Chen, Binh Vo. 13 [doi]
- Robust Accounting in Decentralized P2P Storage SystemsIvan Osipkov, Peng Wang, Nicholas Hopper. 14 [doi]
- Elastic Routing Table with Provable Performance for Congestion Control in DHT NetworksHaiying Shen, Cheng-Zhong Xu. 15 [doi]
- Computing in the Presence of Timing FailuresGadi Taubenfeld. 16 [doi]
- Failure classification and analysis of the Java Virtual MachineDomenico Cotroneo, Salvatore Orlando 0002, Stefano Russo. 17 [doi]
- Efficient Incremental Optimal Chain Partition of Distributed Program TracesSelma Ikiz, Vijay K. Garg. 18 [doi]
- An Empirical Evaluation ofWork Stealing with Parallelism FeedbackKunal Agrawal, Yuxiong He, Charles E. Leiserson. 19 [doi]
- Load Unbalancing to Improve Performance under Autocorrelated TrafficQi Zhang, Ningfang Mi, Alma Riska, Evgenia Smirni. 20 [doi]
- ParRescue: Scalable Parallel Algorithm and Implementation for Biclustering over Large Distributed DatasetsJianhong Zhou, Ashfaq A. Khokhar. 21 [doi]
- A Semantic Overlay for Self- Peer-to-Peer Publish/SubscribeEmmanuelle Anceaume, Maria Gradinariu, Ajoy Kumar Datta, Gwendal Simon, Antonino Virgillito. 22 [doi]
- PastryStrings: A Comprehensive Content-Based Publish/Subscribe DHT NetworkIoannis Aekaterinidis, Peter Triantafillou. 23 [doi]
- Utility Optimization for Event-Driven Distributed InfrastructuresCristian Lumezanu, Sumeer Bhola, Mark Astley. 24 [doi]
- Controlling Quality of Service in Multi-Tier Web ApplicationsYixin Diao, Joseph L. Hellerstein, Sujay S. Parekh, Hidayatullah Shaikh, Maheswaran Surendra. 25 [doi]
- File System Support for Collaboration in theWide AreaVasile Gaburici, Peter J. Keleher, Bobby Bhattacharjee. 26 [doi]
- A Secure and Efficient Large Scale Distributed System for Data SharingGiorgio Zanin, Alessandro Mei, Luigi V. Mancini. 27 [doi]
- Distributed Computing for Efficient Hyperspectral Imaging Using Fully Heterogeneous Networks of WorkstationsAntonio Plaza, Javier Plaza, David Valencia. 28 [doi]
- On Scheduling Expansive and Reductive Dags for Internet-Based ComputingGennaro Cordasco, Grzegorz Malewicz, Arnold L. Rosenberg. 29 [doi]
- Reputation-Based Scheduling on Unreliable Distributed InfrastructuresJason D. Sonnek, Mukesh Nathan, Abhishek Chandra, Jon B. Weissman. 30 [doi]
- On Store Placement for Response Time Minimization in Parallel DisksAkshat Verma, Ashok Anand. 31 [doi]
- PRINS: Optimizing Performance of Reliable Internet StoragesQing Yang, Weijun Xiao, Jin Ren. 32 [doi]
- Genesis: A Scalable Self-Evolving Performance Management Framework for Storage SystemsKristal T. Pollack, Sandeep Uttamchandani. 33 [doi]
- Tolerating Byzantine Faulty Clients in a Quorum SystemBarbara Liskov, Rodrigo Rodrigues. 34 [doi]
- Sharing Memory between Byzantine Processes using Policy-Enforced Tuple SpacesAlysson Neves Bessani, Joni da Silva Fraga, Miguel Correia, Lau Cheuk Lung. 35 [doi]
- Practical Byzantine Group CommunicationVadim Drabkin, Roy Friedman, Alon Kama. 36 [doi]
- Spoof Detection for Preventing DoS Attacks against DNS ServersFanglu Guo, Jiawu Chen, Tzi-cker Chiueh. 37 [doi]
- Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring ApproachXuxian Jiang, Aaron Walters, Dongyan Xu, Eugene H. Spafford, Florian P. Buchholz, Yi-Min Wang. 38 [doi]
- A DoS Resilient Flow-level Intrusion Detection Approach for High-speed NetworksYan Gao, Zhichun Li, Yan Chen. 39 [doi]
- DNScup: Strong Cache Consistency Protocol for DNSXin Chen, Haining Wang, Shansi Ren. 40 [doi]
- Application-Tailored Cache Consistency for Wide-Area File SystemsMing Zhao 0002, Renato J. O. Figueiredo. 41 [doi]
- A Locality-Aware Cooperative Cache Management Protocol to Improve Network File System PerformanceSong Jiang, Fabrizio Petrini, Xiaoning Ding, Xiaodong Zhang. 42 [doi]
- Efficient Formation of Edge Cache Groups for Dynamic Content DeliveryLakshmish Ramaswamy, Ling Liu, Jianjun Zhang. 43 [doi]
- Content-based Dissemination of Fragmented XML DataChee Yong Chan, Yuan Ni. 44 [doi]
- CREW: A Gossip-based Flash-Dissemination SystemMayur Deshpande, Bo Xing, Iosif Lazaridis, Bijit Hore, Nalini Venkatasubramanian, Sharad Mehrotra. 45 [doi]
- Analysis of Clustering and Routing Overhead for Clustered Mobile Ad Hoc NetworksMingqiang Xue, Inn Inn Er, Winston Khoon Guan Seah. 46 [doi]
- Mitigating the FloodingWaves Problem in Energy-Efficient Routing for MANETsSameh Gobriel, Daniel Mossé, Rami G. Melhem. 47 [doi]
- High-Throughput Multicast Routing Metrics in Wireless Mesh NetworksSabyasachi Roy, Dimitrios Koutsonikolas, Saumitra M. Das, Y. Charlie Hu. 48 [doi]
- GMP: Distributed Geographic Multicast Routing in Wireless Sensor NetworksShibo Wu, K. Selçuk Candan. 49 [doi]
- Distributed Minimal Time Convergecast Scheduling in Wireless Sensor NetworksShashidhar Gandham, Ying Zhang, Qingfeng Huang. 50 [doi]
- In-Network Outlier Detection in Wireless Sensor NetworksJoel W. Branch, Boleslaw K. Szymanski, Chris Giannella, Ran Wolff, Hillol Kargupta. 51 [doi]
- POS: A Practical Order Statistics Service forWireless Sensor NetworksLandon P. Cox, Miguel Castro, Antony I. T. Rowstron. 52 [doi]
- Sluice: Secure Dissemination of Code Updates in Sensor NetworksPatrick E. Lanigan, Rajeev Gandhi, Priya Narasimhan. 53 [doi]
- Overlay Multicast with Inferred Link Capacity CorrelationsYing Zhu, Baochun Li. 54 [doi]
- On Estimating Tight-Link Bandwidth Characteristics over Multi-Hop PathsSeong-ryong Kang, Amit Bhati, Dmitri Loguinov, Xiliang Liu. 55 [doi]
- Interplay of ISPs: Distributed Resource Allocation and Revenue MaximizationSam C. M. Lee, Joe W. J. Jiang, John C. S. Lui, Dah-Ming Chiu. 56 [doi]
- Cycling Through a Dangerous Network: A Simple Efficient Strategy for Black Hole SearchStefan Dobrev, Paola Flocchini, Nicola Santoro. 57 [doi]
- Fast data access over asymmetric channels using fair and secure bandwidth sharingSachin Agarwal, Moshe Laifenfeld, Ari Trachtenberg, Murat Alanyali. 58 [doi]
- M2: Multicasting Mixes for Efficient and Anonymous CommunicationGinger Perng, Michael K. Reiter, Chenxi Wang. 59 [doi]
- Dynamic Access Control in a Content-based Publish/Subscribe System with Delivery GuaranteesYuanyuan Zhao, Daniel C. Sturman. 60 [doi]
- On the Access Pricing Issues of Wireless Mesh NetworksRay K. Lam, John C. S. Lui, Dah-Ming Chiu. 61 [doi]
- Modeling and Analysis of Generalized Slotted-Aloha MAC Protocols in Cooperative, Competitive and Adversarial EnvironmentsRichard T. B. Ma, Vishal Misra, Dan Rubenstein. 62 [doi]
- Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc NetworksVenkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya V. Ravishankar, Dharmaiah Manjunath. 63 [doi]
- Delay-Bounded Range Queries in DHT-based Peer-to-Peer SystemsDongsheng Li, Xicheng Lu, Baosheng Wang, Jinshu Su, Jiannong Cao, Keith C. C. Chan, Hong Va Leong. 64 [doi]
- Search-and-Discover in Mobile P2P Network DatabasesOuri Wolfson, Bo Xu, Huabei Yin, Hu Cao. 65 [doi]
- Improving Traffic Locality in BitTorrent via Biased Neighbor SelectionRuchir Bindal, Pei Cao, William Chan, Jan Medved, George Suwala, Tony Bates, Amy Zhang. 66 [doi]
- Self-Protection for Wireless Sensor NetworksDan Wang, Qian Zhang, Jiangchuan Liu. 67 [doi]
- Fault-Tolerant Clustering in Ad Hoc and Sensor NetworksFabian Kuhn, Thomas Moscibroda, Roger Wattenhofer. 68 [doi]
- Scalable and Robust Aggregation Techniques for Extracting Statistical Information in Sensor NetworksHongbo Jiang, Shudong Jin. 69 [doi]
- ASAP: an AS-Aware Peer-Relay Protocol for High Quality VoIPShansi Ren, Lei Guo, Xiaodong Zhang. 70 [doi]
- Adaptive Control of Extreme-scale Stream Processing SystemsLisa Amini, Navendu Jain, Anshul Sehgal, Jeremy Silber, Olivier Verscheure. 71 [doi]
- Greedy is Good: On Service Tree Placement for In-Network Stream ProcessingZoë Abrams, Jie Liu. 72 [doi]
- A Hierarchical Approach to Internet Distance PredictionRongmei Zhang, Y. Charlie Hu, Xiaojun Lin, Sonia Fahmy. 73 [doi]
- Stable and Accurate Network CoordinatesJonathan Ledlie, Peter R. Pietzuch, Margo I. Seltzer. 74 [doi]
- Routing in Networks with Low Doubling DimensionIttai Abraham, Cyril Gavoille, Andrew V. Goldberg, Dahlia Malkhi. 75 [doi]