Abstract is missing.
- Scalability Challenges and Solutions for Emerging NetworksKenneth P. Birman. 2 [doi]
- Trends in System Area NetworkingPankaj Mehra. 3-8 [doi]
- Constructing Ad Hoc NetworksJim Waldo. 9-20 [doi]
- NetSolve and Its ApplicationsJack Dongarra. 21 [doi]
- Hardware- and Software-Based Collective Communication on the Quadrics NetworkFabrizio Petrini, Salvador Coll, Eitan Frachtenberg, Adolfy Hoisie. 24-35 [doi]
- Calculation of Deadline Missing Probability in a QoS Capable Cluster InterconnectEun Jung Kim, Ki Hwan Yum, Chita R. Das. 36-45 [doi]
- Influence of Network Size and Load on the Performance of Reconfiguration ProtocolsRafael Casado, Aurelio Bermúdez, Francisco J. Quiles, José Duato. 46-59 [doi]
- A Law-Abiding Peer-to-Peer Network for Free-Software DistributionArno Bakker, Maarten van Steen, Andrew S. Tanenbaum. 60-67 [doi]
- Micro-Firewalls for Dynamic Network Security with Distributed Intrusion DetectionKai Hwang, Muralidaran Gangadharan. 68-79 [doi]
- Dependability under Malicious Agreement in N-modular Redundancy-on-Demand SystemsMohammad A. Al-Hashimi, Huay-min H. Pu, Nohpill Park, Fabrizio Lombardi. 80-93 [doi]
- Application Routing Load Balancing (ARLB) to Support QoS for VoIP Application over a VPNs EnvironmentSanon Chimmanee, Komwut Wipusitwarakun. 94-99 [doi]
- Probabilistic Semantically Reliable MulticastJosé Orlando Pereira, Rui Carlos Oliveira, Luís Rodrigues, Anne-Marie Kermarrec. 100-103 [doi]
- Replicated Database Recovery Using Multicast CommunicationJoAnne Holliday. 104-107 [doi]
- Eva: An Event-Based Framework for Developing Specialized Communication ProtocolsFrancisco Vilar Brasileiro, Fabíola Greve, Frederic Tronel, Michel Hurfin, Jean-Pierre Le Narzul. 108-121 [doi]
- Comparison of the Analytic N-Burst Model with Other Approximations to Telecommunications TrafficLester Lipsky, Manfred R. Jobmann, Michael Greiner, Hans-Peter Schwefel. 122-132 [doi]
- Optimal Utilization of Equivalent Paths in Computer Networks with Static RoutingDimiter R. Avresky, Vladimir Shurbanov, Natcho H. Natchev, F. Zuccarino, Pankaj Mehra. 133-144 [doi]
- Execution-Driven Simulation of IP Router ArchitecturesLaxmi N. Bhuyan, Hu-Jun Wang. 145-157 [doi]
- On the Design of High-Speed Switch FabricsJosé Duato. 158 [doi]
- Distributed Storage Networking Architectures: Fibre Channel, iSCSI, Ethernet, InfiniBand, Hyper Transport, Rapid IO & 3GIO Collide in the Data CenterDavid R. Follett. 159 [doi]
- Using Simple Remote Evaluation to Enable Efficient Application Protocols in Mobile EnvironmentsSteven E. Czerwinski, Anthony D. Joseph. 162-173 [doi]
- Data Logistics in Network Computing: The Logistical Session LayerD. Martin Swany, Richard Wolski. 174-185 [doi]
- Two-Tier Cooperation: A Scalable Protocol for Web Cache SharingAndrea Santoro, Bruno Ciciani, Francesco Quaglia, Michele Colajanni. 186-193 [doi]
- IP Storage and the CPU Consumption MythRobert W. Horst. 194-200 [doi]
- Network Aware Video Transcoding for Symbiotic Rate Adaptation on Interactive TransportJaved I. Khan, Qiong Gu. 201-213 [doi]
- The Challenges of Delivering Content on the InternetFrank Thomson Leighton. 214 [doi]
- Real Time Resource Management and Adaptive Parallel Programming for a Cluster of Computers: A Comparison of Different Approaches in a Computationally Intensive EnvironmentNilay K. Roy. 216-226 [doi]
- A Fault-Tolerant Approach to Network SecurityJonathan Lundell. 227 [doi]
- Replica Divergence Control Protocol in Weakly Connected EnvironmentAhmed Jebali, Mesaac Makpangou. 230-233 [doi]
- Component-Based Peer-to-Peer Distributed Processing in Heterogeneous Networks Using JAVA PORTSElias S. Manolakos, Demetris G. Galatopoullos, Andrew P. Funk. 234-237 [doi]
- A Java Cluster Management ServiceRodrigo Fernandes de Mello, Maria Stela V. de Paiva, Luís Carlos Trevelin. 238-243 [doi]
- Local Scheduling for Distributed CooperationGrzegorz Malewicz, Alexander Russell, Alexander A. Shvartsman. 244-255 [doi]
- Reconfigurable Algorithms in View SynchronyNicole Lesley, Alan David Fekete. 256-267 [doi]
- Automated Validation of Distributed Software Using the IF EnvironmentMarius Bozga, Susanne Graf, Laurent Mounier. 268-275 [doi]
- Mobile Internet - Research Toy or Product VisionHans-Peter Schwefel. 276 [doi]
- Tapping TCP StreamsMaxim Orgiyan, Christof Fetzer. 278-289 [doi]
- There Is More to Service Carrier-Grade Quality Than Quality of Service (QoS)Isaac Levendel. 290-297 [doi]
- Partial Replication in the Database State MachineAntónio Luís Pinto Ferreira de Sousa, Rui Carlos Oliveira, Francisco Moura, Fernando Pedone. 298-309 [doi]
- An Analytic Performance Model of Parallel Systems that Perform N Tasks Using P Processors That Can FailGehan Weerasinghe, Imad Antonios, Lester Lipsky. 310-319 [doi]
- The Effect of Timeout Prediction and Selection on Wide Area Collective OperationsJames S. Plank, Matthew S. Allen, Richard Wolski. 320-331 [doi]
- On the Scalability of Topologies for Storage Area Networks in Building EnvironmentsXavier Molero, Federico Silla, Vicente Santonja, José Duato. 332-335 [doi]
- Simulation Experiments of a High-Performance RapidIO-based Processing ArchitectureJonathan Adams, Constantine Katsinis, Warren Rosen, Diana Hecht, Vaughn Adams, Harsha Narravula, Satyen Sukhtankar. 336-339 [doi]
- Monitoring of Mobile Agents in Large Cluster SystemsMarco Gönne, Claus Grewe, Holger Pals. 340-343 [doi]
- Box-to-Box Disk Mirroring Using EthernetQiang Li. 344-349 [doi]
- Limited Scope Probing: A Distributed Approach for QoS-Based RoutingKia Seong Teng, Muthucumaru Maheswaran. 350-353 [doi]
- The Influence of Proportional Jitter and Delay on End to End Delay in Differentiated Service NetworkThu Ngo Quynh. 354-357 [doi]
- Performance Analysis of a Wireless MANJosé Carlos Amaro, Rui Pedro Lopes. 358-363 [doi]
- Static Load Balancing for CFD Simulations on a Network of WorkstationsAnthony T. Chronopoulos, Daniel Grosu, Manuel Benche, Andrew M. Wissink. 364-367 [doi]
- A Predicate Calculus Logic for the PKI Trust Model AnalysisHanane El Bakkali, Bahia Idrissi Kaitouni. 368-371 [doi]