Abstract is missing.
- Araneola: A Scalable Reliable Multicast System for Dynamic EnvironmentsRoie Melamed, Idit Keidar. 5-14 [doi]
- PCoord: Network Position Estimation Using Peer-to-Peer MeasurementsLi-wei Lehman, Steven Lerman. 15-24 [doi]
- HyperTree for Self-Stabilizing Peer-to-Peer SystemsShlomi Dolev, Ronen I. Kat. 25-32 [doi]
- Intrusion Tolerance for Internet ApplicationsYves Deswarte, David Powell. 35-36 [doi]
- GeoPeer: A Location-Aware Peer-to-Peer SystemFilipe Araújo, Luís Rodrigues. 39-46 [doi]
- WonGoo: A Pure Peer-to-Peer Full Text Information Retrieval System Based On Semantic Overlay NetworksJianming Lv, Xueqi Cheng. 47-54 [doi]
- Exploring the Network/Software Boundary: A Telecommunications PerspectiveMark E. Segal. 57 [doi]
- Objective-Greedy Algorithms for Long-Term Web PrefetchingBin Wu, Ajay D. Kshemkalyani. 61-68 [doi]
- A Protocol for Improved User Perceived QoS in Web Transactional ApplicationsPaolo Romano, Francesco Quaglia, Bruno Ciciani. 69-76 [doi]
- WALTy: A User Behavior Tailored Tool for Evaluating Web Application PerformanceGiancarlo Ruffo, Rossano Schifanella, Matteo Sereno, Roberto Politi. 77-86 [doi]
- Downloading Replicated, Wide-Area Files - A Framework and Empirical EvaluationRebecca L. Collins, James S. Plank. 89-96 [doi]
- Non-Uniform Information Dissemination for Dynamic Grid Resource DiscoveryVishal Iyengar, Sameer Tilak, Michael J. Lewis, Nael B. Abu-Ghazaleh. 97-106 [doi]
- Group Communication: Where Are We Today and Future ChallengesAndré Schiper. 109-117 [doi]
- Compiling IOA without Global SynchronizationJoshua A. Tauber, Nancy A. Lynch, Michael J. Tsai. 121-130 [doi]
- Towards JMS Compliant Group Communication - A Semantic MappingArnas Kupsys, Stefan Pleisch, André Schiper, Matthias Wiesmann. 131-140 [doi]
- A Methodological Construction of an Efficient Sequential Consistency ProtocolVicent Cholvi, Antonio Fernández, Ernesto Jiménez, Michel Raynal. 141-148 [doi]
- The Response to IT Complexity: Autonomic ComputingAlan G. Ganek, Cristiane P. Hilkner, John W. Sweitzer, Brent A. Miller, Joseph L. Hellerstein. 151-157 [doi]
- Frequent Episode Rules for Internet Anomaly DetectionMin Qin, Kai Hwang. 161-168 [doi]
- Performance Analysis of Cryptographic Protocols on Handheld DevicesPatroklos G. Argyroudis, Raja Verma, Hitesh Tewari, Donal O Mahony. 169-174 [doi]
- The LC Assignment Policy for Cluster-Based ServersVictoria Ungureanu, Benjamin Melamed, Michael Katehakis. 177-184 [doi]
- ViSMI: Software Distributed Shared Memory for InfiniBand ClustersChristian Osendorfer, Jie Tao, Carsten Trinitis, Martin Mairandres. 185-191 [doi]
- Dynamic Key Messaging for Cluster ComputingMing Zhu, Yang Wang, Meng Ding, Constantine Katsinis. 192-199 [doi]
- Are Processors Free? Impact on RDMA and Protocol Off-Load TechnologiesMichael Krause. 203 [doi]
- Speculative Network Processor for Quality-of-Service-Aware Protocol ProcessingJürgen Foag. 207-214 [doi]
- A Novel Switch Architecture for High-Performance Computing and Signal Processing NetworksSatyen Sukhtankar, Diana Hecht, Warren Rosen. 215-222 [doi]
- An Iterative Switching Algorithm With (Possibly) One IterationSaad Mneimneh. 223-231 [doi]
- On the Relationship Between Packet Size and Router Performance for Heavy-Tailed TrafficImad Antonios, Lester Lipsky. 235-242 [doi]
- An Adaptive Admission Control Algorithm for Bandwidth BrokersChristos Bouras, Kostas Stamos. 243-250 [doi]
- Context-Based Access Control Management in Ubiquitous EnvironmentsAntonio Corradi, Rebecca Montanari, Daniela Tibaldi. 253-260 [doi]
- Location-Triggered Routing Protocol in Mobile Ad Hoc NetworksZhengming Shen, Johnson P. Thomas. 261-268 [doi]
- Using a Task-Specific QoS for Controlling Sensing Requests and SchedulingYong Xun, Mieczyslaw M. Kokar, Kenneth Baclawski. 269-276 [doi]
- Towards Flexible Finite-State-Machine-Based Protocol CompositionRichard Ekwall, Sergio Mena, Stefan Pleisch, André Schiper. 281-286 [doi]
- The Nepi Network Programming System: A Programming Environment for Distributed SystemsKen Mano, Yoshinobu Kawabe. 287-292 [doi]
- Infopipes: The ISL/ISG Implementation EvaluationGalen S. Swint, Calton Pu, Younggyun Koh, Ling Liu, Wenchang Yan, Charles Consel, Koichi Moriyama, Jonathan Walpole. 293-296 [doi]
- A Multi-Policy, Cooperative Playback Control ProtocolGiancarlo Fortino, Carlo Mastroianni, Wilma Russo. 297-302 [doi]
- FIONA: A Fault Injector for Dependability Evaluation of Java-Based Network ApplicationsGabriela Jacques-Silva, Roberto Jung Drebes, Júlio Gerchman, Taisy Silva Weber. 303-308 [doi]
- Request Distribution-Aware Caching in Cluster-Based Web ServersVlad Olaru, Walter F. Tichy. 311-316 [doi]
- A Fast Polling I/O Implementation with Real-time SignalsEiji Kawai, Youki Kadobayashi, Suguru Yamaguchi. 317-322 [doi]
- Myrinet Networks: A Performance StudyYing Qian, Ahmad Afsahi, Reza Zamani. 323-328 [doi]
- Traveling Token for Dynamic Load BalancingTariq Omari, Seyed H. Hosseini, K. Vairavan. 329-332 [doi]
- Shared Protection for Time Slotted Optical NetworksAbdelilah Maach, Gregor von Bochmann, Hussein T. Mouftah. 333-336 [doi]
- Context-Awareness for Impromptu Collaboration in MANETsDario Bottazzi, Antonio Corradi, Rebecca Montanari. 339-342 [doi]
- Intrusion Detection in Sensor Networks: A Non-Cooperative Game ApproachAfrand Agah, Sajal K. Das, Kalyan Basu, Mehran Asadi. 343-346 [doi]
- Resilient Peer-to-Peer Multicast from the Ground UpStefan Birrer, Fabián E. Bustamante. 351-355 [doi]
- Performance of the NAS Parallel Benchmarks on Grid Enabled ClustersPhilip J. Sokolowski, Daniel Grosu. 356-361 [doi]
- VIPSEC: Virtualized and Pluggable Security Services Infrastructure for Adaptive Grid ComputingSyed Naqvi, Michel Riguidel. 362-365 [doi]
- Volunteer Availability based Fault Tolerant Scheduling Mechanism in Desktop Grid Computing EnvironmentSungJin Choi, MaengSoon Baik, Chong-Sun Hwang, Joon-Min Gil, Heon-Chang Yu. 366-371 [doi]
- A Fair Synchronization Protocol with Cheat Proofing for Decentralized Online Multiplayer GamesBei Di Chen, Muthucumaru Maheswaran. 372-375 [doi]
- Towards a Quality of Service Aware Public Computing UtilityMuthucumaru Maheswaran, Balasubramaneyam Maniymaran, Shah Asaduzzaman, Arindam Mitra. 376-379 [doi]
- Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash TreesDan Williams, Emin Gün Sirer. 383-388 [doi]
- Towards an Approach for Automatically Repairing Compromised Network SystemsJulian B. Grizzard, Sven Krasser, Henry L. Owen, Gregory J. Conti, Eric R. Dodson. 389-392 [doi]
- Implementation of Distributed Key Generation Algorithms using Secure SocketsAnthony T. Chronopoulos, F. Balbi, D. Veljkovic, N. Kolani. 393-398 [doi]
- Distance Measurement in Volunteer Computing Networks: A Completely Decentralized ApproachDimitris Kamenopoulos, Iosif A. Osman, Panayotis Tsanakas. 399-404 [doi]
- Self-Healing in Group Key Distribution Using Subset Difference MethodMuhammad J. Bohio, Ali Miri. 405-408 [doi]
- A Framework for Multi-Agent System Engineering using Ontology Domain Modelling for Security Architecture Risk Assessment in E-Commerce Security ServicesGustavo A. Santana Torrellas. 409-412 [doi]