Abstract is missing.
- On the Evaluation of Shortest Journeys in Dynamic NetworksAfonso Ferreira, Alfredo Goldman, Julian Monteiro. 3-10 [doi]
- Eventual Leader Service in Unreliable Asynchronous Systems: Why? How?Michel Raynal. 11-24 [doi]
- Approximate Analytical Models for Networked Servers Subject to MMPP Arrival ProcessesBruno Ciciani, Andrea Santoro, Paolo Romano. 25-32 [doi]
- Using Virtualization to Improve Software RejuvenationLuís Moura Silva, Javier Alonso, Paulo Silva, Jordi Torres, Artur Andrzejak. 33-44 [doi]
- Impact of request dispatching granularity in geographically distributed Web systemsMauro Andreolini, Claudia Canali, Riccardo Lancellotti. 45-52 [doi]
- Study of Bursty Internet TrafficKannikar Siriwong, Lester Lipsky, Reda A. Ammar. 53-60 [doi]
- Discovering Web Workload Characteristics through Cluster AnalysisFengbin Li, Katerina Goseva-Popstojanova, Arun Ross. 61-68 [doi]
- Transparent and Accurate Traffic Load Estimation for EnterpriseWireless LANGang Wu, Fanglu Guo, Tzi-cker Chiueh. 69-78 [doi]
- Pyramid Codes: Flexible Schemes to Trade Space for Access Efficiency in Reliable Data Storage SystemsCheng Huang, Minghua Chen, Jin Li. 79-86 [doi]
- Transparent Reliable Multicast for Ethernet-Based Storage Area NetworksShibiao Lin, Maohua Lu, Tzi-cker Chiueh. 87-94 [doi]
- FRAC: Implementing Role-Based Access Control for Network File SystemsAniruddha Bohra, Stephen Smaldone, Liviu Iftode. 95-104 [doi]
- Distributed subscriptions clustering with limited knowledge sharing for content-based publish/subscribe systemsEmiliano Casalicchio, Federico Morabito. 105-112 [doi]
- Fail-Aware Publish/SubscribeZbigniew Jerzak, Robert Fach, Christof Fetzer. 113-125 [doi]
- Message Diffusion in Unstructured Overlay NetworksJianxia Chen, Lakshmish Ramaswamy, Archana Meka. 126-133 [doi]
- Exploiting Host Name Locality for Reduced Stretch P2P RoutingGert Pfeifer, Christof Fetzer, Thomas Hohnstein. 134-144 [doi]
- Security and performance analysis of a secure clustering protocol for sensor networksPubali Banerjee, Doug Jacobson, Soumendra Nath Lahiri. 145-152 [doi]
- Dynamic load balancing for network intrusion detection systems based on distributed architecturesMauro Andreolini, Sara Casolari, Michele Colajanni, Mirco Marchetti. 153-160 [doi]
- Accurate Inter-Transaction Dependency Tracking for Repairable DBMSShweta Bajpai, Alexey Smirnov, Tzi-cker Chiueh. 161-168 [doi]
- A Topological Analysis of Monitor PlacementAlden W. Jackson, Walter C. Milliken, Cesar A. Santivanez, Matthew Condell, W. Timothy Strayer. 169-178 [doi]
- Scalable Communication for High Performance and Inexpensive Reliable QoS using Relaxed RecoveryI. Chen, Mabo Robert Ito. 179-186 [doi]
- GRIDTS: A New Approach for Fault-Tolerant Scheduling in Grid ComputingFábio Favarim, Joni da Silva Fraga, Lau Cheuk Lung, Miguel Correia. 187-194 [doi]
- Aspect-Oriented Programing Techniques to support Distribution, Fault Tolerance, and Load Balancing in the CORBA-LC Component ModelDiego Sevilla, José M. García, Antonio F. Gómez-Skarmeta. 195-204 [doi]
- AcceleratingWeb Protocols Using RDMADennis Dalessandro, Pete Wyckoff. 205-212 [doi]
- Improving Network Processing Concurrency using TCPServersAniruddha Bohra, Liviu Iftode. 213-222 [doi]
- Implementing Atomic Data through Indirect Learning in Dynamic NetworksKishori M. Konwar, Peter M. Musial, Nicolas C. Nicolaou, Alexander A. Shvartsman. 223-230 [doi]
- Decoupled Quorum-Based Byzantine-Resilient Coordination in Open Distributed SystemsAlysson Neves Bessani, Miguel Correia, Joni da Silva Fraga, Lau Cheuk Lung. 231-238 [doi]
- Autonomic Resource Management for Multiple-Spanning-Tree Metro-Ethernet NetworksShibiao Lin, Srikant Sharma, Tzi-cker Chiueh. 239-248 [doi]
- Exact Forwarding Table Partitioning for Efficient TCAM Power SavingsGesan Wang, Nian-Feng Tzeng. 249-252 [doi]
- Adaptive Search Radius - Lowering Internet P2P File-Sharing Traffic through Self-RestraintRicardo Lopes Pereira, Teresa Vazão, Rodrigo Rodrigues. 253-256 [doi]
- Using BIP for Modeling and Verification of Networked Systems -- A Case Study on TinyOS-based NetworksAnanda Basu, Laurent Mounier, Marc Poulhiès, Jacques Pulou, Joseph Sifakis. 257-260 [doi]
- A Global On-Demand Routing Protocol for Mobile Ad Hoc NetworksFenglien Lee, Haklin Kimm, Craig Reinhart. 261-264 [doi]
- A Swarm-based Routing Protocol for Wireless Sensor NetworksMaurizio Paone, Luca Paladina, Dario Bruneo, Antonio Puliafito. 265-268 [doi]
- Impact of Scale-free Topologies on Gossiping in Ad Hoc NetworksBenoît Garbinato, Denis Rochat, Marco Tomassini. 269-272 [doi]
- Enabling Skip Graphs to Process K-Dimensional Range Queries in a Mobile Sensor NetworkGregory J. Brault, Christopher J. Augeri, Barry E. Mullins, Rusty O. Baldwin, Christopher B. Mayer. 273-282 [doi]
- Supporting Scalable and Cooperative Interval Caching in a Clustered Video ServerSuneuy Kim, Kim Hang Thi Tran. 283-286 [doi]
- GORDA: An Open Architecture for Database ReplicationAlfrânio Correia Jr., José Pereira, Luís Rodrigues, Nuno Carvalho, Ricardo Vilaça, Rui Carlos Oliveira, Susana Guedes. 287-290 [doi]
- Towards IQ-Appliances: Quality-awareness in Information VirtualizationRadhika Niranjan, Ada Gavrilovska, Karsten Schwan, Priyanka Tembey. 291-294 [doi]
- Scheduling Bulk File Transfers with Start and End TimesKannan Rajah, Sanjay Ranka, Ye Xia. 295-298 [doi]
- Constructing Overlay Networks with Low Link Costs and Short PathsFuminori Makikawa, Takafumi Matsuo, Tatsuhiro Tsuchiya, Tohru Kikuno. 299-304 [doi]
- Experiences from Building Service and Object Replication MiddlewareJohannes Osrael, Lorenz Froihofer, Karl M. Göschka. 305-310 [doi]
- Autonomous Data Replication Using Q-Learning for Unstructured P2P NetworksSabu M. Thampi, K. Chandra Sekaran. 311-317 [doi]
- TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor NodesLeonardo B. Oliveira, Diego F. Aranha, Eduardo Morais, Felipe Daguano, Julio López, Ricardo Dahab. 318-323 [doi]
- Multilayer In-service Reconfiguration for Network Computing SystemsNobuharu Kami, Jun Suzuki, Yoichi Hidaka, Takashi Yoshikawa, Atsushi Iwata. 324-331 [doi]
- Survival Architecture for Distributed Intrusion Detection System (dIDS) using Mobile AgentSartid Vongpradhip, Wichet Plaimart. 332-338 [doi]