Abstract is missing.
- Processor Group Membership Protocols: Specification, Design, and ImplementationFarnam Jahanian, Sameh A. Fakhouri, Ragunathan Rajkumar. 2-11
- APRICOTS - A Prototype Implementation of a ConTract System: Management of the Control Flow and the Communication SystemFriedemann Schwenkreis. 12-21
- An Approach for Combinatorial Performance and Availability AnalysisMalathi Veeraraghavan, Kishor S. Trivedi. 24-33
- A Compositinal Proof Theory for Fault Tolerant Real-Time Distributed SystemsHenk Schepers, Rob Gerth. 34-43
- Bayesian Analysis for Fault Location in Homogeneous Distributed SystemsYu Lo Cyrus Chang, Leslie C. Lander, Horng-Shing Lu, Martin T. Wells. 44-53
- Using Logging and Asynchronous Checkpointing to Implement Recoverable Distributed Shared MemoryGolden G. Richard III, Mukesh Singhal. 58-67
- Rollback Based on Vector TimeS. L. Peterson, Phil Kearns. 68-77
- Lazy Checkpointing Coordination for Bounding Rollback PropagationYi-Min Wang, W. Kent Fuchs. 78-85
- Efficient Transparent Optimistic Rollback Recovery for Distributed Application ProgramsDavid B. Johnson. 86-95
- An O(1) Quorum Consensus Protocol Tailored for the Client/Server ArchitectureKhaled S. Soufi, Geneva G. Belford. 98-104
- An Approach to Constructing Modular Fault-Tolerant ProtocolsMatti A. Hiltunen, Richard D. Schlichting. 105-114
- Using Atomic Broadcast to Implement a posteriori Agreement for Clock SynchronizationPaulo Veríssimo, Antonio Casimiro, Luís Rodrigues. 115-124
- A Secure Two Phase Locking ProtocolRasikan David, Sang Hyuk Son. 126-135
- Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing AttacksGene Tsudik, Els Van Herreweghen. 136-142
- Constructing Secure Distributed Systems Using ComponentsQi Shi, John A. McDermid. 143-152