Abstract is missing.
- Reliably Networking a Multicast RepositoryWang Lam, Hector Garcia-Molina. 5-14 [doi]
- NEEM: Network-Friendly Epidemic MulticastJosé Orlando Pereira, Luís Rodrigues, M. João Monteiro, Rui Carlos Oliveira, Anne-Marie Kermarrec. 15-24 [doi]
- Epidemic Spreading in Real Networks: An Eigenvalue ViewpointYang Wang, Deepayan Chakrabarti, Chenxi Wang, Christos Faloutsos. 25-34 [doi]
- Group Communication Protocols under Errors35 [doi]
- Network Awareness and Failure Resilience in Self-Organising Overlay NetworksLaurent Massoulié, Anne-Marie Kermarrec, Ayalvadi J. Ganesh. 47-55 [doi]
- Reliable Peer-to-Peer Information Monitoring through ReplicationBugra Gedik, Ling Liu. 56-65 [doi]
- Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed SystemsAltair Olivo Santin, Joni da Silva Fraga, Frank Siqueira, Emerson Ribeiro de Mello. 66-75 [doi]
- Buffer Management in Probabilistic Peer-to-Peer Communication ProtocolsBoris Koldehofe. 76 [doi]
- Component Replication in Distributed Systems: A Case Study Using Enterprise Java BeansAchmad I. Kistijantoro, Graham Morgan, Santosh K. Shrivastava, Mark C. Little. 89-98 [doi]
- Autonomous Replication for High Availability in Unstructured P2P SystemsFrancisco Matias Cuenca-Acuna, Richard P. Martin, Thu D. Nguyen. 99-108 [doi]
- Performance Virtualization for Large-Scale Storage SystemsDavid D. Chambliss, Guillermo A. Alvarez, Prashant Pandey, Divyesh Jadav, Jian Xu, Ram Menon, Tzongyu P. Lee. 109-118 [doi]
- Preventing Orphan Requests in the Context of Replicated InvocationStefan Pleisch, Arnas Kupsys, André Schiper. 119 [doi]
- Performance and Effectiveness Analysis of Checkpointing in Mobile EnvironmentsXinyu Chen, Michael R. Lyu. 131-140 [doi]
- Raptor: Integrating Checkpoints and Thread Migration for Cluster ManagementHazim Shafi, Evan Speight, John K. Bennett. 141 [doi]
- AMSD: A Dependability Roadmap for the Information Society in EuropeLuca Simoncini. 153 [doi]
- Easy: Engineering High Availability QoS in wServicesEliezer Dekel, Oleg Frenkel, Gera Goft, Yosef Moatti. 157-166 [doi]
- Coordinated Forward Error Recovery for Composite Web ServicesFerda Tartanoglu, Valérie Issarny, Alexander B. Romanovsky, Nicole Lévy. 167-176 [doi]
- Service Continuations: An Operating System Mechanism for Dynamic Migration of Internet Service SessionsFlorin Sultan, Aniruddha Bohra, Liviu Iftode. 177 [doi]
- Appia vs. Cactus: Comparing Protocol Composition FrameworksSergio Mena, Xavier Cuvellier, Christophe Grégoire, André Schiper. 189-198 [doi]
- A Systematic Approach to the Development of Event Based ApplicationsPascal Fenkam, Harald Gall, Mehdi Jazayeri. 199-208 [doi]
- TCP-Friendly Many-to-Many End-to-End Congestion ControlTal Anker, Danny Dolev, Ilya Shnayderman, Innocenty Sukhov. 209-218 [doi]
- A Reconfigurable Byzantine Quorum Approach for the Agile StoreLei Kong, Arun Subbiah, Mustaque Ahamad, Douglas M. Blough. 219 [doi]
- A Reliable Key Authentication Schema for Secure Multicast CommunicationsRoberto Di Pietro, Antonio Durante, Luigi V. Mancini. 231-240 [doi]
- Pesto Flavoured SecurityFeike W. Dillema, Tage Stabell-Kulø. 241-249 [doi]
- SNARE: A Strong Security Scheme for Network-Attached StorageYingwu Zhu, Yiming Hu. 250-259 [doi]
- Transparent Runtime Randomization for SecurityJun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 260 [doi]
- An Experimental Evaluation of Correlated Network Partitions in the Coda Distributed File SystemRyan M. Lefever, Michel Cukier, William H. Sanders. 273-282 [doi]
- Hazard Analysis of Complex Distributed Railway SystemsPasquale di Tommaso, Rosaria Esposito, Pietro Marmo, Antonio Orazzo. 283-292 [doi]
- Assessing the Dependability of OGSA Middleware by Fault InjectionNik Looker, Jie Xu. 293-302 [doi]
- Improving the Multiple Errors Detection Coverage in Distributed Embedded SystemsSara Blanc, Pedro J. Gil. 303 [doi]
- Trustworthiness of Open Information Systems: How Should It Be Achieved?Paulo Veríssimo. 315 [doi]
- Transparent Fault-Tolerant Java Virtual MachineRoy Friedman, Alon Kama. 319-328 [doi]
- Fault Tolerance Technology for Autonomous Decentralized Database SystemsCarlos Perez Leguizamo, Dake Wang, Kinji Mori. 329-338 [doi]
- The Design and Implementation of a JCA-Compliant Capture Protection InfrastructureMichael K. Reiter, Asad Samar, Chenxi Wang. 339-348 [doi]
- Distributed Programming for Dummies: A Shifting Transformation TechniqueCarole Delporte-Gallet, Hugues Fauconnier, Rachid Guerraoui, Bastian Pochon. 349 [doi]
- Randomized Asynchronous Consensus with Imperfect CommunicationsUlrich Schmid, Christof Fetzer. 361-370 [doi]
- Sharing Memory with Semi-Byzantine Clients and Faulty Storage ServersHagit Attiya, Amir Bar-Or. 371-378 [doi]
- Modeling and Detecting Failures in Next-generation Distributed Multimedia ApplicationsDomenico Cotroneo, Cristiano di Flora, Generoso Paolillo, Stefano Russo. 379 [doi]