Abstract is missing.
- Assuring Resilient Time SynchronizationAndrea Bondavalli, Andrea Ceccarelli, Lorenzo Falai. 3-12 [doi]
- Application-Level Recovery Mechanisms for Context-Aware Pervasive ComputingDevdatta Kulkarni, Anand Tripathi. 13-22 [doi]
- SeNDORComm: An Energy-Efficient Priority-Driven Communication Layer for Reliable Wireless Sensor NetworksVinaitheerthan Sundaram, Saurabh Bagchi, Yung-Hsiang Lu, Zhiyuan Li. 23-32 [doi]
- Analytical Assessment of the Precision Degradation Caused by Faults in a Fault-Tolerant Master/Slave Clock Synchronization Service for CANGuillermo Rodríguez-Navas, Julian Proenza. 33-42 [doi]
- ALPS: Authenticating Live Peer-to-Peer Live StreamsRemo Meier, Roger Wattenhofer. 45-52 [doi]
- Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock DriftsZhang Fu, Marina Papatriantafilou, Philippas Tsigas. 63-72 [doi]
- Protecting BitTorrent: Design and Evaluation of Effective Countermeasures against DoS AttacksMarinho P. Barcellos, Daniel Bauermann, Henrique Sant anna, Matheus Lehmann, Rodrigo B. Mansilha. 73-82 [doi]
- Dynamically Quantifying and Improving the Reliability of Distributed Storage SystemsRekha Bachwani, Leszek Gryz, Ricardo Bianchini, Cezary Dubnicki. 85-94 [doi]
- An Absolute-Relative Risk Assessment Methodology Approach to Current Safety Critical Systems and its Application to the ADS-B based Air Traffic Control SystemLucio Flavio Vismari, João Batista Camargo Junior. 95-104 [doi]
- Systematic Structural Testing of Firewall PoliciesJeeHyun Hwang, Tao Xie, Fei Chen, Alex X. Liu. 105-114 [doi]
- An Empirical Study of Denial of Service Mitigation TechniquesGal Badishi, Amir Herzberg, Idit Keidar, Oleg Romanov, Avital Yachin. 115-124 [doi]
- An Autonomic Approach for Replication of Internet-based ServicesDamián Serrano, Marta Patiño-Martínez, Ricardo Jiménez-Peris, Bettina Kemme. 127-136 [doi]
- Gumshoe: Diagnosing Performance Problems in Replicated File-SystemsSoila Kavulya, Rajeev Gandhi, Priya Narasimhan. 137-146 [doi]
- Probabilistic Failure Detection for Efficient Distributed Storage MaintenanceJing Tian, Zhi Yang, Wei Chen, Ben Y. Zhao, Yafei Dai. 147-156 [doi]
- An Incremental File System Consistency Checker for Block-Level CDP SystemsMaohua Lu, Tzi-cker Chiueh, Shibiao Lin. 157-162 [doi]
- Scalable Topology Discovery and Link State Detection Using Routing EventsMudhakar Srivatsa, Bong-Jun Ko, Alina Beygelzimer, Venkateshwara Madduri. 165-174 [doi]
- Fault-Tolerant Coverage Planning in Wireless NetworksSvilen Ivanov, Edgar Nett. 175-184 [doi]
- POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor NetworksRoberto Di Pietro, Di Ma, Claudio Soriente, Gene Tsudik. 185-194 [doi]
- Towards Reliable Reputations for Dynamic Networked SystemsGayatri Swamynathan, Ben Y. Zhao, Kevin C. Almeroth, S. Rao Jammalamadaka. 195-204 [doi]
- Self-Stabilization in Tree-Structured Peer-to-Peer Service Discovery SystemsEddy Caron, Ajoy Kumar Datta, Franck Petit, Cédric Tedeschi. 207-216 [doi]
- Adaptive Internal Clock SynchronizationZbigniew Jerzak, Robert Fach, Christof Fetzer. 217-226 [doi]
- Extending Paxos/LastVoting with an Adequate Communication Layer for Wireless Ad Hoc NetworksFatemeh Borran, Ravi Prakash, André Schiper. 227-236 [doi]
- Investigating the Existence and the Regularity of Logarithmic Harary GraphsRoberto Baldoni, Silvia Bonomi, Leonardo Querzoni, Sara Tucci Piergiovanni. 237-246 [doi]
- A Probabilistic Analysis of Snapshot Isolation with Partial ReplicationJosep M. Bernabé-Gisbert, Vaide Zuikeviciute, Francesc D. Muñoz-Escoí, Fernando Pedone. 249-258 [doi]
- Using Tractable and Realistic Churn Models to Analyze Quiescence Behavior of Distributed ProtocolsSteven Y. Ko, Imranul Hoque, Indranil Gupta. 259-268 [doi]
- Formalizing System Behavior for Evaluating a System Hang DetectorLong Wang, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 269-278 [doi]
- Availability of Globally Distributed Nodes: An Empirical EvaluationTimo Warns, Christian Storm, Wilhelm Hasselbring. 279-284 [doi]