Abstract is missing.
- A Fault-Tolerant Routing Algorithm Design for On-Chip Optical NetworksDong Xiang, Yan Zhang, Shuchang Shan, Yi Xu. 1-9 [doi]
- PIP: Privacy and Integrity Preserving Data Aggregation in Wireless Sensor NetworksVimal Kumar, Sanjay Madria. 10-19 [doi]
- Virtual Synchrony Guarantees for Cyber-physical SystemsFederico Ferrari, Marco Zimmerling, Luca Mottola, Lothar Thiele. 20-30 [doi]
- Fighting Uncertainty in Highly Dynamic Wireless Sensor Networks with Probabilistic ModelsLuis Marques, Antonio Casimiro. 31-40 [doi]
- A Distributed Polling with Probabilistic PrivacyYahya Benkaouz, Rachid Guerraoui, Mohammed Erradi, Florian Huc. 41-50 [doi]
- Consensus with Unknown Participants in Shared MemoryCatia Khouri, Fabíola Greve, Sébastien Tixeuil. 51-60 [doi]
- Bounded Delay in Byzantine-Tolerant State Machine ReplicationZarko Milosevic 0001, Martin Biely, André Schiper. 61-70 [doi]
- Stochastic Analysis on RAID Reliability for Solid-State DrivesYongkun Li, Patrick P. C. Lee, John C. S. Lui. 71-80 [doi]
- Automated Multi-graceful Degradation: A Case StudyYiyan Lin, Sandeep S. Kulkarni. 81-90 [doi]
- A Distributed Abstraction Algorithm for Online Predicate DetectionHimanshu Chauhan, Vijay K. Garg, Aravind Natarajan, Neeraj Mittal. 101-110 [doi]
- Linking Resource Usage Anomalies with System Failures from Cluster Log DataEdward Chuah, Arshad Jhumka, Sai Narasimhamurthy, John Hammond, James C. Browne, Bill Barth. 111-120 [doi]
- Automatic Problem Localization via Multi-dimensional Metric ProfilingIgnacio Laguna, Subrata Mitra, Fahad A. Arshad, Nawanol Theera-Ampornpunt, Zongyang Zhu, Saurabh Bagchi, Samuel P. Midkiff, Michael Kistler, Ahmed Gheith. 121-132 [doi]
- Efficient Verification of Distributed Protocols Using Stateful Model CheckingHabib Saissi, Péter Bokor, Can Arda Muftuoglu, Neeraj Suri, Marco Serafini. 133-142 [doi]
- Validity-Based Failure Algebra for Distributed Sensor SystemsTino Brade, Sebastian Zug, Jörg Kaiser. 143-152 [doi]
- Rigorous Performance Evaluation of Self-Stabilization Using Probabilistic Model CheckingNarges Fallahi, Borzoo Bonakdarpour, Sébastien Tixeuil. 153-162 [doi]
- Non-monotonic Snapshot Isolation: Scalable and Strong Consistency for Geo-replicated Transactional SystemsMasoud Saeida Ardekani, Pierre Sutra, Marc Shapiro. 163-172 [doi]
- Clock-SI: Snapshot Isolation for Partitioned Data Stores Using Loosely Synchronized ClocksJiaqing Du, Sameh Elnikety, Willy Zwaenepoel. 173-184 [doi]
- Bumper: Sheltering Transactions from ConflictsNuno Lourenco Diegues, Paolo Romano. 185-194 [doi]
- Analysis of Malware Propagation in TwitterAmeya Sanzgiri, Andrew Hughes, Shambhu Upadhyaya. 195-204 [doi]
- Adaptive Anomaly Identification by Exploring Metric Subspace in Cloud Computing InfrastructuresQiang Guan, Song Fu. 205-214 [doi]
- A Unified Framework for Measuring a Network's Mean Time-to-CompromiseWilliam Nzoukou, Lingyu Wang, Sushil Jajodia, Anoop Singhal. 215-224 [doi]