Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SRDS
SRDS 2009
Generate Citations
Reliable Distributed Systems, IEEE Symposium on
Sept. 27 2009 to Sept. 30 2009
Niagara Falls, New York
ISSN: 1060-9857
ISBN: 978-0-7695-3826-6
Table of Contents
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-vii
Papers
Technical Program Committee
Freely available from IEEE.
pp. xi
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Message from General Chair
Freely available from IEEE.
pp. viii
Papers
Message from Technical Program Co-chairs
Freely available from IEEE.
pp. ix
Papers
Conference Committees
Freely available from IEEE.
pp. x
Papers
Relaxed Atomic Broadcast: State-Machine Replication Using Bounded Memory
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-11
by
Omid Shahmirzadi
,
Sergio Mena
,
Andre Schiper
Papers
When and How to Change Quorums on Wide Area Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-21
by
Michael G. Merideth
,
Florian Oprea
,
Michael K. Reiter
Papers
Multithreading-Enabled Active Replication for Event Stream Processing Operators
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-31
by
Andrey Brito
,
Christof Fetzer
,
Pascal Felber
Papers
Performance Evaluation of a Metaprotocol for Database Replication Adaptability
Full-text access may be available. Sign in or learn about subscription options.
pp. 32-38
by
María Idoia Ruiz-Fuertes
,
Francesc Daniel Muñoz-Escoí
Papers
Reliable and Highly Available Distributed Publish/Subscribe Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-50
by
Reza Sherafat Kazemzadeh
,
Hans-Arno Jacobsen
Papers
Resource-Aware Migratory Services in Wide-Area Shared Computing Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-60
by
Anand Tripathi
,
Vinit Padhye
,
Devdatta Kulkarni
Papers
Model-Based Validation for Internet Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-70
by
Andrew Tjang
,
Fabio Oliveira
,
Ricardo Bianchini
,
Richard P. Martin
,
Thu D. Nguyen
Papers
The Effects of Threading, Infection Time, and Multiple-Attacker Collaboration on Malware Propagation
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-82
by
Yu Zhang
,
Bharat Bhargava
,
Philipp Hurni
Papers
Designing System-Level Defenses against Cellphone Malware
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-90
by
Liang Xie
,
Xinwen Zhang
,
Ashwin Chaugule
,
Trent Jaeger
,
Sencun Zhu
Papers
PolyVaccine: Protecting Web Servers against Zero-Day, Polymorphic and Metamorphic Exploits
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-99
by
Luis Campo-Giralte
,
Ricardo Jimenez-Peris
,
Marta Patiño-Martinez
Papers
Fault Localization for Firewall Policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-106
by
JeeHyun Hwang
,
Tao Xie
,
Fei Chen
,
Alex X. Liu
On the Cost of Database Clusters Reconfiguration
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-267
by
Ricardo Manuel Pereira Vilaca
,
José Orlando Pereira
,
Rui Carlos Oliveira
,
José Enrique Armendariz-Inigo
,
José Ramón González de Mendivil
Papers
DToken: A Lightweight and Traceable Delegation Architecture for Distributed Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-116
by
Erica Yunwen Yang
,
Brian Matthews
Papers
Constraint Based Automated Synthesis of Nonmasking and Stabilizing Fault-Tolerance
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-128
by
Fuad Abujarad
,
Sandeep Kulkarni
Papers
Communication-Based Prevention of Non-P-Pattern
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-134
by
Yi-Wei Ci
,
Zhan Zhang
,
De-Cheng Zuo
,
Zhi-Bo Wu
,
Xiao-Zong Yang
Papers
Spin One's Wheels? Byzantine Fault Tolerance with a Spinning Primary
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-144
by
Giuliana Santos Veronese
,
Miguel Correia
,
Alysson Neves Bessani
,
Lau Cheuk Lung
Papers
[Roster]
Freely available from IEEE.
pp. 298
Papers
A Self-Stabilizing O(n)-Round k-Clustering Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-155
by
Ajoy K Datta
,
Stéphane Devismes
,
Lawrence L. Larmore
Papers
A Partition-Tolerant Manycast Algorithm for Disaster Area Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-165
by
Mikael Asplund
,
Simin Nadjm-Tehrani
Papers
Genuine versus Non-Genuine Atomic Multicast Protocols for Wide Area Networks: An Empirical Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-175
by
Nicolas Schiper
,
Pierre Sutra
,
Fernando Pedone
Papers
A Holistic Solution to Pursuer-Evader Tracking in Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-188
by
Xuming Lu
,
Murat Demirbas
,
Chunming Qiao
Papers
PEQ: A Privacy-Preserving Scheme for Exact Query Evaluation in Distributed Sensor Data Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-198
by
Hai Vu
,
Thuc Nguyen
,
Neeraj Mittal
,
S. Venkatesan
Papers
On Consistent Neighborhood Views in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-208
by
Arshad Jhumka
,
Luca Mottola
Papers
TASK: Template-Based Key Assignment for Confidential Communication in Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 209-216
by
Ramon Novales
,
Neeraj Mittal
Papers
ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Sensor Networks Using Sequential Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-223
by
Jun-Won Ho
,
Matthew Wright
,
Sajal K. Das
Papers
The Blocking Option in Routing Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 227-235
by
Yan Li
,
Mohamed G. Gouda
Papers
X-BOT: A Protocol for Resilient Optimization of Unstructured Overlays
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-245
by
João Carlos Antunes Leitão
,
João Pedro da Silva Ferreira Moura Marques
,
José Orlando Roque Nascimento Pereira
,
Luís Eduardo Teixeira Rodrigues
Papers
A Framework for Distributed Monitoring and Root Cause Analysis for Large IP Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-255
by
Dipyaman Banerjee
,
Venkateswara Madduri
,
Mudhakar Srivatsa
Papers
Location-Aware Cache-Coherence Protocols for Distributed Transactional Contention Management in Metric-Space Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-277
by
Bo Zhang
,
Binoy Ravindran
Papers
Co-scheduling of Disk Head Time in Cluster-Based Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-287
by
Matthew Wachs
,
Gregory R. Ganger
Papers
Assessment and Improvement of Hang Detection in the Linux Operating System
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-294
by
Domenico Cotroneo
,
Roberto Natella
,
Stefano Russo
Papers
Author Index
Freely available from IEEE.
pp. 295-296
Showing 40 out of 40