Default Cover Image

Reliable Distributed Systems, IEEE Symposium on

Sept. 27 2009 to Sept. 30 2009

Niagara Falls, New York

ISSN: 1060-9857

ISBN: 978-0-7695-3826-6

Table of Contents

Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-vii
Papers
Technical Program CommitteeFreely available from IEEE.pp. xi
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Message from General ChairFreely available from IEEE.pp. viii
Papers
Message from Technical Program Co-chairsFreely available from IEEE.pp. ix
Papers
Conference CommitteesFreely available from IEEE.pp. x
Papers
Relaxed Atomic Broadcast: State-Machine Replication Using Bounded MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 3-11
Papers
When and How to Change Quorums on Wide Area NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 12-21
Papers
Multithreading-Enabled Active Replication for Event Stream Processing OperatorsFull-text access may be available. Sign in or learn about subscription options.pp. 22-31
Papers
Performance Evaluation of a Metaprotocol for Database Replication AdaptabilityFull-text access may be available. Sign in or learn about subscription options.pp. 32-38
Papers
Reliable and Highly Available Distributed Publish/Subscribe ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 41-50
Papers
Resource-Aware Migratory Services in Wide-Area Shared Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 51-60
Papers
Model-Based Validation for Internet ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 61-70
Papers
The Effects of Threading, Infection Time, and Multiple-Attacker Collaboration on Malware PropagationFull-text access may be available. Sign in or learn about subscription options.pp. 73-82
Papers
Designing System-Level Defenses against Cellphone MalwareFull-text access may be available. Sign in or learn about subscription options.pp. 83-90
Papers
PolyVaccine: Protecting Web Servers against Zero-Day, Polymorphic and Metamorphic ExploitsFull-text access may be available. Sign in or learn about subscription options.pp. 91-99
Papers
Fault Localization for Firewall PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 100-106
Papers
DToken: A Lightweight and Traceable Delegation Architecture for Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 107-116
Papers
Constraint Based Automated Synthesis of Nonmasking and Stabilizing Fault-ToleranceFull-text access may be available. Sign in or learn about subscription options.pp. 119-128
Papers
Communication-Based Prevention of Non-P-PatternFull-text access may be available. Sign in or learn about subscription options.pp. 129-134
Papers
Spin One's Wheels? Byzantine Fault Tolerance with a Spinning PrimaryFull-text access may be available. Sign in or learn about subscription options.pp. 135-144
Papers
[Roster]Freely available from IEEE.pp. 298
Papers
A Self-Stabilizing O(n)-Round k-Clustering AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 147-155
Papers
A Partition-Tolerant Manycast Algorithm for Disaster Area NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 156-165
Papers
Genuine versus Non-Genuine Atomic Multicast Protocols for Wide Area Networks: An Empirical StudyFull-text access may be available. Sign in or learn about subscription options.pp. 166-175
Papers
A Holistic Solution to Pursuer-Evader Tracking in Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 179-188
Papers
PEQ: A Privacy-Preserving Scheme for Exact Query Evaluation in Distributed Sensor Data NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 189-198
Papers
On Consistent Neighborhood Views in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 199-208
Papers
TASK: Template-Based Key Assignment for Confidential Communication in Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 209-216
Papers
ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Sensor Networks Using Sequential AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 217-223
Papers
The Blocking Option in Routing ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 227-235
Papers
A Framework for Distributed Monitoring and Root Cause Analysis for Large IP NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 246-255
Papers
Location-Aware Cache-Coherence Protocols for Distributed Transactional Contention Management in Metric-Space NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 268-277
Papers
Co-scheduling of Disk Head Time in Cluster-Based StorageFull-text access may be available. Sign in or learn about subscription options.pp. 278-287
Papers
Assessment and Improvement of Hang Detection in the Linux Operating SystemFull-text access may be available. Sign in or learn about subscription options.pp. 288-294
Papers
Author IndexFreely available from IEEE.pp. 295-296
Showing 40 out of 40