Default Cover Image

Proceedings 22nd International Conference on Distributed Computing Systems

July 2 2002 to July 5 2002

Vienna, Austria

Table of Contents

Introduction
Message from the General Co-ChairsFreely available from IEEE.pp. xiii
Introduction
Message from the Program Co-ChairsFreely available from IEEE.pp. xiv
Introduction
Organizing CommitteeFreely available from IEEE.pp. xv
Introduction
Program CommitteeFreely available from IEEE.pp. xvi
Introduction
External ReviewersFreely available from IEEE.pp. xx
Session 1A: Peer-to-Peer Systems
Improving Search in Peer-to-Peer NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 5
Session 1A: Peer-to-Peer Systems
Anthill: A Framework for the Development of Agent-Based Peer-to-Peer SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 15
Session 1A: Peer-to-Peer Systems
Routing Indices For Peer-to-Peer SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 23
Session 1B: Resource Management
Adaptive and Virtual Reconfigurations for Effective Dynamic Job Scheduling in Cluster SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 35
Session 1B: Resource Management
Towards a Distributed Platform for Resource-Constrained DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 43
Session 1B: Resource Management
Overlook: Scalable Name Service on an Overlay NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 52
Session 1C: Routing (1)
Cost-Effective Switching Fabrics with Distributed Control for Scalable RoutersFull-text access may be available. Sign in or learn about subscription options.pp. 65
Session 1C: Routing (1)
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 74
Session 1C: Routing (1)
RICA: A Receiver-Initiated Approach for Channel-Adaptive On-Demand Routing in Ad Hoc Mobile Computing NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 84
Session 2A: Internet and Web Computing
A New Document Placement Scheme for Cooperative Caching on the InternetFull-text access may be available. Sign in or learn about subscription options.pp. 95
Session 2A: Internet and Web Computing
ADAPTLOAD: Effective Balancing in Custered Web Servers Under Transient Load ConditionsFull-text access may be available. Sign in or learn about subscription options.pp. 104
Session 2A: Internet and Web Computing
Dynamic Data Broadcasting with Traffic AwarenessFull-text access may be available. Sign in or learn about subscription options.pp. 112
Session 2B: Dissemination Systems
Conditional Messaging: Extending Reliable Messaging with Application ConditionsFull-text access may be available. Sign in or learn about subscription options.pp. 123
Session 2B: Dissemination Systems
Clustering Algorithms for Content-Based Publication-Subscription SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 133
Session 2B: Dissemination Systems
Scalable and Efficient Update Dissemination for Distributed Interactive ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 143
Session 2C: Streaming
Accelerating Internet Streaming Media Delivery using Network-Aware Partial CachingFull-text access may be available. Sign in or learn about subscription options.pp. 153
Session 2C: Streaming
Distributing MPEG Movies Over the Internet using Programmable NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 161
Session 2C: Streaming
Geometric Spanners for Wireless Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 171
Session 3A: Stabilization
A Self-Stabilizing Protocol for Pipelined PIF in Tree NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 181
Session 3A: Stabilization
Dining Philosophers that Tolerate Malicious CrashesFull-text access may be available. Sign in or learn about subscription options.pp. 191
Session 3A: Stabilization
Snap-Stabilizing PIF Algorithm in Arbitrary NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 199
Session 3B: Distributed Systems
D-Stampede: Distributed Programming System for Ubiquitous ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 209
Session 3B: Distributed Systems
Balancing Performance, Energy, and Quality in Pervasive ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 217
Session 3B: Distributed Systems
Cooperative Computin for Distributed Embedded SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 227
Session 3C: Mobile Computing (1)
A Working-Set Approach to Reduce the Download-Execution Time of Mobile ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 239
Session 3C: Mobile Computing (1)
Incremental Replication for Mobility Support in OBIWANFull-text access may be available. Sign in or learn about subscription options.pp. 249
Session 3C: Mobile Computing (1)
An Optimal Strategy for Anonymous Communication ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 257
Session 4A: Distributed Databases
Query Optimization to Meet Performance Targets for Wide Area ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 271
Session 4A: Distributed Databases
Dynamic Replica Control Based on Fairly Assigned Variation of Data with Weak Consistency for Loosely Coupled Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 280
Session 4A: Distributed Databases
Unification of Replication and Transaction Processing in Three-Tier ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 290
Session 4B: Quality of Service
ControlWare: A Middleware Architecture for Feedback Control of Software PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 301
Session 4B: Quality of Service
Dynamic QoS-Aware Multimedia Service Configuration in Ubiquitous Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 311
Session 4B: Quality of Service
Distributed Bandwidth Broker for QoS Multicast TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 319
Session 4C: Fault-Tolerance
The Transition from Asynchronous to Synchronous System Operation: An Approach for Distributed Fault-Tolerant SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 329
Session 4C: Fault-Tolerance
The Complexity of Adding Failsafe Fault-ToleranceFull-text access may be available. Sign in or learn about subscription options.pp. 337
Session 4C: Fault-Tolerance
A Practical Approach for ?Zero? Downtime in an Operational Information SystemFull-text access may be available. Sign in or learn about subscription options.pp. 345
Session 5A: Peer to Peer (2)
OS Support for P2P Programming: a Case for TPSFull-text access may be available. Sign in or learn about subscription options.pp. 355
Session 5A: Peer to Peer (2)
On Peer-to-Peer Media StreamingFull-text access may be available. Sign in or learn about subscription options.pp. 363
Session 5A: Peer to Peer (2)
Bidding for Storage Space in a Peer-to-Peer Data Preservation SystemFull-text access may be available. Sign in or learn about subscription options.pp. 372
Session 5B: Middleware
Process Migration: A Generalized Approach Using a Virtualizing Operating SystemFull-text access may be available. Sign in or learn about subscription options.pp. 385
Session 5B: Middleware
Design of a Policy-Driven Middleware for Secure Distributed CollaborationFull-text access may be available. Sign in or learn about subscription options.pp. 393
Session 5B: Middleware
Extending RMI to Support Dynamic Reconfiguration of Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 401
Session 5C: Security
dRBAC: Distributed Role-based Access Control for Dynamic Coalition EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 411
Session 5C: Security
SYN-dog: Sniffing SYN Flooding SourcesFull-text access may be available. Sign in or learn about subscription options.pp. 421
Session 5C: Security
Reasoning about Joint Administration of Access Policies for Coalition ResourcesFull-text access may be available. Sign in or learn about subscription options.pp. 429
Session 6A: Short Papers (1)
Using Predeclaration for Efficient Read-only Transaction Processing in Wireless Data BroadcastFull-text access may be available. Sign in or learn about subscription options.pp. 441
Session 6A: Short Papers (1)
Non-Blocking Transactional Mobile Agent ExecutionFull-text access may be available. Sign in or learn about subscription options.pp. 443
Session 6A: Short Papers (1)
A Fully Distributed Framework for Cost-Sensitive Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 445
Session 6A: Short Papers (1)
Invariant Consistency: A Mechanism for Inter-Process Ordering in Distributed Shared Memory SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 447
Session 6B: Short Papers (2)
Universal Interaction with Networked Home AppliancesFull-text access may be available. Sign in or learn about subscription options.pp. 451
Session 6B: Short Papers (2)
On-Demand Multicasting in Ad-Hoc Networks: Comparing AODV and ODMRPFull-text access may be available. Sign in or learn about subscription options.pp. 453
Session 6B: Short Papers (2)
Scheduling Real-Time Data Items In Multiple Channels And Multiple Receivers EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 455
Session 6B: Short Papers (2)
Impact of Network Density on Data Aggregation in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 457
Session 6B: Short Papers (2)
A Pluggable Service-to-Service Communication Mechanism for VNA ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 459
Session 6C: Short Papers (3)
On the Performance of Group Key Agreement ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 463
Session 6C: Short Papers (3)
Architecture of a Large-Scale Location ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 465
Session 6C: Short Papers (3)
Key Trees and the Security of Interval MulticastFull-text access may be available. Sign in or learn about subscription options.pp. 467
Session 6C: Short Papers (3)
Migratory TCP: Connection Migration for Service Continuity in the InternetFull-text access may be available. Sign in or learn about subscription options.pp. 469
Session 6C: Short Papers (3)
Design of Adaptive and Reliable Mobile Agent Communication ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 471
Session 7A: Database Replication
Improving the Scalability of Fault-Tolerant Database ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 477
Session 7A: Database Replication
Partial Database Replication using Epidemic CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 485
Session 7A: Database Replication
From Total Order to Database ReplicationFull-text access may be available. Sign in or learn about subscription options.pp. 494
Session 7B: Scalability
An Extensible and Scalable Content Adaptation Pipeline Architecture to Support Heterogeneous ClientsFull-text access may be available. Sign in or learn about subscription options.pp. 507
Session 7B: Scalability
Dynamic Behaviour of the Distributed Tree Quorum AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 517
Session 7B: Scalability
Group-Based Management of Distributed File CachesFull-text access may be available. Sign in or learn about subscription options.pp. 525
Session 8A: Distributed Algorithms
Fast Collect in the absence of contentionFull-text access may be available. Sign in or learn about subscription options.pp. 537
Session 8A: Distributed Algorithms
Version Stamps — Decentralized Version VectorsFull-text access may be available. Sign in or learn about subscription options.pp. 544
Session 8A: Distributed Algorithms
Timestamping Messages in Synchronous ComputationsFull-text access may be available. Sign in or learn about subscription options.pp. 552
Session 8B: Mobile Computing (2)
A Reliable Multicast Algorithm for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 563
Session 8B: Mobile Computing (2)
Power-Aware Prefetch in Mobile EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 571
Session 8B: Mobile Computing (2)
Agent Chaining: An Approach to Dynamic Mobile Agent PlanningFull-text access may be available. Sign in or learn about subscription options.pp. 579
Session 9: Systems and Algorithms
Convergence RefinementFull-text access may be available. Sign in or learn about subscription options.pp. 589
Session 9: Systems and Algorithms
The Totem Redundant Ring ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 598
Session 9: Systems and Algorithms
Formally Verified Byzantine Agreement in Presence of Link FaultsFull-text access may be available. Sign in or learn about subscription options.pp. 608
Session 9: Systems and Algorithms
Reclaiming Space from Duplicate Files in a Serverless Distributed File SystemFull-text access may be available. Sign in or learn about subscription options.pp. 617
Author Index
Author IndexFreely available from IEEE.pp. 625
Showing 82 out of 82