|
Conferences in DBLP
- Wang Lam, Hector Garcia-Molina
Reliably Networking a Multicast Repository. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:5-14 [Conf]
- José Orlando Pereira, Luís Rodrigues, M. João Monteiro, Rui Carlos Oliveira, Anne-Marie Kermarrec
NEEM: Network-Friendly Epidemic Multicast. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:15-24 [Conf]
- Yang Wang, Deepayan Chakrabarti, Chenxi Wang, Christos Faloutsos
Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:25-34 [Conf]
- Claudio Basile, Long Wang, Zbigniew Kalbarczyk, Ravishankar K. Iyer
Group Communication Protocols under Errors. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:35-0 [Conf]
- Laurent Massoulié, Anne-Marie Kermarrec, Ayalvadi J. Ganesh
Network Awareness and Failure Resilience in Self-Organising Overlay Networks. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:47-55 [Conf]
- Bugra Gedik, Ling Liu
Reliable Peer-to-Peer Information Monitoring through Replication. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:56-65 [Conf]
- Altair Olivo Santin, Joni da Silva Fraga, Frank Siqueira, Emerson Ribeiro de Mello
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:66-75 [Conf]
- Boris Koldehofe
Buffer Management in Probabilistic Peer-to-Peer Communication Protocols. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:76-0 [Conf]
- Achmad I. Kistijantoro, Graham Morgan, Santosh K. Shrivastava, Mark C. Little
Component Replication in Distributed Systems: A Case Study Using Enterprise Java Beans. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:89-98 [Conf]
- Francisco Matias Cuenca-Acuna, Richard P. Martin, Thu D. Nguyen
Autonomous Replication for High Availability in Unstructured P2P Systems. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:99-108 [Conf]
- David D. Chambliss, Guillermo A. Alvarez, Prashant Pandey, Divyesh Jadav, Jian Xu, Ram Menon, Tzongyu P. Lee
Performance Virtualization for Large-Scale Storage Systems. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:109-118 [Conf]
- Stefan Pleisch, Arnas Kupsys, André Schiper
Preventing Orphan Requests in the Context of Replicated Invocation. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:119-0 [Conf]
- Xinyu Chen, Michael R. Lyu
Performance and Effectiveness Analysis of Checkpointing in Mobile Environments. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:131-140 [Conf]
- Hazim Shafi, Evan Speight, John K. Bennett
Raptor: Integrating Checkpoints and Thread Migration for Cluster Management. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:141-0 [Conf]
- Luca Simoncini
AMSD: A Dependability Roadmap for the Information Society in Europe. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:153-0 [Conf]
- Eliezer Dekel, Oleg Frenkel, Gera Goft, Yosef Moatti
Easy: Engineering High Availability QoS in wServices. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:157-166 [Conf]
- Ferda Tartanoglu, Valérie Issarny, Alexander B. Romanovsky, Nicole Lévy
Coordinated Forward Error Recovery for Composite Web Services. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:167-176 [Conf]
- Florin Sultan, Aniruddha Bohra, Liviu Iftode
Service Continuations: An Operating System Mechanism for Dynamic Migration of Internet Service Sessions. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:177-0 [Conf]
- Sergio Mena, Xavier Cuvellier, Christophe Grégoire, André Schiper
Appia vs. Cactus: Comparing Protocol Composition Frameworks. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:189-198 [Conf]
- Pascal Fenkam, Harald Gall, Mehdi Jazayeri
A Systematic Approach to the Development of Event Based Applications. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:199-208 [Conf]
- Tal Anker, Danny Dolev, Ilya Shnayderman, Innocenty Sukhov
TCP-Friendly Many-to-Many End-to-End Congestion Control. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:209-218 [Conf]
- Lei Kong, Arun Subbiah, Mustaque Ahamad, Douglas M. Blough
A Reconfigurable Byzantine Quorum Approach for the Agile Store. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:219-0 [Conf]
- Roberto Di Pietro, Antonio Durante, Luigi V. Mancini
A Reliable Key Authentication Schema for Secure Multicast Communications. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:231-240 [Conf]
- Feike W. Dillema, Tage Stabell-Kulø
Pesto Flavoured Security. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:241-249 [Conf]
- Yingwu Zhu, Yiming Hu
SNARE: A Strong Security Scheme for Network-Attached Storage. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:250-259 [Conf]
- Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer
Transparent Runtime Randomization for Security. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:260-0 [Conf]
- Ryan M. Lefever, Michel Cukier, William H. Sanders
An Experimental Evaluation of Correlated Network Partitions in the Coda Distributed File System. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:273-282 [Conf]
- Pasquale di Tommaso, Rosaria Esposito, Pietro Marmo, Antonio Orazzo
Hazard Analysis of Complex Distributed Railway Systems. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:283-292 [Conf]
- Nik Looker, Jie Xu
Assessing the Dependability of OGSA Middleware by Fault Injection. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:293-302 [Conf]
- Sara Blanc, Pedro J. Gil
Improving the Multiple Errors Detection Coverage in Distributed Embedded Systems. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:303-0 [Conf]
- Paulo Veríssimo
Trustworthiness of Open Information Systems: How Should It Be Achieved? [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:315-0 [Conf]
- Roy Friedman, Alon Kama
Transparent Fault-Tolerant Java Virtual Machine. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:319-328 [Conf]
- Carlos Perez Leguizamo, Dake Wang, Kinji Mori
Fault Tolerance Technology for Autonomous Decentralized Database Systems. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:329-338 [Conf]
- Michael K. Reiter, Asad Samar, Chenxi Wang
The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:339-348 [Conf]
- Carole Delporte-Gallet, Hugues Fauconnier, Rachid Guerraoui, Bastian Pochon
Distributed Programming for Dummies: A Shifting Transformation Technique. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:349-0 [Conf]
- Ulrich Schmid, Christof Fetzer
Randomized Asynchronous Consensus with Imperfect Communications. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:361-370 [Conf]
- Hagit Attiya, Amir Bar-Or
Sharing Memory with Semi-Byzantine Clients and Faulty Storage Servers. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:371-378 [Conf]
- Domenico Cotroneo, Cristiano di Flora, Generoso Paolillo, Stefano Russo
Modeling and Detecting Failures in Next-generation Distributed Multimedia Applications. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:379-0 [Conf]
|