The Community for Technology Leaders
2013 IEEE 33rd International Conference on Distributed Computing Systems (2003)
Providence, Rhode Island
May 19, 2003 to May 22, 2003
ISSN: 1063-6927
ISBN: 0-7695-1920-2
TABLE OF CONTENTS

Program Committee (PDF)

pp. xiii
Session 1: Keynote Address
Session 2A: Self-Stabilizing Systems

Self-Stabilizing Smoothing and Counting (Abstract)

Srikanta Tirthapura , Iowa State University
Maurice Herlihy , Brown University
pp. 4

Enabling Snap-Stabilization (Abstract)

Alain Cournier , LaRIA, Universit? de Picardie Jules Verne
Vincent Villain , LaRIA, Universit? de Picardie Jules Verne
Ajoy K. Datta , University of Nevada Las Vegas
Franck Petit , LaRIA, Universit? de Picardie Jules Verne
pp. 12

Efficient Self-stabilizing Algorithms for Tree Networks (Abstract)

Fredrik Manne , University of Bergen
Jean R. S. Blair , United States Military Academy
pp. 20
Session 2B: Sensor Networks and Energy Management

PEAS: A Robust Energy Conserving Protocol for Long-lived Sensor Networks (Abstract)

Gary Zhong , UCLA Computer Science Department
Fan Ye , UCLA Computer Science Department
Lixia Zhang , UCLA Computer Science Department
Jesse Cheng , UCLA Computer Science Department
Songwu Lu , UCLA Computer Science Department
pp. 28

ON ENERGY EFFICIENCY AND NETWORK CONNECTIVITY OF MOBILE AD HOC NETWORKS (Abstract)

Chi Wan Sung , City University of Hong Kong
Wing Ho Yuen , Rutgers University
pp. 38

SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks (Abstract)

Tian He , University of Virginia
Tarek Abdelzaher , University of Virginia
Chenyang Lu , Washington University in St Louis
John A Stankovic , University of Virginia
pp. 46
Session 2C: Peer-to-Peer Services

Partial Lookup Services (Abstract)

Hector Garcia-Molina , Stanford University
Qixiang Sun , Stanford University
pp. 58

Mutual Anonymity Protocols for Hybrid Peer-to-Peer Systems (Abstract)

Xiaodong Zhang , College of William and Mary
Zhichen Xu , Hewlett-Packard Company
Li Xiao , Michigan State University
pp. 68

Updates in Highly Unreliable, Replicated Peer-to-Peer Systems (Abstract)

Anwitaman Datta , Swiss National Institute of Technology (EPFL)
Karl Aberer , Swiss National Institute of Technology (EPFL)
Manfred Hauswirth , Swiss National Institute of Technology (EPFL)
pp. 76
Session 3A: Distributed Algorithms

A Generic Framework for Indulgent Consensus (Abstract)

Rachid GUERRAOUI , Swiss Federal Institute of Technology in Lausanne
Michel RAYNAL , Universit? de Rennes
pp. 88

Weakly-Connected Dominating Sets and Sparse Spanners in Wireless Ad Hoc Networks (Abstract)

Ophir Frieder , Illinois Institute of Technology
Khaled M. Alzoubi , Illinois Institute of Technology
Peng-Jun Wan , Illinois Institute of Technology
pp. 96

Software Fault Tolerance of Distributed Programs Using Computation Slicing (Abstract)

Neeraj Mittal , The University of Texas at Dallas
Vijay K. Garg , The University of Texas at Austin
pp. 105
Session 3B: Multimedia Streaming

Optimal Distribution Tree for Internet Streaming Media (Abstract)

Min Sik Kim , The University of Texas at Austin
Simon S. Lam , The University of Texas at Austin
Dong-Young Lee , The University of Texas at Austin
pp. 116

Deliver Multimedia Streams with Flexible QoS via a Multicast DAG (Abstract)

Jiong Yang , University of Illinois at Urbana-Champaign
pp. 126

An Integrated Resource Sharing Policy for Multimedia Storage Servers Based on Network-Attached Disks (Abstract)

Chita R. Das , The Pennsylvania State University
Nabil J. Sarhan , The Pennsylvania State University
pp. 136
Session 3C: Secure Data Sharing

Responsive Security for Stored Data (Abstract)

H. Venkateswaran , Georgia Institute of Technology
Mustaque Ahamad , Georgia Institute of Technology
Subramanian Lakshmanan , Georgia Institute of Technology
pp. 146

Performance Optimizations for Group Key Management Schemes (Abstract)

Sanjeev Setia , George Mason University
Sencun Zhu , George Mason University
Sushil Jajodia , George Mason University; The MITRE Corporation
pp. 163
Session 4A: Quality of Service

Scalable Resource Allocation for Multi-Processor QoS Optimization (Abstract)

Ragunathan (Raj) Rajkumar , Carnegie Mellon University
John Lehoczky , Carnegie Mellon University
Jeffery Hansen , Carnegie Mellon University
Sourav Ghosh , Carnegie Mellon University
pp. 174

Scalable Service Differentiation in a Shared Storage Cache (Abstract)

Seraphin Calo , IBM T.J. Watson Research Center
Bong-Jun Ko , Columbia University
Kang-Won Lee , IBM T.J. Watson Research Center
Khalil Amiri , IBM T.J. Watson Research Center
pp. 184

QoS-Assured Service Composition in Managed Service Overlay Networks (Abstract)

Klara Nahrstedt , University of Illinois at Urbana-Champaign
Christopher Ward , IBM T.J. Watson Research Center
Xiaohui Gu , University of Illinois at Urbana-Champaign
Rong N. Chang , IBM T.J. Watson Research Center
pp. 194
Session 4B: Internet Protocols

Experiences With Monitoring OSPF on a Regional Service Provider Network (Abstract)

David Watson , University of Michigan
Farnam Jahanian , University of Michigan
Craig Labovitz , Arbor Networks
pp. 204

VirtualWire: A Fault Injection and Analysis Tool for Network Protocols (Abstract)

Pradipta De , State University of New York at Stony Brook
Anindya Neogi , State University of New York at Stony Brook
Tzi-cker Chiueh , State University of New York at Stony Brook
pp. 214

TCP-PR: TCP for Persistent Packet Reordering (Abstract)

Katia Obraczka , University of California Santa Cruz
Junsoo Lee , Univ. of Southern California Los Angeles
Stephan Bohacek , Univ. of Delaware, Newark
Jo?o P. Hespanha , Univ. of California Santa Barbara
Chansook Lim , Univ. of Southern California Los Angeles
pp. 222
Session 4C: Middleware Communication Services

Efficient Content-Based Event Dispatching in the Presence of Topological Reconfiguration (Abstract)

Gianpaolo Cugola , Politecnico di Milano, Italy
Amy L. Murphy , Univ. of Rochester, NY
Gian Pietro Picco , Politecnico di Milano, Italy
pp. 234

Improving Application Throughput With Enterprise JavaBeans Caching (Abstract)

James T. Rayfield , IBM T.J. Watson Research Center
Avraham Leff , IBM T.J. Watson Research Center
pp. 244

NRMI: Natural and Efficient Middleware (Abstract)

Eli Tilevich , Georgia Tech
Yannis Smaragdakis , Georgia Tech
pp. 252
Session 5: Keynote Address
Session 6A: Fault-Tolerant Systems

Evaluating Distributed Checkpointing Protocol (Abstract)

Adnan Agbaria , University of Illinois at Urbana-Champaign
Roy Friedman , Technion - Israel Institute of Technology
Ari Freund , Technion - Israel Institute of Technology
pp. 266

Synchronous Consensus for Dependent Process Failures (Abstract)

Flavio P. Junqueira , University of California, San Diego
Keith Marzullo , University of California, San Diego
pp. 274

Elastic Vector Time (Abstract)

Michel RAYNAL , IRISA, Campus de Beaulieu
pp. 284
Session 6B: Ubiquitous Computing

A Context-Aware Data Management System for Ubiquitous Computing Applications (Abstract)

Roy H. Campbell , University of Illinois at Urbana-Champaign
Christopher K. Hess , University of Illinois at Urbana-Champaign
pp. 294

Impact of Data Compression on Energy Consumption of Wireless-Networked Handheld Devices (Abstract)

Rong Xu , Purdue University
Zhiyuan Li , Purdue University
Cheng Wang , Purdue University
Peifeng Ni , Purdue University
pp. 302

PARM : Power Aware Reconfigurable Middleware (Abstract)

Nalini Venkatasubramanian , University of California, Irvine
Shivajit Mohapatra , University of California, Irvine
pp. 312
Session 6C: Network Security

Protecting BGP Routes to Top Level DNS Servers (Abstract)

S. Felix Wu , UC Davis
Dan Pei , UCLA
Xiaoliang Zhao , USC/ISI
Allison Mankin , Bell Labs
Lan Wang , UCLA
Daniel Massey , USC/ISI
pp. 322

A Path Information Caching and Aggregation Approach to Traffic Source Identification (Abstract)

Tzi-cker Chiueh , State University of New York at Stony Brook
Fu-Hau Hsu , State University of New York at Stony Brook
pp. 332

On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks (Abstract)

Wei Zhao , Texas A&M University
Riccardo Bettati , Texas A&M University
Xinwen Fu , Texas A&M University
Bryan Graham , Texas A&M University
pp. 340
Session 7A: Real-Time Systems

Rate-monotonic scheduling on uniform multiprocessors (Abstract)

Sanjoy K. Baruah , The University of North Carolina at Chapel Hill
Jo? Goossens , Universit? Libre de Bruxelles
pp. 360

Effective Delay Control for High Rate Heterogeneous Real-time Flows (Abstract)

Weijia Jia , City University of Hong Kong
Wei Zhao , Texas A&M University
Maoning Tang , Shanghai University
Hanxing Wang , Shanghai University
pp. 367
Session 7B: Web Servers

Performance Guarantees for Cluster-Based Internet Services (Abstract)

Chang Li , State University of New York at Stony Brook
Kartik Gopalan , State University of New York at Stony Brook
Gang Peng , State University of New York at Stony Brook
Tzi-cker Chiueh , State University of New York at Stony Brook
pp. 378

Decision-Support Workload Characteristics on a Clustered Database Server from the OS Perspective (Abstract)

Yanyong Zhang , The State University of New Jersey
Hubertus Franke , IBM T. J. Watson Research Center
Chun Liu , The Pennsylvania State University
Anand Sivasubramaniam , The Pennsylvania State University
Jianyong Zhang , The Pennsylvania State University
pp. 386

Integrated Access Control and Intrusion Detection for Web Servers (Abstract)

Li Zhou , University of Southern California
Tatyana Ryutov , University of Southern California
Dongho Kim , University of Southern California
Clifford Neuman , University of Southern California
pp. 394
Session 7C: Middleware and Interoperability

Pragmatic Type Interoperability (Abstract)

Philippe Altherr , Swiss Federal Institute of Technology in Lausanne
Rachid Guerraoui , Swiss Federal Institute of Technology in Lausanne
S?bastien Baehni , Swiss Federal Institute of Technology in Lausanne
Patrick Th. Eugster , Swiss Federal Institute of Technology in Lausanne
pp. 404

Efficiently Distributing Component-Based Applications Across Wide-Area Environments (Abstract)

Alexander Totok , New York University
Deni Llambiri , New York University
Vijay Karamcheti , New York University
pp. 412
Session 8A: Formal Methods

Remote Belief: Preserving Volition for Loosely Coupled Processes (Abstract)

Nuh Aydin , Kenyon College
Paolo A. G. Sivilotti , The Ohio State University
pp. 434

Enhancing The Fault-Tolerance of Nonmasking Programs (Abstract)

Ali Ebnenasir , Michigan State University
Sandeep S. Kulkarni , Michigan State University
pp. 441
Session 8B: Ad Hoc Network Protocols

A Generic Distributed Broadcast Scheme in Ad Hoc Wireless Networks (Abstract)

Jie Wu , Florida Atlantic University
Fei Dai , Florida Atlantic University
pp. 460

Fragmentation based D-MAC Protocol in Wireless Ad Hoc Networks (Abstract)

Jennifer C. Hou , University of Illinois at Urbana Champaign
Pin Zhou , University of Illinois at Urbana Champaign
Zhenmin Li , University of Illinois at Urbana Champaign
pp. 468

Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies (Abstract)

Wenke Lee , Georgia Institute of Technology
Wei Fan , IBM T. J. Watson Research
Philip S. Yu , IBM T. J. Watson Research
Yi-an Huang , Georgia Institute of Technology
pp. 478
Session 8C: Peer-to-Peer Infrastructure

PeerCQ:A Decentralized and Self-Configuring Peer-to-Peer Information Monitoring System (Abstract)

Ling Liu , Georgia Institute of Technology
Bugra Gedik , Georgia Institute of Technology
pp. 490

Building Topology-Aware Overlays Using Global Soft-State (Abstract)

Zhichen Xu , Hewlett-packard Laboratories
Zheng Zhang , Microsoft Research Asia
Chunqiang Tang , Univ. of Rochester
pp. 500

Neighbor Table Construction and Update in a Dynamic Peer-to-Peer Network (Abstract)

Huaiyu Liu , Univ. of Texas at Austin
Simon S. Lam , Univ. of Texas at Austin
pp. 509
Session 9: Keynote Address
Session 10A: Synchronization

Obstruction-Free Synchronization: Double-Ended Queues as an Example (Abstract)

Mark Moir , Sun Microsystems Laboratories
Maurice Herlihy , Brown University
Victor Luchangco , Sun Microsystems Laboratories
pp. 522

Scalable Distributed Concurrency Services for Hierarchical Locking (Abstract)

Nirmit Desai , North Carolina State University
Frank Mueller , North Carolina State University
pp. 530

Local-spin Mutual Exclusion Using Fetch-and-\phi Primitives (Abstract)

James H. Anderson , University of North Carolina at Chapel Hill
Yong-Jik Kim , University of North Carolina at Chapel Hill
pp. 538
Session 10B: Wide Area Distributed Computing

A Case For Grid Computing On Virtual Machines (Abstract)

Peter A. Dinda , Northwestern University
Renato J. Figueiredo , University of Florida
Jos? A. B. Fortes , University of Florida
pp. 550

Efficient Distributed Shared State for Heterogeneous Machine Architectures (Abstract)

DeQing Chen , University of Rochester
Sandhya Dwarkadas , University of Rochester
Chunqiang Tang , University of Rochester
Michael L. Scott , University of Rochester
pp. 560
Session 10C: Mobile Agents

Monotonicity and Partial Results Protection for Mobile Agents (Abstract)

Bennet Yee , University of California, San Diego
pp. 582

Mobile Agent Rendezvous in a Ring (Abstract)

Evangelos Kranakis , Carleton University
Nicola Santoro , Carleton University
Cindy Sawchuk , Carleton University
Danny Krizanc , Wesleyan University
pp. 592

Compiler Scheduling of Mobile Agents for Minimizing Overheads (Abstract)

Santosh Pande , Georgia Institute of Technology
Xiaotong Zhuang , Georgia Institute of Technology
pp. 600
Session 11A: Program/Software Analysis

Method Partitioning - Runtime Customization of Pervasive Programs without Design-time Application Knowledge (Abstract)

Santosh Pande , Georgia Institute of Technology
Dong Zhou , DoCoMo USA Labs
Karsten Schwan , Georgia Institute of Technology
pp. 610

Dynamic Module Replacement in Distributed Protocols (Abstract)

Bruce W. Weide , Ohio State University
Scott M. Pike , Ohio State University
Nigamanth Sridhar , Ohio State University
pp. 620

Analysis of Task Assignment with Cycle Stealing under Central Queue (Abstract)

Takayuki Osogami , Carnegie Mellon University
Mark S. Squillante , IBM Thomas J. Watson Research Center
Cuihong Li , Carnegie Mellon University
Mor Harchol-Balter , Carnegie Mellon University
Alan Scheller-Wolf , Carnegie Mellon University
pp. 628
Session 11B: Wireless Access Control

Energy-Efficient Real-Time Scheduling in IEEE 802.11 Wireless LANs (Abstract)

Lynn Y. Zhang , University of Illinois at Urbana-Champaign
Jennifer Hou , University of Illinois at Urbana-Champaign
Ye Ge , University of Illinois at Urbana-Champaign
pp. 658
Session 11C: Scalable Data Services

The Hash History Approach for Reconciling Mutual Inconsistency (Abstract)

Robert Wilensky , University of California at Berkley
John Kubiatowicz , University of California at Berkley
Brent ByungHoon Kang , University of California at Berkley
pp. 670

New Algorithms for Content-Based Publication-Subscription Systems (Abstract)

Li Zhang , IBM T.J. Watson Research Center
Philip S. Yu , IBM T.J. Watson Research Center
Anton Riabov , Columbia University
Joel L. Wolf , IBM T.J. Watson Research Center
Zhen Liu , IBM T.J. Watson Research Center
pp. 678

Author's Index (PDF)

pp. 696
104 ms
(Ver )