The Community for Technology Leaders
25th IEEE International Conference on Distributed Computing Systems (ICDCS'05) (2005)
Columbus, Ohio, USA
June 6, 2005 to June 10, 2005
ISSN: 1063-6927
ISBN: 0-7695-2331-5
TABLE OF CONTENTS
Introduction

Referees (PDF)

pp. xvii,xviii

Organizing Committee (PDF)

pp. xiv-xv
Session 1: Keynote Speech

Distributed Computation in the Physical World (PDF)

David E. Culler , University of California at Berkeley
pp. 3
Session 2A: Sensor Networks

MNP: Multihop Network Reprogramming Service for Sensor Networks (Abstract)

Sandeep S. Kulkarni , Michigan State University
Limin Wang , Michigan State University
pp. 7-16

Exploring the Energy-Latency Trade-Off for Broadcasts in Energy-Saving Sensor Networks (Abstract)

Matthew J. Miller , University of Illinois at Urbana-Champaign
Cigdem Sengul , University of Illinois at Urbana-Champaign
Indranil Gupta , University of Illinois at Urbana-Champaign
pp. 17-26

Localized Low-Power Topology Control Algorithms in IEEE 802.15.4-Based Sensor Networks (Abstract)

Jian Ma , Hong Kong University of Science and Technology
Min Gao , Hong Kong University of Science and Technology
Qian Zhang , Microsoft Research Asia
Lionel M. Ni , Hong Kong University of Science and Technology
Wenwu Zhu , Microsoft Research Asia
pp. 27-36
Session 2B: Distributed Algorithms

The Impossibility of Boosting Distributed Service Resilience (Abstract)

Paul Attie , Northeastern University and Massachusetts Institute of Technology
Nancy Lynch , Massachusetts Institute of Technology
Sergio Rajsbaum , Universidad Nacional Autónoma de México
pp. 39-48

Explicit Combinatorial Structures for Cooperative Distributed Algorithms (Abstract)

Dariusz Kowalski , Uniwersytet Warszawski
Peter M. Musiał , University of Connecticut
Alexander A. Shvartsman , University of Connecticut and Massachusetts Institute of Technology
pp. 49-58
Session 2C: (Non)Cooperative Systems

Adaptive Collaboration in Peer-to-Peer Systems (Abstract)

Baruch Awerbuch , Johns Hopkins University
Boaz Patt-Shamir , Tel Aviv University
David Peleg , Weizmann Institute
Mark Tuttle , HP Labs
pp. 71-80

On Cooperative Content Distribution and the Price of Barter (Abstract)

Prasanna Ganesan , Stanford University
Mukund Seshadri , University of California at Berkeley
pp. 81-90

Non-Cooperation in Competitive P2P Networks (Abstract)

Beverly Yang , Stanford University
Tyson Condie , Stanford University
Sepandar Kamvar , Stanford University
Hector Garcia-Molina , Stanford University
pp. 91-100
Session 3A: Wireless Communications and Networks

ZAL: Zero-Maintenance Address Allocation in Mobile Wireless Ad Hoc Networks (Abstract)

Zhihua Hu , University of Toronto
Baochun Li , University of Toronto
pp. 103-112

Rcast: A Randomized Communication Scheme for Improving Energy Efficiency in MANETs (Abstract)

Sunho Lim , Pennsylvania State University
Chansu Yu , Cleveland State University
Chita R. Das , Pennsylvania State University
pp. 123-132
Session 3B: Data Management

Systems Support for Pervasive Query Processing (Abstract)

Wenwei Xue , Hong Kong University of Science and Technology
Qiong Luo , Hong Kong University of Science and Technology
Lionel M. Ni , Hong Kong University of Science and Technology
pp. 135-144

Topk Queries across Multiple Private Databases (Abstract)

Li Xiong , Georgia Institute of Technology
Subramanyam Chitti , Georgia Institute of Technology
Ling Liu , Georgia Institute of Technology
pp. 145-154

Supporting Complex Multi-Dimensional Queries in P2P Systems (Abstract)

Bin Liu , Hong Kong University of Science and Technology
Wang-Chien Lee , Pennsylvania State University
Dik Lun Lee , Hong Kong University of Science and Technology
pp. 155-164
Session 3C: Fault-Tolerance

Optimal Asynchronous Garbage Collection for RDT Checkpointing Protocols (Abstract)

Rodrigo Schmidt , ?cole Polytechnique F?d?rale de Lausanne
Fernando Pedone , Universit? della Svizzera Italiana
Luiz E. Buzato , Unicamp
pp. 167-176

Application-Driven Coordination-Free Distributed Checkpointing (Abstract)

Adnan Agbaria , University of Illinois at Urbana-Champaign
William H. Sanders , University of Illinois at Urbana-Champaign
pp. 177-186

On the Impact of Replica Placement to the Reliability of Distributed Brick Storage Systems (Abstract)

Qiao Lian , Microsoft Research Asia
Wei Chen , Microsoft Research Asia
Zheng Zhang , Microsoft Research Asia
pp. 187-196
Session 4A: Data Management II

Flexible Consistency for Wide Area Peer Replication (Abstract)

Sai Susarla , University of Utah
John Carter , University of Utah
pp. 199-208

Mixed Consistency Model: Meeting Data Sharing Needs of Heterogeneous Users (Abstract)

Zhiyuan Zhan , Georgia Institute of Technology
Mustaque Ahamad , Georgia Institute of Technology
Michel Raynal , University of Rennes
pp. 209-218

Network-Centric Buffer Cache Organization (Abstract)

Gang Peng , State University of New York at Stony Brook
Srikant Sharma , State University of New York at Stony Brook
Tzi-cker Chiueh , State University of New York at Stony Brook
pp. 219-228

Cache Clouds: Cooperative Caching of Dynamic Documents in Edge Networks (Abstract)

Lakshmish Ramaswamy , Georgia Tech
Ling Liu , Georgia Tech
Arun Iyengar , IBM T. J. Watson Research Center
pp. 229-238
Session 4B: Distributed Algorithms II

Adaptive Counting Networks (Abstract)

Srikanta Tirthapura , Iowa State University
pp. 241-250

A Dynamic Group Mutual Exclusion Algorithm Using Surrogate-Quorums (Abstract)

Ranganath Atreya , Amazon.com, Inc.
Neeraj Mittal , University of Texas at Dallas
pp. 251-260

On the Possibility of Consensus in Asynchronous Systems with Finite Average Response Times (Abstract)

Christof Fetzer , Technical University of Dresden
Ulrich Schmid , Technical University of Wien
Martin S?sskraut , Technical University of Dresden
pp. 271-280
Session 4C: Security

Virtual Leashing: Internet-Based Software Piracy Protection (Abstract)

Ori Dvir , Tel Aviv University
Maurice Herlihy , Tel Aviv University
Nir N. Shavit , Tel Aviv University
pp. 283-292

Robust Information Dissemination in Uncooperative Environments (Abstract)

Seung Jun , Georgia Institute of Technology
Mustaque Ahamad , Georgia Institute of Technology
Jun (Jim) Xu , Georgia Institute of Technology
pp. 293-302

Efficient Group Rekeying Using Application-Layer Multicast (Abstract)

X. Brian Zhang , University of Texas at Austin
Simon S. Lam , University of Texas at Austin
Huaiyu Liu , University of Texas at Austin
pp. 303-313

An Update Protocol for XML Documents in Distributed and Cooperative Systems (Abstract)

Yunhua Koglin , Purdue University
Giovanni Mella , University of Milano
Elisa Bertino , Purdue University
Elena Ferrari , University of Insubria
pp. 314-323
Session 5A: Keynote Speech
Session 6A: Data Management III

Similarity Searching in Peer-to-Peer Databases (Abstract)

Indrajit Bhattacharya , University of Maryland at College Park
Srinivas R. Kashyap , University of Maryland at College Park
Srinivasan Parthasarathy , University of Maryland at College Park
pp. 329-338

Keyword Search in DHT-Based Peer-to-Peer Networks (Abstract)

Yuh-Jzer Joung , National Taiwan University
Chien-Tse Fang , National Taiwan University
Li-Wei Yang , National Taiwan University
pp. 339-348

DSI: A Fully Distributed Spatial Index for Location-Based Wireless Broadcast Services (Abstract)

Wang-Chien Lee , Pennsylvania State University
Baihua Zheng , Singapore Management University
pp. 349-358
Session 6B: Sensor Networks II

Efficient Power Management Based on Application Timing Semantics for Wireless Sensor Networks (Abstract)

Octav Chipara , Washington University in St. Louis
Chenyang Lu , Washington University in St. Louis
Gruia-Catalin Roman , Washington University in St. Louis
pp. 361-370

A Spatiotemporal Query Service for Mobile Users in Sensor Networks (Abstract)

Chenyang Lu , Washington University in St. Louis
Guoliang Xing , Washington University in St. Louis
Octav Chipara , Washington University in St. Louis
Chien-Liang Fok , Washington University in St. Louis
Sangeeta Bhattacharya , Washington University in St. Louis
pp. 381-390
Session 6C: Internetworking

Timer Interaction in Route Flap Damping (Abstract)

Beichuan Zhang , University of California at Los Angeles
Dan Pei , University of California at Los Angeles
Daniel Massey , Colorado State University
Lixia Zhang , University of California at Los Angeles
pp. 393-403

An In-Depth, Analytical Study of Sampling Techniques for Self-Similar Internet Traffic (Abstract)

Guanghui He , University of Illinois at Urbana Champaign
Jennifer C. Hou , University of Illinois at Urbana Champaign
pp. 404-413

Characterizing and Predicting TCP Throughput on the Wide Area Network (Abstract)

Dong Lu , Northwestern University
Yi Qiao , Northwestern University
Peter A. Dinda , Northwestern University
Fabián E. Bustamante , Northwestern University
pp. 414-424
Session 7A: Publish-Subscribe Communication

Content-Based Publish-Subscribe over Structured Overlay Networks (Abstract)

Roberto Baldoni , Università di Roma "La Sapienza"
Carlo Marchetti , Università di Roma "La Sapienza"
Antonino Virgillito , Università di Roma "La Sapienza"
Roman Vitenberg , IBM Research-Haifa
pp. 437-446
Session 7B: Wireless Communications and Networks II

Symmetrical Fairness in Infrastructure Access in Multi-hop Wireless Networks (Abstract)

Saumitra M. Das , Purdue University
Himabindu Pucha , Purdue University
Y. Charlie Hu , Purdue University
pp. 461-470

FraNtiC: A Fractal Geometric Framework for Mesh-Based Wireless Access Networks (Abstract)

Samik Ghosh , University of Texas at Arlington
Kalyan Basu , University of Texas at Arlington
Sajal K. Das , University of Texas at Arlington
pp. 481-490
Session 7C: Security II

On Flow Marking Attacks in Wireless Anonymous Communication Networks (Abstract)

Xinwen Fu , Texas A—M University
Ye Zhu , Texas A—M University
Bryan Graham , Texas A—M University
Riccardo Bettati , Texas A—M University
Wei Zhao , Texas A—M University
pp. 493-503

Scalable, Server-Passive, User-Anonymous Timed Release Cryptography (Abstract)

Aldar C.-F. Chan , University of Toronto
Ian F. Blake , University of Toronto
pp. 504-513

Anonymity vs. Information Leakage in Anonymity Systems (Abstract)

Ye Zhu , Texas A—M University
Riccardo Bettati , Texas A—M University
pp. 514-524
Session 8: Panel on "DCS — Past 25 Years, Next 25 Years"

null (PDF)

pp. null
Session 9: Keynote Speech
Session 10A: Internet Computing

Using a Layered Markov Model for Distributed Web Ranking Computation (Abstract)

Jie Wu , Ecole Polytechnique Fédérale de Lausanne
Karl Aberer , Ecole Polytechnique Fédérale de Lausanne
pp. 533-542

Comparison of Approaches to Service Deployment (Abstract)

Vanish Talwar , HP Labs
Qinyi Wu , Georgia Tech
Calton Pu , Georgia Tech
Wenchang Yan , Georgia Tech
Gueyoung Jung , Georgia Tech
Dejan Milojicic , HP Labs
pp. 543-552

Supporting Live Development of SOAP and CORBA Servers (Abstract)

Sajeeva L. Pallemulle , Washington University in St. Louis
Kenneth J. Goldman , Washington University in St. Louis
Brandon E. Morgan , Washington University in St. Louis
pp. 553-562
Session 10B: Data Management IV

Resilient Capacity-Aware Multicast Based on Overlay Networks (Abstract)

Zhan Zhang , University of Florida
Shigang Chen , University of Florida
Yibei Ling , Telcordia Technologies
Randy Chow , University of Florida
pp. 565-574

Semi-Probabilistic Content-Based Publish-Subscribe (Abstract)

Paolo Costa , Politecnico di Milano
Gian Pietro Picco , Politecnico di Milano
pp. 575-585
Session 10C: Wireless Privacy

Enhancing Source-Location Privacy in Sensor Network Routing (Abstract)

Pandurang Kamat , Rutgers University
Yanyong Zhang , Rutgers University
Wade Trappe , Rutgers University
Celal Ozturk , Rutgers University
pp. 599-608

Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks (Abstract)

Donggang Liu , North Carolina State University
Peng Ning , North Carolina State University
Wenliang Du , Syracuse University
pp. 609-619
Session 11A: Sensor Networks III

Location Estimation in Ad Hoc Networks with Directional Antennas (Abstract)

N. Malhotra , Purdue University
M. Krasniewski , Purdue University
C. Yang , Purdue University
S. Bagchi , Purdue University
W. Chappell , Purdue University
pp. 633-642

Resilient Localization for Sensor Networks in Outdoor Environments (Abstract)

YoungMin Kwon , University of Illinois at Urbana-Champaign
Kirill Mechitov , University of Illinois at Urbana-Champaign
Sameer Sundresh , University of Illinois at Urbana-Champaign
Wooyoung Kim , University of Illinois at Urbana-Champaign
Gul Agha , University of Illinois at Urbana-Champaign
pp. 643-652

Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications (Abstract)

Chien-Liang Fok , Washington University in St. Louis
Gruia-Catalin Roman , Washington University in St. Louis
Chenyang Lu , Washington University in St. Louis
pp. 653-662
Session 11B: Resource Management

Controlling Gossip Protocol Infection Pattern Using Adaptive Fanout (Abstract)

Satish Verma , National University of Singapore
Wei Tsang Ooi , National University of Singapore
pp. 665-674

Fine-Grain Adaptive Compression in Dynamically Variable Networks (Abstract)

Calton Pu , Georgia Institute of Technology
Lenin Singaravelu , Georgia Institute of Technology
pp. 685-694
Session 11C: Middleware

Lightweight Morphing Support for Evolving Middleware Data Exchanges in Distributed Applications (Abstract)

Sandip Agarwala , Georgia Institute of Technology
Greg Eisenhauer , Georgia Institute of Technology
Karsten Schwan , Georgia Institute of Technology
pp. 697-706

A Self-Organizing Lookup Service for Dynamic Ambient Services (Abstract)

Klaus Herrmann , Berlin University of Technology
Gero Mühl , Berlin University of Technology
Michael Jaeger , Berlin University of Technology
pp. 707-716

ReDAL: Request Distribution for the Application Layer (Abstract)

Debra VanderMeer , Chutney Technologies
Helen Thomas , Carnegie Mellon University
Kaushik Dutta , Florida International University
Anindya Datta , Chutney Technologies
Krithi Ramamritham , Indian Institute of Technology-Mumbai
pp. 717-726
Session 12A: Wireless Communications and Networks III

On Exploring Channel Allocation in the Diverse Data Broadcasting Environment (Abstract)

Hao-Ping Hung , National Taiwan University
Ming-Syan Chen , National Taiwan University
pp. 729-738

Time-Constrained Service on Air (Abstract)

Yu-Chi Chung , National Cheng-Kung University
Chao-Chun Chen , Shih-Chien University
Chiang Lee , National Cheng-Kung University
pp. 739-748

Handling Asymmetry in Power Heterogeneous Ad Hoc Networks: A Cross Layer Approach (Abstract)

Vasudev Shah , University of California at Riverside
Srikanth Krishnamurthy , University of California at Riverside
pp. 749-759
Session 12B: Stream Management

DISC: Dynamic Interleaved Segment Caching for Interactive Streaming (Abstract)

Lei Guo , College of William and Mary
Songqing Chen , George Mason University
Zhen Xiao , AT&T Labs-Research
Xiaodong Zhang , College of William and Mary
pp. 763-772

Optimal Component Composition for Scalable Stream Processing (Abstract)

Xiaohui Gu , IBM T. J. Watson Research Center
Philip S. Yu , IBM T. J. Watson Research Center
Klara Nahrstedt , University of Illinois at Urbana-Champaign
pp. 773-782

Resource-Aware Distributed Stream Management Using Dynamic Overlays (Abstract)

Vibhore Kumar , Georgia Institute of Technology
Brian F. Cooper , Georgia Institute of Technology
Zhongtang Cai , Georgia Institute of Technology
Greg Eisenhauer , Georgia Institute of Technology
Karsten Schwan , Georgia Institute of Technology
pp. 783-792
Session 12C: Security III

Equational Approach to Formal Analysis of TLS (Abstract)

Kazuhiro Ogata , NEC Software Hokuriku, Ltd.
Kokichi Futatsugi , Japan Advanced Institute of Science and Technology
pp. 795-804

Distributed Approximation of Fixed-Points in Trust Structures (Abstract)

Karl Krukow , University of Aarhus
Andrew Twigg , University of Cambridge
pp. 805-814

Distributed Blinding for Distributed ElGamal Re-Encryption (Abstract)

Lidong Zhou , Microsoft Research Silicon Valley
Michael A. Marsh , University of Maryland
Fred B. Schneider , Cornell University
Anna Redz , Royal Institute of Technology
pp. 815-824
Author Index

Author Index (PDF)

pp. 825-827
84 ms
(Ver 3.3 (11022016))