The Community for Technology Leaders
2013 IEEE 33rd International Conference on Distributed Computing Systems (2006)
Lisboa, Portugal
July 4, 2006 to July 7, 2006
ISSN: 1063-6927
ISBN: 0-7695-2540-7
TABLE OF CONTENTS
Introduction

External reviewers (PDF)

pp. xxvii
Introduction
Session 1A: Middleware

Analysis of the Message Waiting Time for the FioranoMQ JMS Server (Abstract)

Michael Menth , University of W?rzburg, Germany
Robert Henjes , University of W?rzburg, Germany
pp. 1

Highly Available Long Running Transactions and Activities for J2EE Applications (Abstract)

Francisco Prez-Sorrosal , Universidad Polit?ecnica de Madrid, Spain
Marta Patino-Martinez , Universidad Politecnica de Madrid, Spain
Jaksa Vuckovic , Universta di Bologna, Italy
Ricardo Jimenez-Peris , Universidad Politecnica de Madrid, Spain
pp. 2

A Bridging Framework for Universal Interoperability in Pervasive Systems (Abstract)

Umakishore Ramachandran , Georgia Institute of Technology
Jin Nakazawa , Keio University, Japan
Hideyuki Tokuda , Keio University, Japan
W. Keith Edwards , Georgia Institute of Technology
pp. 3
Session 1B: Network Optimization

A Loss and Queuing-Delay Controller for Router Buffer Management (Abstract)

F. Donelson Smith , University of North Carolina at Chapel Hill
Kevin Jeffay , University of North Carolina at Chapel Hill
Long Le , University of North Carolina at Chapel Hill
pp. 4

The Confluent Capacity of the Internet: Congestion vs. Dilation (PDF)

Jiangzhuo Chen , Virginia Tech, Blacksburg, VA
Ravi Sundaram , Virginia Tech, Blacksburg, VA
Madhav Marathe , Virginia Tech, Blacksburg, VA
Rajmohan Rajaraman , Northeastern University, College, Boston, MA
pp. 5

FastFlow: A Framework for Accurate Characterization of Network Traffic (Abstract)

Kalyan Basu , University of Texas at Arlington
Sumantra R. Kundu , University of Texas at Arlington
Sajal K. Das , University of Texas at Arlington
Bodhisatwa Chakravarty , University of Texas at Arlington
pp. 6
Session 1C: Autonomic Computing

Autonomic Management of Stream Processing Applications via Adaptive Bandwidth Control (Abstract)

Dimitrios Pendarakis , IBM T.J. Watson Research Center, NY
Jeremy Silber , Google, New York, NY, USA
Laura Wynter , IBM T.J. Watson Research Center, NY
pp. 7

SysProf: Online Distributed Behavior Diagnosis through Fine-grain System Monitoring (Abstract)

Sandip Agarwala , Georgia Institute of Technology
Karsten Schwan , Georgia Institute of Technology
pp. 8
Session 2A: Security

Loud and Clear: Human-Verifiable Authentication Based on Audio (Abstract)

Michael Sirivianos , University of California, Irvine
Gene Tsudik , University of California, Irvine
John Solis , University of California, Irvine
Ersin Uzun , University of California, Irvine
Michael T. Goodrich , University of California, Irvine
pp. 10

Design and Performance Evaluation of a Proxy-based Java Rewriting Security System (Abstract)

Ying Xu , University of California, Riverside
Brett D. Fleisch , University of California, Riverside
Yougang Song , University of California, Riverside
pp. 11
Session 2B: Peer-to-Peer I

WhoPay: A Scalable and Anonymous Payment System for Peer-to-Peer Environments (Abstract)

Kai Wei , University of Cailfornia, Berkeley
Alan J. Smith , University of Cailfornia, Berkeley
Binh Vo , Massachusetts Institute of Technology
Yih-Farn Robin Chen , AT&T Labs-Research
pp. 13

Robust Accounting in Decentralized P2P Storage Systems (Abstract)

Peng Wang , University of Minnesota
Ivan Osipkov , University of Minnesota
Nicholas Hopper , University of Minnesota
pp. 14

Elastic Routing Table with Provable Performance for Congestion Control in DHT Networks (Abstract)

Cheng-Zhong Xu , Wayne State University, Detroit, MI
Haiying Shen , Wayne State University, Detroit, MI
pp. 15
Session 2C: Fault-Tolerance

Computing in the Presence of Timing Failures (Abstract)

Gadi Taubenfeld , The Interdisciplinary CenterP.O.Box 167, Herzliya 46150, Israel
pp. 16

Failure classification and analysis of the Java Virtual Machine (Abstract)

Stefano Russo , Laboratorio ITEM - Consorzio Interuniversitario Nazionale per l?Informatica, Italy
Domenico Cotroneo , Universit`a degli Studi di Napoli Federico II
Salvatore Orlando , Universit`a degli Studi di Napoli Federico II
pp. 17

Efficient Incremental Optimal Chain Partition of Distributed Program Traces (Abstract)

Vijay K. Garg , University of Texas at Austin
Selma Ikiz , University of Texas at Austin
pp. 18
Session 3A: Distributed Processing I

An Empirical Evaluation ofWork Stealing with Parallelism Feedback (Abstract)

Kunal Agrawal , Massachusetts Institute of Technology
Charles E. Leiserson , Massachusetts Institute of Technology
Yuxiong He , Massachusetts Institute of Technology
pp. 19

Load Unbalancing to Improve Performance under Autocorrelated Traffic (Abstract)

Qi Zhang , College of William and Mary, Williamsburg, VA
Evgenia Smirni , ollege of William and Mary Williamsburg, VA
Alma Riska , Seagate Research, Pittsburgh, PA
Ningfang Mi , College of William and Mary, Williamsburg, VA
pp. 20

ParRescue: Scalable Parallel Algorithm and Implementation for Biclustering over Large Distributed Datasets (Abstract)

Ashfaq Khokhar , University of Illinois at Chicago
Jianhong Zhou , University of Illinois at Chicago
pp. 21
Session 3B: Publish-Subscribe

A Semantic Overlay for Self- Peer-to-Peer Publish/Subscribe (Abstract)

A. Virgillito , Universita di Roma La Sapienza, Italy
M. Gradinariu , IRISA, Rennes, France
E. Anceaume , IRISA, Rennes, France
A. K. Datta , University of Nevada Las Vegas, USA
G. Simon , France Telecom R&D, Issy les Moulineaux, France
pp. 22

PastryStrings: A Comprehensive Content-Based Publish/Subscribe DHT Network (Abstract)

Ioannis Aekaterinidis , University of Patras, Greece
Peter Triantafillou , University of Patras, Greece
pp. 23

Utility Optimization for Event-Driven Distributed Infrastructures (Abstract)

Mark Astley , IBM T.J. Watson Research Center
Cristian Lumezanu , University of Maryland, College Park
Sumeer Bhola , IBM T.J. Watson Research Center
pp. 24
Session 3C: Web and Collaborative Systems

Controlling Quality of Service in Multi-Tier Web Applications (Abstract)

Sujay Parekh , IBM Thomas J. Watson Research Center, NY
Joseph L. Hellerstein , IBM Thomas J. Watson Research Center, NY
Maheswaran Surendra , IBM Thomas J. Watson Research Center, NY
Yixin Diao , IBM Thomas J. Watson Research Center, NY
Hidayatullah Shaikh , IBM Thomas J. Watson Research Center, NY
pp. 25

File System Support for Collaboration in theWide Area (Abstract)

Vasile Gaburici , University of Maryland
Bobby Bhattacharjee , University of Maryland
Pete Keleher , University of Maryland
pp. 26

A Secure and Efficient Large Scale Distributed System for Data Sharing (Abstract)

Luigi Vincenzo Mancini , Universit`a di Roma La Sapienza Italy
Giorgio Zanin , Universit`a di Roma La Sapienza Italy
pp. 27
Session 4A: Distributed Processing II

Distributed Computing for Efficient Hyperspectral Imaging Using Fully Heterogeneous Networks of Workstations (Abstract)

Antonio Plaza , University of Extremadura, Spain
David Valencia , University of Extremadura, Spain
Javier Plaza , University of Extremadura, Spain
pp. 28

Reputation-Based Scheduling on Unreliable Distributed Infrastructures (Abstract)

Mukesh Nathan , University of Minnesota, Minneapolis
Abhishek Chandra , University of Minnesota, Minneapolis
Jason Sonnek , University of Minnesota, Minneapolis,
Jon Weissman , University of Minnesota, Minneapolis
pp. 30
Session 4B: Storage

On Store Placement for Response Time Minimization in Parallel Disks (Abstract)

Akshat Verma , IBM India Research Laboratory
Ashok Anand , IBM India Research Laboratory
pp. 31

PRINS: Optimizing Performance of Reliable Internet Storages (Abstract)

Jin Ren , University of Rhode Island
Weijun Xiao , University of Rhode Island
Qing Yang , University of Rhode Island
pp. 32

Genesis: A Scalable Self-Evolving Performance Management Framework for Storage Systems (Abstract)

Kristal T. Pollack , University of California, Santa Cruz
Sandeep M. Uttamchandani , IBM Almaden Research Center
pp. 33
Session 4C: Byzantine Fault-Tolerance

Tolerating Byzantine Faulty Clients in a Quorum System (Abstract)

Rodrigo Rodrigues , INESC-ID / Instituto Superior Tecnico Lisbon, Portugal
Barbara Liskov , MIT CSAIL, Cambridge, MA, USA
pp. 34

Sharing Memory between Byzantine Processes using Policy-Enforced Tuple Spaces (Abstract)

Alysson Neves Bessani , Universidade Federal de Santa Catarina - Brazil
Lau Cheuk Lung , Pontificia Universidade Cat?olica do Paran?a - Brazil
Joni da Silva Fraga , Universidade Federal de Santa Catarina - Brazil
Miguel Correia , LASIGE, Faculdade de Ciencias da Universidade de Lisboa - Portugal
pp. 35

Practical Byzantine Group Communication (Abstract)

Roy Friedman , Technion - Israel Institute of Technology Haifa, 32000 Israel
Alon Kama , Technion - Israel Institute of Technology Haifa, 32000 Israel
Vadim Drabkin , Technion - Israel Institute of Technology Haifa, 32000 Israel
pp. 36
Session 5A: Countering Attacks

Spoof Detection for Preventing DoS Attacks against DNS Servers (Abstract)

Jiawu Chen , Stony Brook University, NY
Fanglu Guo , Stony Brook University, NY
Tzi-cker Chiueh , Stony Brook University, NY
pp. 37

Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach (Abstract)

Yi-Min Wang , Microsoft Research, WA
AAron Walters , Purdue University, W. Lafayette, IN
Florian Buchholz , James Madison Univ., Harrisonburg, VA
Xuxian Jiang , Purdue University, W. Lafayette, IN
Dongyan Xu , Purdue University, W. Lafayette, IN
Eugene H. Spafford , Purdue University, W. Lafayette, IN
pp. 38

A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks (Abstract)

Zhichun Li , Northwestern Univ
Yan Chen , Northwestern Univ
Yan Gao , Northwestern Univ
pp. 39
Session 5B: Consistency and Cache Management

DNScup: Strong Cache Consistency Protocol for DNS (Abstract)

Xin Chen , Ask.com, Piscataway, NJ
Haining Wang , College of William and Mary, Williamsburg, VA
Shansi Ren , Ohio State University
pp. 40

Application-Tailored Cache Consistency for Wide-Area File Systems (Abstract)

Ming Zhao , University of Florida
Renato J. Figueiredo , University of Florida
pp. 41

A Locality-Aware Cooperative Cache Management Protocol to Improve Network File System Performance (Abstract)

Xiaodong Zhang , Ohio State University
Xiaoning Ding , Ohio State University
Song Jiang , Los Alamos National Laboratory
Fabrizio Petrini , Pacific Northwest National Laboratory, WA
pp. 42
Session 5C: Content Delivery

Content-based Dissemination of Fragmented XML Data (Abstract)

Chee-Yong Chan , National University of Singapore
Yuan Ni , National University of Singapore
pp. 44

CREW: A Gossip-based Flash-Dissemination System (Abstract)

Iosif Lazardis , University of California, Irvine
Sharad Mehrotra , University of California, Irvine
Nalini Venkatasubramanian , University of California, Irvine
Bo Xing , University of California, Irvine
Bijit Hore , University of California, Irvine
Mayur Deshpande , University of California, Irvine
pp. 45
Session 6A: Routing in MANETs

Analysis of Clustering and Routing Overhead for Clustered Mobile Ad Hoc Networks (Abstract)

Winston K.G. Seah , Heng Mui Keng Terrace, Singapore
Inn-Inn Er , Heng Mui Keng Terrace, Singapore
Mingqiang Xue , National University of Singapore, Singapore
pp. 46

Mitigating the FloodingWaves Problem in Energy-Efficient Routing for MANETs (Abstract)

Rami Melhem , University of Pittsburgh
Daniel Mosse , University of Pittsburgh
Sameh Gobriel , University of Pittsburgh
pp. 47

High-Throughput Multicast Routing Metrics in Wireless Mesh Networks (Abstract)

Y. Charlie Hu , Purdue University, West Lafayette, IN
Sabyasachi Roy , Purdue University, West Lafayette, IN
Saumitra Das , Purdue University, West Lafayette, IN
Dimitrios Koutsonikolas , Purdue University, West Lafayette, IN
pp. 48

GMP: Distributed Geographic Multicast Routing in Wireless Sensor Networks (Abstract)

Shibo Wu , Arizona State University, Tempe, AZ, USA
K. Selcuk Candan , Arizona State University, Tempe, AZ, USA
pp. 49
Session 6B: Sensor Networks

Distributed Minimal Time Convergecast Scheduling in Wireless Sensor Networks (Abstract)

Ying Zhang , Palo Alto Research Center (PARC) Inc.
Qingfeng Huang , Palo Alto Research Center (PARC) Inc.
Shashidhar Gandham , University of Texas at Dallas
pp. 50

In-Network Outlier Detection in Wireless Sensor Networks (Abstract)

Boleslaw Szymanski , Rensselaer Polytechnic Institute, NY
Ran Wolff , University of Maryland Baltimore County
Hillol Kargupta , University of Maryland Baltimore County
Joel Branch , Rensselaer Polytechnic Institute, NY
Chris Giannella , University of Maryland Baltimore County
pp. 51

POS: A Practical Order Statistics Service forWireless Sensor Networks (Abstract)

Antony Rowstron , Microsoft Research, Cambridge
Landon P. Cox Landon P. Cox , Duke University
Miguel Castro , Microsoft Research, Cambridge
pp. 52

Sluice: Secure Dissemination of Code Updates in Sensor Networks (Abstract)

Rajeev Gandhi , Carnegie Mellon University
Priya Narasimhan , Carnegie Mellon University
Patrick E. Lanigan , Carnegie Mellon University
pp. 53
Session 6C: Networks

Overlay Multicast with Inferred Link Capacity Correlations (Abstract)

Baochun Li , University of Toronto
Ying Zhu , University of Toronto
pp. 54

On Estimating Tight-Link Bandwidth Characteristics over Multi-Hop Paths (Abstract)

Dmitri Loguinov , Texas A&M University, College Station, TX
Amit Bhati , Texas A&M University, College Station, TX
Xiliang Liu , City University of New York, New York, NY
Seong-Ryong Kang , Texas A&M University, College Station, TX
pp. 55

Interplay of ISPs: Distributed Resource Allocation and Revenue Maximization (Abstract)

Dah-Ming Chiu , Chinese University of Hong Kong
Sam C.M. Lee , Chinese University of Hong Kong
Joe W.J. Jiang , Chinese University of Hong Kong
John C. S. Lui , Chinese University of Hong Kong
pp. 56

Cycling Through a Dangerous Network: A Simple Efficient Strategy for Black Hole Search (Abstract)

Nicola Santoro , Carleton University
Paola Flocchini , University of Ottawa
Stefan Dobrev , University of Ottawa
pp. 57
Session 7A: Secure Communication

Fast data access over asymmetric channels using fair and secure bandwidth sharing (Abstract)

Moshe Laifenfeld , Deutsche Telekom Laboratories Berlin, Germany
Murat Alanyali , Boston University
Ari Trachtenberg , Boston University
Sachin Agarwal , Deutsche Telekom Laboratories Berlin, Germany
pp. 58

M2: Multicasting Mixes for Efficient and Anonymous Communication (Abstract)

Michael K. Reiter , Carnegie Mellon University
Ginger Perng , Carnegie Mellon University
Chenxi Wang , Carnegie Mellon University
pp. 59
Session 7B: Wireless Networks

On the Access Pricing Issues of Wireless Mesh Networks (Abstract)

John C.S. Lui , Chinese University of Hong Kong
Dah-Ming Chiu , Chinese University of Hong Kong
Ray K. Lam , Chinese University of Hong Kong
pp. 61

Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks (Abstract)

Srikanth V. Krishnamurthy , University of California, Riverside
Dharmaiah Manjunath , Indian Institute of Technology - Mumbai, India
Venkata Nishanth Lolla , University of California, Riverside
Lap Kong Law , University of California, Riverside
Chinya Ravishankar , University of California, Riverside
pp. 63
Session 7C: Peer-to-Peer II

Delay-Bounded Range Queries in DHT-based Peer-to-Peer Systems (Abstract)

Hong-va Leong , Hong Kong Polytechnic University, Kowloon, Hong Kong
Keith C. C. Chan , Hong Kong Polytechnic University, Kowloon, Hong Kong
Jiannong Cao , Hong Kong Polytechnic University, Kowloon, Hong Kong
Jinshu Su , National University of Defense Technology, Changsha, China
Xicheng Lu , National University of Defense Technology, Changsha, China
Dongsheng Li , National University of Defense Technology, Changsha, China
Baosheng Wang , National University of Defense Technology, Changsha, China
pp. 64

Search-and-Discover in Mobile P2P Network Databases (Abstract)

Huabei Yin , University of Illinois at Chicago
Ouri Wolfson , Pirouette Software Consulting, Chicago IL
Bo Xu , University of Illinois at Chicago
Hu Cao , University of Illinois at Chicago
pp. 65

Improving Traffic Locality in BitTorrent via Biased Neighbor Selection (Abstract)

Tony Bates , Cisco Systems, Inc.
Jan Medved , Cisco Systems, Inc.
Amy Zhang , Cisco Systems, Inc.
George Suwala , Cisco Systems, Inc.
Pei Cao , Stanford University
Ruchir Bindal , Stanford University
William Chan , Stanford University
pp. 66
Session 8A: Reliable and Secure Sensor Networks

Self-Protection for Wireless Sensor Networks (Abstract)

Qlan zhang , Hong Kong Univ. of Sci and Tech
Dan Wang , Simon Fraser University,
Jiangchuan Liu , Hong Kong Univ. of Sci and Tech
pp. 67

Fault-Tolerant Clustering in Ad Hoc and Sensor Networks (Abstract)

Thomas Moscibroda , Network Laboratory ETH Zurich, 8092 Zurich
Roger Wattenhofer , Network Laboratory ETH Zurich, 8092 Zurich
Fabian Kuhn , Microsoft Research Silicon Valley, Mountain View, CA
pp. 68

Scalable and Robust Aggregation Techniques for Extracting Statistical Information in Sensor Networks (Abstract)

Hongbo Jiang , Case Western Reserve University
Shudong Jin , Case Western Reserve University
pp. 69
Session 8B: Streaming

ASAP: an AS-Aware Peer-Relay Protocol for High Quality VoIP (Abstract)

Lei Guo , Ohio State University
Shansi Ren , Ohio State University
Xiaodong Zhang , Ohio State University
pp. 70

Adaptive Control of Extreme-scale Stream Processing Systems (Abstract)

Olivier Verscheure , IBM T. J. Watson Research Center, NY
Lisa Amini , IBM T. J. Watson Research Center, NY
Jeremy Silber , IBM T. J. Watson Research Center, NY
Anshul Sehgal , IBM T. J. Watson Research Center, NY
Navendu Jain , IBM T. J. Watson Research Center, NY
pp. 71

Greedy is Good: On Service Tree Placement for In-Network Stream Processing (Abstract)

Jie Liu , Microsoft Research Redmond, WA
Zoe Abrams , Stanford University, Stanford, CA
pp. 72
Session 8C: Network Characterization

A Hierarchical Approach to Internet Distance Prediction (Abstract)

Sonia Fahmy , Purdue University,West Lafayette, IN
Xiaojun Lin , Purdue University,West Lafayette, IN
Rongmei Zhang , Purdue University,West Lafayette, IN
Charlie Hu , Purdue University,West Lafayette, IN
pp. 73

Stable and Accurate Network Coordinates (Abstract)

Margo Seltzer , Harvard University, Cambridge, MA, USA
Jonathan Ledlie , Harvard University, Cambridge, MA, USA
Peter Pietzuch , Harvard University, Cambridge, MA, USA
pp. 74

Routing in Networks with Low Doubling Dimension (Abstract)

Ittai Abraham , Hebrew University of Jerusalem
Cyril Gavoille , University of Bordeaux, Bordeaux, France.
Andrew V. Goldberg , Microsoft Research - Silicon Valley
Dahlia Malkhi , Hebrew University of Jerusalem
pp. 75
Author Index

Author Index (PDF)

pp. 76
99 ms
(Ver )