The Community for Technology Leaders
Reliable Distributed Systems, IEEE Symposium on (2003)
Florence, Italy
Oct. 6, 2003 to Oct. 8, 2003
ISSN: 1060-9857
ISBN: 0-7695-1955-5
TABLE OF CONTENTS
Introduction
Session 2: Dependable Multicasting

Reliably Networking a Multicast Repository (Abstract)

Hector Garcia-Molina , Stanford University
Wang Lam , Stanford University
pp. 5

NEEM: Network-Friendly Epidemic Multicast (Abstract)

A.-M. Kermarrec , Microsoft Research
M. J. Monteiro , U. de Lisboa
J. Pereira , U. do Minho
R. Oliveira , U. do Minho
L. Rodrigues , U. de Lisboa
pp. 15

Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint (Abstract)

Deepayan Chakrabarti , Carnegie Mellon University
Yang Wang , Carnegie Mellon University
Christos Faloutsos , Carnegie Mellon University
Chenxi Wang , Carnegie Mellon University
pp. 25

Group Communication Protocols under Errors (Abstract)

Long Wang , University of Illinois at Urbana-Champaign
Zbigniew Kalbarczyk , University of Illinois at Urbana-Champaign
Ravi Iyer , University of Illinois at Urbana-Champaign
Claudio Basile , University of Illinois at Urbana-Champaign
pp. 35
Session 3: Peer-to-Peer and Beyond

Reliable Peer-to-Peer Information Monitoring through Replication (Abstract)

Ling Liu , Georgia Institute of Technology
Buğra Gedik , Georgia Institute of Technology
pp. 56

Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems (Abstract)

Altair Olivo Santin , Federal University of Santa Catarina and Pontifical Catholic University of Paran?
Joni da Silva Fraga , Federal University of Santa Catarina
Frank Siqueira , Federal University of Santa Catarina
Emerson R. de Mello , Federal University of Santa Catarina
pp. 66
Session 4: Replication

Component Replication in Distributed Systems: A Case Study Using Enterprise Java Beans (Abstract)

Graham Morgan , Newcastle University
Achmad I. Kistijantoro , Newcastle University
Mark C. Little , Arjuna Technologies Ltd.
Santosh K. Shrivastava , Newcastle University
pp. 89

Performance Virtualization for Large-Scale Storage Systems (Abstract)

Tzongyu P. Lee , IBM Almaden Research Center
Prashant Pandey , IBM Almaden Research Center
Jian Xu , IBM Almaden Research Center
Divyesh Jadav , IBM Almaden Research Center
Guillermo A. Alvarez , IBM Almaden Research Center
David D. Chambliss , IBM Almaden Research Center
Ram Menon , IBM Almaden Research Center
pp. 109

Preventing Orphan Requests in the Context of Replicated Invocation (Abstract)

André Schiper , Swiss Federal Institute of Technology
Stefan Pleisch , Swiss Federal Institute of Technology
Arnas Kupsys , Swiss Federal Institute of Technology
pp. 119
Session 5: Checkpointing

Performance and Effectiveness Analysis of Checkpointing in Mobile Environments (Abstract)

Xinyu Chen , Chinese University of Hong Kong
Michael R. Lyu , Chinese University of Hong Kong
pp. 131

Raptor: Integrating Checkpoints and Thread Migration for Cluster Management (Abstract)

John K. Bennett , University of Colorado
Evan Speight , Cornell University
Hazim Shafi , IBM Research
pp. 141
Session 6: Invited Address
Session 7: Making Services Robust

Easy: Engineering High Availability QoS in wServices (Abstract)

Eliezer Dekel , IBM Research Laboratory in Haifa
Oleg Frenkel , IBM Research Laboratory in Haifa
Yosef Moatti , IBM Research Laboratory in Haifa
Gera Goft , IBM Research Laboratory in Haifa
pp. 157

Coordinated Forward Error Recovery for CompositeWeb Services (Abstract)

A. Romanovsky , University of Newcastle upon Tyne
F. Tartanoglu , INRIA Rocquencourt
N. Levy , Université de Versailles Saint-Quentin
V. Issarny , INRIA Rocquencourt
pp. 167
Session 8: Frameworks and Protocols

Appia vs. Cactus: Comparing Protocol Composition Frameworks (Abstract)

Christophe Grégoire , University of Namur
André Schiper , Ecole Polytechnique Fédérale de Lausanne
Xavier Cuvellier , University of Namur
Sergio Mena , Ecole Polytechnique Fédérale de Lausanne
pp. 189

A Systematic Approach to the Development of Event Based Applications (Abstract)

Harald Gall , Technical University of Vienna
Mehdi Jazayeri , Technical University of Vienna
Pascal Fenkam , Technical University of Vienna
pp. 199

TCP-Friendly Many-to-Many End-to-End Congestion Control (Abstract)

Innocenty Sukhov , Hebrew University of Jerusalem
Ilya Shnayderman , Hebrew University of Jerusalem
Tal Anker , Hebrew University of Jerusalem
Danny Dolev , Hebrew University of Jerusalem
pp. 209

A Reconfigurable Byzantine Quorum Approach for the Agile Store (Abstract)

Douglas M. Blough , Georgia Institute of Technology
Mustaque Ahamad , Georgia Institute of Technology
Lei Kong , Georgia Institute of Technology
Arun Subbiah , Georgia Institute of Technology
pp. 219
Session 9: Security

A Reliable Key Authentication Schema for Secure Multicast Communications (Abstract)

Roberto Di Pietro , Università di Roma "La Sapienza"
Luigi V. Mancini , Università di Roma "La Sapienza"
Antonio Durante , Università di Roma "La Sapienza"
pp. 231

Pesto Flavoured Security (Abstract)

Tage Stabell-Kul? , University of Troms?
Feike W. Dillema , University of Troms?
pp. 241

SNARE: A Strong Security Scheme for Network-Attached Storage (Abstract)

Yiming Hu , University of Cincinnati
Yingwu Zhu , University of Cincinnati
pp. 250

Transparent Runtime Randomization for Security (Abstract)

Zbigniew Kalbarczyk , University of Illinois at Urbana-Champaign
Ravishankar K. Iyer , University of Illinois at Urbana-Champaign
Jun Xu , University of Illinois at Urbana-Champaign
pp. 260
Session 10: Experimental Evaluation

An Experimental Evaluation of Correlated Network Partitions in the Coda Distributed File System (Abstract)

Ryan M. Lefever , University of Illinois at Urbana-Champaign
William H. Sanders , University of Illinois at Urbana-Champaign
Michel Cukier , University of Maryland at College Park
pp. 273

Hazard Analysis of Complex Distributed Railway Systems (Abstract)

Rosaria Esposito , Ansaldo Segnalamento Ferroviario S.p.A.
Pietro Marmo , Ansaldo Segnalamento Ferroviario S.p.A.
Antonio Orazzo , Ansaldo Segnalamento Ferroviario S.p.A.
Pasquale di Tommaso , Ansaldo Segnalamento Ferroviario S.p.A.
pp. 283

Assessing the Dependability of OGSA Middleware by Fault Injection (Abstract)

Jie Xu , University of Durham
Nik Looker , University of Durham
pp. 293

Improving the Multiple Errors Detection Coverage in Distributed Embedded Systems (Abstract)

Pedro J. Gil , Polytechnic University of Valencia
Sara Blanc , Polytechnic University of Valencia
pp. 303
Session 11: Panel
Session 12: System Engineering

Transparent Fault-Tolerant Java Virtual Machine (Abstract)

Roy Friedman , Technion - Israel Institute of Technology
Alon Kama , Technion - Israel Institute of Technology
pp. 319

Fault Tolerance Technology for Autonomous Decentralized Database Systems (Abstract)

Dake Wang , Tokyo Institute of Technology
Carlos Perez Leguizamo , Tokyo Institute of Technology
Kinji Mori , Tokyo Institute of Technology
pp. 329

The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure (Abstract)

Michael K. Reiter , Carnegie Mellon University
Asad Samar , Carnegie Mellon University
Chenxi Wang , Carnegie Mellon University
pp. 339
Session 13: Coping with Failure Models

Randomized Asynchronous Consensus with Imperfect Communications (Abstract)

Christof Fetzer , AT&T Labs-Research
Ulrich Schmid , Technische Universität Wien
pp. 361

Modeling and Detecting Failures in Next-generation Distributed Multimedia Applications (Abstract)

D. Cotroneo , Università di Napoli "Federico II" and Consorzio Interuniversitario Nazionale per léInformatica
S. Russo , Università di Napoli "Federico II"
G. Paolillo , Consorzio Interuniversitario Nazionale per l?Informatica
C. di Flora , Università di Napoli "Federico II"
pp. 379
Author Index

Author Index (PDF)

pp. 389
87 ms
(Ver 3.3 (11022016))