Abstract is missing.
- Challenges in Personalizing and Decentralizing the Web: An Overview of GOSSPLEAnne-Marie Kermarrec. 1-16 [doi]
- Local Algorithms: Self-stabilization on SpeedChristoph Lenzen, Jukka Suomela, Roger Wattenhofer. 17-34 [doi]
- As Good as It Gets: Competitive Fault Tolerance in Network StructuresDavid Peleg. 35-46 [doi]
- Multicore Constraint-Based Automated StabilizationFuad Abujarad, Sandeep S. Kulkarni. 47-61 [doi]
- A Theory of Network TracingHrishikesh B. Acharya, Mohamed G. Gouda. 62-74 [doi]
- Developing Autonomic and Secure Virtual Organisations with Chemical ProgrammingAlvaro E. Arenas, Jean-Pierre Banâtre, Thierry Priol. 75-89 [doi]
- Making Population Protocols Self-stabilizingJoffroy Beauquier, Janna Burman, Shay Kutten. 90-104 [doi]
- Analysis of Wireless Sensor Network Protocols in Dynamic ScenariosCinzia Bernardeschi, Paolo Masci, Holger Pfeifer. 105-119 [doi]
- Consensus When All Processes May Be Byzantine for Some TimeMartin Biely, Martin Hutle. 120-132 [doi]
- A Superstabilizing log(::::n::::)-Approximation Algorithm for Dynamic Steiner TreesLélia Blin, Maria Gradinariu Potop-Butucaru, Stephane Rovedakis. 133-148 [doi]
- Looking for the Weakest Failure Detector for ::::k::::-Set Agreement in Message-Passing Systems: Is {/it /Pi}_k {/it /Pi}_k the End of the Road?François Bonnet, Michel Raynal. 149-164 [doi]
- Optimal Byzantine Resilient Convergence in Asynchronous Robots NetworksZohir Bouzid, Maria Gradinariu Potop-Butucaru, Sébastien Tixeuil. 165-179 [doi]
- FoG: Fighting the Achilles Heel of Gossip Protocols with Fountain CodesMary-Luc Champel, Anne-Marie Kermarrec, Nicolas Le Scouarnec. 180-194 [doi]
- How to Improve Snap-Stabilizing Point-to-Point Communication Space Complexity?Alain Cournier, Swan Dubois, Vincent Villain. 195-208 [doi]
- Fault-Containment in Weakly-Stabilizing SystemsAnurag Dasgupta, Sukumar Ghosh, Xin Xiao. 209-223 [doi]
- Stability of Distributed Algorithms in the Face of Incessant FaultsRobert E. Lee DeVille, Sayan Mitra. 224-237 [doi]
- Dependability Engineering of Silent Self-stabilizing SystemsAbhishek Dhama, Oliver E. Theel, Pepijn Crouzen, Holger Hermanns, Ralf Wimmer, Bernd Becker. 238-253 [doi]
- Robustness and Dependability of Self-Organizing Systems - A Safety Engineering PerspectiveGiovanna Di Marzo Serugendo. 254-268 [doi]
- Efficient Robust Storage Using Secret TokensDan Dobre, Matthias Majuntke, Marco Serafini, Neeraj Suri. 269-283 [doi]
- An Optimal Self-stabilizing Firing SquadDanny Dolev, Ezra N. Hoch, Yoram Moses. 284-296 [doi]
- Anonymous Transactions in Computer NetworksShlomi Dolev, Marina Kopeetsky. 297-310 [doi]
- Nash Equilibria in Stabilizing SystemsMohamed G. Gouda, Hrishikesh B. Acharya. 311-324 [doi]
- ACCADA: A Framework for Continuous Context-Aware Deployment and AdaptationNing Gui, Vincenzo De Florio, Hong Sun, Chris Blondia. 325-340 [doi]
- A Self-stabilizing Approximation Algorithm for Vertex Cover in Anonymous NetworksVolker Turau, Bernd Hauck. 341-353 [doi]
- Separation of Circulating TokensKajari Ghosh Dastidar, Ted Herman. 354-368 [doi]
- Visiting Gafni s Reduction Land: From the BG Simulation to the Extended BG SimulationDamien Imbs, Michel Raynal. 369-383 [doi]
- Randomized Gathering of Mobile Robots with Local-Multiplicity DetectionTaisuke Izumi, Tomoko Izumi, Sayaka Kamei, Fukuhito Ooshita. 384-398 [doi]
- Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security ThreatMárk Jelasity, Vilmos Bilicki. 399-412 [doi]
- CFlood: A Constrained Flooding Protocol for Real-time Data Delivery in Wireless Sensor NetworksBo Jiang, Binoy Ravindran, Hyeonjoong Cho. 413-427 [doi]
- Cached Sensornet Transformation of Non-silent Self-stabilizing Algorithms with Unreliable LinksHirotsugu Kakugawa, Yukiko Yamauchi, Sayaka Kamei, Toshimitsu Masuzawa. 428-442 [doi]
- Analysis of an Intentional Fault Which Is Undetectable by Local Checks under an Unfair SchedulerJun Kiniwa, Kensaku Kikuta. 443-457 [doi]
- Exploring Polygonal Environments by Simple Robots with Faulty Combinatorial VisionAnvesh Komuravelli, Matús Mihalák. 458-471 [doi]
- Finding Good Partners in Availability-Aware P2P NetworksStevens Le-Blond, Fabrice Le Fessant, Erwan Le Merrer. 472-484 [doi]
- Churn-Resilient Replication Strategy for Peer-to-Peer Distributed Hash-TablesSergey Legtchenko, Sébastien Monnet, Pierre Sens, Gilles Muller. 485-499 [doi]
- Distributed Power Control with Multiple Agents in a Distributed Base Station Scheme Using MacrodiversityPhilippe Leroux, Sébastien Roy 0002. 500-514 [doi]
- Redundancy Maintenance and Garbage Collection Strategies in Peer-to-Peer Storage SystemsXin Liu, Anwitaman Datta. 515-530 [doi]
- Model Checking Coalition Nash Equilibria in MAD Distributed SystemsFederico Mari, Igor Melatti, Ivano Salvo, Enrico Tronci, Lorenzo Alvisi, Allen Clement, Harry C. Li. 531-546 [doi]
- OpenMP Support for NBTI-Induced Aging Tolerance in MPSoCsAndrea Marongiu, Andrea Acquaviva, Luca Benini. 547-562 [doi]
- A Self-stabilizing Algorithm for Graph Searching in TreesRodica Mihai, Morten Mjelde. 563-577 [doi]
- A Metastability-Free Multi-synchronous Communication Scheme for SoCsThomas Polzer, Thomas Handl, Andreas Steininger. 578-592 [doi]
- From Local Impact Functions to Global Adaptation of Service CompositionsLiliana Rosa, LuÃs Rodrigues, Antónia Lopes, Matti A. Hiltunen, Richard D. Schlichting. 593-608 [doi]
- A Wireless Security Framework without Shared SecretsLifeng Sang, Anish Arora. 609-623 [doi]
- Read-Write-Codes: An Erasure Resilient Encoding System for Flexible Reading and Writing in Storage NetworksMario Mense, Christian Schindelhauer. 624-639 [doi]
- Distributed Sleep Scheduling in Wireless Sensor Networks via Fractional Domatic PartitioningAndré Schumacher, Harri Haanpää. 640-654 [doi]
- Network-Friendly GossipingSabina Serbu, Etienne Riviere, Pascal Felber. 655-669 [doi]
- Black Hole Search with Tokens in Interconnected NetworksWei Shi. 670-682 [doi]
- Oracle-Based Flocking of Mobile Robots in Crash-Recovery ModelSamia Souissi, Taisuke Izumi, Koichi Wada. 683-697 [doi]
- Speculation for Parallelizing Runtime ChecksMartin Süßkraut, Stefan Weigert, Ute Schiffel, Thomas Knauth, Martin Nowack, Diogo Becker de Brum, Christof Fetzer. 698-710 [doi]
- Optimistic Fair Exchange Using Trusted DevicesMohammad Torabi Dashti. 711-725 [doi]
- Application Data Consistency Checking for Anomaly Based Intrusion DetectionOlivier Sarrouy, Eric Totel, Bernard Jouga. 726-740 [doi]
- Self Adaptive High Interaction Honeypots Driven by Game TheoryGérard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel. 741-755 [doi]
- Cooperative Autonomic Management in Dynamic Distributed SystemsJing Xu, Ming Zhao 0002, José A. B. Fortes. 756-770 [doi]
- Brief Announcement: Consistent Fixed Points and Negative GainHrishikesh B. Acharya, Ehab S. Elmallah, Mohamed G. Gouda. 771-772 [doi]
- Brief Announcement: Induced Churn to Face Adversarial Behavior in Peer-to-Peer SystemsEmmanuelle Anceaume, Francisco Vilar Brasileiro, Romaric Ludinard, Bruno Sericola, Frederic Tronel. 773-774 [doi]
- Safer Than Safe: On the Initial State of Self-stabilizing SystemsSylvie Delaët, Shlomi Dolev, Olivier Peres. 775-776 [doi]
- Brief Announcement: Unique Permutation HashingShlomi Dolev, Limor Lahiani, Yinnon A. Haviv. 777-778 [doi]
- Randomization Adaptive Self-stabilizationShlomi Dolev, Nir Tzachar. 779-780 [doi]
- Brief Announcement: On the Time Complexity of Distributed Topological Self-stabilizationDominik Gall, Riko Jacob, Andréa W. Richa, Christian Scheideler, Stefan Schmid, Hanjo Täubig. 781-782 [doi]
- Brief Announcement: An OS Architecture for Device Self-protectionRuan He, Marc Lacoste, Jean Leneutre. 783-784 [doi]
- Brief Announcement: Towards Secure Cloud ComputingChristian Henrich, Matthias Huber, Carmen Kempka, Jörn Müller-Quade, Mario Strefler. 785-786 [doi]
- Brief Announcement: Robust Self-stabilizing Construction of Bounded Size Weight-Based ClustersColette Johnen, Fouzi Mekhaldi. 787-788 [doi]
- Brief Announcement: A Stabilizing Algorithm for Finding Two Disjoint Paths in Arbitrary NetworksMehmet Hakan Karaata, Rachid Hadid. 789-790 [doi]
- Relocation Analysis of Stabilizing MACPierre Leone, Marina Papatriantafilou, Elad Michael Schiller. 791-792 [doi]
- Brief Announcement: A Simple and Quiescent Omega Algorithm in the Crash-Recovery ModelCristian MartÃn, Mikel Larrea. 793-794 [doi]
- Brief Announcement: How to Overcome the Limits of BoundsOlivier Peres. 795-796 [doi]
- Brief Announcement: The Design and Evaluation of a Distributed Reliable File SystemDalibor Peric, Thomas Bocek, Fabio Victora Hecht, David Hausheer, Burkhard Stiller. 797-798 [doi]