| Taming the dynamics of distributed data | p. 1 |
| Data in your space | p. 2 |
| Enabling technologies for harnessing information explosion | p. 21 |
| Fair leader election by randomized voting | p. 22 |
| An efficient leader election algorithm for mobile ad hoc networks | p. 32 |
| Distributed balanced tables : a new approach | p. 42 |
| Performance evaluation of Gigabit Ethernet and SCI in a linux cluster | p. 50 |
| Performance evaluation of a modified-cyclic-banyan based ATM/IP switching fabric | p. 60 |
| A scalable and roboust QoS architecture for WiFi P2P networks | p. 65 |
| NEC : node energy based clustering protocol for wireless sensor networks with guaranteed connectivity | p. 75 |
| Energy efficient cache invalidation in a disconnected mobile environment | p. 85 |
| An efficient data dissemination schemes for location dependent information services | p. 96 |
| A publish/subscribe based architecture of an alert server to support prioritized and persistent alerts | p. 106 |
| A nested transaction model for LDAP transactions | p. 117 |
| Team transaction : a new transaction model for mobile ad hoc networks | p. 127 |
| An efficient protocol for checkpoint-based failure recovery in distributed systems | p. 135 |
| Cybersecurity : opportunities and challenges | p. 145 |
| Vulnerabilities and threats in distributed systems | p. 146 |
| A TNATS approach to hidden Web documents | p. 158 |
| Querying XML documents from a relational database in the presence of DTDs | p. 168 |
| SAQI : semantics aware query interface | p. 178 |
| Hybrid-chord : a peer-to-peer system based on chord | p. 194 |
| A generic and flexible model for replica consistency management | p. 204 |
| An efficient distributed scheme for source routing protocol in communication networks | p. 210 |
| The roles of ontology and metadata registry for interoperable databases | p. 217 |
| DHL : semantically rich dynamic and active hyperlinks | p. 227 |
| User-class based service acceptance policy using cluster analysis | p. 237 |
| Tools and techniques for multi-site software development | p. 243 |
| Specifying a mobile computing infrastructure and services | p. 244 |
| Generating a prototype from a UML model of system requirements | p. 255 |
| A type system for an aspect oriented programming language | p. 266 |
| Secure requirements elicitation through triggered message sequence charts | p. 273 |
| Framework for safe reuse of software binaries | p. 283 |
| Supporting partial component matching | p. 294 |
| A novel approach for dynamic slicing of distributed object-oriented programs | p. 304 |
| Pattern semantic link : a reusable pattern representation in MDA context | p. 310 |
| Compatibility test and adapter generation for interfaces of software components | p. 318 |
| A modern graphic flowchart layout tool | p. 329 |
| A flexible authorization framework for E-commerce | p. 336 |
| Efficient algorithms for intrusion detection | p. 346 |
| Proxy-annotated control flow graphs : deterministic context-sensitive monitoring for intrusion detection | p. 353 |
| Using schemas to simplify access control for XML documents | p. 363 |
| Automatic enforcement of access control policies among dynamic coalitions | p. 369 |
| Implementing consistency checking in correlating attacks | p. 379 |
| LSAD : lightweight SYN flooding attack detector | p. 385 |
| UGSP : secure key establishment protocol for ad-hoc network | p. 391 |
| Tracing attackers with deterministic edge router marking (DERM) | p. 400 |
| Distributing key updates in secure dynamic groups | p. 410 |
| Succinct and fast accessible data structures for database damage assessment | p. 420 |
| A secure checkpointing protocol for survivable server design | p. 430 |
| MobiCoin : digital cash for M-commerce | p. 441 |
| Cellular automata : an ideal candidate for a block cipher | p. 452 |
| NFD technique for efficient and secured information hiding in low resolution images | p. 458 |
| Improving feature selection in anomaly intrusion detection using specifications | p. 468 |
| Towards automatic learning of valid services for honeypots | p. 469 |
| Table of Contents provided by Blackwell. All Rights Reserved. |