LEADER 07618nam 22008775 450 001 9910484732003321 005 20251226195350.0 010 $a1-280-93575-8 010 $a9786610935758 010 $a3-540-49823-0 024 7 $a10.1007/978-3-540-49823-0 035 $a(CKB)1000000000478527 035 $a(EBL)3061552 035 $a(SSID)ssj0000250375 035 $a(PQKBManifestationID)11238692 035 $a(PQKBTitleCode)TC0000250375 035 $a(PQKBWorkID)10231792 035 $a(PQKB)10786889 035 $a(DE-He213)978-3-540-49823-0 035 $a(MiAaPQ)EBC3061552 035 $a(MiAaPQ)EBC6711195 035 $a(Au-PeEL)EBL6711195 035 $a(OCoLC)262693921 035 $a(PPN)123139627 035 $a(EXLCZ)991000000000478527 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aStabilization, Safety, and Security of Distributed Systems $e8th International Symposium, SSS 2006, Dallas, TX, USA, November 17-19, 2006, Proceedings /$fedited by Ajoy K. Datta, Maria Gradinariu 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (604 p.) 225 1 $aTheoretical Computer Science and General Issues,$x2512-2029 ;$v4280 300 $aDescription based upon print version of record. 311 08$a3-540-49018-3 320 $aIncludes bibliographical references and index. 327 $aInvited Talks -- Stabilization Enabling Technology -- A General Characterization of Indulgence -- Regular Papers -- Coverage, Connectivity, and Fault Tolerance Measures of Wireless Sensor Networks -- A Case Study on Prototyping Power Management Protocols for Sensor Networks -- Unconscious Eventual Consistency with Gossips -- All k-Bounded Policies Are Equivalent for Self-stabilization -- A 1-Strong Self-stabilizing Transformer -- Optimal Message-Driven Implementation of Omega with Mute Processes -- Incremental Synthesis of Fault-Tolerant Real-Time Programs -- Toward a Time-Optimal Odd Phase Clock Unison in Trees -- Recovery Oriented Programming -- Evaluation of a Tracking Architecture in Wireless Sensor Networks -- Self-protection for Distributed Component-Based Applications -- From Self- to Snap- Stabilization -- Self-stabilizing Philosophers with Generic Conflicts -- Selfish Stabilization -- Reliability and Availability Analysis of Self-stabilizing Systems -- Circle Formation of Weak Mobile Robots -- Self-stabilizing Device Drivers -- Secure Communication for RFIDs Proactive Information Security Within Computational Security -- Fault Masking in Tri-redundant Systems -- Logarithmic Keying of Communication Networks -- Safe Peer-to-Peer Self-downloading -- Best Paper: Stabilizing Clock Synchronization for Wireless Sensor Networks -- Self-stabilizing Byzantine Digital Clock Synchronization -- Distributed Edge Coloration for Bipartite Networks -- A Dependable Intrusion Detection Architecture Based on Agreement Services -- Stabilizing Health Monitoring for Wireless Sensor Networks -- A Byzantine-Fault Tolerant Self-stabilizing Protocol for Distributed Clock Synchronization Systems -- A Memory Efficient Self-stabilizing Algorithm for Maximal k-Packing -- Bounding the Impact of Unbounded Attacks in Stabilization -- On Bootstrapping Topology Knowledge in Anonymous Networks -- Self-adaptive Disk Arrays -- Using Eventually Consistent Compasses to Gather Oblivious Mobile Robots with Limited Visibility -- Self-stabilizing Asynchronous Phase Synchronization in General Graphs -- Composition of Fault-Containing Protocols Based on Recovery Waiting Fault-Containing Composition Framework -- Energy-Efficient and Non-interactive Self-certification in MANETs -- Self-adaptive Worms and Countermeasures -- Brief Announcement -- Brief Announcement: Self-healing Algorithms for Reconfigurable Networks -- Brief Announcement: Distributed Synthesis of Fault-Tolerance -- Brief Announcement: Exploration and Mitigation of Deafness Problems in Directional Antennas Based Wireless Ad-Hoc Networks -- Brief Announcement: A Synthetic Public Key Management Scheme for Large-Scale MANET -- Brief Announcement: Termination Detection in an Asynchronous Distributed System with Crash-Recovery Failures -- Brief Announcement: Self-stabilizing Spanning Tree Algorithm for Large Scale Systems -- Brief Announcement: Chasing the Weakest System Model for Implementing and Consensus -- Brief Announcement: Wait-Free Dining for Eventual Weak Exclusion -- Brief Announcement: An Efficient and Self-stabilizing Link Formation Algorithm -- Brief Announcement: Analyzing the Interactions of Self-propagating Codes in Multi-hop Networks -- Brief Announcement: Towards Modular Verification of Stabilisation in Self-adaptive Embedded Systems -- Brief Announcement: An Adaptive Randomised Searching Protocol in Peer-to-Peer Systems Based on Probabilistic Weak Quorum System. 330 $aThis symposium has been the main forum for presentation of research results in the area of self-* for 17 years. It started as The Workshop on Self-Stabilizing Systems (WSS), and met in 1989 in Austin, 1995 in Las Vegas, 1997 in Santa Barbara, 1999 in Austin, and 2001 in Lisbon. It was then renamed The S- posium on Self-Stabilizing Systems (SSS), and has since met in 2003 in San Francisco, and in 2005 in Barcelona, Spain. This year,we extended the scope of the symposium to cover all safety and - curity related aspects of self-* systems. The title of the symposium was changed to the International Symposium on Stabilization, Safety, and Security of D- tributed Systems (SSS) to re?ect this expansion. The decision by Mohamed Gouda, the General Chair, to expand the scope of the symposium was timely and successful. From 33 papers submitted for SSS 2005, the number of submissions increased to 155. Reviewing this surge of s- missions to select the ?nal set of papers for the symposium was a monumental taskfor the ProgramCommittee. The 61 ProgramCommittee membersdevoted countless hours reading and evaluating the papers. But even this e?ort was not enough; we recruited 143 external reviewers, whose work was also very subst- tial. 410 0$aTheoretical Computer Science and General Issues,$x2512-2029 ;$v4280 606 $aArtificial intelligence 606 $aComputer networks 606 $aComputers, Special purpose 606 $aComputer science 606 $aAlgorithms 606 $aElectronic data processing$xManagement 606 $aArtificial Intelligence 606 $aComputer Communication Networks 606 $aSpecial Purpose and Application-Based Systems 606 $aTheory of Computation 606 $aAlgorithms 606 $aIT Operations 615 0$aArtificial intelligence. 615 0$aComputer networks. 615 0$aComputers, Special purpose. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aElectronic data processing$xManagement. 615 14$aArtificial Intelligence. 615 24$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aTheory of Computation. 615 24$aAlgorithms. 615 24$aIT Operations. 676 $a006.3 702 $aDatta$b Ajoy K.$f1958- 702 $aGradinariu$b Maria 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484732003321 996 $aStabilization, Safety, and Security of Distributed Systems$9772094 997 $aUNINA