| 2009 | 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), Niagara Falls, New York, USA, September 27-30, 2009 |
| 2009 | A Framework for Distributed Monitoring and Root Cause Analysis for Large IP Networks. Dipyaman Banerjee, Venkateshwara Madduri, Mudhakar Srivatsa |
| 2009 | A Holistic Solution to Pursuer-Evader Tracking in Sensor Networks. Xuming Lu, Murat Demirbas, Chunming Qiao |
| 2009 | A Partition-Tolerant Manycast Algorithm for Disaster Area Networks. Mikael Asplund, Simin Nadjm-Tehrani |
| 2009 | A Self-Stabilizing O(n)-Round k-Clustering Algorithm. Ajoy Kumar Datta, Stéphane Devismes, Lawrence L. Larmore |
| 2009 | Assessment and Improvement of Hang Detection in the Linux Operating System. Domenico Cotroneo, Roberto Natella, Stefano Russo |
| 2009 | Co-scheduling of Disk Head Time in Cluster-Based Storage. Matthew Wachs, Gregory R. Ganger |
| 2009 | Communication-Based Prevention of Non-P-Pattern. Yiwei Ci, Zhan Zhang, De-Cheng Zuo, Zhibo Wu, Xiao-Zong Yang |
| 2009 | Constraint Based Automated Synthesis of Nonmasking and Stabilizing Fault-Tolerance. Fuad Abujarad, Sandeep S. Kulkarni |
| 2009 | DToken: A Lightweight and Traceable Delegation Architecture for Distributed Systems. Erica Y. Yang, Brian Matthews |
| 2009 | Designing System-Level Defenses against Cellphone Malware. Liang Xie, Xinwen Zhang, Ashwin Chaugule, Trent Jaeger, Sencun Zhu |
| 2009 | Fault Localization for Firewall Policies. Jeehyun Hwang, Tao Xie, Fei Chen, Alex X. Liu |
| 2009 | Genuine versus Non-Genuine Atomic Multicast Protocols for Wide Area Networks: An Empirical Study. Nicolas Schiper, Pierre Sutra, Fernando Pedone |
| 2009 | Location-Aware Cache-Coherence Protocols for Distributed Transactional Contention Management in Metric-Space Networks. Bo Zhang, Binoy Ravindran |
| 2009 | Model-Based Validation for Internet Services. Andrew Tjang, Fábio Oliveira, Ricardo Bianchini, Richard P. Martin, Thu D. Nguyen |
| 2009 | Multithreading-Enabled Active Replication for Event Stream Processing Operators. Andrey Brito, Christof Fetzer, Pascal Felber |
| 2009 | On Consistent Neighborhood Views in Wireless Sensor Networks. Arshad Jhumka, Luca Mottola |
| 2009 | On the Cost of Database Clusters Reconfiguration. Ricardo Manuel Pereira Vilaça, José Pereira, Rui Carlos Oliveira, José Enrique Armendáriz-Iñigo, José Ramón González de Mendívil |
| 2009 | PEQ: A Privacy-Preserving Scheme for Exact Query Evaluation in Distributed Sensor Data Networks. Hai Trong Vu, Thuc D. Nguyen, Neeraj Mittal, S. Venkatesan |
| 2009 | Performance Evaluation of a Metaprotocol for Database Replication Adaptability. María Idoia Ruiz-Fuertes, Francesc D. Muñoz-Escoí |
| 2009 | PolyVaccine: Protecting Web Servers against Zero-Day, Polymorphic and Metamorphic Exploits. Luis Campo-Giralte, Ricardo Jiménez-Peris, Marta Patiño-Martínez |
| 2009 | Relaxed Atomic Broadcast: State-Machine Replication Using Bounded Memory. Omid Shahmirzadi, Sergio Mena, André Schiper |
| 2009 | Reliable and Highly Available Distributed Publish/Subscribe Service. Reza Sherafat Kazemzadeh, Hans-Arno Jacobsen |
| 2009 | Resource-Aware Migratory Services in Wide-Area Shared Computing Environments. Anand Tripathi, Vinit Padhye, Devdatta Kulkarni |
| 2009 | Spin One's Wheels? Byzantine Fault Tolerance with a Spinning Primary. Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung |
| 2009 | TASK: Template-Based Key Assignment for Confidential Communication in Wireless Networks. Ramon Novales, Neeraj Mittal |
| 2009 | The Blocking Option in Routing Protocols. Yan Li, Mohamed G. Gouda |
| 2009 | The Effects of Threading, Infection Time, and Multiple-Attacker Collaboration on Malware Propagation. Yu Zhang, Bharat K. Bhargava, Philipp Hurni |
| 2009 | When and How to Change Quorums on Wide Area Networks. Michael G. Merideth, Florian Oprea, Michael K. Reiter |
| 2009 | X-BOT: A Protocol for Resilient Optimization of Unstructured Overlays. Joao Carlos Antunes Leitao, João Pedro Marques, José Orlando Roque Nascimento Pereira, Luis Eduardo Teixeira Rodrigues |
| 2009 | ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Sensor Networks Using Sequential Analysis. Jun-Won Ho, Matthew K. Wright, Sajal K. Das |