The SCEAS System
Navigation Menu

Conferences in DBLP

Dependable Systems and Networks (dsn)
2004 (conf/dsn/2004)

  1. Leslie Lamport
    Recent Discoveries from Paxos. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:3- [Conf]
  2. Miguel Castro, Manuel Costa, Antony I. T. Rowstron
    Performance and Dependability of Structured Peer-to-Peer Overlays. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:9-18 [Conf]
  3. Alberto Montresor, Márk Jelasity, Özalp Babaoglu
    Robust Aggregation Protocols for Large-Scale Overlay Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:19-28 [Conf]
  4. Junghee Han, Farnam Jahanian
    Impact of Path Diversity on Multi-homed and Overlay Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:29-0 [Conf]
  5. Christopher LaFrieda, Rajit Manohar
    Fault Detection and Isolation Techniques for Quasi Delay-Insensitive Circuits. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:41-50 [Conf]
  6. Fred A. Bower, Paul G. Shealy, Sule Ozev, Daniel J. Sorin
    Tolerating Hard Faults in Microprocessor Array Structures. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:51-60 [Conf]
  7. Nicholas J. Wang, Justin Quek, Todd M. Rafacz, Sanjay J. Patel
    Characterizing the Effects of Transient Faults on a High-Performance Processor Pipeline. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:61-0 [Conf]
  8. Cynthia Wong, Chenxi Wang, Dawn Xiaodong Song, Stan Bielski, Gregory R. Ganger
    Dynamic Quarantine of Internet Worms. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:73-82 [Conf]
  9. Hao Yang, Haiyun Luo, Yi Yang, Songwu Lu, Lixia Zhang
    HOURS: Achieving DoS Resilience in an Open Service Hierarchy. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:83-92 [Conf]
  10. Mark G. Karpovsky, Konrad J. Kulikowski, Alexander Taubin
    Robust Protection against Fault-Injection Attacks on Smart Cards Implementing the Advanced Encryption Standard. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:93-101 [Conf]
  11. Kevin S. Killourhy, Roy A. Maxion, Kymie M. C. Tan
    A Defense-Centric Taxonomy Based on Attack Manifestations. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:102-0 [Conf]
  12. James S. Plank, Michael G. Thomason
    A Practical Analysis of Low-Density Parity-Check Erasure Codes for Wide-Area Storage Applications. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:115-124 [Conf]
  13. Svend Frølund, Arif Merchant, Yasushi Saito, Susan Spence, Alistair C. Veitch
    A Decentralized Algorithm for Erasure-Coded Virtual Disks. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:125-134 [Conf]
  14. Garth R. Goodson, Jay J. Wylie, Gregory R. Ganger, Michael K. Reiter
    Efficient Byzantine-Tolerant Erasure-Coded Storage. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:135-144 [Conf]
  15. Philip Koopman, Tridib Chakravarty
    Cyclic Redundancy Code (CRC) Polynomial Selection For Embedded Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:145-0 [Conf]
  16. P. Oscar Boykin, Vwani P. Roychowdhury, Tal Mor, Farrokh Vatan
    Fault Tolerant Computation on Ensemble Quantum Computers. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:157-166 [Conf]
  17. A. J. KleinOsowski, Kevin KleinOsowski, Vijay Rangarajan, Priyadarshini Ranganath, David J. Lilja
    The Recursive NanoBox Processor Grid: A Reliable System Architecture for Unreliable Nanotechnology Devices. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:167-176 [Conf]
  18. Jayanth Srinivasan, Sarita V. Adve, Pradip Bose, Jude A. Rivers
    The Impact of Technology Scaling on Lifetime Reliability. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:177-0 [Conf]
  19. Wilfried Steiner, John M. Rushby, Maria Sorea, Holger Pfeifer
    Model Checking a Fault-Tolerant Startup Algorithm: From Design Exploration To Exhaustive Fault Simulation. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:189-198 [Conf]
  20. Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, D. T. Lee, Sy-Yen Kuo
    Verifying Web Applications Using Bounded Model Checking. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:199-208 [Conf]
  21. Sandeep S. Kulkarni, Ali Ebnenasir
    Automated Synthesis of Multitolerance. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:209-0 [Conf]
  22. Gal Badishi, Idit Keidar, Amir Sasson
    Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:223-232 [Conf]
  23. Sébastien Baehni, Patrick Th. Eugster, Rachid Guerraoui
    Data-Aware Multicast. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:233-242 [Conf]
  24. Taisuke Izumi, Akinori Saitoh, Toshimitsu Masuzawa
    Timed Uniform Consensus Resilient to Crash and Timing Faults. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:243-252 [Conf]
  25. Carolos Livadas, Idit Keidar
    Caching-Enhanced Scalable Reliable Multicast. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:253-0 [Conf]
  26. Peter T. Popov, Bev Littlewood
    The Effect of Testing on Reliability of Fault-Tolerant Software. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:265-274 [Conf]
  27. Elizabeth Latronico, Paul S. Miner, Philip Koopman
    Quantifying the Reliability of Proven SPIDER Group Membership Service Guarantees. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:275-284 [Conf]
  28. João Durães, Henrique Madeira
    Generic Faultloads Based on Software Faults for Dependability Benchmarking. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:285-294 [Conf]
  29. Charles P. Shelton, Philip Koopman
    Improving System Dependability with Functional Alternatives. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:295-0 [Conf]
  30. Leslie Lamport, Mike Massa
    Cheap Paxos. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:307-314 [Conf]
  31. Kishori M. Konwar, Dariusz R. Kowalski, Alexander A. Shvartsman
    The Join Problem in Dynamic Network Algorithms. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:315-324 [Conf]
  32. Jean-Philippe Martin, Lorenzo Alvisi
    A Framework for Dynamic Byzantine Storage. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:325-334 [Conf]
  33. Jennifer Ren, Rick Buskens, Oscar J. Gonzalez
    Dependable Initialization of Large-Scale Distributed Software. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:335-0 [Conf]
  34. Ismail Assayad, Alain Girault, Hamoudi Kalla
    A Bi-Criteria Scheduling Heuristic for Distributed Embedded Systems under Reliability and Real-Time Constraints. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:347-356 [Conf]
  35. Soila M. Pertet, Priya Narasimhan
    Proactive Recovery in Distributed CORBA Applications. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:357-366 [Conf]
  36. Elisabeth A. Strunk, John C. Knight
    Assured Reconfiguration of Embedded Real-Time Software. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:367-376 [Conf]
  37. Jennifer Morris, Daniel Kroening, Philip Koopman
    Fault Tolerance Tradeoffs in Moving from Decentralized to Centralized Embedded Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:377-0 [Conf]
  38. Ilir Gashi, Peter T. Popov, Lorenzo Strigini
    Fault Diversity among Off-The-Shelf SQL Database Servers. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:389-398 [Conf]
  39. Lan Guo, Supratik Mukhopadhyay, Bojan Cukic
    Does Your Result Checker Really Check? [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:399-404 [Conf]
  40. Aaron B. Brown, Leonard Chung, William Kakes, Calvin Ling, David A. Patterson
    Experience with Evaluating Human-Assisted Recovery Processes. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:405-410 [Conf]
  41. G. John Janakiraman, Jose Renato Santos, Yoshio Turner
    Automated System Design for Availability. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:411-0 [Conf]
  42. Christian Cachin, Asad Samar
    Secure Distributed DNS. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:423-432 [Conf]
  43. Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Singh, Timothy K. Tsai
    SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:433-442 [Conf]
  44. Alexey Smirnov, Tzi-cker Chiueh
    A Portable Implementation Framework for Intrusion-Resilient Database Management Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:443-452 [Conf]
  45. Robert J. Stroud, Ian S. Welch, John P. Warne, Peter Y. A. Ryan
    A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:453-0 [Conf]
  46. Lan Wang, Daniel Massey, Keyur Patel, Lixia Zhang
    FRTR: A Scalable Mechanism for Global Routing Table Consistency. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:465-474 [Conf]
  47. Srinivasan Ramasubramanian
    On Failure Dependent Protection in Optical Grooming Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:475-484 [Conf]
  48. Christie Bolton, Gavin Lowe
    Analyses of the Reverse Path Forwarding Routing Algorithm. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:485-494 [Conf]
  49. Elias Procópio Duarte Jr., Rogério Santini, Jaime Cohen
    Delivering Packets During The Routing Convergence Latency Interval Through Highly Connected Detours. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:495-0 [Conf]
  50. Benoît Garbinato, Fernando Pedone, Rodrigo Schmidt
    An Adaptive Algorithm for Efficient Message Diffusion in Unreliable Environments. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:507-516 [Conf]
  51. Jonathan C. Rowanhill, Philip E. Varner, John C. Knight
    Efficient Hierarchic Management For Reconfiguration of Networked Information Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:517-526 [Conf]
  52. Subramanian Lakshmanan, Deepak J. Manohar, Mustaque Ahamad, H. Venkateswaran
    Collective Endorsement and the Dissemination Problem in Malicious Environments. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:527-536 [Conf]
  53. Jyh-How Huang, Shivakant Mishra
    Support for Mobility and Fault Tolerance in Mykil. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:537-0 [Conf]
  54. Taha Bennani, Laurent Blain, Ludovic Courtès, Jean-Charles Fabre, Marc-Olivier Killijian, Eric Marsden, François Taïani
    Implementing Simple Replication Protocols using CORBA Portable Interceptors and Java Serialization. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:549-554 [Conf]
  55. Enrique Hernández-Orallo, Joan Vila i Carbó
    In Advance Activation of Backup Channels for Real-Time Transmission. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:555-560 [Conf]
  56. Archana Ganapathi, Yi-Min Wang, Ni Lao, Ji-Rong Wen
    Why PCs Are Fragile and What We Can Do About It: A Study of Windows Registry Problems. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:561-566 [Conf]
  57. Pedro Martins, Paulo Jorge Paiva de Sousa, Antonio Casimiro, Paulo Veríssimo
    Dependable Adaptive Real-Time Applications in Wormhole-based Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:567-0 [Conf]
  58. Ramakrishna Kotla, Michael Dahlin
    High Throughput Byzantine Fault Tolerance. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:575-584 [Conf]
  59. Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Jun Xu
    An Architectural Framework for Providing Reliability and Security Support. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:585-594 [Conf]
  60. Alex X. Liu, Mohamed G. Gouda
    Diverse Firewall Design. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:595-604 [Conf]
  61. Nick Cook, Paul Robinson, Santosh K. Shrivastava
    Component Middleware to Support Non-repudiable Service Interactions. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:605-0 [Conf]
  62. Jun He, Matti A. Hiltunen, Richard D. Schlichting
    Customizing Dependability Attributes for Mobile Service Platforms. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:617-626 [Conf]
  63. Rajesh Venkatasubramanian, John P. Hayes
    Discovering 1-FT Routes in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:627-636 [Conf]
  64. Jing Deng, Richard Han, Shivakant Mishra
    Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:637-0 [Conf]
  65. Frank Ortmeier, Wolfgang Reif
    Safety Optimization: A Combination of Fault Tree Analysis and Optimization Techniques. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:651-658 [Conf]
  66. Daniele Codetta Raiteri, Mauro Iacono, Giuliana Franceschinis, Valeria Vittorini
    Repairable Fault Tree for the Automatic Evaluation of Repair Policies. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:659-668 [Conf]
  67. Dong Tang, Dileep Kumar, Sreeram Duvur, Øystein Torbjørnsen
    Availability Measurement and Modeling for An Application Server. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:669-0 [Conf]
  68. Ali Kalakech, Karama Kanoun, Yves Crouzet, Jean Arlat
    Benchmarking The Dependability of Windows NT4, 2000 and XP. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:681-686 [Conf]
  69. Long Wang, Zbigniew Kalbarczyk, Ravishankar K. Iyer, H. Vora, T. Chahande
    Checkpointing of Control Structures in Main Memory Database Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:687-692 [Conf]
  70. Dong Tang, Kishor S. Trivedi
    Hierarchical Computation of Interval Availability and Related Metrics. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:693-0 [Conf]
  71. Christel Baier, Lucia Cloth, Boudewijn R. Haverkort, Matthias Kuntz, Markus Siegle
    Model Checking Action- and State-Labelled Markov Chains. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:701-710 [Conf]
  72. Mieke Massink, Joost-Pieter Katoen, Diego Latella
    Model Checking Dependability Attributes of Wireless Group Communication. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:711-720 [Conf]
  73. Tatsuya Ozaki, Tadashi Dohi, Hiroyuki Okamura, Naoto Kaio
    Min-Max Checkpoint Placement under Incomplete Failure Information. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:721-730 [Conf]
  74. Andrea Acquaviva, Alessandro Aldini, Marco Bernardo, Alessandro Bogliolo, Edoardo Bontà, Emanuele Lattanzi
    Assessing the Impact of Dynamic Power Management on the Functionality and the Performance of Battery-Powered Appliances. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:731-0 [Conf]
  75. Ludmila Cherkasova, Wenting Tang, Sharad Singhal
    An SLA-Oriented Capacity Planning Tool for Streaming Media Services. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:743-752 [Conf]
  76. Raul Ceretta Nunes, Ingrid Jansch-Pôrto
    QoS of Timeout-Based Self-Tuned Failure Detectors: The Effects of the Communication Delay Predictor and the Safety Margin. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:753-761 [Conf]
  77. Panagiotis Katsaros, Constantine Lazos
    Optimal Object State Transfer - Recovery Policies for Fault Tolerant Distributed Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:762-771 [Conf]
  78. Ramendra K. Sahoo, Anand Sivasubramaniam, Mark S. Squillante, Yanyong Zhang
    Failure Data Analysis of a Large-Scale Heterogeneous Server Environment. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:772-0 [Conf]
  79. Patrick Downey, Rachel Cardell-Oliver
    Evaluating the Impact of Limited Resource on the Performance of Flooding in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:785-794 [Conf]
  80. Gunjan Khanna, Saurabh Bagchi, Yu-Sung Wu
    Fault Tolerant Energy Aware Data Dissemination Protocol in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:795-804 [Conf]
  81. Ann T. Tai, Kam S. Tso, William H. Sanders
    Cluster-Based Failure Detection Service for Large-Scale Ad Hoc Wireless Network Applications. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:805-0 [Conf]
  82. Vinu Vijay Kumar, Rashi Verma, John Lach, Joanne Bechta Dugan
    A Markov Reward Model for Reliable Synchronous Dataflow System Design. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:817-825 [Conf]
  83. Mehdi Kargahi, Ali Movaghar-Rahimabadi
    A Method for Performance Analysis of Earliest-Deadline-First Scheduling Policy. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:826-834 [Conf]
  84. Marco Gribaudo, Matteo Sereno
    An Efficient Algorithm for the Transient Analysis of a Class of Deterministic Stochastic Petri Nets. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:835-844 [Conf]
  85. Gábor Horváth, Sándor Rácz, Miklós Telek
    Analysis of Second-Order Markov Reward Models. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:845-0 [Conf]
  86. Juan-Carlos Ruiz-Garcia, Pedro Yuste, Pedro J. Gil, Lenin Lemus
    On Benchmarking the Dependability of Automotive Engine Control Applications. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:857-866 [Conf]
  87. Arnaud Albinet, Jean Arlat, Jean-Charles Fabre
    Characterization of the Impact of Faulty Drivers on the Robustness of the Linux Kernel. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:867-876 [Conf]
  88. Kimberly Keeton, Arif Merchant
    A Framework for Evaluating Storage System Dependability. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:877-886 [Conf]
  89. Weining Gu, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    Error Sensitivity of the Linux Kernel Executing on PowerPC G4 and Pentium 4 Processors. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:887-0 [Conf]
  90. Michael D. Harrison, Lorenzo Strigini
    Workshop on Interdisciplinary Approaches to Achieving and Analysing System Dependability. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:899- [Conf]
  91. Saurabh Bagchi, Douglas M. Blough, Paolo Santi, Nitin H. Vaidya
    DIWANS: Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:900- [Conf]
  92. Rogério de Lemos, Cristina Gacek, Alexander B. Romanovsky
    Twin Workshops on Architecting Dependable Systems (WADS 2004). [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:901- [Conf]
  93. Luca Breveglieri, Israel Koren
    Workshop on Fault Diagnosis and Tolerance in Cryptography. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:902- [Conf]
  94. Charles Howell, Sofia Guerra, Shari Lawrence Pfleeger, Victoria Stavridou-Coleman
    Workshop on Assurance Cases: Best Practices, Possible Obstacles, and Future Opportunities. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:903- [Conf]
  95. Susanna Donatelli
    Student Forum. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:904- [Conf]
  96. Felicita Di Giandomenico
    Fast Abstracts. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:905- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002