P. Kumar and M. Satyanarayanan, Log-based directory resolution in the Coda file system, [1993] Proceedings of the Second International Conference on Parallel and Distributed Information Systems, pp.202-213, 1993.
DOI : 10.1109/PDIS.1993.253092

M. Satyanarayanan, J. J. Kistler, P. Kumar, M. E. Okasaki, E. H. Siegel et al., Coda: a highly available file system for a distributed workstation environment, IEEE Transactions on Computers, vol.39, issue.4, pp.447-459, 1990.
DOI : 10.1109/12.54838

R. G. Guy, Ficus: A very large scale reliable distributed file system, 1991.

K. Petersen, M. Spreitzer, D. Terry, M. Theimer, and A. Demers, Flexible update propagation for weakly consistent replication, Proceedings of the 16th Symposium on Operating Systems Principles, 1997.

J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels et al., Oceanstore: An extremely wide-area storage system, Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 2000.

C. Mascolo, L. Capra, S. Zachariadis, and W. Emmerich, XMID- DLE: a data-sharing middleware for mobile computing, Wireless Personal Communications, vol.21, 2001.

H. Yu and A. Vahdat, Design and evaluation of a continuous consistency model for replicated services, Proc. of the 4rd Symposium on Operating Systems Design and Implementation, 2000.

T. Ekenstam, C. Matheny, P. Reiher, and G. Popek, The bengal database replication system, Distributed and Parallel Databases, 2001.

A. J. Menezes, P. C. Van-oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, 1996.
DOI : 10.1201/9781439821916

Y. Kim, A. Perrig, and G. Tsudik, Simple and fault-tolerant key agreement for dynamic collaborative groups, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, pp.235-244, 2000.
DOI : 10.1145/352600.352638

E. Guttman, C. Perkins, J. Veizades, and M. Day, Service location protocol, 1999.

M. H. Degroot, Probability and Statistics, 1986.

K. , A. Agha, G. Pujolle, and D. Zeghlache, VCB: an efficient resource sharing scheme for cellular mobile systems, Telecommunication Systems, Kluwer, vol.19, issue.1, pp.101-110, 2002.
URL : https://hal.archives-ouvertes.fr/hal-01151595

B. Schneier, Description of a new variable-length key, 64-bit block cipher (Blowfish), Fast Software Encryption, Cambridge Security Workshop Proceedings, pp.191-204, 1993.
DOI : 10.1007/3-540-58108-1_24

L. Feeney and M. Nilsson, Investigating the energy consumption of a wireless network interface in an ad hoc networking environment, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213), 2001.
DOI : 10.1109/INFCOM.2001.916651

G. Kuenning and G. Popek, Automated hoarding for mobile computers, Proceedings of the 16th ACM Symposium on Operating Systems Principles, 1997.

A. Joseph, A. De-lespinasse, J. Tauber, D. Gifford, and M. Kaashoek, Rover: A toolkit for mobile information access, Proceedings of the 15th ACM Symposium on Operating Systems Principles, 1995.

A. Kermarrec, A. Rowstron, M. Shapiro, and P. Druschel, The IceCube approach to the reconciliation of divergent replicas, Proceedings of the twentieth annual ACM symposium on Principles of distributed computing , PODC '01, 2001.
DOI : 10.1145/383962.384020

URL : https://hal.archives-ouvertes.fr/hal-01248215

P. Castro, B. Greenstein, R. Muntz, C. Bisdikian, P. Kermani et al., Locating application data across service discovery domains, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, 2001.
DOI : 10.1145/381677.381681

F. Sailhan and V. Issarny, Energy-aware Web caching for mobile terminals, Proceedings 22nd International Conference on Distributed Computing Systems Workshops, 2002.
DOI : 10.1109/ICDCSW.2002.1030869

URL : https://hal.archives-ouvertes.fr/inria-00415133