diff options
author | Nils Gillmann <ng0@n0.is> | 2018-06-02 11:57:41 +0000 |
---|---|---|
committer | Nils Gillmann <ng0@n0.is> | 2018-06-02 11:57:41 +0000 |
commit | fbcc1749b8d6d22a18b48b7ae4a30e44f37566f9 (patch) | |
tree | 06c91fb2f5bb30d28c249341ea3c95ec296d7c4a | |
parent | e1efd07466fdcab2f6203c336694a3ac72d6d2e6 (diff) | |
download | bibliography-fbcc1749b8d6d22a18b48b7ae4a30e44f37566f9.tar.gz bibliography-fbcc1749b8d6d22a18b48b7ae4a30e44f37566f9.zip |
Replace all filenames with whitespaces to use underscores.
Even if that means we break wikipedia links and so on (again).
Whitespaces are terrible to deal with in files.
Signed-off-by: Nils Gillmann <ng0@n0.is>
-rw-r--r-- | docs/10.1.1.27.1639_(2).pdf (renamed from docs/10.1.1.27.1639 (2).pdf) | bin | 118020 -> 118020 bytes | |||
-rw-r--r-- | docs/10.1.1.4.7003_(1).pdf (renamed from docs/10.1.1.4.7003 (1).pdf) | bin | 212023 -> 212023 bytes | |||
-rw-r--r-- | docs/2004-ISLPED-Energy-aware_demand_paging_on_NAND_flash-based_embedded_storages.pdf (renamed from docs/2004-ISLPED-Energy-aware demand paging on NAND flash-based embedded storages.pdf) | bin | 222664 -> 222664 bytes | |||
-rw-r--r-- | docs/A02370_DF_CFP_SpringerOpen_SI_CFP_EURASIP_JWCN_Global_A42.pdf (renamed from docs/A02370_DF_CFP_SpringerOpen SI CFP EURASIP JWCN_Global_A42.pdf) | bin | 474589 -> 474589 bytes | |||
-rw-r--r-- | docs/AAAI'08_-_Local_search_for_DCOP.pdf (renamed from docs/AAAI'08 - Local search for DCOP.pdf) | bin | 200389 -> 200389 bytes | |||
-rw-r--r-- | docs/AAAI'96_-_Mixed_constraint_satisfaction.pdf (renamed from docs/AAAI'96 - Mixed constraint satisfaction.pdf) | bin | 123033 -> 123033 bytes | |||
-rw-r--r-- | docs/AAMAS'05_-_Accelerating_the_DCOP_algorithm_ADOPT.pdf (renamed from docs/AAMAS'05 - Accelerating the DCOP algorithm ADOPT.pdf) | bin | 4661000 -> 4661000 bytes | |||
-rw-r--r-- | docs/AAMAS08_-_DCOP_algorithms_in_a_real_world_problem.pdf (renamed from docs/AAMAS08 - DCOP algorithms in a real world problem.pdf) | bin | 486149 -> 486149 bytes | |||
-rw-r--r-- | docs/ACM_Computing_Surveys_-_A_survey_of_p2p_content_distribution_technologies.pdf (renamed from docs/ACM Computing Surveys - A survey of p2p content distribution technologies.pdf) | bin | 517773 -> 517773 bytes | |||
-rw-r--r-- | docs/ACM_SIGCOMM'05_-_Cheng_&_Friedman_-_Sybilproof_reputation_mechanisms.pdf (renamed from docs/ACM SIGCOMM'05 - Cheng & Friedman - Sybilproof reputation mechanisms.pdf) | bin | 189455 -> 189455 bytes | |||
-rw-r--r-- | docs/ACNS'05_-_Garcia_&_Hoepman_-_Off-line_Karma.pdf (renamed from docs/ACNS'05 - Garcia & Hoepman - Off-line Karma.pdf) | bin | 179762 -> 179762 bytes | |||
-rw-r--r-- | docs/ACSAC'02_-_A_secure_directory_service_based_on_exclusive_encryption.pdf (renamed from docs/ACSAC'02 - A secure directory service based on exclusive encryption.pdf) | bin | 231311 -> 231311 bytes | |||
-rw-r--r-- | docs/ACSAC'11_-_BACKLIT.pdf (renamed from docs/ACSAC'11 - BACKLIT.pdf) | bin | 702766 -> 702766 bytes | |||
-rw-r--r-- | docs/ACSAC'11_-_Tortoise.pdf (renamed from docs/ACSAC'11 - Tortoise.pdf) | bin | 476389 -> 476389 bytes | |||
-rw-r--r-- | docs/AIMS'09_-_Sybil_attacks_protection_schemes_in_KAD.pdf (renamed from docs/AIMS'09 - Sybil attacks protection schemes in KAD.pdf) | bin | 245803 -> 245803 bytes | |||
-rw-r--r-- | docs/ARES'06_-_Fair_Trading_of_Information.pdf (renamed from docs/ARES'06 - Fair Trading of Information.pdf) | bin | 423016 -> 423016 bytes | |||
-rw-r--r-- | docs/ASIACRYPT'07_-_IBBE_with_constant_size_ciphertexts_and_private_keys.pdf (renamed from docs/ASIACRYPT'07 - IBBE with constant size ciphertexts and private keys.pdf) | bin | 503474 -> 503474 bytes | |||
-rw-r--r-- | docs/ATEC'04_-_A_network_positioning_system.pdf (renamed from docs/ATEC'04 - A network positioning system.pdf) | bin | 223195 -> 223195 bytes | |||
-rw-r--r-- | docs/A_Novel_Testbed_for_P2P_Networks.pdf (renamed from docs/A Novel Testbed for P2P Networks.pdf) | bin | 344958 -> 344958 bytes | |||
-rw-r--r-- | docs/Amann_-_Secure_asynchronous_change_notifications.pdf (renamed from docs/Amann - Secure asynchronous change notifications.pdf) | bin | 931135 -> 931135 bytes | |||
-rw-r--r-- | docs/Amnefelt_&_Svenningsson_-_Keso.pdf (renamed from docs/Amnefelt & Svenningsson - Keso.pdf) | bin | 341739 -> 341739 bytes | |||
-rw-r--r-- | docs/Applied_Intelligence_-_Combinatorial_Auctions.pdf (renamed from docs/Applied Intelligence - Combinatorial Auctions.pdf) | bin | 672330 -> 672330 bytes | |||
-rw-r--r-- | docs/Bogetoft_et_al._-_Secure_multiparty_computation_goes_live.pdf (renamed from docs/Bogetoft et al. - Secure multiparty computation goes live.pdf) | bin | 335795 -> 335795 bytes | |||
-rw-r--r-- | docs/Browne_et_al_-_A_survey_of_MCTS_methods.pdf (renamed from docs/Browne et al - A survey of MCTS methods.pdf) | bin | 2465222 -> 2465222 bytes | |||
-rw-r--r-- | docs/Brumley_&_Tuveri_-_Timing_Attacks.pdf (renamed from docs/Brumley & Tuveri - Timing Attacks.pdf) | bin | 356025 -> 356025 bytes | |||
-rw-r--r-- | docs/CCS'03_-_Yang_&_Garcia-Molina_-_PPay.pdf (renamed from docs/CCS'03 - Yang & Garcia-Molina - PPay.pdf) | 0 | ||||
-rw-r--r-- | docs/CCS'06_-_Attributed-based_encryption_for_fine-grained_access_control_of_encrypted_data.pdf (renamed from docs/CCS'06 - Attributed-based encryption for fine-grained access control of encrypted data.pdf) | bin | 277458 -> 277458 bytes | |||
-rw-r--r-- | docs/CCS'07_-_ABE_with_non-monotonic_access_structures.pdf (renamed from docs/CCS'07 - ABE with non-monotonic access structures.pdf) | bin | 216604 -> 216604 bytes | |||
-rw-r--r-- | docs/CCS'08_-_FairplayMP.pdf (renamed from docs/CCS'08 - FairplayMP.pdf) | bin | 266316 -> 266316 bytes | |||
-rw-r--r-- | docs/CCS'08_-_Identity-based_encryption_with_efficient_revocation.pdf (renamed from docs/CCS'08 - Identity-based encryption with efficient revocation.pdf) | bin | 302141 -> 302141 bytes | |||
-rw-r--r-- | docs/CCS'11_-_Cirripede.pdf (renamed from docs/CCS'11 - Cirripede.pdf) | bin | 1116428 -> 1116428 bytes | |||
-rw-r--r-- | docs/CCS'11_-_Throughput-fingerprinting.pdf (renamed from docs/CCS'11 - Throughput-fingerprinting.pdf) | bin | 451773 -> 451773 bytes | |||
-rw-r--r-- | docs/CCS'11_-_Trust-based_Anonymous_Communication1.pdf (renamed from docs/CCS'11 - Trust-based Anonymous Communication1.pdf) | bin | 373511 -> 373511 bytes | |||
-rw-r--r-- | docs/CG'06_-_Selectivity_and_backup_operators_in_MCTS.pdf (renamed from docs/CG'06 - Selectivity and backup operators in MCTS.pdf) | bin | 136788 -> 136788 bytes | |||
-rw-r--r-- | docs/CIA'04_-_Despotovic_&_Aberer_-_Peers'_performance_in_P2P_networks.pdf (renamed from docs/CIA'04 - Despotovic & Aberer - Peers' performance in P2P networks.pdf) | bin | 190223 -> 190223 bytes | |||
-rw-r--r-- | docs/CRYPTO'02_-_The_LSD_broadcast_encryption_scheme.pdf (renamed from docs/CRYPTO'02 - The LSD broadcast encryption scheme.pdf) | bin | 166360 -> 166360 bytes | |||
-rw-r--r-- | docs/CRYPTO'84_-_El_Gamal_-_Public_Key_Cryptosystem.pdf (renamed from docs/CRYPTO'84 - El Gamal - Public Key Cryptosystem.pdf) | bin | 336486 -> 336486 bytes | |||
-rw-r--r-- | docs/CSET'11_-_ExperimenTor.pdf (renamed from docs/CSET'11 - ExperimenTor.pdf) | bin | 489919 -> 489919 bytes | |||
-rw-r--r-- | docs/CaberNet_Radicals_Workshop_-_Puzzles_in_P2P_Systems.pdf (renamed from docs/CaberNet Radicals Workshop - Puzzles in P2P Systems.pdf) | bin | 127742 -> 127742 bytes | |||
-rw-r--r-- | docs/ChinaCom'06_-_Combating_hidden_action_in_unstructured_p2p_systems.pdf (renamed from docs/ChinaCom'06 - Combating hidden action in unstructured p2p systems.pdf) | bin | 5539323 -> 5539323 bytes | |||
-rw-r--r-- | docs/CoRR_-_Critical_look_at_decentralization.pdf (renamed from docs/CoRR - Critical look at decentralization.pdf) | bin | 163362 -> 163362 bytes | |||
-rw-r--r-- | docs/CoRR_-_X-Vine.pdf (renamed from docs/CoRR - X-Vine.pdf) | bin | 427038 -> 427038 bytes | |||
-rw-r--r-- | docs/Combining_Virtual_and_Physical_Structures_for_Self-organized_Routing_0.pdf (renamed from docs/Combining Virtual and Physical Structures for Self-organized Routing_0.pdf) | bin | 453012 -> 453012 bytes | |||
-rw-r--r-- | docs/Communications_of_the_ACM_-_Reputation_Systems.pdf (renamed from docs/Communications of the ACM - Reputation Systems.pdf) | bin | 67185 -> 67185 bytes | |||
-rw-r--r-- | docs/Compcon_'97_-_Privacy-enhancing_Technologies_for_the_Internet.pdf (renamed from docs/Compcon '97 - Privacy-enhancing Technologies for the Internet.pdf) | bin | 42068 -> 42068 bytes | |||
-rw-r--r-- | docs/Computer_Networks_-_Wang,_Chiu_&_Lui_-_Overlay_network_traffic_on_ISP_peering.pdf (renamed from docs/Computer Networks - Wang, Chiu & Lui - Overlay network traffic on ISP peering.pdf) | bin | 380115 -> 380115 bytes | |||
-rw-r--r-- | docs/Concurrency_and_Computation_-_TRIBLER.pdf (renamed from docs/Concurrency and Computation - TRIBLER.pdf) | bin | 281955 -> 281955 bytes | |||
-rw-r--r-- | docs/DIALM'02_-_Feigenbaum_&_Shenker_-_Distributed_algorithmic_mechanism_design.pdf (renamed from docs/DIALM'02 - Feigenbaum & Shenker - Distributed algorithmic mechanism design.pdf) | bin | 181536 -> 181536 bytes | |||
-rw-r--r-- | docs/DP5:_A_Private_Presence_Service.pdf (renamed from docs/DP5: A Private Presence Service.pdf) | bin | 611692 -> 611692 bytes | |||
-rw-r--r-- | docs/Dellarocas_-_Reputation_Mechanisms.pdf (renamed from docs/Dellarocas - Reputation Mechanisms.pdf) | bin | 650219 -> 650219 bytes | |||
-rw-r--r-- | docs/Dependent_Link_Padding_Algorithms_for.pdf (renamed from docs/Dependent Link Padding Algorithms for.pdf) | bin | 1740835 -> 1740835 bytes | |||
-rw-r--r-- | docs/Duminuco_&_Biersack_-_Hierarchical_Codes.pdf (renamed from docs/Duminuco & Biersack - Hierarchical Codes.pdf) | bin | 478014 -> 478014 bytes | |||
-rw-r--r-- | docs/EC'04_-_Robust_incentive_techniques_for_P2P_networks.pdf (renamed from docs/EC'04 - Robust incentive techniques for P2P networks.pdf) | bin | 168711 -> 168711 bytes | |||
-rw-r--r-- | docs/EC'05_-_Hidden-action_in_multi-hop_routing.pdf (renamed from docs/EC'05 - Hidden-action in multi-hop routing.pdf) | bin | 237707 -> 237707 bytes | |||
-rw-r--r-- | docs/EC'06_-_Incentive-compatible_interdomain_routing.pdf (renamed from docs/EC'06 - Incentive-compatible interdomain routing.pdf) | bin | 245673 -> 245673 bytes | |||
-rw-r--r-- | docs/EC'08_-_Why_share_in_peer-to-peer_networks.pdf (renamed from docs/EC'08 - Why share in peer-to-peer networks.pdf) | bin | 138205 -> 138205 bytes | |||
-rw-r--r-- | docs/EC'09_-_Sybilproof_transitive_trust_protocols.pdf (renamed from docs/EC'09 - Sybilproof transitive trust protocols.pdf) | bin | 173640 -> 173640 bytes | |||
-rw-r--r-- | docs/EUROCRYPT'05_-_Fuzzy_Identity-Based_Encryption.pdf (renamed from docs/EUROCRYPT'05 - Fuzzy Identity-Based Encryption.pdf) | bin | 200579 -> 200579 bytes | |||
-rw-r--r-- | docs/EUROCRYPT'89_-_Waidner&Pfitzmann_-_The_dining_cryptographers_in_the_disco_.pdf (renamed from docs/EUROCRYPT'89 - Waidner&Pfitzmann - The dining cryptographers in the disco .pdf) | bin | 82278 -> 82278 bytes | |||
-rw-r--r-- | docs/EUROCRYPT'92_-_Chaun_&_Pedersen_-_Transferred_cash_grows_in_size.PDF (renamed from docs/EUROCRYPT'92 - Chaun & Pedersen - Transferred cash grows in size.PDF) | 0 | ||||
-rw-r--r-- | docs/Erdős_&_Rényi_-_On_Random_Graphs.pdf (renamed from docs/Erdős & Rényi - On Random Graphs.pdf) | bin | 1410802 -> 1410802 bytes | |||
-rw-r--r-- | docs/Euro-Par'05_-_Pastis.pdf (renamed from docs/Euro-Par'05 - Pastis.pdf) | bin | 123992 -> 123992 bytes | |||
-rw-r--r-- | docs/FAST'09_-_Open-source_erasure_coding_libraries_for_storage.pdf (renamed from docs/FAST'09 - Open-source erasure coding libraries for storage.pdf) | bin | 515672 -> 515672 bytes | |||
-rw-r--r-- | docs/FC'11_-_BNymble.pdf (renamed from docs/FC'11 - BNymble.pdf) | bin | 191536 -> 191536 bytes | |||
-rw-r--r-- | docs/FC'11_-_Malice_versus_AN.ON_.pdf (renamed from docs/FC'11 - Malice versus AN.ON_.pdf) | bin | 1040865 -> 1040865 bytes | |||
-rw-r--r-- | docs/FC'11_-_Proximax.pdf (renamed from docs/FC'11 - Proximax.pdf) | bin | 179439 -> 179439 bytes | |||
-rw-r--r-- | docs/FC'12_-_Congestion-aware_Path_Selection_for_Tor.pdf (renamed from docs/FC'12 - Congestion-aware Path Selection for Tor.pdf) | bin | 962626 -> 962626 bytes | |||
-rw-r--r-- | docs/FGCS_-_P2P_Contracts:_a_Framework_for_Resource_and_Service_Exchange.pdf (renamed from docs/FGCS - P2P Contracts: a Framework for Resource and Service Exchange.pdf) | bin | 201234 -> 201234 bytes | |||
-rw-r--r-- | docs/FOCI'11_-_Decoy_Routing:_Toward_Unblockable_Internet_Communication.pdf (renamed from docs/FOCI'11 - Decoy Routing: Toward Unblockable Internet Communication.pdf) | bin | 145566 -> 145566 bytes | |||
-rw-r--r-- | docs/FREENIX'01_-_A_transparent_cryptographic_file_system_for_UNIX.pdf (renamed from docs/FREENIX'01 - A transparent cryptographic file system for UNIX.pdf) | bin | 145234 -> 145234 bytes | |||
-rw-r--r-- | docs/Feldman,_Lai,_Chuang_&_Stoica_-_Quantifying_disincentives_in_peer-to-peer_networks.pdf (renamed from docs/Feldman, Lai, Chuang & Stoica - Quantifying disincentives in peer-to-peer networks.pdf) | bin | 116464 -> 116464 bytes | |||
-rw-r--r-- | docs/Finite-length_analysis_of_low-density_parity-check_codes_on.pdf (renamed from docs/Finite-length analysis of low-density parity-check codes on.pdf) | bin | 474693 -> 474693 bytes | |||
-rw-r--r-- | docs/Formalizing_Anonymous_Blacklisting_Systems.pdf (renamed from docs/Formalizing Anonymous Blacklisting Systems.pdf) | bin | 966218 -> 966218 bytes | |||
-rw-r--r-- | docs/GECON'04_-_Designing_incentive_mechanisms_for_p2p_systems.pdf (renamed from docs/GECON'04 - Designing incentive mechanisms for p2p systems.pdf) | bin | 403825 -> 403825 bytes | |||
-rw-r--r-- | docs/Ghodsi_-_Distributed_k-ary_System.pdf (renamed from docs/Ghodsi - Distributed k-ary System.pdf) | bin | 1635373 -> 1635373 bytes | |||
-rw-r--r-- | docs/Grid_Computing_-_Estimating_The_Size_Of_Peer-To-Peer_Networks.pdf (renamed from docs/Grid Computing - Estimating The Size Of Peer-To-Peer Networks.pdf) | bin | 654064 -> 654064 bytes | |||
-rw-r--r-- | docs/Group_Decision_and_Negociation_-_Automated_Negociation.pdf (renamed from docs/Group Decision and Negociation - Automated Negociation.pdf) | bin | 1037008 -> 1037008 bytes | |||
-rw-r--r-- | docs/HICSS'02_-_A_computational_model_of_trust_and_reputation.pdf (renamed from docs/HICSS'02 - A computational model of trust and reputation.pdf) | bin | 363406 -> 363406 bytes | |||
-rw-r--r-- | docs/HOT-P2P'05_-_Khorshadi,_Liu_&_Ghosal.pdf (renamed from docs/HOT-P2P'05 - Khorshadi, Liu & Ghosal.pdf) | bin | 270414 -> 270414 bytes | |||
-rw-r--r-- | docs/HPDC'06_-_Peer_to_peer_size_estimation_in_large_and_dynamic_networks.pdf (renamed from docs/HPDC'06 - Peer to peer size estimation in large and dynamic networks.pdf) | bin | 495491 -> 495491 bytes | |||
-rw-r--r-- | docs/HotOS_IX_-_High_available,_scalable_storage,_dynamic_peer_networks.pdf (renamed from docs/HotOS IX - High available, scalable storage, dynamic peer networks.pdf) | bin | 96589 -> 96589 bytes | |||
-rw-r--r-- | docs/HotP2P'10_-_KAD_DHT_attack_mitigation.pdf (renamed from docs/HotP2P'10 - KAD DHT attack mitigation.pdf) | bin | 321859 -> 321859 bytes | |||
-rw-r--r-- | docs/ICC'08_-_Super-Seeding_in_BitTorrent.PDF (renamed from docs/ICC'08 - Super-Seeding in BitTorrent.PDF) | bin | 249457 -> 249457 bytes | |||
-rw-r--r-- | docs/ICDCN'10_-_Poisoning_the_Kad_Network.pdf (renamed from docs/ICDCN'10 - Poisoning the Kad Network.pdf) | bin | 387398 -> 387398 bytes | |||
-rw-r--r-- | docs/ICDCS'02_-_Reclaiming_space_for_duplicate_files.pdf (renamed from docs/ICDCS'02 - Reclaiming space for duplicate files.pdf) | bin | 572963 -> 572963 bytes | |||
-rw-r--r-- | docs/ICDCS'06_-_Improving_traffic_locality_in_BitTorrent.pdf (renamed from docs/ICDCS'06 - Improving traffic locality in BitTorrent.pdf) | bin | 155172 -> 155172 bytes | |||
-rw-r--r-- | docs/ICDCS'09_-_Regenerating_codes_for_p2p_backup_systems.pdf (renamed from docs/ICDCS'09 - Regenerating codes for p2p backup systems.pdf) | bin | 445777 -> 445777 bytes | |||
-rw-r--r-- | docs/ICN'07_-_PlanetLab.pdf (renamed from docs/ICN'07 - PlanetLab.pdf) | bin | 253943 -> 253943 bytes | |||
-rw-r--r-- | docs/ICNP'03_-_Resilient_peer-to-peer_streaming.pdf (renamed from docs/ICNP'03 - Resilient peer-to-peer streaming.pdf) | bin | 372484 -> 372484 bytes | |||
-rw-r--r-- | docs/IEEE_CST_-_A_Survey_and_Comparison_of_Peer-to-Peer_Overlay.pdf (renamed from docs/IEEE CST - A Survey and Comparison of Peer-to-Peer Overlay.pdf) | bin | 276266 -> 276266 bytes | |||
-rw-r--r-- | docs/IEEE_Communications_Magazine_-_Video_Streaming_in_P2P_Systems.pdf (renamed from docs/IEEE Communications Magazine - Video Streaming in P2P Systems.pdf) | bin | 793579 -> 793579 bytes | |||
-rw-r--r-- | docs/IEEE_Computer_Society_-_2Fast.pdf (renamed from docs/IEEE Computer Society - 2Fast.pdf) | bin | 211293 -> 211293 bytes | |||
-rw-r--r-- | docs/IEEE_DSO_-_Free_riding_on_Gnutella_revisited.pdf (renamed from docs/IEEE DSO - Free riding on Gnutella revisited.pdf) | bin | 335280 -> 335280 bytes | |||
-rw-r--r-- | docs/IEEE_Journal_(25)_-_Hidden-action_in_network_routing.pdf (renamed from docs/IEEE Journal (25) - Hidden-action in network routing.pdf) | bin | 424887 -> 424887 bytes | |||
-rw-r--r-- | docs/IEEE_Trans._on_Info._-_New_directions_in_cryptography.pdf (renamed from docs/IEEE Trans. on Info. - New directions in cryptography.pdf) | bin | 2216632 -> 2216632 bytes | |||
-rw-r--r-- | docs/IEEE_Transactions_on_Systems_-_Descentralized_learning.pdf (renamed from docs/IEEE Transactions on Systems - Descentralized learning.pdf) | bin | 311278 -> 311278 bytes | |||
-rw-r--r-- | docs/IEEE⁄ACM_Banner_&_Orda.pdf (renamed from docs/IEEE⁄ACM Banner & Orda.pdf) | bin | 681489 -> 681489 bytes | |||
-rw-r--r-- | docs/IEEE⁄ACM_Trans._Netw.'02_(10)-_Internet_pricing.pdf (renamed from docs/IEEE⁄ACM Trans. Netw.'02 (10)- Internet pricing.pdf) | bin | 368751 -> 368751 bytes | |||
-rw-r--r-- | docs/IEEE⁄ACM_Transactions_on_Networking_-_Detecting_shared_congestion_of_flows.pdf (renamed from docs/IEEE⁄ACM Transactions on Networking - Detecting shared congestion of flows.pdf) | bin | 383575 -> 383575 bytes | |||
-rw-r--r-- | docs/IJCAI'07_-_PC-DPOP.pdf (renamed from docs/IJCAI'07 - PC-DPOP.pdf) | bin | 226457 -> 226457 bytes | |||
-rw-r--r-- | docs/IJCCR_vol_10_(2006)_1_Ardron_and_Lietaer.pdf (renamed from docs/IJCCR vol 10 (2006) 1 Ardron and Lietaer.pdf) | bin | 259905 -> 259905 bytes | |||
-rw-r--r-- | docs/IMC'04_-_Availability,_Usage,_and_Deployment_Characteristics_of_the_DNS.pdf (renamed from docs/IMC'04 - Availability, Usage, and Deployment Characteristics of the DNS.pdf) | bin | 856335 -> 856335 bytes | |||
-rw-r--r-- | docs/IMC'05_-_Measurement,_analysis_and_modeling_of_BitTorrent-like_systems.pdf (renamed from docs/IMC'05 - Measurement, analysis and modeling of BitTorrent-like systems.pdf) | bin | 1889416 -> 1889416 bytes | |||
-rw-r--r-- | docs/IMC'06_-_Understanding_churn_in_p2p_networks.pdf (renamed from docs/IMC'06 - Understanding churn in p2p networks.pdf) | bin | 261059 -> 261059 bytes | |||
-rw-r--r-- | docs/IMC'07_-_A_global_view_of_KAD.pdf (renamed from docs/IMC'07 - A global view of KAD.pdf) | bin | 163341 -> 163341 bytes | |||
-rw-r--r-- | docs/IMC'08_-_Detecting_BitTorrent_Blocking.pdf (renamed from docs/IMC'08 - Detecting BitTorrent Blocking.pdf) | bin | 481202 -> 481202 bytes | |||
-rw-r--r-- | docs/INFOCOM'02_-_Probabilistic_location_and_routing.pdf (renamed from docs/INFOCOM'02 - Probabilistic location and routing.pdf) | bin | 225708 -> 225708 bytes | |||
-rw-r--r-- | docs/INFOCOM'05_-_Designing_incentives_for_peer-to-peer_routing.pdf (renamed from docs/INFOCOM'05 - Designing incentives for peer-to-peer routing.pdf) | bin | 237564 -> 237564 bytes | |||
-rw-r--r-- | docs/INFOCOM'05_-_Exploiting_anarchy_in_networks.pdf (renamed from docs/INFOCOM'05 - Exploiting anarchy in networks.pdf) | bin | 282032 -> 282032 bytes | |||
-rw-r--r-- | docs/INFOCOM'05_-_Market-driven_bandwidth_allocation.pdf (renamed from docs/INFOCOM'05 - Market-driven bandwidth allocation.pdf) | bin | 604015 -> 604015 bytes | |||
-rw-r--r-- | docs/INFOCOM'05_-_Network_coding_for_large_scale_content_distribution.pdf (renamed from docs/INFOCOM'05 - Network coding for large scale content distribution.pdf) | bin | 108753 -> 108753 bytes | |||
-rw-r--r-- | docs/INFOCOM'06_-_Pianese,_Keller_&_Biersack_-_PULSE.pdf (renamed from docs/INFOCOM'06 - Pianese, Keller & Biersack - PULSE.pdf) | bin | 177363 -> 177363 bytes | |||
-rw-r--r-- | docs/INFOCOM'07_-_MARCH.pdf (renamed from docs/INFOCOM'07 - MARCH.pdf) | bin | 208345 -> 208345 bytes | |||
-rw-r--r-- | docs/INFOCOM'07_-_Mesh_or_multiple-tree.pdf (renamed from docs/INFOCOM'07 - Mesh or multiple-tree.pdf) | bin | 205472 -> 205472 bytes | |||
-rw-r--r-- | docs/INFOCOM'07_-_Network_coding_for_distributed_storage_systems.pdf (renamed from docs/INFOCOM'07 - Network coding for distributed storage systems.pdf) | bin | 400656 -> 400656 bytes | |||
-rw-r--r-- | docs/INFOCOM'07_-_PRIME.pdf (renamed from docs/INFOCOM'07 - PRIME.pdf) | bin | 369504 -> 369504 bytes | |||
-rw-r--r-- | docs/INFOCOM'08_-_Stable_peers.PDF (renamed from docs/INFOCOM'08 - Stable peers.PDF) | bin | 261140 -> 261140 bytes | |||
-rw-r--r-- | docs/INFOCOM'09_-_Queusing_models_for_p2p_streaming_systems.pdf (renamed from docs/INFOCOM'09 - Queusing models for p2p streaming systems.pdf) | bin | 233400 -> 233400 bytes | |||
-rw-r--r-- | docs/INFOCOM'09_-_Sybilproof_Indirect_Reprocity_Mechanism_for_P2P_Networks_.pdf (renamed from docs/INFOCOM'09 - Sybilproof Indirect Reprocity Mechanism for P2P Networks .pdf) | bin | 243216 -> 243216 bytes | |||
-rw-r--r-- | docs/INFOCOM'09_-_Traffic_Engineering_vs._Content_Distribution.PDF (renamed from docs/INFOCOM'09 - Traffic Engineering vs. Content Distribution.PDF) | bin | 196665 -> 196665 bytes | |||
-rw-r--r-- | docs/INFOCOMM'09_-_Mechanism_design_without_payments.pdf (renamed from docs/INFOCOMM'09 - Mechanism design without payments.pdf) | bin | 723984 -> 723984 bytes | |||
-rw-r--r-- | docs/IPTPS'01_-_Complex_queries_in_DHT-based_p2p_networks.pdf (renamed from docs/IPTPS'01 - Complex queries in DHT-based p2p networks.pdf) | bin | 163797 -> 163797 bytes | |||
-rw-r--r-- | docs/IPTPS'01_-_Erasure_coding_vs._replication.pdf (renamed from docs/IPTPS'01 - Erasure coding vs. replication.pdf) | bin | 93361 -> 93361 bytes | |||
-rw-r--r-- | docs/IPTPS'02_-_Douceur_-_The_Sybil_Attack.pdf (renamed from docs/IPTPS'02 - Douceur - The Sybil Attack.pdf) | bin | 100091 -> 100091 bytes | |||
-rw-r--r-- | docs/IPTPS'03_-_Rateless_codes_and_big_downloads.pdf (renamed from docs/IPTPS'03 - Rateless codes and big downloads.pdf) | bin | 103854 -> 103854 bytes | |||
-rw-r--r-- | docs/IPTPS'03_-_Towards_a_common_API.pdf (renamed from docs/IPTPS'03 - Towards a common API.pdf) | bin | 92791 -> 92791 bytes | |||
-rw-r--r-- | docs/IPTPS'05_-_High_availability_in_DHTs:_erasure_coding_vs._replication.pdf (renamed from docs/IPTPS'05 - High availability in DHTs: erasure coding vs. replication.pdf) | bin | 100392 -> 100392 bytes | |||
-rw-r--r-- | docs/IPTPS'05_-_The_BitTorrent:_measurements_and_analysis.pdf (renamed from docs/IPTPS'05 - The BitTorrent: measurements and analysis.pdf) | bin | 779757 -> 779757 bytes | |||
-rw-r--r-- | docs/IPTPS'06_-_On_object_maintenance_in_p2p_systems.pdf (renamed from docs/IPTPS'06 - On object maintenance in p2p systems.pdf) | bin | 130180 -> 130180 bytes | |||
-rw-r--r-- | docs/IPTPS'06_-_Skype_p2p_VoIP_System.pdf (renamed from docs/IPTPS'06 - Skype p2p VoIP System.pdf) | bin | 917329 -> 917329 bytes | |||
-rw-r--r-- | docs/ITC-20'07_-_Estimating_churn_in_structured_p2p_networks.pdf (renamed from docs/ITC-20'07 - Estimating churn in structured p2p networks.pdf) | bin | 652466 -> 652466 bytes | |||
-rw-r--r-- | docs/IWSOS'08_-_Network_Size_Estimation_for_Structured_Overlays.pdf (renamed from docs/IWSOS'08 - Network Size Estimation for Structured Overlays.pdf) | bin | 661810 -> 661810 bytes | |||
-rw-r--r-- | docs/Informatik_Spektrum_-_Peer-to-peer_networking_&_-computing.pdf (renamed from docs/Informatik Spektrum - Peer-to-peer networking & -computing.pdf) | bin | 144894 -> 144894 bytes | |||
-rw-r--r-- | docs/JPE_(1993)_-_Gode_&_Sunder_-_Allocative_Efficiency.pdf (renamed from docs/JPE (1993) - Gode & Sunder - Allocative Efficiency.pdf) | 0 | ||||
-rw-r--r-- | docs/Jelasity,_Montresor_&_Babaoglu_-_Gossip-based_aggregation.pdf (renamed from docs/Jelasity, Montresor & Babaoglu - Gossip-based aggregation.pdf) | bin | 533887 -> 533887 bytes | |||
-rw-r--r-- | docs/Jiang,_Bai_&_Wang_-_Trust_and_Cooperation_in_Peer-to-Peer_Systems.pdf (renamed from docs/Jiang, Bai & Wang - Trust and Cooperation in Peer-to-Peer Systems.pdf) | bin | 57598 -> 57598 bytes | |||
-rw-r--r-- | docs/Journal_of_AI_-_BnB-ADOPT.pdf (renamed from docs/Journal of AI - BnB-ADOPT.pdf) | bin | 1118962 -> 1118962 bytes | |||
-rw-r--r-- | docs/Journal_of_Parallel_&_Distributed_Computing_-_Deleting_files_in_the_Celeste_p2p_storage_systems.pdf (renamed from docs/Journal of Parallel & Distributed Computing - Deleting files in the Celeste p2p storage systems.pdf) | bin | 316979 -> 316979 bytes | |||
-rw-r--r-- | docs/Journal_of_Public_Economics_-_Bolton,_Katok_&_Ockenfels.pdf (renamed from docs/Journal of Public Economics - Bolton, Katok & Ockenfels.pdf) | bin | 171465 -> 171465 bytes | |||
-rw-r--r-- | docs/Journal_of_Supercomputing_-_Insight_into_redundancy_schemes_in_DHTs.pdf (renamed from docs/Journal of Supercomputing - Insight into redundancy schemes in DHTs.pdf) | bin | 377919 -> 377919 bytes | |||
-rw-r--r-- | docs/Kernighan_&_Lin_-_An_Efficient_Heuristic_Procedure_for_Partitioning_Graphs%0A.pdf (renamed from docs/Kernighan & Lin - An Efficient Heuristic Procedure for Partitioning Graphs%0A.pdf) | bin | 1644398 -> 1644398 bytes | |||
-rw-r--r-- | docs/Kising_-_Proximity_Neighbor_Selection_for_IGOR.pdf (renamed from docs/Kising - Proximity Neighbor Selection for IGOR.pdf) | bin | 504001 -> 504001 bytes | |||
-rw-r--r-- | docs/LAP:_Lightweight_Anonymity_and_Privacy.pdf (renamed from docs/LAP: Lightweight Anonymity and Privacy.pdf) | bin | 623018 -> 623018 bytes | |||
-rw-r--r-- | docs/LASTor:_A_Low-Latency_AS-Aware_Tor_Client.pdf (renamed from docs/LASTor: A Low-Latency AS-Aware Tor Client.pdf) | bin | 587476 -> 587476 bytes | |||
-rw-r--r-- | docs/LNCS_-_Distributed_Hash_Tables.pdf (renamed from docs/LNCS - Distributed Hash Tables.pdf) | bin | 663450 -> 663450 bytes | |||
-rw-r--r-- | docs/Laffont_&_Martimort_-_The_Theory_of_Incentives.pdf (renamed from docs/Laffont & Martimort - The Theory of Incentives.pdf) | bin | 2885306 -> 2885306 bytes | |||
-rw-r--r-- | docs/Lecture_Notes_in_Computer_Science_-_Selected_DHT_Algorithms_.pdf (renamed from docs/Lecture Notes in Computer Science - Selected DHT Algorithms .pdf) | bin | 373183 -> 373183 bytes | |||
-rw-r--r-- | docs/Long_Term_Study_of_Peer_Behavior_in_the_kad_DHT.pdf (renamed from docs/Long Term Study of Peer Behavior in the kad DHT.pdf) | 0 | ||||
-rw-r--r-- | docs/MDS'07_-_Conner_&_Nahrstedt_-_Securing_peer-to-peer_media_streaming_systems.pdf (renamed from docs/MDS'07 - Conner & Nahrstedt - Securing peer-to-peer media streaming systems.pdf) | bin | 81085 -> 81085 bytes | |||
-rw-r--r-- | docs/Marx_-_Parameterized_graph_separation_problems.pdf (renamed from docs/Marx - Parameterized graph separation problems.pdf) | bin | 223322 -> 223322 bytes | |||
-rw-r--r-- | docs/Menezes_&_Monteiro_-_An_Introduction_to_Auction_Theory.pdf (renamed from docs/Menezes & Monteiro - An Introduction to Auction Theory.pdf) | bin | 1024012 -> 1024012 bytes | |||
-rw-r--r-- | docs/Mies_-_SpoVNet.pdf (renamed from docs/Mies - SpoVNet.pdf) | bin | 855827 -> 855827 bytes | |||
-rw-r--r-- | docs/NCA'05_-_Decentralized_Schemes_for_Size_Estimation_in_Large_and_Dynamic_Groups.pdf (renamed from docs/NCA'05 - Decentralized Schemes for Size Estimation in Large and Dynamic Groups.pdf) | bin | 1700392 -> 1700392 bytes | |||
-rw-r--r-- | docs/NDSS'11_-_Security_API_for_Distributed_Social_Networks.pdf (renamed from docs/NDSS'11 - Security API for Distributed Social Networks.pdf) | bin | 1061504 -> 1061504 bytes | |||
-rw-r--r-- | docs/NGC'03_-_Scalable_Application-level_Anycast_.pdf (renamed from docs/NGC'03 - Scalable Application-level Anycast .pdf) | bin | 120085 -> 120085 bytes | |||
-rw-r--r-- | docs/NMNC_-_Progressive_strategies_for_MCTS.pdf (renamed from docs/NMNC - Progressive strategies for MCTS.pdf) | bin | 367543 -> 367543 bytes | |||
-rw-r--r-- | docs/NSDI'04_-_Designing_a_DHT_for_low_latency_and_high_throughput.pdf (renamed from docs/NSDI'04 - Designing a DHT for low latency and high throughput.pdf) | bin | 243452 -> 243452 bytes | |||
-rw-r--r-- | docs/NSDI'07_-_Do_incentives_build_robustness_in_BitTorrent.pdf (renamed from docs/NSDI'07 - Do incentives build robustness in BitTorrent.pdf) | bin | 955812 -> 955812 bytes | |||
-rw-r--r-- | docs/NetCod'05_-_Random_linear_coding_based_distributed_networked_storage.pdf (renamed from docs/NetCod'05 - Random linear coding based distributed networked storage.pdf) | bin | 223284 -> 223284 bytes | |||
-rw-r--r-- | docs/NetEcon'03_-_Cohen_-_Incentives_build_robustness_in_BitTorrent.pdf (renamed from docs/NetEcon'03 - Cohen - Incentives build robustness in BitTorrent.pdf) | bin | 81110 -> 81110 bytes | |||
-rw-r--r-- | docs/NetEcon'06_-_Harvelaar.pdf (renamed from docs/NetEcon'06 - Harvelaar.pdf) | bin | 549850 -> 549850 bytes | |||
-rw-r--r-- | docs/NetEcon'06_-_Improving_robustness_of_p2p_streaming.pdf (renamed from docs/NetEcon'06 - Improving robustness of p2p streaming.pdf) | bin | 107858 -> 107858 bytes | |||
-rw-r--r-- | docs/NetEcon'08_-_Yang_-_Auction,_but_don't_block.pdf (renamed from docs/NetEcon'08 - Yang - Auction, but don't block.pdf) | bin | 369873 -> 369873 bytes | |||
-rw-r--r-- | docs/Neumann_&_Morgenstern_-_Theory_of_Games_and_Economic_Behavior.pdf (renamed from docs/Neumann & Morgenstern - Theory of Games and Economic Behavior.pdf) | bin | 33143357 -> 33143357 bytes | |||
-rw-r--r-- | docs/OSDI'00_-_Fast_and_Secure_Distributed_Read-Only_File_System.pdf (renamed from docs/OSDI'00 - Fast and Secure Distributed Read-Only File System.pdf) | bin | 399590 -> 399590 bytes | |||
-rw-r--r-- | docs/OSDI'00_-_Overcast.pdf (renamed from docs/OSDI'00 - Overcast.pdf) | 0 | ||||
-rw-r--r-- | docs/Oper._Res._-_Optimal_Resource_Allocation.pdf (renamed from docs/Oper. Res. - Optimal Resource Allocation.pdf) | bin | 180433 -> 180433 bytes | |||
-rw-r--r-- | docs/P2P'03_-_Buragohain,_Agrawal_&_Suri_-_Incentives_in_P2P_systems.pdf (renamed from docs/P2P'03 - Buragohain, Agrawal & Suri - Incentives in P2P systems.pdf) | bin | 176308 -> 176308 bytes | |||
-rw-r--r-- | docs/P2P'03_-_Identity_crisis:_anonymity_vs_reputation.pdf (renamed from docs/P2P'03 - Identity crisis: anonymity vs reputation.pdf) | bin | 102194 -> 102194 bytes | |||
-rw-r--r-- | docs/P2P'04_-_Reputation_management_framework.pdf (renamed from docs/P2P'04 - Reputation management framework.pdf) | bin | 427283 -> 427283 bytes | |||
-rw-r--r-- | docs/P2P'09_-_PeerSim.pdf (renamed from docs/P2P'09 - PeerSim.pdf) | bin | 64900 -> 64900 bytes | |||
-rw-r--r-- | docs/P2PECON'05_-_Incentives_in_BitTorrent_induce_free_riding.pdf (renamed from docs/P2PECON'05 - Incentives in BitTorrent induce free riding.pdf) | bin | 203312 -> 203312 bytes | |||
-rw-r--r-- | docs/P2PECON'05_-_KARMA.pdf (renamed from docs/P2PECON'05 - KARMA.pdf) | bin | 119291 -> 119291 bytes | |||
-rw-r--r-- | docs/P2PECON'05_-_Self-recharging_virtual_currency.pdf (renamed from docs/P2PECON'05 - Self-recharging virtual currency.pdf) | bin | 139169 -> 139169 bytes | |||
-rw-r--r-- | docs/P2PEcon'04_-_SWIFT.pdf (renamed from docs/P2PEcon'04 - SWIFT.pdf) | bin | 96545 -> 96545 bytes | |||
-rw-r--r-- | docs/P2PEcon'05_-_A_new_mechanism_for_the_free-rider_problem.pdf (renamed from docs/P2PEcon'05 - A new mechanism for the free-rider problem.pdf) | bin | 144169 -> 144169 bytes | |||
-rw-r--r-- | docs/PAM'04_-_Dissecting_bittorrent.pdf (renamed from docs/PAM'04 - Dissecting bittorrent.pdf) | bin | 208806 -> 208806 bytes | |||
-rw-r--r-- | docs/PASSAT'11_-_Multiparty_linear_programming.pdf (renamed from docs/PASSAT'11 - Multiparty linear programming.pdf) | bin | 323020 -> 323020 bytes | |||
-rw-r--r-- | docs/PETS'11_-_An_Accurate_System-Wide_Anonymity_Metric_for_Probabilistic_Attacks.pdf (renamed from docs/PETS'11 - An Accurate System-Wide Anonymity Metric for Probabilistic Attacks.pdf) | bin | 264210 -> 264210 bytes | |||
-rw-r--r-- | docs/PETS'11_-_DefenestraTor.pdf (renamed from docs/PETS'11 - DefenestraTor.pdf) | bin | 772304 -> 772304 bytes | |||
-rw-r--r-- | docs/PINS'04_-__Free-riding_and_whitewashing_in_P2P_systems.pdf (renamed from docs/PINS'04 - Free-riding and whitewashing in P2P systems.pdf) | bin | 121347 -> 121347 bytes | |||
-rw-r--r-- | docs/PNAS_(2003)_-_The_evolution_of_altruistic_punishment.pdf (renamed from docs/PNAS (2003) - The evolution of altruistic punishment.pdf) | bin | 239344 -> 239344 bytes | |||
-rw-r--r-- | docs/PNAS_-_Nash_-_Equilibrium_points_in_n-person_games.pdf (renamed from docs/PNAS - Nash - Equilibrium points in n-person games.pdf) | bin | 235487 -> 235487 bytes | |||
-rw-r--r-- | docs/PODC'02_-_Building_secure_file_systems_out_of_Byzantine_storage.pdf (renamed from docs/PODC'02 - Building secure file systems out of Byzantine storage.pdf) | bin | 159568 -> 159568 bytes | |||
-rw-r--r-- | docs/PODC'06_-_Peer_counting_and_sampling_in_overlay_networks.pdf (renamed from docs/PODC'06 - Peer counting and sampling in overlay networks.pdf) | bin | 208212 -> 208212 bytes | |||
-rw-r--r-- | docs/Peek-a-Boo,_I_Still_See_You:_Why_Efficient_Traffic_Analysis_Countermeasures_Fail.pdf (renamed from docs/Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail.pdf) | bin | 652864 -> 652864 bytes | |||
-rw-r--r-- | docs/Prospects_for_Remailers.pdf (renamed from docs/Prospects for Remailers.pdf) | bin | 97840 -> 97840 bytes | |||
-rw-r--r-- | docs/Reed_&_Solomon_-_Polynomial_Codes_Over_Certain_Finite_Fields.pdf (renamed from docs/Reed & Solomon - Polynomial Codes Over Certain Finite Fields.pdf) | 0 | ||||
-rw-r--r-- | docs/SAINT'03_-_Kwon_&_Ryu.pdf (renamed from docs/SAINT'03 - Kwon & Ryu.pdf) | bin | 339233 -> 339233 bytes | |||
-rw-r--r-- | docs/SAINT'07_-_Local_production,_local_consumption_p2p_architecture.pdf (renamed from docs/SAINT'07 - Local production, local consumption p2p architecture.pdf) | bin | 1096754 -> 1096754 bytes | |||
-rw-r--r-- | docs/SASO'07_-_Garbacki,_Epema_&_van_Steen.pdf (renamed from docs/SASO'07 - Garbacki, Epema & van Steen.pdf) | bin | 407897 -> 407897 bytes | |||
-rw-r--r-- | docs/SELMAS_-_Software_framework_for_automated_negotiation.pdf (renamed from docs/SELMAS - Software framework for automated negotiation.pdf) | bin | 339107 -> 339107 bytes | |||
-rw-r--r-- | docs/SIGCOMM'03_-_On_selfish_routing_in_internet-like_environments.pdf (renamed from docs/SIGCOMM'03 - On selfish routing in internet-like environments.pdf) | bin | 228887 -> 228887 bytes | |||
-rw-r--r-- | docs/SIGCOMM'03_-_The_impact_of_DHT_routing_geometry_on_resilience_and_proximity.pdf (renamed from docs/SIGCOMM'03 - The impact of DHT routing geometry on resilience and proximity.pdf) | bin | 420760 -> 420760 bytes | |||
-rw-r--r-- | docs/SIGCOMM'04_-_Qui_&_Srikant_-_Modeling_and_performance_analysis.pdf (renamed from docs/SIGCOMM'04 - Qui & Srikant - Modeling and performance analysis.pdf) | bin | 510688 -> 510688 bytes | |||
-rw-r--r-- | docs/SIGCOMM'06_-_SybilGuard.pdf (renamed from docs/SIGCOMM'06 - SybilGuard.pdf) | bin | 368617 -> 368617 bytes | |||
-rw-r--r-- | docs/SIGCOMM'08_-_Rationality_and_traffic_attraction.pdf (renamed from docs/SIGCOMM'08 - Rationality and traffic attraction.pdf) | bin | 386963 -> 386963 bytes | |||
-rw-r--r-- | docs/SIGCOMM'11_-_Uncovering_social_network_sybils.pdf (renamed from docs/SIGCOMM'11 - Uncovering social network sybils.pdf) | bin | 536897 -> 536897 bytes | |||
-rw-r--r-- | docs/SIGCOMM'87_-_Strategies_for_decentralized_resource_management.pdf (renamed from docs/SIGCOMM'87 - Strategies for decentralized resource management.pdf) | bin | 1172234 -> 1172234 bytes | |||
-rw-r--r-- | docs/SIGCOMM_Comp._Comm._Rev._-_Minimizing_churn_in_distributed_systems.pdf (renamed from docs/SIGCOMM Comp. Comm. Rev. - Minimizing churn in distributed systems.pdf) | bin | 493993 -> 493993 bytes | |||
-rw-r--r-- | docs/SIGCOMM_Compt._Commun._Rev._-_Vivaldi.pdf (renamed from docs/SIGCOMM Compt. Commun. Rev. - Vivaldi.pdf) | bin | 649008 -> 649008 bytes | |||
-rw-r--r-- | docs/SIGCOMM_Comput._Commun._Rev._-_BitTorrent_is_an_Auction.pdf (renamed from docs/SIGCOMM Comput. Commun. Rev. - BitTorrent is an Auction.pdf) | bin | 362312 -> 362312 bytes | |||
-rw-r--r-- | docs/SIGCOMM_Comput._Commun._Rev._-_P4P:_Provider_Portal_for_Applications.pdf (renamed from docs/SIGCOMM Comput. Commun. Rev. - P4P: Provider Portal for Applications.pdf) | bin | 507572 -> 507572 bytes | |||
-rw-r--r-- | docs/SIGCOMM_Comput._Commun._Rev._-_Practical,_distributed_network_coordinates.pdf (renamed from docs/SIGCOMM Comput. Commun. Rev. - Practical, distributed network coordinates.pdf) | bin | 277622 -> 277622 bytes | |||
-rw-r--r-- | docs/SIGCOMM_Comput._Commun._Rev._-_Securing_Internet_Coordinate_Embedding_Systems.pdf (renamed from docs/SIGCOMM Comput. Commun. Rev. - Securing Internet Coordinate Embedding Systems.pdf) | 0 | ||||
-rw-r--r-- | docs/SIGCOMM_Comput._Commun._Rev_-_Network_Coding:_an_Instant_Primer.pdf (renamed from docs/SIGCOMM Comput. Commun. Rev - Network Coding: an Instant Primer.pdf) | bin | 145102 -> 145102 bytes | |||
-rw-r--r-- | docs/SIGCOMM_Computers_Communication_Review_-_Bubblestorm.pdf (renamed from docs/SIGCOMM Computers Communication Review - Bubblestorm.pdf) | bin | 776426 -> 776426 bytes | |||
-rw-r--r-- | docs/SIGKDD_Explor._Newsl._-_Distributed_data_mining.pdf (renamed from docs/SIGKDD Explor. Newsl. - Distributed data mining.pdf) | bin | 125039 -> 125039 bytes | |||
-rw-r--r-- | docs/SIGMETRICS'05_-_Bharambe,_Herley_&_Padmanabhan.pdf (renamed from docs/SIGMETRICS'05 - Bharambe, Herley & Padmanabhan.pdf) | 0 | ||||
-rw-r--r-- | docs/SIGMETRICS'05_-_Coupon_replication_systems.pdf (renamed from docs/SIGMETRICS'05 - Coupon replication systems.pdf) | bin | 239323 -> 239323 bytes | |||
-rw-r--r-- | docs/SIGOPS_-_FARSITE.pdf (renamed from docs/SIGOPS - FARSITE.pdf) | bin | 290248 -> 290248 bytes | |||
-rw-r--r-- | docs/SIGOSP'03_-_Spitstream:_High-bandwidth_multicast.pdf (renamed from docs/SIGOSP'03 - Spitstream: High-bandwidth multicast.pdf) | bin | 1650124 -> 1650124 bytes | |||
-rw-r--r-- | docs/SIGecom_Exch._(5)_-_Overcoming_free-riding_behavior.pdf (renamed from docs/SIGecom Exch. (5) - Overcoming free-riding behavior.pdf) | bin | 119236 -> 119236 bytes | |||
-rw-r--r-- | docs/SODA'04_-_Network_failure_detection_and_graph_connectivity%0A.pdf (renamed from docs/SODA'04 - Network failure detection and graph connectivity%0A.pdf) | bin | 172158 -> 172158 bytes | |||
-rw-r--r-- | docs/SOSP'03_-_Bullet.pdf (renamed from docs/SOSP'03 - Bullet.pdf) | bin | 375512 -> 375512 bytes | |||
-rw-r--r-- | docs/SPAA'05_-_Selfish_routing_with_incomplete_information.pdf (renamed from docs/SPAA'05 - Selfish routing with incomplete information.pdf) | bin | 630211 -> 630211 bytes | |||
-rw-r--r-- | docs/SRDS'06_-_Cryptree.pdf (renamed from docs/SRDS'06 - Cryptree.pdf) | bin | 339393 -> 339393 bytes | |||
-rw-r--r-- | docs/STACS'99_-_Nisan_-_Algorithms_for_selfish_agents.pdf (renamed from docs/STACS'99 - Nisan - Algorithms for selfish agents.pdf) | bin | 239886 -> 239886 bytes | |||
-rw-r--r-- | docs/STOC'08_-_Optimal_mechanism_design_and_money_burning.pdf (renamed from docs/STOC'08 - Optimal mechanism design and money burning.pdf) | bin | 282489 -> 282489 bytes | |||
-rw-r--r-- | docs/STOC'97_-_Practical_Loss-Resilient_Codes.pdf (renamed from docs/STOC'97 - Practical Loss-Resilient Codes.pdf) | bin | 159206 -> 159206 bytes | |||
-rw-r--r-- | docs/STOC'99_-_Nisan_&_Ronen_-_Algorithmic_mechanism_design.pdf (renamed from docs/STOC'99 - Nisan & Ronen - Algorithmic mechanism design.pdf) | bin | 321145 -> 321145 bytes | |||
-rw-r--r-- | docs/Saito_-_i-WAT_Dissertation.pdf (renamed from docs/Saito - i-WAT Dissertation.pdf) | bin | 14256574 -> 14256574 bytes | |||
-rw-r--r-- | docs/Schollmeier_-_Signaling_and_networking_in_unstructured_p2p_networks.pdf (renamed from docs/Schollmeier - Signaling and networking in unstructured p2p networks.pdf) | bin | 5555941 -> 5555941 bytes | |||
-rw-r--r-- | docs/Science_-_Hardin_-_The_Tragedy_of_the_Commons.pdf (renamed from docs/Science - Hardin - The Tragedy of the Commons.pdf) | bin | 341229 -> 341229 bytes | |||
-rw-r--r-- | docs/Secure_Collaborative_Planning_Forecasting_and_Replenishment.pdf (renamed from docs/Secure Collaborative Planning Forecasting and Replenishment.pdf) | bin | 556200 -> 556200 bytes | |||
-rw-r--r-- | docs/TISSEC_-_PEREA.pdf (renamed from docs/TISSEC - PEREA.pdf) | bin | 983616 -> 983616 bytes | |||
-rw-r--r-- | docs/Tech_Report_-_A_Survey_of_Solutions_to_the_Sybil_Attack.pdf (renamed from docs/Tech Report - A Survey of Solutions to the Sybil Attack.pdf) | bin | 140676 -> 140676 bytes | |||
-rw-r--r-- | docs/Tech_Report_-_Analyzing_peer_behavior_in_KAD.pdf (renamed from docs/Tech Report - Analyzing peer behavior in KAD.pdf) | bin | 1072069 -> 1072069 bytes | |||
-rw-r--r-- | docs/Tech_Report_-_Privacy_guarantees_through_DCS.pdf (renamed from docs/Tech Report - Privacy guarantees through DCS.pdf) | bin | 233931 -> 233931 bytes | |||
-rw-r--r-- | docs/Tech_report_-_DCOP_as_a_formal_model_of_PARC.pdf (renamed from docs/Tech report - DCOP as a formal model of PARC.pdf) | bin | 186769 -> 186769 bytes | |||
-rw-r--r-- | docs/Telex:_Anticensorship_in_the_Network_Infrastructure.pdf (renamed from docs/Telex: Anticensorship in the Network Infrastructure.pdf) | bin | 2482127 -> 2482127 bytes | |||
-rw-r--r-- | docs/Thesis_-_Autonomic_distributed_systems.pdf (renamed from docs/Thesis - Autonomic distributed systems.pdf) | bin | 1584594 -> 1584594 bytes | |||
-rw-r--r-- | docs/Thesis_-_F.Schadd.pdf (renamed from docs/Thesis - F.Schadd.pdf) | bin | 1228723 -> 1228723 bytes | |||
-rw-r--r-- | docs/Thesis_-_P.Harvey.pdf (renamed from docs/Thesis - P.Harvey.pdf) | bin | 1461610 -> 1461610 bytes | |||
-rw-r--r-- | docs/Trivers_-_The_evolution_of_reciprocal_altruism.pdf (renamed from docs/Trivers - The evolution of reciprocal altruism.pdf) | bin | 504072 -> 504072 bytes | |||
-rw-r--r-- | docs/USENIX_-_PIR-Tor.pdf (renamed from docs/USENIX - PIR-Tor.pdf) | bin | 529570 -> 529570 bytes | |||
-rw-r--r-- | docs/USENIX_Security'10_-_SEPIA.pdf (renamed from docs/USENIX Security'10 - SEPIA.pdf) | bin | 513008 -> 513008 bytes | |||
-rw-r--r-- | docs/User-Perceived_Performance_of_the_NICE_Application_Layer_Multicast_Protocol_in_Large_and_Highly_Dynamic_Groups_1.pdf (renamed from docs/User-Perceived Performance of the NICE Application Layer Multicast Protocol in Large and Highly Dynamic Groups_1.pdf) | bin | 700467 -> 700467 bytes | |||
-rw-r--r-- | docs/WEIS'05_-_Moore_-_Counterin_hidden-action_attacks.pdf (renamed from docs/WEIS'05 - Moore - Counterin hidden-action attacks.pdf) | bin | 137878 -> 137878 bytes | |||
-rw-r--r-- | docs/WIAPP'03_-_Deconstructing_the_Kazaa_network.pdf (renamed from docs/WIAPP'03 - Deconstructing the Kazaa network.pdf) | bin | 331345 -> 331345 bytes | |||
-rw-r--r-- | docs/WPES'04_-_Forecasting_and_benchamking.pdf (renamed from docs/WPES'04 - Forecasting and benchamking.pdf) | bin | 238177 -> 238177 bytes | |||
-rw-r--r-- | docs/WPES'11_-_FAUST.pdf (renamed from docs/WPES'11 - FAUST.pdf) | bin | 241209 -> 241209 bytes | |||
-rw-r--r-- | docs/WPES'11_-_Fingerprinting.pdf (renamed from docs/WPES'11 - Fingerprinting.pdf) | bin | 476010 -> 476010 bytes | |||
-rw-r--r-- | docs/WPES'11_-_bridgeSPA.pdf (renamed from docs/WPES'11 - bridgeSPA.pdf) | bin | 186580 -> 186580 bytes | |||
-rw-r--r-- | docs/WWW'03_-_The_EigenTrust_algorithm.pdf (renamed from docs/WWW'03 - The EigenTrust algorithm.pdf) | bin | 223109 -> 223109 bytes | |||
-rw-r--r-- | docs/WiOpt'03_-_Buchegger_&_Le_Boudec_-_Reputation_Systems.pdf (renamed from docs/WiOpt'03 - Buchegger & Le Boudec - Reputation Systems.pdf) | bin | 167171 -> 167171 bytes | |||
-rw-r--r-- | docs/Workshop_on_Economics_of_P2P_Systems'03_-_Chun,_Fu_&_Vahdat.pdf (renamed from docs/Workshop on Economics of P2P Systems'03 - Chun, Fu & Vahdat.pdf) | bin | 282657 -> 282657 bytes | |||
-rw-r--r-- | docs/eScholarship_UC_item_4x6723n2.pdf (renamed from docs/eScholarship UC item 4x6723n2.pdf) | bin | 398273 -> 398273 bytes | |||
-rw-r--r-- | docs/hill_climbing.pdf (renamed from docs/hill climbing.pdf) | bin | 215057 -> 215057 bytes |
249 files changed, 0 insertions, 0 deletions
diff --git a/docs/10.1.1.27.1639 (2).pdf b/docs/10.1.1.27.1639_(2).pdf index 2d9f36a..2d9f36a 100644 --- a/docs/10.1.1.27.1639 (2).pdf +++ b/docs/10.1.1.27.1639_(2).pdf | |||
Binary files differ | |||
diff --git a/docs/10.1.1.4.7003 (1).pdf b/docs/10.1.1.4.7003_(1).pdf index e908da1..e908da1 100644 --- a/docs/10.1.1.4.7003 (1).pdf +++ b/docs/10.1.1.4.7003_(1).pdf | |||
Binary files differ | |||
diff --git a/docs/2004-ISLPED-Energy-aware demand paging on NAND flash-based embedded storages.pdf b/docs/2004-ISLPED-Energy-aware_demand_paging_on_NAND_flash-based_embedded_storages.pdf index c587d3c..c587d3c 100644 --- a/docs/2004-ISLPED-Energy-aware demand paging on NAND flash-based embedded storages.pdf +++ b/docs/2004-ISLPED-Energy-aware_demand_paging_on_NAND_flash-based_embedded_storages.pdf | |||
Binary files differ | |||
diff --git a/docs/A02370_DF_CFP_SpringerOpen SI CFP EURASIP JWCN_Global_A42.pdf b/docs/A02370_DF_CFP_SpringerOpen_SI_CFP_EURASIP_JWCN_Global_A42.pdf index e4cb993..e4cb993 100644 --- a/docs/A02370_DF_CFP_SpringerOpen SI CFP EURASIP JWCN_Global_A42.pdf +++ b/docs/A02370_DF_CFP_SpringerOpen_SI_CFP_EURASIP_JWCN_Global_A42.pdf | |||
Binary files differ | |||
diff --git a/docs/AAAI'08 - Local search for DCOP.pdf b/docs/AAAI'08_-_Local_search_for_DCOP.pdf index 5d2c000..5d2c000 100644 --- a/docs/AAAI'08 - Local search for DCOP.pdf +++ b/docs/AAAI'08_-_Local_search_for_DCOP.pdf | |||
Binary files differ | |||
diff --git a/docs/AAAI'96 - Mixed constraint satisfaction.pdf b/docs/AAAI'96_-_Mixed_constraint_satisfaction.pdf index 39429f6..39429f6 100644 --- a/docs/AAAI'96 - Mixed constraint satisfaction.pdf +++ b/docs/AAAI'96_-_Mixed_constraint_satisfaction.pdf | |||
Binary files differ | |||
diff --git a/docs/AAMAS'05 - Accelerating the DCOP algorithm ADOPT.pdf b/docs/AAMAS'05_-_Accelerating_the_DCOP_algorithm_ADOPT.pdf index 12af360..12af360 100644 --- a/docs/AAMAS'05 - Accelerating the DCOP algorithm ADOPT.pdf +++ b/docs/AAMAS'05_-_Accelerating_the_DCOP_algorithm_ADOPT.pdf | |||
Binary files differ | |||
diff --git a/docs/AAMAS08 - DCOP algorithms in a real world problem.pdf b/docs/AAMAS08_-_DCOP_algorithms_in_a_real_world_problem.pdf index 2bb19bb..2bb19bb 100644 --- a/docs/AAMAS08 - DCOP algorithms in a real world problem.pdf +++ b/docs/AAMAS08_-_DCOP_algorithms_in_a_real_world_problem.pdf | |||
Binary files differ | |||
diff --git a/docs/ACM Computing Surveys - A survey of p2p content distribution technologies.pdf b/docs/ACM_Computing_Surveys_-_A_survey_of_p2p_content_distribution_technologies.pdf index e7b930e..e7b930e 100644 --- a/docs/ACM Computing Surveys - A survey of p2p content distribution technologies.pdf +++ b/docs/ACM_Computing_Surveys_-_A_survey_of_p2p_content_distribution_technologies.pdf | |||
Binary files differ | |||
diff --git a/docs/ACM SIGCOMM'05 - Cheng & Friedman - Sybilproof reputation mechanisms.pdf b/docs/ACM_SIGCOMM'05_-_Cheng_&_Friedman_-_Sybilproof_reputation_mechanisms.pdf index e0c3a21..e0c3a21 100644 --- a/docs/ACM SIGCOMM'05 - Cheng & Friedman - Sybilproof reputation mechanisms.pdf +++ b/docs/ACM_SIGCOMM'05_-_Cheng_&_Friedman_-_Sybilproof_reputation_mechanisms.pdf | |||
Binary files differ | |||
diff --git a/docs/ACNS'05 - Garcia & Hoepman - Off-line Karma.pdf b/docs/ACNS'05_-_Garcia_&_Hoepman_-_Off-line_Karma.pdf index 0eda18e..0eda18e 100644 --- a/docs/ACNS'05 - Garcia & Hoepman - Off-line Karma.pdf +++ b/docs/ACNS'05_-_Garcia_&_Hoepman_-_Off-line_Karma.pdf | |||
Binary files differ | |||
diff --git a/docs/ACSAC'02 - A secure directory service based on exclusive encryption.pdf b/docs/ACSAC'02_-_A_secure_directory_service_based_on_exclusive_encryption.pdf index ff71ea5..ff71ea5 100644 --- a/docs/ACSAC'02 - A secure directory service based on exclusive encryption.pdf +++ b/docs/ACSAC'02_-_A_secure_directory_service_based_on_exclusive_encryption.pdf | |||
Binary files differ | |||
diff --git a/docs/ACSAC'11 - BACKLIT.pdf b/docs/ACSAC'11_-_BACKLIT.pdf index f233304..f233304 100644 --- a/docs/ACSAC'11 - BACKLIT.pdf +++ b/docs/ACSAC'11_-_BACKLIT.pdf | |||
Binary files differ | |||
diff --git a/docs/ACSAC'11 - Tortoise.pdf b/docs/ACSAC'11_-_Tortoise.pdf index dcfe109..dcfe109 100644 --- a/docs/ACSAC'11 - Tortoise.pdf +++ b/docs/ACSAC'11_-_Tortoise.pdf | |||
Binary files differ | |||
diff --git a/docs/AIMS'09 - Sybil attacks protection schemes in KAD.pdf b/docs/AIMS'09_-_Sybil_attacks_protection_schemes_in_KAD.pdf index 7b36d3a..7b36d3a 100644 --- a/docs/AIMS'09 - Sybil attacks protection schemes in KAD.pdf +++ b/docs/AIMS'09_-_Sybil_attacks_protection_schemes_in_KAD.pdf | |||
Binary files differ | |||
diff --git a/docs/ARES'06 - Fair Trading of Information.pdf b/docs/ARES'06_-_Fair_Trading_of_Information.pdf index d2ac338..d2ac338 100644 --- a/docs/ARES'06 - Fair Trading of Information.pdf +++ b/docs/ARES'06_-_Fair_Trading_of_Information.pdf | |||
Binary files differ | |||
diff --git a/docs/ASIACRYPT'07 - IBBE with constant size ciphertexts and private keys.pdf b/docs/ASIACRYPT'07_-_IBBE_with_constant_size_ciphertexts_and_private_keys.pdf index d3ccf86..d3ccf86 100644 --- a/docs/ASIACRYPT'07 - IBBE with constant size ciphertexts and private keys.pdf +++ b/docs/ASIACRYPT'07_-_IBBE_with_constant_size_ciphertexts_and_private_keys.pdf | |||
Binary files differ | |||
diff --git a/docs/ATEC'04 - A network positioning system.pdf b/docs/ATEC'04_-_A_network_positioning_system.pdf index 1c704c4..1c704c4 100644 --- a/docs/ATEC'04 - A network positioning system.pdf +++ b/docs/ATEC'04_-_A_network_positioning_system.pdf | |||
Binary files differ | |||
diff --git a/docs/A Novel Testbed for P2P Networks.pdf b/docs/A_Novel_Testbed_for_P2P_Networks.pdf index 3a82807..3a82807 100644 --- a/docs/A Novel Testbed for P2P Networks.pdf +++ b/docs/A_Novel_Testbed_for_P2P_Networks.pdf | |||
Binary files differ | |||
diff --git a/docs/Amann - Secure asynchronous change notifications.pdf b/docs/Amann_-_Secure_asynchronous_change_notifications.pdf index d2e1aa6..d2e1aa6 100644 --- a/docs/Amann - Secure asynchronous change notifications.pdf +++ b/docs/Amann_-_Secure_asynchronous_change_notifications.pdf | |||
Binary files differ | |||
diff --git a/docs/Amnefelt & Svenningsson - Keso.pdf b/docs/Amnefelt_&_Svenningsson_-_Keso.pdf index 06e239c..06e239c 100644 --- a/docs/Amnefelt & Svenningsson - Keso.pdf +++ b/docs/Amnefelt_&_Svenningsson_-_Keso.pdf | |||
Binary files differ | |||
diff --git a/docs/Applied Intelligence - Combinatorial Auctions.pdf b/docs/Applied_Intelligence_-_Combinatorial_Auctions.pdf index 2fe6c00..2fe6c00 100644 --- a/docs/Applied Intelligence - Combinatorial Auctions.pdf +++ b/docs/Applied_Intelligence_-_Combinatorial_Auctions.pdf | |||
Binary files differ | |||
diff --git a/docs/Bogetoft et al. - Secure multiparty computation goes live.pdf b/docs/Bogetoft_et_al._-_Secure_multiparty_computation_goes_live.pdf index 23dd23f..23dd23f 100644 --- a/docs/Bogetoft et al. - Secure multiparty computation goes live.pdf +++ b/docs/Bogetoft_et_al._-_Secure_multiparty_computation_goes_live.pdf | |||
Binary files differ | |||
diff --git a/docs/Browne et al - A survey of MCTS methods.pdf b/docs/Browne_et_al_-_A_survey_of_MCTS_methods.pdf index 0f3bb99..0f3bb99 100644 --- a/docs/Browne et al - A survey of MCTS methods.pdf +++ b/docs/Browne_et_al_-_A_survey_of_MCTS_methods.pdf | |||
Binary files differ | |||
diff --git a/docs/Brumley & Tuveri - Timing Attacks.pdf b/docs/Brumley_&_Tuveri_-_Timing_Attacks.pdf index 11eb077..11eb077 100644 --- a/docs/Brumley & Tuveri - Timing Attacks.pdf +++ b/docs/Brumley_&_Tuveri_-_Timing_Attacks.pdf | |||
Binary files differ | |||
diff --git a/docs/CCS'03 - Yang & Garcia-Molina - PPay.pdf b/docs/CCS'03_-_Yang_&_Garcia-Molina_-_PPay.pdf index 486c420..486c420 100644 --- a/docs/CCS'03 - Yang & Garcia-Molina - PPay.pdf +++ b/docs/CCS'03_-_Yang_&_Garcia-Molina_-_PPay.pdf | |||
diff --git a/docs/CCS'06 - Attributed-based encryption for fine-grained access control of encrypted data.pdf b/docs/CCS'06_-_Attributed-based_encryption_for_fine-grained_access_control_of_encrypted_data.pdf index 0cf2242..0cf2242 100644 --- a/docs/CCS'06 - Attributed-based encryption for fine-grained access control of encrypted data.pdf +++ b/docs/CCS'06_-_Attributed-based_encryption_for_fine-grained_access_control_of_encrypted_data.pdf | |||
Binary files differ | |||
diff --git a/docs/CCS'07 - ABE with non-monotonic access structures.pdf b/docs/CCS'07_-_ABE_with_non-monotonic_access_structures.pdf index 6545658..6545658 100644 --- a/docs/CCS'07 - ABE with non-monotonic access structures.pdf +++ b/docs/CCS'07_-_ABE_with_non-monotonic_access_structures.pdf | |||
Binary files differ | |||
diff --git a/docs/CCS'08 - FairplayMP.pdf b/docs/CCS'08_-_FairplayMP.pdf index b7c50e6..b7c50e6 100644 --- a/docs/CCS'08 - FairplayMP.pdf +++ b/docs/CCS'08_-_FairplayMP.pdf | |||
Binary files differ | |||
diff --git a/docs/CCS'08 - Identity-based encryption with efficient revocation.pdf b/docs/CCS'08_-_Identity-based_encryption_with_efficient_revocation.pdf index 9bde934..9bde934 100644 --- a/docs/CCS'08 - Identity-based encryption with efficient revocation.pdf +++ b/docs/CCS'08_-_Identity-based_encryption_with_efficient_revocation.pdf | |||
Binary files differ | |||
diff --git a/docs/CCS'11 - Cirripede.pdf b/docs/CCS'11_-_Cirripede.pdf index 3059a44..3059a44 100644 --- a/docs/CCS'11 - Cirripede.pdf +++ b/docs/CCS'11_-_Cirripede.pdf | |||
Binary files differ | |||
diff --git a/docs/CCS'11 - Throughput-fingerprinting.pdf b/docs/CCS'11_-_Throughput-fingerprinting.pdf index 1d4e072..1d4e072 100644 --- a/docs/CCS'11 - Throughput-fingerprinting.pdf +++ b/docs/CCS'11_-_Throughput-fingerprinting.pdf | |||
Binary files differ | |||
diff --git a/docs/CCS'11 - Trust-based Anonymous Communication1.pdf b/docs/CCS'11_-_Trust-based_Anonymous_Communication1.pdf index ffd1c80..ffd1c80 100644 --- a/docs/CCS'11 - Trust-based Anonymous Communication1.pdf +++ b/docs/CCS'11_-_Trust-based_Anonymous_Communication1.pdf | |||
Binary files differ | |||
diff --git a/docs/CG'06 - Selectivity and backup operators in MCTS.pdf b/docs/CG'06_-_Selectivity_and_backup_operators_in_MCTS.pdf index bc95b93..bc95b93 100644 --- a/docs/CG'06 - Selectivity and backup operators in MCTS.pdf +++ b/docs/CG'06_-_Selectivity_and_backup_operators_in_MCTS.pdf | |||
Binary files differ | |||
diff --git a/docs/CIA'04 - Despotovic & Aberer - Peers' performance in P2P networks.pdf b/docs/CIA'04_-_Despotovic_&_Aberer_-_Peers'_performance_in_P2P_networks.pdf index 22e8041..22e8041 100644 --- a/docs/CIA'04 - Despotovic & Aberer - Peers' performance in P2P networks.pdf +++ b/docs/CIA'04_-_Despotovic_&_Aberer_-_Peers'_performance_in_P2P_networks.pdf | |||
Binary files differ | |||
diff --git a/docs/CRYPTO'02 - The LSD broadcast encryption scheme.pdf b/docs/CRYPTO'02_-_The_LSD_broadcast_encryption_scheme.pdf index 155152b..155152b 100644 --- a/docs/CRYPTO'02 - The LSD broadcast encryption scheme.pdf +++ b/docs/CRYPTO'02_-_The_LSD_broadcast_encryption_scheme.pdf | |||
Binary files differ | |||
diff --git a/docs/CRYPTO'84 - El Gamal - Public Key Cryptosystem.pdf b/docs/CRYPTO'84_-_El_Gamal_-_Public_Key_Cryptosystem.pdf index 73c3532..73c3532 100644 --- a/docs/CRYPTO'84 - El Gamal - Public Key Cryptosystem.pdf +++ b/docs/CRYPTO'84_-_El_Gamal_-_Public_Key_Cryptosystem.pdf | |||
Binary files differ | |||
diff --git a/docs/CSET'11 - ExperimenTor.pdf b/docs/CSET'11_-_ExperimenTor.pdf index 97b9027..97b9027 100644 --- a/docs/CSET'11 - ExperimenTor.pdf +++ b/docs/CSET'11_-_ExperimenTor.pdf | |||
Binary files differ | |||
diff --git a/docs/CaberNet Radicals Workshop - Puzzles in P2P Systems.pdf b/docs/CaberNet_Radicals_Workshop_-_Puzzles_in_P2P_Systems.pdf index 6428d54..6428d54 100644 --- a/docs/CaberNet Radicals Workshop - Puzzles in P2P Systems.pdf +++ b/docs/CaberNet_Radicals_Workshop_-_Puzzles_in_P2P_Systems.pdf | |||
Binary files differ | |||
diff --git a/docs/ChinaCom'06 - Combating hidden action in unstructured p2p systems.pdf b/docs/ChinaCom'06_-_Combating_hidden_action_in_unstructured_p2p_systems.pdf index 8c4b87c..8c4b87c 100644 --- a/docs/ChinaCom'06 - Combating hidden action in unstructured p2p systems.pdf +++ b/docs/ChinaCom'06_-_Combating_hidden_action_in_unstructured_p2p_systems.pdf | |||
Binary files differ | |||
diff --git a/docs/CoRR - Critical look at decentralization.pdf b/docs/CoRR_-_Critical_look_at_decentralization.pdf index 690a15e..690a15e 100644 --- a/docs/CoRR - Critical look at decentralization.pdf +++ b/docs/CoRR_-_Critical_look_at_decentralization.pdf | |||
Binary files differ | |||
diff --git a/docs/CoRR - X-Vine.pdf b/docs/CoRR_-_X-Vine.pdf index 02c98c8..02c98c8 100644 --- a/docs/CoRR - X-Vine.pdf +++ b/docs/CoRR_-_X-Vine.pdf | |||
Binary files differ | |||
diff --git a/docs/Combining Virtual and Physical Structures for Self-organized Routing_0.pdf b/docs/Combining_Virtual_and_Physical_Structures_for_Self-organized_Routing_0.pdf index 2033a80..2033a80 100644 --- a/docs/Combining Virtual and Physical Structures for Self-organized Routing_0.pdf +++ b/docs/Combining_Virtual_and_Physical_Structures_for_Self-organized_Routing_0.pdf | |||
Binary files differ | |||
diff --git a/docs/Communications of the ACM - Reputation Systems.pdf b/docs/Communications_of_the_ACM_-_Reputation_Systems.pdf index a85509e..a85509e 100644 --- a/docs/Communications of the ACM - Reputation Systems.pdf +++ b/docs/Communications_of_the_ACM_-_Reputation_Systems.pdf | |||
Binary files differ | |||
diff --git a/docs/Compcon '97 - Privacy-enhancing Technologies for the Internet.pdf b/docs/Compcon_'97_-_Privacy-enhancing_Technologies_for_the_Internet.pdf index 2577ad0..2577ad0 100644 --- a/docs/Compcon '97 - Privacy-enhancing Technologies for the Internet.pdf +++ b/docs/Compcon_'97_-_Privacy-enhancing_Technologies_for_the_Internet.pdf | |||
Binary files differ | |||
diff --git a/docs/Computer Networks - Wang, Chiu & Lui - Overlay network traffic on ISP peering.pdf b/docs/Computer_Networks_-_Wang,_Chiu_&_Lui_-_Overlay_network_traffic_on_ISP_peering.pdf index a5d7778..a5d7778 100644 --- a/docs/Computer Networks - Wang, Chiu & Lui - Overlay network traffic on ISP peering.pdf +++ b/docs/Computer_Networks_-_Wang,_Chiu_&_Lui_-_Overlay_network_traffic_on_ISP_peering.pdf | |||
Binary files differ | |||
diff --git a/docs/Concurrency and Computation - TRIBLER.pdf b/docs/Concurrency_and_Computation_-_TRIBLER.pdf index 2650336..2650336 100644 --- a/docs/Concurrency and Computation - TRIBLER.pdf +++ b/docs/Concurrency_and_Computation_-_TRIBLER.pdf | |||
Binary files differ | |||
diff --git a/docs/DIALM'02 - Feigenbaum & Shenker - Distributed algorithmic mechanism design.pdf b/docs/DIALM'02_-_Feigenbaum_&_Shenker_-_Distributed_algorithmic_mechanism_design.pdf index 0f0ec16..0f0ec16 100644 --- a/docs/DIALM'02 - Feigenbaum & Shenker - Distributed algorithmic mechanism design.pdf +++ b/docs/DIALM'02_-_Feigenbaum_&_Shenker_-_Distributed_algorithmic_mechanism_design.pdf | |||
Binary files differ | |||
diff --git a/docs/DP5: A Private Presence Service.pdf b/docs/DP5:_A_Private_Presence_Service.pdf index c91e3ef..c91e3ef 100644 --- a/docs/DP5: A Private Presence Service.pdf +++ b/docs/DP5:_A_Private_Presence_Service.pdf | |||
Binary files differ | |||
diff --git a/docs/Dellarocas - Reputation Mechanisms.pdf b/docs/Dellarocas_-_Reputation_Mechanisms.pdf index 309571c..309571c 100644 --- a/docs/Dellarocas - Reputation Mechanisms.pdf +++ b/docs/Dellarocas_-_Reputation_Mechanisms.pdf | |||
Binary files differ | |||
diff --git a/docs/Dependent Link Padding Algorithms for.pdf b/docs/Dependent_Link_Padding_Algorithms_for.pdf index fe760b1..fe760b1 100644 --- a/docs/Dependent Link Padding Algorithms for.pdf +++ b/docs/Dependent_Link_Padding_Algorithms_for.pdf | |||
Binary files differ | |||
diff --git a/docs/Duminuco & Biersack - Hierarchical Codes.pdf b/docs/Duminuco_&_Biersack_-_Hierarchical_Codes.pdf index 4e44699..4e44699 100644 --- a/docs/Duminuco & Biersack - Hierarchical Codes.pdf +++ b/docs/Duminuco_&_Biersack_-_Hierarchical_Codes.pdf | |||
Binary files differ | |||
diff --git a/docs/EC'04 - Robust incentive techniques for P2P networks.pdf b/docs/EC'04_-_Robust_incentive_techniques_for_P2P_networks.pdf index 5fa8c08..5fa8c08 100644 --- a/docs/EC'04 - Robust incentive techniques for P2P networks.pdf +++ b/docs/EC'04_-_Robust_incentive_techniques_for_P2P_networks.pdf | |||
Binary files differ | |||
diff --git a/docs/EC'05 - Hidden-action in multi-hop routing.pdf b/docs/EC'05_-_Hidden-action_in_multi-hop_routing.pdf index 2678ab2..2678ab2 100644 --- a/docs/EC'05 - Hidden-action in multi-hop routing.pdf +++ b/docs/EC'05_-_Hidden-action_in_multi-hop_routing.pdf | |||
Binary files differ | |||
diff --git a/docs/EC'06 - Incentive-compatible interdomain routing.pdf b/docs/EC'06_-_Incentive-compatible_interdomain_routing.pdf index 92d6288..92d6288 100644 --- a/docs/EC'06 - Incentive-compatible interdomain routing.pdf +++ b/docs/EC'06_-_Incentive-compatible_interdomain_routing.pdf | |||
Binary files differ | |||
diff --git a/docs/EC'08 - Why share in peer-to-peer networks.pdf b/docs/EC'08_-_Why_share_in_peer-to-peer_networks.pdf index b259037..b259037 100644 --- a/docs/EC'08 - Why share in peer-to-peer networks.pdf +++ b/docs/EC'08_-_Why_share_in_peer-to-peer_networks.pdf | |||
Binary files differ | |||
diff --git a/docs/EC'09 - Sybilproof transitive trust protocols.pdf b/docs/EC'09_-_Sybilproof_transitive_trust_protocols.pdf index 2a949d1..2a949d1 100644 --- a/docs/EC'09 - Sybilproof transitive trust protocols.pdf +++ b/docs/EC'09_-_Sybilproof_transitive_trust_protocols.pdf | |||
Binary files differ | |||
diff --git a/docs/EUROCRYPT'05 - Fuzzy Identity-Based Encryption.pdf b/docs/EUROCRYPT'05_-_Fuzzy_Identity-Based_Encryption.pdf index 675fd94..675fd94 100644 --- a/docs/EUROCRYPT'05 - Fuzzy Identity-Based Encryption.pdf +++ b/docs/EUROCRYPT'05_-_Fuzzy_Identity-Based_Encryption.pdf | |||
Binary files differ | |||
diff --git a/docs/EUROCRYPT'89 - Waidner&Pfitzmann - The dining cryptographers in the disco .pdf b/docs/EUROCRYPT'89_-_Waidner&Pfitzmann_-_The_dining_cryptographers_in_the_disco_.pdf index e40a3e0..e40a3e0 100644 --- a/docs/EUROCRYPT'89 - Waidner&Pfitzmann - The dining cryptographers in the disco .pdf +++ b/docs/EUROCRYPT'89_-_Waidner&Pfitzmann_-_The_dining_cryptographers_in_the_disco_.pdf | |||
Binary files differ | |||
diff --git a/docs/EUROCRYPT'92 - Chaun & Pedersen - Transferred cash grows in size.PDF b/docs/EUROCRYPT'92_-_Chaun_&_Pedersen_-_Transferred_cash_grows_in_size.PDF index b32532f..b32532f 100644 --- a/docs/EUROCRYPT'92 - Chaun & Pedersen - Transferred cash grows in size.PDF +++ b/docs/EUROCRYPT'92_-_Chaun_&_Pedersen_-_Transferred_cash_grows_in_size.PDF | |||
diff --git a/docs/Erdős & Rényi - On Random Graphs.pdf b/docs/Erdős_&_Rényi_-_On_Random_Graphs.pdf index 1676869..1676869 100644 --- a/docs/Erdős & Rényi - On Random Graphs.pdf +++ b/docs/Erdős_&_Rényi_-_On_Random_Graphs.pdf | |||
Binary files differ | |||
diff --git a/docs/Euro-Par'05 - Pastis.pdf b/docs/Euro-Par'05_-_Pastis.pdf index f32d541..f32d541 100644 --- a/docs/Euro-Par'05 - Pastis.pdf +++ b/docs/Euro-Par'05_-_Pastis.pdf | |||
Binary files differ | |||
diff --git a/docs/FAST'09 - Open-source erasure coding libraries for storage.pdf b/docs/FAST'09_-_Open-source_erasure_coding_libraries_for_storage.pdf index 0a21ed6..0a21ed6 100644 --- a/docs/FAST'09 - Open-source erasure coding libraries for storage.pdf +++ b/docs/FAST'09_-_Open-source_erasure_coding_libraries_for_storage.pdf | |||
Binary files differ | |||
diff --git a/docs/FC'11 - BNymble.pdf b/docs/FC'11_-_BNymble.pdf index 22dbb4a..22dbb4a 100644 --- a/docs/FC'11 - BNymble.pdf +++ b/docs/FC'11_-_BNymble.pdf | |||
Binary files differ | |||
diff --git a/docs/FC'11 - Malice versus AN.ON_.pdf b/docs/FC'11_-_Malice_versus_AN.ON_.pdf index c04c4d3..c04c4d3 100644 --- a/docs/FC'11 - Malice versus AN.ON_.pdf +++ b/docs/FC'11_-_Malice_versus_AN.ON_.pdf | |||
Binary files differ | |||
diff --git a/docs/FC'11 - Proximax.pdf b/docs/FC'11_-_Proximax.pdf index 9c1f7bf..9c1f7bf 100644 --- a/docs/FC'11 - Proximax.pdf +++ b/docs/FC'11_-_Proximax.pdf | |||
Binary files differ | |||
diff --git a/docs/FC'12 - Congestion-aware Path Selection for Tor.pdf b/docs/FC'12_-_Congestion-aware_Path_Selection_for_Tor.pdf index 9e48007..9e48007 100644 --- a/docs/FC'12 - Congestion-aware Path Selection for Tor.pdf +++ b/docs/FC'12_-_Congestion-aware_Path_Selection_for_Tor.pdf | |||
Binary files differ | |||
diff --git a/docs/FGCS - P2P Contracts: a Framework for Resource and Service Exchange.pdf b/docs/FGCS_-_P2P_Contracts:_a_Framework_for_Resource_and_Service_Exchange.pdf index f3c11f0..f3c11f0 100644 --- a/docs/FGCS - P2P Contracts: a Framework for Resource and Service Exchange.pdf +++ b/docs/FGCS_-_P2P_Contracts:_a_Framework_for_Resource_and_Service_Exchange.pdf | |||
Binary files differ | |||
diff --git a/docs/FOCI'11 - Decoy Routing: Toward Unblockable Internet Communication.pdf b/docs/FOCI'11_-_Decoy_Routing:_Toward_Unblockable_Internet_Communication.pdf index 5590429..5590429 100644 --- a/docs/FOCI'11 - Decoy Routing: Toward Unblockable Internet Communication.pdf +++ b/docs/FOCI'11_-_Decoy_Routing:_Toward_Unblockable_Internet_Communication.pdf | |||
Binary files differ | |||
diff --git a/docs/FREENIX'01 - A transparent cryptographic file system for UNIX.pdf b/docs/FREENIX'01_-_A_transparent_cryptographic_file_system_for_UNIX.pdf index e340329..e340329 100644 --- a/docs/FREENIX'01 - A transparent cryptographic file system for UNIX.pdf +++ b/docs/FREENIX'01_-_A_transparent_cryptographic_file_system_for_UNIX.pdf | |||
Binary files differ | |||
diff --git a/docs/Feldman, Lai, Chuang & Stoica - Quantifying disincentives in peer-to-peer networks.pdf b/docs/Feldman,_Lai,_Chuang_&_Stoica_-_Quantifying_disincentives_in_peer-to-peer_networks.pdf index 4e2fc77..4e2fc77 100644 --- a/docs/Feldman, Lai, Chuang & Stoica - Quantifying disincentives in peer-to-peer networks.pdf +++ b/docs/Feldman,_Lai,_Chuang_&_Stoica_-_Quantifying_disincentives_in_peer-to-peer_networks.pdf | |||
Binary files differ | |||
diff --git a/docs/Finite-length analysis of low-density parity-check codes on.pdf b/docs/Finite-length_analysis_of_low-density_parity-check_codes_on.pdf index 51c91c2..51c91c2 100644 --- a/docs/Finite-length analysis of low-density parity-check codes on.pdf +++ b/docs/Finite-length_analysis_of_low-density_parity-check_codes_on.pdf | |||
Binary files differ | |||
diff --git a/docs/Formalizing Anonymous Blacklisting Systems.pdf b/docs/Formalizing_Anonymous_Blacklisting_Systems.pdf index bad209a..bad209a 100644 --- a/docs/Formalizing Anonymous Blacklisting Systems.pdf +++ b/docs/Formalizing_Anonymous_Blacklisting_Systems.pdf | |||
Binary files differ | |||
diff --git a/docs/GECON'04 - Designing incentive mechanisms for p2p systems.pdf b/docs/GECON'04_-_Designing_incentive_mechanisms_for_p2p_systems.pdf index 88ed6ab..88ed6ab 100644 --- a/docs/GECON'04 - Designing incentive mechanisms for p2p systems.pdf +++ b/docs/GECON'04_-_Designing_incentive_mechanisms_for_p2p_systems.pdf | |||
Binary files differ | |||
diff --git a/docs/Ghodsi - Distributed k-ary System.pdf b/docs/Ghodsi_-_Distributed_k-ary_System.pdf index f96cf7f..f96cf7f 100644 --- a/docs/Ghodsi - Distributed k-ary System.pdf +++ b/docs/Ghodsi_-_Distributed_k-ary_System.pdf | |||
Binary files differ | |||
diff --git a/docs/Grid Computing - Estimating The Size Of Peer-To-Peer Networks.pdf b/docs/Grid_Computing_-_Estimating_The_Size_Of_Peer-To-Peer_Networks.pdf index 0249094..0249094 100644 --- a/docs/Grid Computing - Estimating The Size Of Peer-To-Peer Networks.pdf +++ b/docs/Grid_Computing_-_Estimating_The_Size_Of_Peer-To-Peer_Networks.pdf | |||
Binary files differ | |||
diff --git a/docs/Group Decision and Negociation - Automated Negociation.pdf b/docs/Group_Decision_and_Negociation_-_Automated_Negociation.pdf index 8da8a8a..8da8a8a 100644 --- a/docs/Group Decision and Negociation - Automated Negociation.pdf +++ b/docs/Group_Decision_and_Negociation_-_Automated_Negociation.pdf | |||
Binary files differ | |||
diff --git a/docs/HICSS'02 - A computational model of trust and reputation.pdf b/docs/HICSS'02_-_A_computational_model_of_trust_and_reputation.pdf index 22cf091..22cf091 100644 --- a/docs/HICSS'02 - A computational model of trust and reputation.pdf +++ b/docs/HICSS'02_-_A_computational_model_of_trust_and_reputation.pdf | |||
Binary files differ | |||
diff --git a/docs/HOT-P2P'05 - Khorshadi, Liu & Ghosal.pdf b/docs/HOT-P2P'05_-_Khorshadi,_Liu_&_Ghosal.pdf index 3652562..3652562 100644 --- a/docs/HOT-P2P'05 - Khorshadi, Liu & Ghosal.pdf +++ b/docs/HOT-P2P'05_-_Khorshadi,_Liu_&_Ghosal.pdf | |||
Binary files differ | |||
diff --git a/docs/HPDC'06 - Peer to peer size estimation in large and dynamic networks.pdf b/docs/HPDC'06_-_Peer_to_peer_size_estimation_in_large_and_dynamic_networks.pdf index aef799f..aef799f 100644 --- a/docs/HPDC'06 - Peer to peer size estimation in large and dynamic networks.pdf +++ b/docs/HPDC'06_-_Peer_to_peer_size_estimation_in_large_and_dynamic_networks.pdf | |||
Binary files differ | |||
diff --git a/docs/HotOS IX - High available, scalable storage, dynamic peer networks.pdf b/docs/HotOS_IX_-_High_available,_scalable_storage,_dynamic_peer_networks.pdf index 275eb15..275eb15 100644 --- a/docs/HotOS IX - High available, scalable storage, dynamic peer networks.pdf +++ b/docs/HotOS_IX_-_High_available,_scalable_storage,_dynamic_peer_networks.pdf | |||
Binary files differ | |||
diff --git a/docs/HotP2P'10 - KAD DHT attack mitigation.pdf b/docs/HotP2P'10_-_KAD_DHT_attack_mitigation.pdf index 833211a..833211a 100644 --- a/docs/HotP2P'10 - KAD DHT attack mitigation.pdf +++ b/docs/HotP2P'10_-_KAD_DHT_attack_mitigation.pdf | |||
Binary files differ | |||
diff --git a/docs/ICC'08 - Super-Seeding in BitTorrent.PDF b/docs/ICC'08_-_Super-Seeding_in_BitTorrent.PDF index dff089a..dff089a 100644 --- a/docs/ICC'08 - Super-Seeding in BitTorrent.PDF +++ b/docs/ICC'08_-_Super-Seeding_in_BitTorrent.PDF | |||
Binary files differ | |||
diff --git a/docs/ICDCN'10 - Poisoning the Kad Network.pdf b/docs/ICDCN'10_-_Poisoning_the_Kad_Network.pdf index 18506ab..18506ab 100644 --- a/docs/ICDCN'10 - Poisoning the Kad Network.pdf +++ b/docs/ICDCN'10_-_Poisoning_the_Kad_Network.pdf | |||
Binary files differ | |||
diff --git a/docs/ICDCS'02 - Reclaiming space for duplicate files.pdf b/docs/ICDCS'02_-_Reclaiming_space_for_duplicate_files.pdf index 77ca689..77ca689 100644 --- a/docs/ICDCS'02 - Reclaiming space for duplicate files.pdf +++ b/docs/ICDCS'02_-_Reclaiming_space_for_duplicate_files.pdf | |||
Binary files differ | |||
diff --git a/docs/ICDCS'06 - Improving traffic locality in BitTorrent.pdf b/docs/ICDCS'06_-_Improving_traffic_locality_in_BitTorrent.pdf index 9e1f26f..9e1f26f 100644 --- a/docs/ICDCS'06 - Improving traffic locality in BitTorrent.pdf +++ b/docs/ICDCS'06_-_Improving_traffic_locality_in_BitTorrent.pdf | |||
Binary files differ | |||
diff --git a/docs/ICDCS'09 - Regenerating codes for p2p backup systems.pdf b/docs/ICDCS'09_-_Regenerating_codes_for_p2p_backup_systems.pdf index 0922224..0922224 100644 --- a/docs/ICDCS'09 - Regenerating codes for p2p backup systems.pdf +++ b/docs/ICDCS'09_-_Regenerating_codes_for_p2p_backup_systems.pdf | |||
Binary files differ | |||
diff --git a/docs/ICN'07 - PlanetLab.pdf b/docs/ICN'07_-_PlanetLab.pdf index 1ff1fb5..1ff1fb5 100644 --- a/docs/ICN'07 - PlanetLab.pdf +++ b/docs/ICN'07_-_PlanetLab.pdf | |||
Binary files differ | |||
diff --git a/docs/ICNP'03 - Resilient peer-to-peer streaming.pdf b/docs/ICNP'03_-_Resilient_peer-to-peer_streaming.pdf index 3df4371..3df4371 100644 --- a/docs/ICNP'03 - Resilient peer-to-peer streaming.pdf +++ b/docs/ICNP'03_-_Resilient_peer-to-peer_streaming.pdf | |||
Binary files differ | |||
diff --git a/docs/IEEE CST - A Survey and Comparison of Peer-to-Peer Overlay.pdf b/docs/IEEE_CST_-_A_Survey_and_Comparison_of_Peer-to-Peer_Overlay.pdf index 49e6f21..49e6f21 100644 --- a/docs/IEEE CST - A Survey and Comparison of Peer-to-Peer Overlay.pdf +++ b/docs/IEEE_CST_-_A_Survey_and_Comparison_of_Peer-to-Peer_Overlay.pdf | |||
Binary files differ | |||
diff --git a/docs/IEEE Communications Magazine - Video Streaming in P2P Systems.pdf b/docs/IEEE_Communications_Magazine_-_Video_Streaming_in_P2P_Systems.pdf index 13b01f9..13b01f9 100644 --- a/docs/IEEE Communications Magazine - Video Streaming in P2P Systems.pdf +++ b/docs/IEEE_Communications_Magazine_-_Video_Streaming_in_P2P_Systems.pdf | |||
Binary files differ | |||
diff --git a/docs/IEEE Computer Society - 2Fast.pdf b/docs/IEEE_Computer_Society_-_2Fast.pdf index d9b4617..d9b4617 100644 --- a/docs/IEEE Computer Society - 2Fast.pdf +++ b/docs/IEEE_Computer_Society_-_2Fast.pdf | |||
Binary files differ | |||
diff --git a/docs/IEEE DSO - Free riding on Gnutella revisited.pdf b/docs/IEEE_DSO_-_Free_riding_on_Gnutella_revisited.pdf index 6784508..6784508 100644 --- a/docs/IEEE DSO - Free riding on Gnutella revisited.pdf +++ b/docs/IEEE_DSO_-_Free_riding_on_Gnutella_revisited.pdf | |||
Binary files differ | |||
diff --git a/docs/IEEE Journal (25) - Hidden-action in network routing.pdf b/docs/IEEE_Journal_(25)_-_Hidden-action_in_network_routing.pdf index df064bc..df064bc 100644 --- a/docs/IEEE Journal (25) - Hidden-action in network routing.pdf +++ b/docs/IEEE_Journal_(25)_-_Hidden-action_in_network_routing.pdf | |||
Binary files differ | |||
diff --git a/docs/IEEE Trans. on Info. - New directions in cryptography.pdf b/docs/IEEE_Trans._on_Info._-_New_directions_in_cryptography.pdf index 80b1da4..80b1da4 100644 --- a/docs/IEEE Trans. on Info. - New directions in cryptography.pdf +++ b/docs/IEEE_Trans._on_Info._-_New_directions_in_cryptography.pdf | |||
Binary files differ | |||
diff --git a/docs/IEEE Transactions on Systems - Descentralized learning.pdf b/docs/IEEE_Transactions_on_Systems_-_Descentralized_learning.pdf index f325eec..f325eec 100644 --- a/docs/IEEE Transactions on Systems - Descentralized learning.pdf +++ b/docs/IEEE_Transactions_on_Systems_-_Descentralized_learning.pdf | |||
Binary files differ | |||
diff --git a/docs/IEEE⁄ACM Banner & Orda.pdf b/docs/IEEE⁄ACM_Banner_&_Orda.pdf index c66a3d5..c66a3d5 100644 --- a/docs/IEEE⁄ACM Banner & Orda.pdf +++ b/docs/IEEE⁄ACM_Banner_&_Orda.pdf | |||
Binary files differ | |||
diff --git a/docs/IEEE⁄ACM Trans. Netw.'02 (10)- Internet pricing.pdf b/docs/IEEE⁄ACM_Trans._Netw.'02_(10)-_Internet_pricing.pdf index 964f25a..964f25a 100644 --- a/docs/IEEE⁄ACM Trans. Netw.'02 (10)- Internet pricing.pdf +++ b/docs/IEEE⁄ACM_Trans._Netw.'02_(10)-_Internet_pricing.pdf | |||
Binary files differ | |||
diff --git a/docs/IEEE⁄ACM Transactions on Networking - Detecting shared congestion of flows.pdf b/docs/IEEE⁄ACM_Transactions_on_Networking_-_Detecting_shared_congestion_of_flows.pdf index cbc0f7d..cbc0f7d 100644 --- a/docs/IEEE⁄ACM Transactions on Networking - Detecting shared congestion of flows.pdf +++ b/docs/IEEE⁄ACM_Transactions_on_Networking_-_Detecting_shared_congestion_of_flows.pdf | |||
Binary files differ | |||
diff --git a/docs/IJCAI'07 - PC-DPOP.pdf b/docs/IJCAI'07_-_PC-DPOP.pdf index 5c239e4..5c239e4 100644 --- a/docs/IJCAI'07 - PC-DPOP.pdf +++ b/docs/IJCAI'07_-_PC-DPOP.pdf | |||
Binary files differ | |||
diff --git a/docs/IJCCR vol 10 (2006) 1 Ardron and Lietaer.pdf b/docs/IJCCR_vol_10_(2006)_1_Ardron_and_Lietaer.pdf index 718dc35..718dc35 100644 --- a/docs/IJCCR vol 10 (2006) 1 Ardron and Lietaer.pdf +++ b/docs/IJCCR_vol_10_(2006)_1_Ardron_and_Lietaer.pdf | |||
Binary files differ | |||
diff --git a/docs/IMC'04 - Availability, Usage, and Deployment Characteristics of the DNS.pdf b/docs/IMC'04_-_Availability,_Usage,_and_Deployment_Characteristics_of_the_DNS.pdf index d93c938..d93c938 100644 --- a/docs/IMC'04 - Availability, Usage, and Deployment Characteristics of the DNS.pdf +++ b/docs/IMC'04_-_Availability,_Usage,_and_Deployment_Characteristics_of_the_DNS.pdf | |||
Binary files differ | |||
diff --git a/docs/IMC'05 - Measurement, analysis and modeling of BitTorrent-like systems.pdf b/docs/IMC'05_-_Measurement,_analysis_and_modeling_of_BitTorrent-like_systems.pdf index cbac650..cbac650 100644 --- a/docs/IMC'05 - Measurement, analysis and modeling of BitTorrent-like systems.pdf +++ b/docs/IMC'05_-_Measurement,_analysis_and_modeling_of_BitTorrent-like_systems.pdf | |||
Binary files differ | |||
diff --git a/docs/IMC'06 - Understanding churn in p2p networks.pdf b/docs/IMC'06_-_Understanding_churn_in_p2p_networks.pdf index 33aa4e8..33aa4e8 100644 --- a/docs/IMC'06 - Understanding churn in p2p networks.pdf +++ b/docs/IMC'06_-_Understanding_churn_in_p2p_networks.pdf | |||
Binary files differ | |||
diff --git a/docs/IMC'07 - A global view of KAD.pdf b/docs/IMC'07_-_A_global_view_of_KAD.pdf index a77ea26..a77ea26 100644 --- a/docs/IMC'07 - A global view of KAD.pdf +++ b/docs/IMC'07_-_A_global_view_of_KAD.pdf | |||
Binary files differ | |||
diff --git a/docs/IMC'08 - Detecting BitTorrent Blocking.pdf b/docs/IMC'08_-_Detecting_BitTorrent_Blocking.pdf index 2b178c7..2b178c7 100644 --- a/docs/IMC'08 - Detecting BitTorrent Blocking.pdf +++ b/docs/IMC'08_-_Detecting_BitTorrent_Blocking.pdf | |||
Binary files differ | |||
diff --git a/docs/INFOCOM'02 - Probabilistic location and routing.pdf b/docs/INFOCOM'02_-_Probabilistic_location_and_routing.pdf index f5ef6ab..f5ef6ab 100644 --- a/docs/INFOCOM'02 - Probabilistic location and routing.pdf +++ b/docs/INFOCOM'02_-_Probabilistic_location_and_routing.pdf | |||
Binary files differ | |||
diff --git a/docs/INFOCOM'05 - Designing incentives for peer-to-peer routing.pdf b/docs/INFOCOM'05_-_Designing_incentives_for_peer-to-peer_routing.pdf index b05bcbd..b05bcbd 100644 --- a/docs/INFOCOM'05 - Designing incentives for peer-to-peer routing.pdf +++ b/docs/INFOCOM'05_-_Designing_incentives_for_peer-to-peer_routing.pdf | |||
Binary files differ | |||
diff --git a/docs/INFOCOM'05 - Exploiting anarchy in networks.pdf b/docs/INFOCOM'05_-_Exploiting_anarchy_in_networks.pdf index 0fab665..0fab665 100644 --- a/docs/INFOCOM'05 - Exploiting anarchy in networks.pdf +++ b/docs/INFOCOM'05_-_Exploiting_anarchy_in_networks.pdf | |||
Binary files differ | |||
diff --git a/docs/INFOCOM'05 - Market-driven bandwidth allocation.pdf b/docs/INFOCOM'05_-_Market-driven_bandwidth_allocation.pdf index d9a2944..d9a2944 100644 --- a/docs/INFOCOM'05 - Market-driven bandwidth allocation.pdf +++ b/docs/INFOCOM'05_-_Market-driven_bandwidth_allocation.pdf | |||
Binary files differ | |||
diff --git a/docs/INFOCOM'05 - Network coding for large scale content distribution.pdf b/docs/INFOCOM'05_-_Network_coding_for_large_scale_content_distribution.pdf index e0ced69..e0ced69 100644 --- a/docs/INFOCOM'05 - Network coding for large scale content distribution.pdf +++ b/docs/INFOCOM'05_-_Network_coding_for_large_scale_content_distribution.pdf | |||
Binary files differ | |||
diff --git a/docs/INFOCOM'06 - Pianese, Keller & Biersack - PULSE.pdf b/docs/INFOCOM'06_-_Pianese,_Keller_&_Biersack_-_PULSE.pdf index c440013..c440013 100644 --- a/docs/INFOCOM'06 - Pianese, Keller & Biersack - PULSE.pdf +++ b/docs/INFOCOM'06_-_Pianese,_Keller_&_Biersack_-_PULSE.pdf | |||
Binary files differ | |||
diff --git a/docs/INFOCOM'07 - MARCH.pdf b/docs/INFOCOM'07_-_MARCH.pdf index 2c442dc..2c442dc 100644 --- a/docs/INFOCOM'07 - MARCH.pdf +++ b/docs/INFOCOM'07_-_MARCH.pdf | |||
Binary files differ | |||
diff --git a/docs/INFOCOM'07 - Mesh or multiple-tree.pdf b/docs/INFOCOM'07_-_Mesh_or_multiple-tree.pdf index 9bcabd8..9bcabd8 100644 --- a/docs/INFOCOM'07 - Mesh or multiple-tree.pdf +++ b/docs/INFOCOM'07_-_Mesh_or_multiple-tree.pdf | |||
Binary files differ | |||
diff --git a/docs/INFOCOM'07 - Network coding for distributed storage systems.pdf b/docs/INFOCOM'07_-_Network_coding_for_distributed_storage_systems.pdf index f69991c..f69991c 100644 --- a/docs/INFOCOM'07 - Network coding for distributed storage systems.pdf +++ b/docs/INFOCOM'07_-_Network_coding_for_distributed_storage_systems.pdf | |||
Binary files differ | |||
diff --git a/docs/INFOCOM'07 - PRIME.pdf b/docs/INFOCOM'07_-_PRIME.pdf index 2e09f82..2e09f82 100644 --- a/docs/INFOCOM'07 - PRIME.pdf +++ b/docs/INFOCOM'07_-_PRIME.pdf | |||
Binary files differ | |||
diff --git a/docs/INFOCOM'08 - Stable peers.PDF b/docs/INFOCOM'08_-_Stable_peers.PDF index a8d10c0..a8d10c0 100644 --- a/docs/INFOCOM'08 - Stable peers.PDF +++ b/docs/INFOCOM'08_-_Stable_peers.PDF | |||
Binary files differ | |||
diff --git a/docs/INFOCOM'09 - Queusing models for p2p streaming systems.pdf b/docs/INFOCOM'09_-_Queusing_models_for_p2p_streaming_systems.pdf index 33345c3..33345c3 100644 --- a/docs/INFOCOM'09 - Queusing models for p2p streaming systems.pdf +++ b/docs/INFOCOM'09_-_Queusing_models_for_p2p_streaming_systems.pdf | |||
Binary files differ | |||
diff --git a/docs/INFOCOM'09 - Sybilproof Indirect Reprocity Mechanism for P2P Networks .pdf b/docs/INFOCOM'09_-_Sybilproof_Indirect_Reprocity_Mechanism_for_P2P_Networks_.pdf index 3ee9cbc..3ee9cbc 100644 --- a/docs/INFOCOM'09 - Sybilproof Indirect Reprocity Mechanism for P2P Networks .pdf +++ b/docs/INFOCOM'09_-_Sybilproof_Indirect_Reprocity_Mechanism_for_P2P_Networks_.pdf | |||
Binary files differ | |||
diff --git a/docs/INFOCOM'09 - Traffic Engineering vs. Content Distribution.PDF b/docs/INFOCOM'09_-_Traffic_Engineering_vs._Content_Distribution.PDF index 4bdd919..4bdd919 100644 --- a/docs/INFOCOM'09 - Traffic Engineering vs. Content Distribution.PDF +++ b/docs/INFOCOM'09_-_Traffic_Engineering_vs._Content_Distribution.PDF | |||
Binary files differ | |||
diff --git a/docs/INFOCOMM'09 - Mechanism design without payments.pdf b/docs/INFOCOMM'09_-_Mechanism_design_without_payments.pdf index c9e6b70..c9e6b70 100644 --- a/docs/INFOCOMM'09 - Mechanism design without payments.pdf +++ b/docs/INFOCOMM'09_-_Mechanism_design_without_payments.pdf | |||
Binary files differ | |||
diff --git a/docs/IPTPS'01 - Complex queries in DHT-based p2p networks.pdf b/docs/IPTPS'01_-_Complex_queries_in_DHT-based_p2p_networks.pdf index a793533..a793533 100644 --- a/docs/IPTPS'01 - Complex queries in DHT-based p2p networks.pdf +++ b/docs/IPTPS'01_-_Complex_queries_in_DHT-based_p2p_networks.pdf | |||
Binary files differ | |||
diff --git a/docs/IPTPS'01 - Erasure coding vs. replication.pdf b/docs/IPTPS'01_-_Erasure_coding_vs._replication.pdf index 884bbbe..884bbbe 100644 --- a/docs/IPTPS'01 - Erasure coding vs. replication.pdf +++ b/docs/IPTPS'01_-_Erasure_coding_vs._replication.pdf | |||
Binary files differ | |||
diff --git a/docs/IPTPS'02 - Douceur - The Sybil Attack.pdf b/docs/IPTPS'02_-_Douceur_-_The_Sybil_Attack.pdf index 45f7453..45f7453 100644 --- a/docs/IPTPS'02 - Douceur - The Sybil Attack.pdf +++ b/docs/IPTPS'02_-_Douceur_-_The_Sybil_Attack.pdf | |||
Binary files differ | |||
diff --git a/docs/IPTPS'03 - Rateless codes and big downloads.pdf b/docs/IPTPS'03_-_Rateless_codes_and_big_downloads.pdf index 0795d88..0795d88 100644 --- a/docs/IPTPS'03 - Rateless codes and big downloads.pdf +++ b/docs/IPTPS'03_-_Rateless_codes_and_big_downloads.pdf | |||
Binary files differ | |||
diff --git a/docs/IPTPS'03 - Towards a common API.pdf b/docs/IPTPS'03_-_Towards_a_common_API.pdf index f6a37f6..f6a37f6 100644 --- a/docs/IPTPS'03 - Towards a common API.pdf +++ b/docs/IPTPS'03_-_Towards_a_common_API.pdf | |||
Binary files differ | |||
diff --git a/docs/IPTPS'05 - High availability in DHTs: erasure coding vs. replication.pdf b/docs/IPTPS'05_-_High_availability_in_DHTs:_erasure_coding_vs._replication.pdf index 0da8852..0da8852 100644 --- a/docs/IPTPS'05 - High availability in DHTs: erasure coding vs. replication.pdf +++ b/docs/IPTPS'05_-_High_availability_in_DHTs:_erasure_coding_vs._replication.pdf | |||
Binary files differ | |||
diff --git a/docs/IPTPS'05 - The BitTorrent: measurements and analysis.pdf b/docs/IPTPS'05_-_The_BitTorrent:_measurements_and_analysis.pdf index 5c27664..5c27664 100644 --- a/docs/IPTPS'05 - The BitTorrent: measurements and analysis.pdf +++ b/docs/IPTPS'05_-_The_BitTorrent:_measurements_and_analysis.pdf | |||
Binary files differ | |||
diff --git a/docs/IPTPS'06 - On object maintenance in p2p systems.pdf b/docs/IPTPS'06_-_On_object_maintenance_in_p2p_systems.pdf index 9d3b974..9d3b974 100644 --- a/docs/IPTPS'06 - On object maintenance in p2p systems.pdf +++ b/docs/IPTPS'06_-_On_object_maintenance_in_p2p_systems.pdf | |||
Binary files differ | |||
diff --git a/docs/IPTPS'06 - Skype p2p VoIP System.pdf b/docs/IPTPS'06_-_Skype_p2p_VoIP_System.pdf index 974663b..974663b 100644 --- a/docs/IPTPS'06 - Skype p2p VoIP System.pdf +++ b/docs/IPTPS'06_-_Skype_p2p_VoIP_System.pdf | |||
Binary files differ | |||
diff --git a/docs/ITC-20'07 - Estimating churn in structured p2p networks.pdf b/docs/ITC-20'07_-_Estimating_churn_in_structured_p2p_networks.pdf index 5d887da..5d887da 100644 --- a/docs/ITC-20'07 - Estimating churn in structured p2p networks.pdf +++ b/docs/ITC-20'07_-_Estimating_churn_in_structured_p2p_networks.pdf | |||
Binary files differ | |||
diff --git a/docs/IWSOS'08 - Network Size Estimation for Structured Overlays.pdf b/docs/IWSOS'08_-_Network_Size_Estimation_for_Structured_Overlays.pdf index 4c6c05c..4c6c05c 100644 --- a/docs/IWSOS'08 - Network Size Estimation for Structured Overlays.pdf +++ b/docs/IWSOS'08_-_Network_Size_Estimation_for_Structured_Overlays.pdf | |||
Binary files differ | |||
diff --git a/docs/Informatik Spektrum - Peer-to-peer networking & -computing.pdf b/docs/Informatik_Spektrum_-_Peer-to-peer_networking_&_-computing.pdf index 7a29021..7a29021 100644 --- a/docs/Informatik Spektrum - Peer-to-peer networking & -computing.pdf +++ b/docs/Informatik_Spektrum_-_Peer-to-peer_networking_&_-computing.pdf | |||
Binary files differ | |||
diff --git a/docs/JPE (1993) - Gode & Sunder - Allocative Efficiency.pdf b/docs/JPE_(1993)_-_Gode_&_Sunder_-_Allocative_Efficiency.pdf index 88208b8..88208b8 100644 --- a/docs/JPE (1993) - Gode & Sunder - Allocative Efficiency.pdf +++ b/docs/JPE_(1993)_-_Gode_&_Sunder_-_Allocative_Efficiency.pdf | |||
diff --git a/docs/Jelasity, Montresor & Babaoglu - Gossip-based aggregation.pdf b/docs/Jelasity,_Montresor_&_Babaoglu_-_Gossip-based_aggregation.pdf index e8c1c5e..e8c1c5e 100644 --- a/docs/Jelasity, Montresor & Babaoglu - Gossip-based aggregation.pdf +++ b/docs/Jelasity,_Montresor_&_Babaoglu_-_Gossip-based_aggregation.pdf | |||
Binary files differ | |||
diff --git a/docs/Jiang, Bai & Wang - Trust and Cooperation in Peer-to-Peer Systems.pdf b/docs/Jiang,_Bai_&_Wang_-_Trust_and_Cooperation_in_Peer-to-Peer_Systems.pdf index ea71e63..ea71e63 100644 --- a/docs/Jiang, Bai & Wang - Trust and Cooperation in Peer-to-Peer Systems.pdf +++ b/docs/Jiang,_Bai_&_Wang_-_Trust_and_Cooperation_in_Peer-to-Peer_Systems.pdf | |||
Binary files differ | |||
diff --git a/docs/Journal of AI - BnB-ADOPT.pdf b/docs/Journal_of_AI_-_BnB-ADOPT.pdf index 24042cc..24042cc 100644 --- a/docs/Journal of AI - BnB-ADOPT.pdf +++ b/docs/Journal_of_AI_-_BnB-ADOPT.pdf | |||
Binary files differ | |||
diff --git a/docs/Journal of Parallel & Distributed Computing - Deleting files in the Celeste p2p storage systems.pdf b/docs/Journal_of_Parallel_&_Distributed_Computing_-_Deleting_files_in_the_Celeste_p2p_storage_systems.pdf index 615079a..615079a 100644 --- a/docs/Journal of Parallel & Distributed Computing - Deleting files in the Celeste p2p storage systems.pdf +++ b/docs/Journal_of_Parallel_&_Distributed_Computing_-_Deleting_files_in_the_Celeste_p2p_storage_systems.pdf | |||
Binary files differ | |||
diff --git a/docs/Journal of Public Economics - Bolton, Katok & Ockenfels.pdf b/docs/Journal_of_Public_Economics_-_Bolton,_Katok_&_Ockenfels.pdf index e527ac2..e527ac2 100644 --- a/docs/Journal of Public Economics - Bolton, Katok & Ockenfels.pdf +++ b/docs/Journal_of_Public_Economics_-_Bolton,_Katok_&_Ockenfels.pdf | |||
Binary files differ | |||
diff --git a/docs/Journal of Supercomputing - Insight into redundancy schemes in DHTs.pdf b/docs/Journal_of_Supercomputing_-_Insight_into_redundancy_schemes_in_DHTs.pdf index 4a064ae..4a064ae 100644 --- a/docs/Journal of Supercomputing - Insight into redundancy schemes in DHTs.pdf +++ b/docs/Journal_of_Supercomputing_-_Insight_into_redundancy_schemes_in_DHTs.pdf | |||
Binary files differ | |||
diff --git a/docs/Kernighan & Lin - An Efficient Heuristic Procedure for Partitioning Graphs%0A.pdf b/docs/Kernighan_&_Lin_-_An_Efficient_Heuristic_Procedure_for_Partitioning_Graphs%0A.pdf index a59ecf7..a59ecf7 100644 --- a/docs/Kernighan & Lin - An Efficient Heuristic Procedure for Partitioning Graphs%0A.pdf +++ b/docs/Kernighan_&_Lin_-_An_Efficient_Heuristic_Procedure_for_Partitioning_Graphs%0A.pdf | |||
Binary files differ | |||
diff --git a/docs/Kising - Proximity Neighbor Selection for IGOR.pdf b/docs/Kising_-_Proximity_Neighbor_Selection_for_IGOR.pdf index 32b9112..32b9112 100644 --- a/docs/Kising - Proximity Neighbor Selection for IGOR.pdf +++ b/docs/Kising_-_Proximity_Neighbor_Selection_for_IGOR.pdf | |||
Binary files differ | |||
diff --git a/docs/LAP: Lightweight Anonymity and Privacy.pdf b/docs/LAP:_Lightweight_Anonymity_and_Privacy.pdf index ce92444..ce92444 100644 --- a/docs/LAP: Lightweight Anonymity and Privacy.pdf +++ b/docs/LAP:_Lightweight_Anonymity_and_Privacy.pdf | |||
Binary files differ | |||
diff --git a/docs/LASTor: A Low-Latency AS-Aware Tor Client.pdf b/docs/LASTor:_A_Low-Latency_AS-Aware_Tor_Client.pdf index ba2a296..ba2a296 100644 --- a/docs/LASTor: A Low-Latency AS-Aware Tor Client.pdf +++ b/docs/LASTor:_A_Low-Latency_AS-Aware_Tor_Client.pdf | |||
Binary files differ | |||
diff --git a/docs/LNCS - Distributed Hash Tables.pdf b/docs/LNCS_-_Distributed_Hash_Tables.pdf index c5e218f..c5e218f 100644 --- a/docs/LNCS - Distributed Hash Tables.pdf +++ b/docs/LNCS_-_Distributed_Hash_Tables.pdf | |||
Binary files differ | |||
diff --git a/docs/Laffont & Martimort - The Theory of Incentives.pdf b/docs/Laffont_&_Martimort_-_The_Theory_of_Incentives.pdf index 5bbf4f6..5bbf4f6 100644 --- a/docs/Laffont & Martimort - The Theory of Incentives.pdf +++ b/docs/Laffont_&_Martimort_-_The_Theory_of_Incentives.pdf | |||
Binary files differ | |||
diff --git a/docs/Lecture Notes in Computer Science - Selected DHT Algorithms .pdf b/docs/Lecture_Notes_in_Computer_Science_-_Selected_DHT_Algorithms_.pdf index 67ff5e3..67ff5e3 100644 --- a/docs/Lecture Notes in Computer Science - Selected DHT Algorithms .pdf +++ b/docs/Lecture_Notes_in_Computer_Science_-_Selected_DHT_Algorithms_.pdf | |||
Binary files differ | |||
diff --git a/docs/Long Term Study of Peer Behavior in the kad DHT.pdf b/docs/Long_Term_Study_of_Peer_Behavior_in_the_kad_DHT.pdf index 78634ee..78634ee 100644 --- a/docs/Long Term Study of Peer Behavior in the kad DHT.pdf +++ b/docs/Long_Term_Study_of_Peer_Behavior_in_the_kad_DHT.pdf | |||
diff --git a/docs/MDS'07 - Conner & Nahrstedt - Securing peer-to-peer media streaming systems.pdf b/docs/MDS'07_-_Conner_&_Nahrstedt_-_Securing_peer-to-peer_media_streaming_systems.pdf index 27afd93..27afd93 100644 --- a/docs/MDS'07 - Conner & Nahrstedt - Securing peer-to-peer media streaming systems.pdf +++ b/docs/MDS'07_-_Conner_&_Nahrstedt_-_Securing_peer-to-peer_media_streaming_systems.pdf | |||
Binary files differ | |||
diff --git a/docs/Marx - Parameterized graph separation problems.pdf b/docs/Marx_-_Parameterized_graph_separation_problems.pdf index 4f67681..4f67681 100644 --- a/docs/Marx - Parameterized graph separation problems.pdf +++ b/docs/Marx_-_Parameterized_graph_separation_problems.pdf | |||
Binary files differ | |||
diff --git a/docs/Menezes & Monteiro - An Introduction to Auction Theory.pdf b/docs/Menezes_&_Monteiro_-_An_Introduction_to_Auction_Theory.pdf index f7e7fa7..f7e7fa7 100644 --- a/docs/Menezes & Monteiro - An Introduction to Auction Theory.pdf +++ b/docs/Menezes_&_Monteiro_-_An_Introduction_to_Auction_Theory.pdf | |||
Binary files differ | |||
diff --git a/docs/Mies - SpoVNet.pdf b/docs/Mies_-_SpoVNet.pdf index 9868747..9868747 100644 --- a/docs/Mies - SpoVNet.pdf +++ b/docs/Mies_-_SpoVNet.pdf | |||
Binary files differ | |||
diff --git a/docs/NCA'05 - Decentralized Schemes for Size Estimation in Large and Dynamic Groups.pdf b/docs/NCA'05_-_Decentralized_Schemes_for_Size_Estimation_in_Large_and_Dynamic_Groups.pdf index 4de25f8..4de25f8 100644 --- a/docs/NCA'05 - Decentralized Schemes for Size Estimation in Large and Dynamic Groups.pdf +++ b/docs/NCA'05_-_Decentralized_Schemes_for_Size_Estimation_in_Large_and_Dynamic_Groups.pdf | |||
Binary files differ | |||
diff --git a/docs/NDSS'11 - Security API for Distributed Social Networks.pdf b/docs/NDSS'11_-_Security_API_for_Distributed_Social_Networks.pdf index 72018e5..72018e5 100644 --- a/docs/NDSS'11 - Security API for Distributed Social Networks.pdf +++ b/docs/NDSS'11_-_Security_API_for_Distributed_Social_Networks.pdf | |||
Binary files differ | |||
diff --git a/docs/NGC'03 - Scalable Application-level Anycast .pdf b/docs/NGC'03_-_Scalable_Application-level_Anycast_.pdf index 5089e6e..5089e6e 100644 --- a/docs/NGC'03 - Scalable Application-level Anycast .pdf +++ b/docs/NGC'03_-_Scalable_Application-level_Anycast_.pdf | |||
Binary files differ | |||
diff --git a/docs/NMNC - Progressive strategies for MCTS.pdf b/docs/NMNC_-_Progressive_strategies_for_MCTS.pdf index 4c07f4a..4c07f4a 100644 --- a/docs/NMNC - Progressive strategies for MCTS.pdf +++ b/docs/NMNC_-_Progressive_strategies_for_MCTS.pdf | |||
Binary files differ | |||
diff --git a/docs/NSDI'04 - Designing a DHT for low latency and high throughput.pdf b/docs/NSDI'04_-_Designing_a_DHT_for_low_latency_and_high_throughput.pdf index 7dbf778..7dbf778 100644 --- a/docs/NSDI'04 - Designing a DHT for low latency and high throughput.pdf +++ b/docs/NSDI'04_-_Designing_a_DHT_for_low_latency_and_high_throughput.pdf | |||
Binary files differ | |||
diff --git a/docs/NSDI'07 - Do incentives build robustness in BitTorrent.pdf b/docs/NSDI'07_-_Do_incentives_build_robustness_in_BitTorrent.pdf index 428880c..428880c 100644 --- a/docs/NSDI'07 - Do incentives build robustness in BitTorrent.pdf +++ b/docs/NSDI'07_-_Do_incentives_build_robustness_in_BitTorrent.pdf | |||
Binary files differ | |||
diff --git a/docs/NetCod'05 - Random linear coding based distributed networked storage.pdf b/docs/NetCod'05_-_Random_linear_coding_based_distributed_networked_storage.pdf index bcc962e..bcc962e 100644 --- a/docs/NetCod'05 - Random linear coding based distributed networked storage.pdf +++ b/docs/NetCod'05_-_Random_linear_coding_based_distributed_networked_storage.pdf | |||
Binary files differ | |||
diff --git a/docs/NetEcon'03 - Cohen - Incentives build robustness in BitTorrent.pdf b/docs/NetEcon'03_-_Cohen_-_Incentives_build_robustness_in_BitTorrent.pdf index 06ae156..06ae156 100644 --- a/docs/NetEcon'03 - Cohen - Incentives build robustness in BitTorrent.pdf +++ b/docs/NetEcon'03_-_Cohen_-_Incentives_build_robustness_in_BitTorrent.pdf | |||
Binary files differ | |||
diff --git a/docs/NetEcon'06 - Harvelaar.pdf b/docs/NetEcon'06_-_Harvelaar.pdf index 0b599e4..0b599e4 100644 --- a/docs/NetEcon'06 - Harvelaar.pdf +++ b/docs/NetEcon'06_-_Harvelaar.pdf | |||
Binary files differ | |||
diff --git a/docs/NetEcon'06 - Improving robustness of p2p streaming.pdf b/docs/NetEcon'06_-_Improving_robustness_of_p2p_streaming.pdf index bbfd03e..bbfd03e 100644 --- a/docs/NetEcon'06 - Improving robustness of p2p streaming.pdf +++ b/docs/NetEcon'06_-_Improving_robustness_of_p2p_streaming.pdf | |||
Binary files differ | |||
diff --git a/docs/NetEcon'08 - Yang - Auction, but don't block.pdf b/docs/NetEcon'08_-_Yang_-_Auction,_but_don't_block.pdf index f9b0376..f9b0376 100644 --- a/docs/NetEcon'08 - Yang - Auction, but don't block.pdf +++ b/docs/NetEcon'08_-_Yang_-_Auction,_but_don't_block.pdf | |||
Binary files differ | |||
diff --git a/docs/Neumann & Morgenstern - Theory of Games and Economic Behavior.pdf b/docs/Neumann_&_Morgenstern_-_Theory_of_Games_and_Economic_Behavior.pdf index 62c6d72..62c6d72 100644 --- a/docs/Neumann & Morgenstern - Theory of Games and Economic Behavior.pdf +++ b/docs/Neumann_&_Morgenstern_-_Theory_of_Games_and_Economic_Behavior.pdf | |||
Binary files differ | |||
diff --git a/docs/OSDI'00 - Fast and Secure Distributed Read-Only File System.pdf b/docs/OSDI'00_-_Fast_and_Secure_Distributed_Read-Only_File_System.pdf index 7377811..7377811 100644 --- a/docs/OSDI'00 - Fast and Secure Distributed Read-Only File System.pdf +++ b/docs/OSDI'00_-_Fast_and_Secure_Distributed_Read-Only_File_System.pdf | |||
Binary files differ | |||
diff --git a/docs/OSDI'00 - Overcast.pdf b/docs/OSDI'00_-_Overcast.pdf index 13ccd6a..13ccd6a 100644 --- a/docs/OSDI'00 - Overcast.pdf +++ b/docs/OSDI'00_-_Overcast.pdf | |||
diff --git a/docs/Oper. Res. - Optimal Resource Allocation.pdf b/docs/Oper._Res._-_Optimal_Resource_Allocation.pdf index 6c20b45..6c20b45 100644 --- a/docs/Oper. Res. - Optimal Resource Allocation.pdf +++ b/docs/Oper._Res._-_Optimal_Resource_Allocation.pdf | |||
Binary files differ | |||
diff --git a/docs/P2P'03 - Buragohain, Agrawal & Suri - Incentives in P2P systems.pdf b/docs/P2P'03_-_Buragohain,_Agrawal_&_Suri_-_Incentives_in_P2P_systems.pdf index 57eac0c..57eac0c 100644 --- a/docs/P2P'03 - Buragohain, Agrawal & Suri - Incentives in P2P systems.pdf +++ b/docs/P2P'03_-_Buragohain,_Agrawal_&_Suri_-_Incentives_in_P2P_systems.pdf | |||
Binary files differ | |||
diff --git a/docs/P2P'03 - Identity crisis: anonymity vs reputation.pdf b/docs/P2P'03_-_Identity_crisis:_anonymity_vs_reputation.pdf index d3acd2a..d3acd2a 100644 --- a/docs/P2P'03 - Identity crisis: anonymity vs reputation.pdf +++ b/docs/P2P'03_-_Identity_crisis:_anonymity_vs_reputation.pdf | |||
Binary files differ | |||
diff --git a/docs/P2P'04 - Reputation management framework.pdf b/docs/P2P'04_-_Reputation_management_framework.pdf index 649800d..649800d 100644 --- a/docs/P2P'04 - Reputation management framework.pdf +++ b/docs/P2P'04_-_Reputation_management_framework.pdf | |||
Binary files differ | |||
diff --git a/docs/P2P'09 - PeerSim.pdf b/docs/P2P'09_-_PeerSim.pdf index b7a1637..b7a1637 100644 --- a/docs/P2P'09 - PeerSim.pdf +++ b/docs/P2P'09_-_PeerSim.pdf | |||
Binary files differ | |||
diff --git a/docs/P2PECON'05 - Incentives in BitTorrent induce free riding.pdf b/docs/P2PECON'05_-_Incentives_in_BitTorrent_induce_free_riding.pdf index 7551380..7551380 100644 --- a/docs/P2PECON'05 - Incentives in BitTorrent induce free riding.pdf +++ b/docs/P2PECON'05_-_Incentives_in_BitTorrent_induce_free_riding.pdf | |||
Binary files differ | |||
diff --git a/docs/P2PECON'05 - KARMA.pdf b/docs/P2PECON'05_-_KARMA.pdf index 2c12ddb..2c12ddb 100644 --- a/docs/P2PECON'05 - KARMA.pdf +++ b/docs/P2PECON'05_-_KARMA.pdf | |||
Binary files differ | |||
diff --git a/docs/P2PECON'05 - Self-recharging virtual currency.pdf b/docs/P2PECON'05_-_Self-recharging_virtual_currency.pdf index 895972c..895972c 100644 --- a/docs/P2PECON'05 - Self-recharging virtual currency.pdf +++ b/docs/P2PECON'05_-_Self-recharging_virtual_currency.pdf | |||
Binary files differ | |||
diff --git a/docs/P2PEcon'04 - SWIFT.pdf b/docs/P2PEcon'04_-_SWIFT.pdf index 994b0af..994b0af 100644 --- a/docs/P2PEcon'04 - SWIFT.pdf +++ b/docs/P2PEcon'04_-_SWIFT.pdf | |||
Binary files differ | |||
diff --git a/docs/P2PEcon'05 - A new mechanism for the free-rider problem.pdf b/docs/P2PEcon'05_-_A_new_mechanism_for_the_free-rider_problem.pdf index 85af0dc..85af0dc 100644 --- a/docs/P2PEcon'05 - A new mechanism for the free-rider problem.pdf +++ b/docs/P2PEcon'05_-_A_new_mechanism_for_the_free-rider_problem.pdf | |||
Binary files differ | |||
diff --git a/docs/PAM'04 - Dissecting bittorrent.pdf b/docs/PAM'04_-_Dissecting_bittorrent.pdf index c708693..c708693 100644 --- a/docs/PAM'04 - Dissecting bittorrent.pdf +++ b/docs/PAM'04_-_Dissecting_bittorrent.pdf | |||
Binary files differ | |||
diff --git a/docs/PASSAT'11 - Multiparty linear programming.pdf b/docs/PASSAT'11_-_Multiparty_linear_programming.pdf index 680911b..680911b 100644 --- a/docs/PASSAT'11 - Multiparty linear programming.pdf +++ b/docs/PASSAT'11_-_Multiparty_linear_programming.pdf | |||
Binary files differ | |||
diff --git a/docs/PETS'11 - An Accurate System-Wide Anonymity Metric for Probabilistic Attacks.pdf b/docs/PETS'11_-_An_Accurate_System-Wide_Anonymity_Metric_for_Probabilistic_Attacks.pdf index 9599754..9599754 100644 --- a/docs/PETS'11 - An Accurate System-Wide Anonymity Metric for Probabilistic Attacks.pdf +++ b/docs/PETS'11_-_An_Accurate_System-Wide_Anonymity_Metric_for_Probabilistic_Attacks.pdf | |||
Binary files differ | |||
diff --git a/docs/PETS'11 - DefenestraTor.pdf b/docs/PETS'11_-_DefenestraTor.pdf index d254901..d254901 100644 --- a/docs/PETS'11 - DefenestraTor.pdf +++ b/docs/PETS'11_-_DefenestraTor.pdf | |||
Binary files differ | |||
diff --git a/docs/PINS'04 - Free-riding and whitewashing in P2P systems.pdf b/docs/PINS'04_-__Free-riding_and_whitewashing_in_P2P_systems.pdf index 269e28c..269e28c 100644 --- a/docs/PINS'04 - Free-riding and whitewashing in P2P systems.pdf +++ b/docs/PINS'04_-__Free-riding_and_whitewashing_in_P2P_systems.pdf | |||
Binary files differ | |||
diff --git a/docs/PNAS (2003) - The evolution of altruistic punishment.pdf b/docs/PNAS_(2003)_-_The_evolution_of_altruistic_punishment.pdf index 563fc86..563fc86 100644 --- a/docs/PNAS (2003) - The evolution of altruistic punishment.pdf +++ b/docs/PNAS_(2003)_-_The_evolution_of_altruistic_punishment.pdf | |||
Binary files differ | |||
diff --git a/docs/PNAS - Nash - Equilibrium points in n-person games.pdf b/docs/PNAS_-_Nash_-_Equilibrium_points_in_n-person_games.pdf index 8ba7fa1..8ba7fa1 100644 --- a/docs/PNAS - Nash - Equilibrium points in n-person games.pdf +++ b/docs/PNAS_-_Nash_-_Equilibrium_points_in_n-person_games.pdf | |||
Binary files differ | |||
diff --git a/docs/PODC'02 - Building secure file systems out of Byzantine storage.pdf b/docs/PODC'02_-_Building_secure_file_systems_out_of_Byzantine_storage.pdf index d154d3e..d154d3e 100644 --- a/docs/PODC'02 - Building secure file systems out of Byzantine storage.pdf +++ b/docs/PODC'02_-_Building_secure_file_systems_out_of_Byzantine_storage.pdf | |||
Binary files differ | |||
diff --git a/docs/PODC'06 - Peer counting and sampling in overlay networks.pdf b/docs/PODC'06_-_Peer_counting_and_sampling_in_overlay_networks.pdf index 705ff14..705ff14 100644 --- a/docs/PODC'06 - Peer counting and sampling in overlay networks.pdf +++ b/docs/PODC'06_-_Peer_counting_and_sampling_in_overlay_networks.pdf | |||
Binary files differ | |||
diff --git a/docs/Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail.pdf b/docs/Peek-a-Boo,_I_Still_See_You:_Why_Efficient_Traffic_Analysis_Countermeasures_Fail.pdf index f6fc1eb..f6fc1eb 100644 --- a/docs/Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail.pdf +++ b/docs/Peek-a-Boo,_I_Still_See_You:_Why_Efficient_Traffic_Analysis_Countermeasures_Fail.pdf | |||
Binary files differ | |||
diff --git a/docs/Prospects for Remailers.pdf b/docs/Prospects_for_Remailers.pdf index 4a4b432..4a4b432 100644 --- a/docs/Prospects for Remailers.pdf +++ b/docs/Prospects_for_Remailers.pdf | |||
Binary files differ | |||
diff --git a/docs/Reed & Solomon - Polynomial Codes Over Certain Finite Fields.pdf b/docs/Reed_&_Solomon_-_Polynomial_Codes_Over_Certain_Finite_Fields.pdf index 88600df..88600df 100644 --- a/docs/Reed & Solomon - Polynomial Codes Over Certain Finite Fields.pdf +++ b/docs/Reed_&_Solomon_-_Polynomial_Codes_Over_Certain_Finite_Fields.pdf | |||
diff --git a/docs/SAINT'03 - Kwon & Ryu.pdf b/docs/SAINT'03_-_Kwon_&_Ryu.pdf index b9549d3..b9549d3 100644 --- a/docs/SAINT'03 - Kwon & Ryu.pdf +++ b/docs/SAINT'03_-_Kwon_&_Ryu.pdf | |||
Binary files differ | |||
diff --git a/docs/SAINT'07 - Local production, local consumption p2p architecture.pdf b/docs/SAINT'07_-_Local_production,_local_consumption_p2p_architecture.pdf index 87de01a..87de01a 100644 --- a/docs/SAINT'07 - Local production, local consumption p2p architecture.pdf +++ b/docs/SAINT'07_-_Local_production,_local_consumption_p2p_architecture.pdf | |||
Binary files differ | |||
diff --git a/docs/SASO'07 - Garbacki, Epema & van Steen.pdf b/docs/SASO'07_-_Garbacki,_Epema_&_van_Steen.pdf index 4b4625d..4b4625d 100644 --- a/docs/SASO'07 - Garbacki, Epema & van Steen.pdf +++ b/docs/SASO'07_-_Garbacki,_Epema_&_van_Steen.pdf | |||
Binary files differ | |||
diff --git a/docs/SELMAS - Software framework for automated negotiation.pdf b/docs/SELMAS_-_Software_framework_for_automated_negotiation.pdf index ccb3980..ccb3980 100644 --- a/docs/SELMAS - Software framework for automated negotiation.pdf +++ b/docs/SELMAS_-_Software_framework_for_automated_negotiation.pdf | |||
Binary files differ | |||
diff --git a/docs/SIGCOMM'03 - On selfish routing in internet-like environments.pdf b/docs/SIGCOMM'03_-_On_selfish_routing_in_internet-like_environments.pdf index 5f0f6cd..5f0f6cd 100644 --- a/docs/SIGCOMM'03 - On selfish routing in internet-like environments.pdf +++ b/docs/SIGCOMM'03_-_On_selfish_routing_in_internet-like_environments.pdf | |||
Binary files differ | |||
diff --git a/docs/SIGCOMM'03 - The impact of DHT routing geometry on resilience and proximity.pdf b/docs/SIGCOMM'03_-_The_impact_of_DHT_routing_geometry_on_resilience_and_proximity.pdf index 225e4c9..225e4c9 100644 --- a/docs/SIGCOMM'03 - The impact of DHT routing geometry on resilience and proximity.pdf +++ b/docs/SIGCOMM'03_-_The_impact_of_DHT_routing_geometry_on_resilience_and_proximity.pdf | |||
Binary files differ | |||
diff --git a/docs/SIGCOMM'04 - Qui & Srikant - Modeling and performance analysis.pdf b/docs/SIGCOMM'04_-_Qui_&_Srikant_-_Modeling_and_performance_analysis.pdf index ffe62f5..ffe62f5 100644 --- a/docs/SIGCOMM'04 - Qui & Srikant - Modeling and performance analysis.pdf +++ b/docs/SIGCOMM'04_-_Qui_&_Srikant_-_Modeling_and_performance_analysis.pdf | |||
Binary files differ | |||
diff --git a/docs/SIGCOMM'06 - SybilGuard.pdf b/docs/SIGCOMM'06_-_SybilGuard.pdf index 842a2bb..842a2bb 100644 --- a/docs/SIGCOMM'06 - SybilGuard.pdf +++ b/docs/SIGCOMM'06_-_SybilGuard.pdf | |||
Binary files differ | |||
diff --git a/docs/SIGCOMM'08 - Rationality and traffic attraction.pdf b/docs/SIGCOMM'08_-_Rationality_and_traffic_attraction.pdf index 3e303f3..3e303f3 100644 --- a/docs/SIGCOMM'08 - Rationality and traffic attraction.pdf +++ b/docs/SIGCOMM'08_-_Rationality_and_traffic_attraction.pdf | |||
Binary files differ | |||
diff --git a/docs/SIGCOMM'11 - Uncovering social network sybils.pdf b/docs/SIGCOMM'11_-_Uncovering_social_network_sybils.pdf index e997fe5..e997fe5 100644 --- a/docs/SIGCOMM'11 - Uncovering social network sybils.pdf +++ b/docs/SIGCOMM'11_-_Uncovering_social_network_sybils.pdf | |||
Binary files differ | |||
diff --git a/docs/SIGCOMM'87 - Strategies for decentralized resource management.pdf b/docs/SIGCOMM'87_-_Strategies_for_decentralized_resource_management.pdf index 2d6caac..2d6caac 100644 --- a/docs/SIGCOMM'87 - Strategies for decentralized resource management.pdf +++ b/docs/SIGCOMM'87_-_Strategies_for_decentralized_resource_management.pdf | |||
Binary files differ | |||
diff --git a/docs/SIGCOMM Comp. Comm. Rev. - Minimizing churn in distributed systems.pdf b/docs/SIGCOMM_Comp._Comm._Rev._-_Minimizing_churn_in_distributed_systems.pdf index 443855d..443855d 100644 --- a/docs/SIGCOMM Comp. Comm. Rev. - Minimizing churn in distributed systems.pdf +++ b/docs/SIGCOMM_Comp._Comm._Rev._-_Minimizing_churn_in_distributed_systems.pdf | |||
Binary files differ | |||
diff --git a/docs/SIGCOMM Compt. Commun. Rev. - Vivaldi.pdf b/docs/SIGCOMM_Compt._Commun._Rev._-_Vivaldi.pdf index 5dbfdff..5dbfdff 100644 --- a/docs/SIGCOMM Compt. Commun. Rev. - Vivaldi.pdf +++ b/docs/SIGCOMM_Compt._Commun._Rev._-_Vivaldi.pdf | |||
Binary files differ | |||
diff --git a/docs/SIGCOMM Comput. Commun. Rev. - BitTorrent is an Auction.pdf b/docs/SIGCOMM_Comput._Commun._Rev._-_BitTorrent_is_an_Auction.pdf index eddcba0..eddcba0 100644 --- a/docs/SIGCOMM Comput. Commun. Rev. - BitTorrent is an Auction.pdf +++ b/docs/SIGCOMM_Comput._Commun._Rev._-_BitTorrent_is_an_Auction.pdf | |||
Binary files differ | |||
diff --git a/docs/SIGCOMM Comput. Commun. Rev. - P4P: Provider Portal for Applications.pdf b/docs/SIGCOMM_Comput._Commun._Rev._-_P4P:_Provider_Portal_for_Applications.pdf index 0b39dbc..0b39dbc 100644 --- a/docs/SIGCOMM Comput. Commun. Rev. - P4P: Provider Portal for Applications.pdf +++ b/docs/SIGCOMM_Comput._Commun._Rev._-_P4P:_Provider_Portal_for_Applications.pdf | |||
Binary files differ | |||
diff --git a/docs/SIGCOMM Comput. Commun. Rev. - Practical, distributed network coordinates.pdf b/docs/SIGCOMM_Comput._Commun._Rev._-_Practical,_distributed_network_coordinates.pdf index 46ca523..46ca523 100644 --- a/docs/SIGCOMM Comput. Commun. Rev. - Practical, distributed network coordinates.pdf +++ b/docs/SIGCOMM_Comput._Commun._Rev._-_Practical,_distributed_network_coordinates.pdf | |||
Binary files differ | |||
diff --git a/docs/SIGCOMM Comput. Commun. Rev. - Securing Internet Coordinate Embedding Systems.pdf b/docs/SIGCOMM_Comput._Commun._Rev._-_Securing_Internet_Coordinate_Embedding_Systems.pdf index bc5af95..bc5af95 100644 --- a/docs/SIGCOMM Comput. Commun. Rev. - Securing Internet Coordinate Embedding Systems.pdf +++ b/docs/SIGCOMM_Comput._Commun._Rev._-_Securing_Internet_Coordinate_Embedding_Systems.pdf | |||
diff --git a/docs/SIGCOMM Comput. Commun. Rev - Network Coding: an Instant Primer.pdf b/docs/SIGCOMM_Comput._Commun._Rev_-_Network_Coding:_an_Instant_Primer.pdf index cf7f746..cf7f746 100644 --- a/docs/SIGCOMM Comput. Commun. Rev - Network Coding: an Instant Primer.pdf +++ b/docs/SIGCOMM_Comput._Commun._Rev_-_Network_Coding:_an_Instant_Primer.pdf | |||
Binary files differ | |||
diff --git a/docs/SIGCOMM Computers Communication Review - Bubblestorm.pdf b/docs/SIGCOMM_Computers_Communication_Review_-_Bubblestorm.pdf index 6dfc75c..6dfc75c 100644 --- a/docs/SIGCOMM Computers Communication Review - Bubblestorm.pdf +++ b/docs/SIGCOMM_Computers_Communication_Review_-_Bubblestorm.pdf | |||
Binary files differ | |||
diff --git a/docs/SIGKDD Explor. Newsl. - Distributed data mining.pdf b/docs/SIGKDD_Explor._Newsl._-_Distributed_data_mining.pdf index 18f0341..18f0341 100644 --- a/docs/SIGKDD Explor. Newsl. - Distributed data mining.pdf +++ b/docs/SIGKDD_Explor._Newsl._-_Distributed_data_mining.pdf | |||
Binary files differ | |||
diff --git a/docs/SIGMETRICS'05 - Bharambe, Herley & Padmanabhan.pdf b/docs/SIGMETRICS'05_-_Bharambe,_Herley_&_Padmanabhan.pdf index ecf43b5..ecf43b5 100644 --- a/docs/SIGMETRICS'05 - Bharambe, Herley & Padmanabhan.pdf +++ b/docs/SIGMETRICS'05_-_Bharambe,_Herley_&_Padmanabhan.pdf | |||
diff --git a/docs/SIGMETRICS'05 - Coupon replication systems.pdf b/docs/SIGMETRICS'05_-_Coupon_replication_systems.pdf index f302ddd..f302ddd 100644 --- a/docs/SIGMETRICS'05 - Coupon replication systems.pdf +++ b/docs/SIGMETRICS'05_-_Coupon_replication_systems.pdf | |||
Binary files differ | |||
diff --git a/docs/SIGOPS - FARSITE.pdf b/docs/SIGOPS_-_FARSITE.pdf index 775b484..775b484 100644 --- a/docs/SIGOPS - FARSITE.pdf +++ b/docs/SIGOPS_-_FARSITE.pdf | |||
Binary files differ | |||
diff --git a/docs/SIGOSP'03 - Spitstream: High-bandwidth multicast.pdf b/docs/SIGOSP'03_-_Spitstream:_High-bandwidth_multicast.pdf index d5ac170..d5ac170 100644 --- a/docs/SIGOSP'03 - Spitstream: High-bandwidth multicast.pdf +++ b/docs/SIGOSP'03_-_Spitstream:_High-bandwidth_multicast.pdf | |||
Binary files differ | |||
diff --git a/docs/SIGecom Exch. (5) - Overcoming free-riding behavior.pdf b/docs/SIGecom_Exch._(5)_-_Overcoming_free-riding_behavior.pdf index 0b3a3d5..0b3a3d5 100644 --- a/docs/SIGecom Exch. (5) - Overcoming free-riding behavior.pdf +++ b/docs/SIGecom_Exch._(5)_-_Overcoming_free-riding_behavior.pdf | |||
Binary files differ | |||
diff --git a/docs/SODA'04 - Network failure detection and graph connectivity%0A.pdf b/docs/SODA'04_-_Network_failure_detection_and_graph_connectivity%0A.pdf index afe5a24..afe5a24 100644 --- a/docs/SODA'04 - Network failure detection and graph connectivity%0A.pdf +++ b/docs/SODA'04_-_Network_failure_detection_and_graph_connectivity%0A.pdf | |||
Binary files differ | |||
diff --git a/docs/SOSP'03 - Bullet.pdf b/docs/SOSP'03_-_Bullet.pdf index 06bb287..06bb287 100644 --- a/docs/SOSP'03 - Bullet.pdf +++ b/docs/SOSP'03_-_Bullet.pdf | |||
Binary files differ | |||
diff --git a/docs/SPAA'05 - Selfish routing with incomplete information.pdf b/docs/SPAA'05_-_Selfish_routing_with_incomplete_information.pdf index da89532..da89532 100644 --- a/docs/SPAA'05 - Selfish routing with incomplete information.pdf +++ b/docs/SPAA'05_-_Selfish_routing_with_incomplete_information.pdf | |||
Binary files differ | |||
diff --git a/docs/SRDS'06 - Cryptree.pdf b/docs/SRDS'06_-_Cryptree.pdf index 0d672a8..0d672a8 100644 --- a/docs/SRDS'06 - Cryptree.pdf +++ b/docs/SRDS'06_-_Cryptree.pdf | |||
Binary files differ | |||
diff --git a/docs/STACS'99 - Nisan - Algorithms for selfish agents.pdf b/docs/STACS'99_-_Nisan_-_Algorithms_for_selfish_agents.pdf index cbcecd0..cbcecd0 100644 --- a/docs/STACS'99 - Nisan - Algorithms for selfish agents.pdf +++ b/docs/STACS'99_-_Nisan_-_Algorithms_for_selfish_agents.pdf | |||
Binary files differ | |||
diff --git a/docs/STOC'08 - Optimal mechanism design and money burning.pdf b/docs/STOC'08_-_Optimal_mechanism_design_and_money_burning.pdf index 11f6d04..11f6d04 100644 --- a/docs/STOC'08 - Optimal mechanism design and money burning.pdf +++ b/docs/STOC'08_-_Optimal_mechanism_design_and_money_burning.pdf | |||
Binary files differ | |||
diff --git a/docs/STOC'97 - Practical Loss-Resilient Codes.pdf b/docs/STOC'97_-_Practical_Loss-Resilient_Codes.pdf index 5ddd0cd..5ddd0cd 100644 --- a/docs/STOC'97 - Practical Loss-Resilient Codes.pdf +++ b/docs/STOC'97_-_Practical_Loss-Resilient_Codes.pdf | |||
Binary files differ | |||
diff --git a/docs/STOC'99 - Nisan & Ronen - Algorithmic mechanism design.pdf b/docs/STOC'99_-_Nisan_&_Ronen_-_Algorithmic_mechanism_design.pdf index ff98ac5..ff98ac5 100644 --- a/docs/STOC'99 - Nisan & Ronen - Algorithmic mechanism design.pdf +++ b/docs/STOC'99_-_Nisan_&_Ronen_-_Algorithmic_mechanism_design.pdf | |||
Binary files differ | |||
diff --git a/docs/Saito - i-WAT Dissertation.pdf b/docs/Saito_-_i-WAT_Dissertation.pdf index be7e792..be7e792 100644 --- a/docs/Saito - i-WAT Dissertation.pdf +++ b/docs/Saito_-_i-WAT_Dissertation.pdf | |||
Binary files differ | |||
diff --git a/docs/Schollmeier - Signaling and networking in unstructured p2p networks.pdf b/docs/Schollmeier_-_Signaling_and_networking_in_unstructured_p2p_networks.pdf index 0910833..0910833 100644 --- a/docs/Schollmeier - Signaling and networking in unstructured p2p networks.pdf +++ b/docs/Schollmeier_-_Signaling_and_networking_in_unstructured_p2p_networks.pdf | |||
Binary files differ | |||
diff --git a/docs/Science - Hardin - The Tragedy of the Commons.pdf b/docs/Science_-_Hardin_-_The_Tragedy_of_the_Commons.pdf index 0087262..0087262 100644 --- a/docs/Science - Hardin - The Tragedy of the Commons.pdf +++ b/docs/Science_-_Hardin_-_The_Tragedy_of_the_Commons.pdf | |||
Binary files differ | |||
diff --git a/docs/Secure Collaborative Planning Forecasting and Replenishment.pdf b/docs/Secure_Collaborative_Planning_Forecasting_and_Replenishment.pdf index 0a9646f..0a9646f 100644 --- a/docs/Secure Collaborative Planning Forecasting and Replenishment.pdf +++ b/docs/Secure_Collaborative_Planning_Forecasting_and_Replenishment.pdf | |||
Binary files differ | |||
diff --git a/docs/TISSEC - PEREA.pdf b/docs/TISSEC_-_PEREA.pdf index b77bde1..b77bde1 100644 --- a/docs/TISSEC - PEREA.pdf +++ b/docs/TISSEC_-_PEREA.pdf | |||
Binary files differ | |||
diff --git a/docs/Tech Report - A Survey of Solutions to the Sybil Attack.pdf b/docs/Tech_Report_-_A_Survey_of_Solutions_to_the_Sybil_Attack.pdf index cda149e..cda149e 100644 --- a/docs/Tech Report - A Survey of Solutions to the Sybil Attack.pdf +++ b/docs/Tech_Report_-_A_Survey_of_Solutions_to_the_Sybil_Attack.pdf | |||
Binary files differ | |||
diff --git a/docs/Tech Report - Analyzing peer behavior in KAD.pdf b/docs/Tech_Report_-_Analyzing_peer_behavior_in_KAD.pdf index 2861d07..2861d07 100644 --- a/docs/Tech Report - Analyzing peer behavior in KAD.pdf +++ b/docs/Tech_Report_-_Analyzing_peer_behavior_in_KAD.pdf | |||
Binary files differ | |||
diff --git a/docs/Tech Report - Privacy guarantees through DCS.pdf b/docs/Tech_Report_-_Privacy_guarantees_through_DCS.pdf index 29632a9..29632a9 100644 --- a/docs/Tech Report - Privacy guarantees through DCS.pdf +++ b/docs/Tech_Report_-_Privacy_guarantees_through_DCS.pdf | |||
Binary files differ | |||
diff --git a/docs/Tech report - DCOP as a formal model of PARC.pdf b/docs/Tech_report_-_DCOP_as_a_formal_model_of_PARC.pdf index b28e14d..b28e14d 100644 --- a/docs/Tech report - DCOP as a formal model of PARC.pdf +++ b/docs/Tech_report_-_DCOP_as_a_formal_model_of_PARC.pdf | |||
Binary files differ | |||
diff --git a/docs/Telex: Anticensorship in the Network Infrastructure.pdf b/docs/Telex:_Anticensorship_in_the_Network_Infrastructure.pdf index 0b1a27c..0b1a27c 100644 --- a/docs/Telex: Anticensorship in the Network Infrastructure.pdf +++ b/docs/Telex:_Anticensorship_in_the_Network_Infrastructure.pdf | |||
Binary files differ | |||
diff --git a/docs/Thesis - Autonomic distributed systems.pdf b/docs/Thesis_-_Autonomic_distributed_systems.pdf index 8a2e3fb..8a2e3fb 100644 --- a/docs/Thesis - Autonomic distributed systems.pdf +++ b/docs/Thesis_-_Autonomic_distributed_systems.pdf | |||
Binary files differ | |||
diff --git a/docs/Thesis - F.Schadd.pdf b/docs/Thesis_-_F.Schadd.pdf index 0c9f748..0c9f748 100644 --- a/docs/Thesis - F.Schadd.pdf +++ b/docs/Thesis_-_F.Schadd.pdf | |||
Binary files differ | |||
diff --git a/docs/Thesis - P.Harvey.pdf b/docs/Thesis_-_P.Harvey.pdf index 0141690..0141690 100644 --- a/docs/Thesis - P.Harvey.pdf +++ b/docs/Thesis_-_P.Harvey.pdf | |||
Binary files differ | |||
diff --git a/docs/Trivers - The evolution of reciprocal altruism.pdf b/docs/Trivers_-_The_evolution_of_reciprocal_altruism.pdf index 685da29..685da29 100644 --- a/docs/Trivers - The evolution of reciprocal altruism.pdf +++ b/docs/Trivers_-_The_evolution_of_reciprocal_altruism.pdf | |||
Binary files differ | |||
diff --git a/docs/USENIX - PIR-Tor.pdf b/docs/USENIX_-_PIR-Tor.pdf index b705343..b705343 100644 --- a/docs/USENIX - PIR-Tor.pdf +++ b/docs/USENIX_-_PIR-Tor.pdf | |||
Binary files differ | |||
diff --git a/docs/USENIX Security'10 - SEPIA.pdf b/docs/USENIX_Security'10_-_SEPIA.pdf index 7942f11..7942f11 100644 --- a/docs/USENIX Security'10 - SEPIA.pdf +++ b/docs/USENIX_Security'10_-_SEPIA.pdf | |||
Binary files differ | |||
diff --git a/docs/User-Perceived Performance of the NICE Application Layer Multicast Protocol in Large and Highly Dynamic Groups_1.pdf b/docs/User-Perceived_Performance_of_the_NICE_Application_Layer_Multicast_Protocol_in_Large_and_Highly_Dynamic_Groups_1.pdf index b6e24c3..b6e24c3 100644 --- a/docs/User-Perceived Performance of the NICE Application Layer Multicast Protocol in Large and Highly Dynamic Groups_1.pdf +++ b/docs/User-Perceived_Performance_of_the_NICE_Application_Layer_Multicast_Protocol_in_Large_and_Highly_Dynamic_Groups_1.pdf | |||
Binary files differ | |||
diff --git a/docs/WEIS'05 - Moore - Counterin hidden-action attacks.pdf b/docs/WEIS'05_-_Moore_-_Counterin_hidden-action_attacks.pdf index 8659c56..8659c56 100644 --- a/docs/WEIS'05 - Moore - Counterin hidden-action attacks.pdf +++ b/docs/WEIS'05_-_Moore_-_Counterin_hidden-action_attacks.pdf | |||
Binary files differ | |||
diff --git a/docs/WIAPP'03 - Deconstructing the Kazaa network.pdf b/docs/WIAPP'03_-_Deconstructing_the_Kazaa_network.pdf index dbc7d66..dbc7d66 100644 --- a/docs/WIAPP'03 - Deconstructing the Kazaa network.pdf +++ b/docs/WIAPP'03_-_Deconstructing_the_Kazaa_network.pdf | |||
Binary files differ | |||
diff --git a/docs/WPES'04 - Forecasting and benchamking.pdf b/docs/WPES'04_-_Forecasting_and_benchamking.pdf index fc1c84a..fc1c84a 100644 --- a/docs/WPES'04 - Forecasting and benchamking.pdf +++ b/docs/WPES'04_-_Forecasting_and_benchamking.pdf | |||
Binary files differ | |||
diff --git a/docs/WPES'11 - FAUST.pdf b/docs/WPES'11_-_FAUST.pdf index e97228f..e97228f 100644 --- a/docs/WPES'11 - FAUST.pdf +++ b/docs/WPES'11_-_FAUST.pdf | |||
Binary files differ | |||
diff --git a/docs/WPES'11 - Fingerprinting.pdf b/docs/WPES'11_-_Fingerprinting.pdf index 8544e27..8544e27 100644 --- a/docs/WPES'11 - Fingerprinting.pdf +++ b/docs/WPES'11_-_Fingerprinting.pdf | |||
Binary files differ | |||
diff --git a/docs/WPES'11 - bridgeSPA.pdf b/docs/WPES'11_-_bridgeSPA.pdf index 7466064..7466064 100644 --- a/docs/WPES'11 - bridgeSPA.pdf +++ b/docs/WPES'11_-_bridgeSPA.pdf | |||
Binary files differ | |||
diff --git a/docs/WWW'03 - The EigenTrust algorithm.pdf b/docs/WWW'03_-_The_EigenTrust_algorithm.pdf index 0dc23a3..0dc23a3 100644 --- a/docs/WWW'03 - The EigenTrust algorithm.pdf +++ b/docs/WWW'03_-_The_EigenTrust_algorithm.pdf | |||
Binary files differ | |||
diff --git a/docs/WiOpt'03 - Buchegger & Le Boudec - Reputation Systems.pdf b/docs/WiOpt'03_-_Buchegger_&_Le_Boudec_-_Reputation_Systems.pdf index 79e1925..79e1925 100644 --- a/docs/WiOpt'03 - Buchegger & Le Boudec - Reputation Systems.pdf +++ b/docs/WiOpt'03_-_Buchegger_&_Le_Boudec_-_Reputation_Systems.pdf | |||
Binary files differ | |||
diff --git a/docs/Workshop on Economics of P2P Systems'03 - Chun, Fu & Vahdat.pdf b/docs/Workshop_on_Economics_of_P2P_Systems'03_-_Chun,_Fu_&_Vahdat.pdf index af5fa0e..af5fa0e 100644 --- a/docs/Workshop on Economics of P2P Systems'03 - Chun, Fu & Vahdat.pdf +++ b/docs/Workshop_on_Economics_of_P2P_Systems'03_-_Chun,_Fu_&_Vahdat.pdf | |||
Binary files differ | |||
diff --git a/docs/eScholarship UC item 4x6723n2.pdf b/docs/eScholarship_UC_item_4x6723n2.pdf index 30efc6a..30efc6a 100644 --- a/docs/eScholarship UC item 4x6723n2.pdf +++ b/docs/eScholarship_UC_item_4x6723n2.pdf | |||
Binary files differ | |||
diff --git a/docs/hill climbing.pdf b/docs/hill_climbing.pdf index f700791..f700791 100644 --- a/docs/hill climbing.pdf +++ b/docs/hill_climbing.pdf | |||
Binary files differ | |||