aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNils Gillmann <ng0@n0.is>2018-06-02 11:57:41 +0000
committerNils Gillmann <ng0@n0.is>2018-06-02 11:57:41 +0000
commitfbcc1749b8d6d22a18b48b7ae4a30e44f37566f9 (patch)
tree06c91fb2f5bb30d28c249341ea3c95ec296d7c4a
parente1efd07466fdcab2f6203c336694a3ac72d6d2e6 (diff)
downloadbibliography-fbcc1749b8d6d22a18b48b7ae4a30e44f37566f9.tar.gz
bibliography-fbcc1749b8d6d22a18b48b7ae4a30e44f37566f9.zip
Replace all filenames with whitespaces to use underscores.
Even if that means we break wikipedia links and so on (again). Whitespaces are terrible to deal with in files. Signed-off-by: Nils Gillmann <ng0@n0.is>
-rw-r--r--docs/10.1.1.27.1639_(2).pdf (renamed from docs/10.1.1.27.1639 (2).pdf)bin118020 -> 118020 bytes
-rw-r--r--docs/10.1.1.4.7003_(1).pdf (renamed from docs/10.1.1.4.7003 (1).pdf)bin212023 -> 212023 bytes
-rw-r--r--docs/2004-ISLPED-Energy-aware_demand_paging_on_NAND_flash-based_embedded_storages.pdf (renamed from docs/2004-ISLPED-Energy-aware demand paging on NAND flash-based embedded storages.pdf)bin222664 -> 222664 bytes
-rw-r--r--docs/A02370_DF_CFP_SpringerOpen_SI_CFP_EURASIP_JWCN_Global_A42.pdf (renamed from docs/A02370_DF_CFP_SpringerOpen SI CFP EURASIP JWCN_Global_A42.pdf)bin474589 -> 474589 bytes
-rw-r--r--docs/AAAI'08_-_Local_search_for_DCOP.pdf (renamed from docs/AAAI'08 - Local search for DCOP.pdf)bin200389 -> 200389 bytes
-rw-r--r--docs/AAAI'96_-_Mixed_constraint_satisfaction.pdf (renamed from docs/AAAI'96 - Mixed constraint satisfaction.pdf)bin123033 -> 123033 bytes
-rw-r--r--docs/AAMAS'05_-_Accelerating_the_DCOP_algorithm_ADOPT.pdf (renamed from docs/AAMAS'05 - Accelerating the DCOP algorithm ADOPT.pdf)bin4661000 -> 4661000 bytes
-rw-r--r--docs/AAMAS08_-_DCOP_algorithms_in_a_real_world_problem.pdf (renamed from docs/AAMAS08 - DCOP algorithms in a real world problem.pdf)bin486149 -> 486149 bytes
-rw-r--r--docs/ACM_Computing_Surveys_-_A_survey_of_p2p_content_distribution_technologies.pdf (renamed from docs/ACM Computing Surveys - A survey of p2p content distribution technologies.pdf)bin517773 -> 517773 bytes
-rw-r--r--docs/ACM_SIGCOMM'05_-_Cheng_&_Friedman_-_Sybilproof_reputation_mechanisms.pdf (renamed from docs/ACM SIGCOMM'05 - Cheng & Friedman - Sybilproof reputation mechanisms.pdf)bin189455 -> 189455 bytes
-rw-r--r--docs/ACNS'05_-_Garcia_&_Hoepman_-_Off-line_Karma.pdf (renamed from docs/ACNS'05 - Garcia & Hoepman - Off-line Karma.pdf)bin179762 -> 179762 bytes
-rw-r--r--docs/ACSAC'02_-_A_secure_directory_service_based_on_exclusive_encryption.pdf (renamed from docs/ACSAC'02 - A secure directory service based on exclusive encryption.pdf)bin231311 -> 231311 bytes
-rw-r--r--docs/ACSAC'11_-_BACKLIT.pdf (renamed from docs/ACSAC'11 - BACKLIT.pdf)bin702766 -> 702766 bytes
-rw-r--r--docs/ACSAC'11_-_Tortoise.pdf (renamed from docs/ACSAC'11 - Tortoise.pdf)bin476389 -> 476389 bytes
-rw-r--r--docs/AIMS'09_-_Sybil_attacks_protection_schemes_in_KAD.pdf (renamed from docs/AIMS'09 - Sybil attacks protection schemes in KAD.pdf)bin245803 -> 245803 bytes
-rw-r--r--docs/ARES'06_-_Fair_Trading_of_Information.pdf (renamed from docs/ARES'06 - Fair Trading of Information.pdf)bin423016 -> 423016 bytes
-rw-r--r--docs/ASIACRYPT'07_-_IBBE_with_constant_size_ciphertexts_and_private_keys.pdf (renamed from docs/ASIACRYPT'07 - IBBE with constant size ciphertexts and private keys.pdf)bin503474 -> 503474 bytes
-rw-r--r--docs/ATEC'04_-_A_network_positioning_system.pdf (renamed from docs/ATEC'04 - A network positioning system.pdf)bin223195 -> 223195 bytes
-rw-r--r--docs/A_Novel_Testbed_for_P2P_Networks.pdf (renamed from docs/A Novel Testbed for P2P Networks.pdf)bin344958 -> 344958 bytes
-rw-r--r--docs/Amann_-_Secure_asynchronous_change_notifications.pdf (renamed from docs/Amann - Secure asynchronous change notifications.pdf)bin931135 -> 931135 bytes
-rw-r--r--docs/Amnefelt_&_Svenningsson_-_Keso.pdf (renamed from docs/Amnefelt & Svenningsson - Keso.pdf)bin341739 -> 341739 bytes
-rw-r--r--docs/Applied_Intelligence_-_Combinatorial_Auctions.pdf (renamed from docs/Applied Intelligence - Combinatorial Auctions.pdf)bin672330 -> 672330 bytes
-rw-r--r--docs/Bogetoft_et_al._-_Secure_multiparty_computation_goes_live.pdf (renamed from docs/Bogetoft et al. - Secure multiparty computation goes live.pdf)bin335795 -> 335795 bytes
-rw-r--r--docs/Browne_et_al_-_A_survey_of_MCTS_methods.pdf (renamed from docs/Browne et al - A survey of MCTS methods.pdf)bin2465222 -> 2465222 bytes
-rw-r--r--docs/Brumley_&_Tuveri_-_Timing_Attacks.pdf (renamed from docs/Brumley & Tuveri - Timing Attacks.pdf)bin356025 -> 356025 bytes
-rw-r--r--docs/CCS'03_-_Yang_&_Garcia-Molina_-_PPay.pdf (renamed from docs/CCS'03 - Yang & Garcia-Molina - PPay.pdf)0
-rw-r--r--docs/CCS'06_-_Attributed-based_encryption_for_fine-grained_access_control_of_encrypted_data.pdf (renamed from docs/CCS'06 - Attributed-based encryption for fine-grained access control of encrypted data.pdf)bin277458 -> 277458 bytes
-rw-r--r--docs/CCS'07_-_ABE_with_non-monotonic_access_structures.pdf (renamed from docs/CCS'07 - ABE with non-monotonic access structures.pdf)bin216604 -> 216604 bytes
-rw-r--r--docs/CCS'08_-_FairplayMP.pdf (renamed from docs/CCS'08 - FairplayMP.pdf)bin266316 -> 266316 bytes
-rw-r--r--docs/CCS'08_-_Identity-based_encryption_with_efficient_revocation.pdf (renamed from docs/CCS'08 - Identity-based encryption with efficient revocation.pdf)bin302141 -> 302141 bytes
-rw-r--r--docs/CCS'11_-_Cirripede.pdf (renamed from docs/CCS'11 - Cirripede.pdf)bin1116428 -> 1116428 bytes
-rw-r--r--docs/CCS'11_-_Throughput-fingerprinting.pdf (renamed from docs/CCS'11 - Throughput-fingerprinting.pdf)bin451773 -> 451773 bytes
-rw-r--r--docs/CCS'11_-_Trust-based_Anonymous_Communication1.pdf (renamed from docs/CCS'11 - Trust-based Anonymous Communication1.pdf)bin373511 -> 373511 bytes
-rw-r--r--docs/CG'06_-_Selectivity_and_backup_operators_in_MCTS.pdf (renamed from docs/CG'06 - Selectivity and backup operators in MCTS.pdf)bin136788 -> 136788 bytes
-rw-r--r--docs/CIA'04_-_Despotovic_&_Aberer_-_Peers'_performance_in_P2P_networks.pdf (renamed from docs/CIA'04 - Despotovic & Aberer - Peers' performance in P2P networks.pdf)bin190223 -> 190223 bytes
-rw-r--r--docs/CRYPTO'02_-_The_LSD_broadcast_encryption_scheme.pdf (renamed from docs/CRYPTO'02 - The LSD broadcast encryption scheme.pdf)bin166360 -> 166360 bytes
-rw-r--r--docs/CRYPTO'84_-_El_Gamal_-_Public_Key_Cryptosystem.pdf (renamed from docs/CRYPTO'84 - El Gamal - Public Key Cryptosystem.pdf)bin336486 -> 336486 bytes
-rw-r--r--docs/CSET'11_-_ExperimenTor.pdf (renamed from docs/CSET'11 - ExperimenTor.pdf)bin489919 -> 489919 bytes
-rw-r--r--docs/CaberNet_Radicals_Workshop_-_Puzzles_in_P2P_Systems.pdf (renamed from docs/CaberNet Radicals Workshop - Puzzles in P2P Systems.pdf)bin127742 -> 127742 bytes
-rw-r--r--docs/ChinaCom'06_-_Combating_hidden_action_in_unstructured_p2p_systems.pdf (renamed from docs/ChinaCom'06 - Combating hidden action in unstructured p2p systems.pdf)bin5539323 -> 5539323 bytes
-rw-r--r--docs/CoRR_-_Critical_look_at_decentralization.pdf (renamed from docs/CoRR - Critical look at decentralization.pdf)bin163362 -> 163362 bytes
-rw-r--r--docs/CoRR_-_X-Vine.pdf (renamed from docs/CoRR - X-Vine.pdf)bin427038 -> 427038 bytes
-rw-r--r--docs/Combining_Virtual_and_Physical_Structures_for_Self-organized_Routing_0.pdf (renamed from docs/Combining Virtual and Physical Structures for Self-organized Routing_0.pdf)bin453012 -> 453012 bytes
-rw-r--r--docs/Communications_of_the_ACM_-_Reputation_Systems.pdf (renamed from docs/Communications of the ACM - Reputation Systems.pdf)bin67185 -> 67185 bytes
-rw-r--r--docs/Compcon_'97_-_Privacy-enhancing_Technologies_for_the_Internet.pdf (renamed from docs/Compcon '97 - Privacy-enhancing Technologies for the Internet.pdf)bin42068 -> 42068 bytes
-rw-r--r--docs/Computer_Networks_-_Wang,_Chiu_&_Lui_-_Overlay_network_traffic_on_ISP_peering.pdf (renamed from docs/Computer Networks - Wang, Chiu & Lui - Overlay network traffic on ISP peering.pdf)bin380115 -> 380115 bytes
-rw-r--r--docs/Concurrency_and_Computation_-_TRIBLER.pdf (renamed from docs/Concurrency and Computation - TRIBLER.pdf)bin281955 -> 281955 bytes
-rw-r--r--docs/DIALM'02_-_Feigenbaum_&_Shenker_-_Distributed_algorithmic_mechanism_design.pdf (renamed from docs/DIALM'02 - Feigenbaum & Shenker - Distributed algorithmic mechanism design.pdf)bin181536 -> 181536 bytes
-rw-r--r--docs/DP5:_A_Private_Presence_Service.pdf (renamed from docs/DP5: A Private Presence Service.pdf)bin611692 -> 611692 bytes
-rw-r--r--docs/Dellarocas_-_Reputation_Mechanisms.pdf (renamed from docs/Dellarocas - Reputation Mechanisms.pdf)bin650219 -> 650219 bytes
-rw-r--r--docs/Dependent_Link_Padding_Algorithms_for.pdf (renamed from docs/Dependent Link Padding Algorithms for.pdf)bin1740835 -> 1740835 bytes
-rw-r--r--docs/Duminuco_&_Biersack_-_Hierarchical_Codes.pdf (renamed from docs/Duminuco & Biersack - Hierarchical Codes.pdf)bin478014 -> 478014 bytes
-rw-r--r--docs/EC'04_-_Robust_incentive_techniques_for_P2P_networks.pdf (renamed from docs/EC'04 - Robust incentive techniques for P2P networks.pdf)bin168711 -> 168711 bytes
-rw-r--r--docs/EC'05_-_Hidden-action_in_multi-hop_routing.pdf (renamed from docs/EC'05 - Hidden-action in multi-hop routing.pdf)bin237707 -> 237707 bytes
-rw-r--r--docs/EC'06_-_Incentive-compatible_interdomain_routing.pdf (renamed from docs/EC'06 - Incentive-compatible interdomain routing.pdf)bin245673 -> 245673 bytes
-rw-r--r--docs/EC'08_-_Why_share_in_peer-to-peer_networks.pdf (renamed from docs/EC'08 - Why share in peer-to-peer networks.pdf)bin138205 -> 138205 bytes
-rw-r--r--docs/EC'09_-_Sybilproof_transitive_trust_protocols.pdf (renamed from docs/EC'09 - Sybilproof transitive trust protocols.pdf)bin173640 -> 173640 bytes
-rw-r--r--docs/EUROCRYPT'05_-_Fuzzy_Identity-Based_Encryption.pdf (renamed from docs/EUROCRYPT'05 - Fuzzy Identity-Based Encryption.pdf)bin200579 -> 200579 bytes
-rw-r--r--docs/EUROCRYPT'89_-_Waidner&Pfitzmann_-_The_dining_cryptographers_in_the_disco_.pdf (renamed from docs/EUROCRYPT'89 - Waidner&Pfitzmann - The dining cryptographers in the disco .pdf)bin82278 -> 82278 bytes
-rw-r--r--docs/EUROCRYPT'92_-_Chaun_&_Pedersen_-_Transferred_cash_grows_in_size.PDF (renamed from docs/EUROCRYPT'92 - Chaun & Pedersen - Transferred cash grows in size.PDF)0
-rw-r--r--docs/Erdős_&_Rényi_-_On_Random_Graphs.pdf (renamed from docs/Erdős & Rényi - On Random Graphs.pdf)bin1410802 -> 1410802 bytes
-rw-r--r--docs/Euro-Par'05_-_Pastis.pdf (renamed from docs/Euro-Par'05 - Pastis.pdf)bin123992 -> 123992 bytes
-rw-r--r--docs/FAST'09_-_Open-source_erasure_coding_libraries_for_storage.pdf (renamed from docs/FAST'09 - Open-source erasure coding libraries for storage.pdf)bin515672 -> 515672 bytes
-rw-r--r--docs/FC'11_-_BNymble.pdf (renamed from docs/FC'11 - BNymble.pdf)bin191536 -> 191536 bytes
-rw-r--r--docs/FC'11_-_Malice_versus_AN.ON_.pdf (renamed from docs/FC'11 - Malice versus AN.ON_.pdf)bin1040865 -> 1040865 bytes
-rw-r--r--docs/FC'11_-_Proximax.pdf (renamed from docs/FC'11 - Proximax.pdf)bin179439 -> 179439 bytes
-rw-r--r--docs/FC'12_-_Congestion-aware_Path_Selection_for_Tor.pdf (renamed from docs/FC'12 - Congestion-aware Path Selection for Tor.pdf)bin962626 -> 962626 bytes
-rw-r--r--docs/FGCS_-_P2P_Contracts:_a_Framework_for_Resource_and_Service_Exchange.pdf (renamed from docs/FGCS - P2P Contracts: a Framework for Resource and Service Exchange.pdf)bin201234 -> 201234 bytes
-rw-r--r--docs/FOCI'11_-_Decoy_Routing:_Toward_Unblockable_Internet_Communication.pdf (renamed from docs/FOCI'11 - Decoy Routing: Toward Unblockable Internet Communication.pdf)bin145566 -> 145566 bytes
-rw-r--r--docs/FREENIX'01_-_A_transparent_cryptographic_file_system_for_UNIX.pdf (renamed from docs/FREENIX'01 - A transparent cryptographic file system for UNIX.pdf)bin145234 -> 145234 bytes
-rw-r--r--docs/Feldman,_Lai,_Chuang_&_Stoica_-_Quantifying_disincentives_in_peer-to-peer_networks.pdf (renamed from docs/Feldman, Lai, Chuang & Stoica - Quantifying disincentives in peer-to-peer networks.pdf)bin116464 -> 116464 bytes
-rw-r--r--docs/Finite-length_analysis_of_low-density_parity-check_codes_on.pdf (renamed from docs/Finite-length analysis of low-density parity-check codes on.pdf)bin474693 -> 474693 bytes
-rw-r--r--docs/Formalizing_Anonymous_Blacklisting_Systems.pdf (renamed from docs/Formalizing Anonymous Blacklisting Systems.pdf)bin966218 -> 966218 bytes
-rw-r--r--docs/GECON'04_-_Designing_incentive_mechanisms_for_p2p_systems.pdf (renamed from docs/GECON'04 - Designing incentive mechanisms for p2p systems.pdf)bin403825 -> 403825 bytes
-rw-r--r--docs/Ghodsi_-_Distributed_k-ary_System.pdf (renamed from docs/Ghodsi - Distributed k-ary System.pdf)bin1635373 -> 1635373 bytes
-rw-r--r--docs/Grid_Computing_-_Estimating_The_Size_Of_Peer-To-Peer_Networks.pdf (renamed from docs/Grid Computing - Estimating The Size Of Peer-To-Peer Networks.pdf)bin654064 -> 654064 bytes
-rw-r--r--docs/Group_Decision_and_Negociation_-_Automated_Negociation.pdf (renamed from docs/Group Decision and Negociation - Automated Negociation.pdf)bin1037008 -> 1037008 bytes
-rw-r--r--docs/HICSS'02_-_A_computational_model_of_trust_and_reputation.pdf (renamed from docs/HICSS'02 - A computational model of trust and reputation.pdf)bin363406 -> 363406 bytes
-rw-r--r--docs/HOT-P2P'05_-_Khorshadi,_Liu_&_Ghosal.pdf (renamed from docs/HOT-P2P'05 - Khorshadi, Liu & Ghosal.pdf)bin270414 -> 270414 bytes
-rw-r--r--docs/HPDC'06_-_Peer_to_peer_size_estimation_in_large_and_dynamic_networks.pdf (renamed from docs/HPDC'06 - Peer to peer size estimation in large and dynamic networks.pdf)bin495491 -> 495491 bytes
-rw-r--r--docs/HotOS_IX_-_High_available,_scalable_storage,_dynamic_peer_networks.pdf (renamed from docs/HotOS IX - High available, scalable storage, dynamic peer networks.pdf)bin96589 -> 96589 bytes
-rw-r--r--docs/HotP2P'10_-_KAD_DHT_attack_mitigation.pdf (renamed from docs/HotP2P'10 - KAD DHT attack mitigation.pdf)bin321859 -> 321859 bytes
-rw-r--r--docs/ICC'08_-_Super-Seeding_in_BitTorrent.PDF (renamed from docs/ICC'08 - Super-Seeding in BitTorrent.PDF)bin249457 -> 249457 bytes
-rw-r--r--docs/ICDCN'10_-_Poisoning_the_Kad_Network.pdf (renamed from docs/ICDCN'10 - Poisoning the Kad Network.pdf)bin387398 -> 387398 bytes
-rw-r--r--docs/ICDCS'02_-_Reclaiming_space_for_duplicate_files.pdf (renamed from docs/ICDCS'02 - Reclaiming space for duplicate files.pdf)bin572963 -> 572963 bytes
-rw-r--r--docs/ICDCS'06_-_Improving_traffic_locality_in_BitTorrent.pdf (renamed from docs/ICDCS'06 - Improving traffic locality in BitTorrent.pdf)bin155172 -> 155172 bytes
-rw-r--r--docs/ICDCS'09_-_Regenerating_codes_for_p2p_backup_systems.pdf (renamed from docs/ICDCS'09 - Regenerating codes for p2p backup systems.pdf)bin445777 -> 445777 bytes
-rw-r--r--docs/ICN'07_-_PlanetLab.pdf (renamed from docs/ICN'07 - PlanetLab.pdf)bin253943 -> 253943 bytes
-rw-r--r--docs/ICNP'03_-_Resilient_peer-to-peer_streaming.pdf (renamed from docs/ICNP'03 - Resilient peer-to-peer streaming.pdf)bin372484 -> 372484 bytes
-rw-r--r--docs/IEEE_CST_-_A_Survey_and_Comparison_of_Peer-to-Peer_Overlay.pdf (renamed from docs/IEEE CST - A Survey and Comparison of Peer-to-Peer Overlay.pdf)bin276266 -> 276266 bytes
-rw-r--r--docs/IEEE_Communications_Magazine_-_Video_Streaming_in_P2P_Systems.pdf (renamed from docs/IEEE Communications Magazine - Video Streaming in P2P Systems.pdf)bin793579 -> 793579 bytes
-rw-r--r--docs/IEEE_Computer_Society_-_2Fast.pdf (renamed from docs/IEEE Computer Society - 2Fast.pdf)bin211293 -> 211293 bytes
-rw-r--r--docs/IEEE_DSO_-_Free_riding_on_Gnutella_revisited.pdf (renamed from docs/IEEE DSO - Free riding on Gnutella revisited.pdf)bin335280 -> 335280 bytes
-rw-r--r--docs/IEEE_Journal_(25)_-_Hidden-action_in_network_routing.pdf (renamed from docs/IEEE Journal (25) - Hidden-action in network routing.pdf)bin424887 -> 424887 bytes
-rw-r--r--docs/IEEE_Trans._on_Info._-_New_directions_in_cryptography.pdf (renamed from docs/IEEE Trans. on Info. - New directions in cryptography.pdf)bin2216632 -> 2216632 bytes
-rw-r--r--docs/IEEE_Transactions_on_Systems_-_Descentralized_learning.pdf (renamed from docs/IEEE Transactions on Systems - Descentralized learning.pdf)bin311278 -> 311278 bytes
-rw-r--r--docs/IEEE⁄ACM_Banner_&_Orda.pdf (renamed from docs/IEEE⁄ACM Banner & Orda.pdf)bin681489 -> 681489 bytes
-rw-r--r--docs/IEEE⁄ACM_Trans._Netw.'02_(10)-_Internet_pricing.pdf (renamed from docs/IEEE⁄ACM Trans. Netw.'02 (10)- Internet pricing.pdf)bin368751 -> 368751 bytes
-rw-r--r--docs/IEEE⁄ACM_Transactions_on_Networking_-_Detecting_shared_congestion_of_flows.pdf (renamed from docs/IEEE⁄ACM Transactions on Networking - Detecting shared congestion of flows.pdf)bin383575 -> 383575 bytes
-rw-r--r--docs/IJCAI'07_-_PC-DPOP.pdf (renamed from docs/IJCAI'07 - PC-DPOP.pdf)bin226457 -> 226457 bytes
-rw-r--r--docs/IJCCR_vol_10_(2006)_1_Ardron_and_Lietaer.pdf (renamed from docs/IJCCR vol 10 (2006) 1 Ardron and Lietaer.pdf)bin259905 -> 259905 bytes
-rw-r--r--docs/IMC'04_-_Availability,_Usage,_and_Deployment_Characteristics_of_the_DNS.pdf (renamed from docs/IMC'04 - Availability, Usage, and Deployment Characteristics of the DNS.pdf)bin856335 -> 856335 bytes
-rw-r--r--docs/IMC'05_-_Measurement,_analysis_and_modeling_of_BitTorrent-like_systems.pdf (renamed from docs/IMC'05 - Measurement, analysis and modeling of BitTorrent-like systems.pdf)bin1889416 -> 1889416 bytes
-rw-r--r--docs/IMC'06_-_Understanding_churn_in_p2p_networks.pdf (renamed from docs/IMC'06 - Understanding churn in p2p networks.pdf)bin261059 -> 261059 bytes
-rw-r--r--docs/IMC'07_-_A_global_view_of_KAD.pdf (renamed from docs/IMC'07 - A global view of KAD.pdf)bin163341 -> 163341 bytes
-rw-r--r--docs/IMC'08_-_Detecting_BitTorrent_Blocking.pdf (renamed from docs/IMC'08 - Detecting BitTorrent Blocking.pdf)bin481202 -> 481202 bytes
-rw-r--r--docs/INFOCOM'02_-_Probabilistic_location_and_routing.pdf (renamed from docs/INFOCOM'02 - Probabilistic location and routing.pdf)bin225708 -> 225708 bytes
-rw-r--r--docs/INFOCOM'05_-_Designing_incentives_for_peer-to-peer_routing.pdf (renamed from docs/INFOCOM'05 - Designing incentives for peer-to-peer routing.pdf)bin237564 -> 237564 bytes
-rw-r--r--docs/INFOCOM'05_-_Exploiting_anarchy_in_networks.pdf (renamed from docs/INFOCOM'05 - Exploiting anarchy in networks.pdf)bin282032 -> 282032 bytes
-rw-r--r--docs/INFOCOM'05_-_Market-driven_bandwidth_allocation.pdf (renamed from docs/INFOCOM'05 - Market-driven bandwidth allocation.pdf)bin604015 -> 604015 bytes
-rw-r--r--docs/INFOCOM'05_-_Network_coding_for_large_scale_content_distribution.pdf (renamed from docs/INFOCOM'05 - Network coding for large scale content distribution.pdf)bin108753 -> 108753 bytes
-rw-r--r--docs/INFOCOM'06_-_Pianese,_Keller_&_Biersack_-_PULSE.pdf (renamed from docs/INFOCOM'06 - Pianese, Keller & Biersack - PULSE.pdf)bin177363 -> 177363 bytes
-rw-r--r--docs/INFOCOM'07_-_MARCH.pdf (renamed from docs/INFOCOM'07 - MARCH.pdf)bin208345 -> 208345 bytes
-rw-r--r--docs/INFOCOM'07_-_Mesh_or_multiple-tree.pdf (renamed from docs/INFOCOM'07 - Mesh or multiple-tree.pdf)bin205472 -> 205472 bytes
-rw-r--r--docs/INFOCOM'07_-_Network_coding_for_distributed_storage_systems.pdf (renamed from docs/INFOCOM'07 - Network coding for distributed storage systems.pdf)bin400656 -> 400656 bytes
-rw-r--r--docs/INFOCOM'07_-_PRIME.pdf (renamed from docs/INFOCOM'07 - PRIME.pdf)bin369504 -> 369504 bytes
-rw-r--r--docs/INFOCOM'08_-_Stable_peers.PDF (renamed from docs/INFOCOM'08 - Stable peers.PDF)bin261140 -> 261140 bytes
-rw-r--r--docs/INFOCOM'09_-_Queusing_models_for_p2p_streaming_systems.pdf (renamed from docs/INFOCOM'09 - Queusing models for p2p streaming systems.pdf)bin233400 -> 233400 bytes
-rw-r--r--docs/INFOCOM'09_-_Sybilproof_Indirect_Reprocity_Mechanism_for_P2P_Networks_.pdf (renamed from docs/INFOCOM'09 - Sybilproof Indirect Reprocity Mechanism for P2P Networks .pdf)bin243216 -> 243216 bytes
-rw-r--r--docs/INFOCOM'09_-_Traffic_Engineering_vs._Content_Distribution.PDF (renamed from docs/INFOCOM'09 - Traffic Engineering vs. Content Distribution.PDF)bin196665 -> 196665 bytes
-rw-r--r--docs/INFOCOMM'09_-_Mechanism_design_without_payments.pdf (renamed from docs/INFOCOMM'09 - Mechanism design without payments.pdf)bin723984 -> 723984 bytes
-rw-r--r--docs/IPTPS'01_-_Complex_queries_in_DHT-based_p2p_networks.pdf (renamed from docs/IPTPS'01 - Complex queries in DHT-based p2p networks.pdf)bin163797 -> 163797 bytes
-rw-r--r--docs/IPTPS'01_-_Erasure_coding_vs._replication.pdf (renamed from docs/IPTPS'01 - Erasure coding vs. replication.pdf)bin93361 -> 93361 bytes
-rw-r--r--docs/IPTPS'02_-_Douceur_-_The_Sybil_Attack.pdf (renamed from docs/IPTPS'02 - Douceur - The Sybil Attack.pdf)bin100091 -> 100091 bytes
-rw-r--r--docs/IPTPS'03_-_Rateless_codes_and_big_downloads.pdf (renamed from docs/IPTPS'03 - Rateless codes and big downloads.pdf)bin103854 -> 103854 bytes
-rw-r--r--docs/IPTPS'03_-_Towards_a_common_API.pdf (renamed from docs/IPTPS'03 - Towards a common API.pdf)bin92791 -> 92791 bytes
-rw-r--r--docs/IPTPS'05_-_High_availability_in_DHTs:_erasure_coding_vs._replication.pdf (renamed from docs/IPTPS'05 - High availability in DHTs: erasure coding vs. replication.pdf)bin100392 -> 100392 bytes
-rw-r--r--docs/IPTPS'05_-_The_BitTorrent:_measurements_and_analysis.pdf (renamed from docs/IPTPS'05 - The BitTorrent: measurements and analysis.pdf)bin779757 -> 779757 bytes
-rw-r--r--docs/IPTPS'06_-_On_object_maintenance_in_p2p_systems.pdf (renamed from docs/IPTPS'06 - On object maintenance in p2p systems.pdf)bin130180 -> 130180 bytes
-rw-r--r--docs/IPTPS'06_-_Skype_p2p_VoIP_System.pdf (renamed from docs/IPTPS'06 - Skype p2p VoIP System.pdf)bin917329 -> 917329 bytes
-rw-r--r--docs/ITC-20'07_-_Estimating_churn_in_structured_p2p_networks.pdf (renamed from docs/ITC-20'07 - Estimating churn in structured p2p networks.pdf)bin652466 -> 652466 bytes
-rw-r--r--docs/IWSOS'08_-_Network_Size_Estimation_for_Structured_Overlays.pdf (renamed from docs/IWSOS'08 - Network Size Estimation for Structured Overlays.pdf)bin661810 -> 661810 bytes
-rw-r--r--docs/Informatik_Spektrum_-_Peer-to-peer_networking_&_-computing.pdf (renamed from docs/Informatik Spektrum - Peer-to-peer networking & -computing.pdf)bin144894 -> 144894 bytes
-rw-r--r--docs/JPE_(1993)_-_Gode_&_Sunder_-_Allocative_Efficiency.pdf (renamed from docs/JPE (1993) - Gode & Sunder - Allocative Efficiency.pdf)0
-rw-r--r--docs/Jelasity,_Montresor_&_Babaoglu_-_Gossip-based_aggregation.pdf (renamed from docs/Jelasity, Montresor & Babaoglu - Gossip-based aggregation.pdf)bin533887 -> 533887 bytes
-rw-r--r--docs/Jiang,_Bai_&_Wang_-_Trust_and_Cooperation_in_Peer-to-Peer_Systems.pdf (renamed from docs/Jiang, Bai & Wang - Trust and Cooperation in Peer-to-Peer Systems.pdf)bin57598 -> 57598 bytes
-rw-r--r--docs/Journal_of_AI_-_BnB-ADOPT.pdf (renamed from docs/Journal of AI - BnB-ADOPT.pdf)bin1118962 -> 1118962 bytes
-rw-r--r--docs/Journal_of_Parallel_&_Distributed_Computing_-_Deleting_files_in_the_Celeste_p2p_storage_systems.pdf (renamed from docs/Journal of Parallel & Distributed Computing - Deleting files in the Celeste p2p storage systems.pdf)bin316979 -> 316979 bytes
-rw-r--r--docs/Journal_of_Public_Economics_-_Bolton,_Katok_&_Ockenfels.pdf (renamed from docs/Journal of Public Economics - Bolton, Katok & Ockenfels.pdf)bin171465 -> 171465 bytes
-rw-r--r--docs/Journal_of_Supercomputing_-_Insight_into_redundancy_schemes_in_DHTs.pdf (renamed from docs/Journal of Supercomputing - Insight into redundancy schemes in DHTs.pdf)bin377919 -> 377919 bytes
-rw-r--r--docs/Kernighan_&_Lin_-_An_Efficient_Heuristic_Procedure_for_Partitioning_Graphs%0A.pdf (renamed from docs/Kernighan & Lin - An Efficient Heuristic Procedure for Partitioning Graphs%0A.pdf)bin1644398 -> 1644398 bytes
-rw-r--r--docs/Kising_-_Proximity_Neighbor_Selection_for_IGOR.pdf (renamed from docs/Kising - Proximity Neighbor Selection for IGOR.pdf)bin504001 -> 504001 bytes
-rw-r--r--docs/LAP:_Lightweight_Anonymity_and_Privacy.pdf (renamed from docs/LAP: Lightweight Anonymity and Privacy.pdf)bin623018 -> 623018 bytes
-rw-r--r--docs/LASTor:_A_Low-Latency_AS-Aware_Tor_Client.pdf (renamed from docs/LASTor: A Low-Latency AS-Aware Tor Client.pdf)bin587476 -> 587476 bytes
-rw-r--r--docs/LNCS_-_Distributed_Hash_Tables.pdf (renamed from docs/LNCS - Distributed Hash Tables.pdf)bin663450 -> 663450 bytes
-rw-r--r--docs/Laffont_&_Martimort_-_The_Theory_of_Incentives.pdf (renamed from docs/Laffont & Martimort - The Theory of Incentives.pdf)bin2885306 -> 2885306 bytes
-rw-r--r--docs/Lecture_Notes_in_Computer_Science_-_Selected_DHT_Algorithms_.pdf (renamed from docs/Lecture Notes in Computer Science - Selected DHT Algorithms .pdf)bin373183 -> 373183 bytes
-rw-r--r--docs/Long_Term_Study_of_Peer_Behavior_in_the_kad_DHT.pdf (renamed from docs/Long Term Study of Peer Behavior in the kad DHT.pdf)0
-rw-r--r--docs/MDS'07_-_Conner_&_Nahrstedt_-_Securing_peer-to-peer_media_streaming_systems.pdf (renamed from docs/MDS'07 - Conner & Nahrstedt - Securing peer-to-peer media streaming systems.pdf)bin81085 -> 81085 bytes
-rw-r--r--docs/Marx_-_Parameterized_graph_separation_problems.pdf (renamed from docs/Marx - Parameterized graph separation problems.pdf)bin223322 -> 223322 bytes
-rw-r--r--docs/Menezes_&_Monteiro_-_An_Introduction_to_Auction_Theory.pdf (renamed from docs/Menezes & Monteiro - An Introduction to Auction Theory.pdf)bin1024012 -> 1024012 bytes
-rw-r--r--docs/Mies_-_SpoVNet.pdf (renamed from docs/Mies - SpoVNet.pdf)bin855827 -> 855827 bytes
-rw-r--r--docs/NCA'05_-_Decentralized_Schemes_for_Size_Estimation_in_Large_and_Dynamic_Groups.pdf (renamed from docs/NCA'05 - Decentralized Schemes for Size Estimation in Large and Dynamic Groups.pdf)bin1700392 -> 1700392 bytes
-rw-r--r--docs/NDSS'11_-_Security_API_for_Distributed_Social_Networks.pdf (renamed from docs/NDSS'11 - Security API for Distributed Social Networks.pdf)bin1061504 -> 1061504 bytes
-rw-r--r--docs/NGC'03_-_Scalable_Application-level_Anycast_.pdf (renamed from docs/NGC'03 - Scalable Application-level Anycast .pdf)bin120085 -> 120085 bytes
-rw-r--r--docs/NMNC_-_Progressive_strategies_for_MCTS.pdf (renamed from docs/NMNC - Progressive strategies for MCTS.pdf)bin367543 -> 367543 bytes
-rw-r--r--docs/NSDI'04_-_Designing_a_DHT_for_low_latency_and_high_throughput.pdf (renamed from docs/NSDI'04 - Designing a DHT for low latency and high throughput.pdf)bin243452 -> 243452 bytes
-rw-r--r--docs/NSDI'07_-_Do_incentives_build_robustness_in_BitTorrent.pdf (renamed from docs/NSDI'07 - Do incentives build robustness in BitTorrent.pdf)bin955812 -> 955812 bytes
-rw-r--r--docs/NetCod'05_-_Random_linear_coding_based_distributed_networked_storage.pdf (renamed from docs/NetCod'05 - Random linear coding based distributed networked storage.pdf)bin223284 -> 223284 bytes
-rw-r--r--docs/NetEcon'03_-_Cohen_-_Incentives_build_robustness_in_BitTorrent.pdf (renamed from docs/NetEcon'03 - Cohen - Incentives build robustness in BitTorrent.pdf)bin81110 -> 81110 bytes
-rw-r--r--docs/NetEcon'06_-_Harvelaar.pdf (renamed from docs/NetEcon'06 - Harvelaar.pdf)bin549850 -> 549850 bytes
-rw-r--r--docs/NetEcon'06_-_Improving_robustness_of_p2p_streaming.pdf (renamed from docs/NetEcon'06 - Improving robustness of p2p streaming.pdf)bin107858 -> 107858 bytes
-rw-r--r--docs/NetEcon'08_-_Yang_-_Auction,_but_don't_block.pdf (renamed from docs/NetEcon'08 - Yang - Auction, but don't block.pdf)bin369873 -> 369873 bytes
-rw-r--r--docs/Neumann_&_Morgenstern_-_Theory_of_Games_and_Economic_Behavior.pdf (renamed from docs/Neumann & Morgenstern - Theory of Games and Economic Behavior.pdf)bin33143357 -> 33143357 bytes
-rw-r--r--docs/OSDI'00_-_Fast_and_Secure_Distributed_Read-Only_File_System.pdf (renamed from docs/OSDI'00 - Fast and Secure Distributed Read-Only File System.pdf)bin399590 -> 399590 bytes
-rw-r--r--docs/OSDI'00_-_Overcast.pdf (renamed from docs/OSDI'00 - Overcast.pdf)0
-rw-r--r--docs/Oper._Res._-_Optimal_Resource_Allocation.pdf (renamed from docs/Oper. Res. - Optimal Resource Allocation.pdf)bin180433 -> 180433 bytes
-rw-r--r--docs/P2P'03_-_Buragohain,_Agrawal_&_Suri_-_Incentives_in_P2P_systems.pdf (renamed from docs/P2P'03 - Buragohain, Agrawal & Suri - Incentives in P2P systems.pdf)bin176308 -> 176308 bytes
-rw-r--r--docs/P2P'03_-_Identity_crisis:_anonymity_vs_reputation.pdf (renamed from docs/P2P'03 - Identity crisis: anonymity vs reputation.pdf)bin102194 -> 102194 bytes
-rw-r--r--docs/P2P'04_-_Reputation_management_framework.pdf (renamed from docs/P2P'04 - Reputation management framework.pdf)bin427283 -> 427283 bytes
-rw-r--r--docs/P2P'09_-_PeerSim.pdf (renamed from docs/P2P'09 - PeerSim.pdf)bin64900 -> 64900 bytes
-rw-r--r--docs/P2PECON'05_-_Incentives_in_BitTorrent_induce_free_riding.pdf (renamed from docs/P2PECON'05 - Incentives in BitTorrent induce free riding.pdf)bin203312 -> 203312 bytes
-rw-r--r--docs/P2PECON'05_-_KARMA.pdf (renamed from docs/P2PECON'05 - KARMA.pdf)bin119291 -> 119291 bytes
-rw-r--r--docs/P2PECON'05_-_Self-recharging_virtual_currency.pdf (renamed from docs/P2PECON'05 - Self-recharging virtual currency.pdf)bin139169 -> 139169 bytes
-rw-r--r--docs/P2PEcon'04_-_SWIFT.pdf (renamed from docs/P2PEcon'04 - SWIFT.pdf)bin96545 -> 96545 bytes
-rw-r--r--docs/P2PEcon'05_-_A_new_mechanism_for_the_free-rider_problem.pdf (renamed from docs/P2PEcon'05 - A new mechanism for the free-rider problem.pdf)bin144169 -> 144169 bytes
-rw-r--r--docs/PAM'04_-_Dissecting_bittorrent.pdf (renamed from docs/PAM'04 - Dissecting bittorrent.pdf)bin208806 -> 208806 bytes
-rw-r--r--docs/PASSAT'11_-_Multiparty_linear_programming.pdf (renamed from docs/PASSAT'11 - Multiparty linear programming.pdf)bin323020 -> 323020 bytes
-rw-r--r--docs/PETS'11_-_An_Accurate_System-Wide_Anonymity_Metric_for_Probabilistic_Attacks.pdf (renamed from docs/PETS'11 - An Accurate System-Wide Anonymity Metric for Probabilistic Attacks.pdf)bin264210 -> 264210 bytes
-rw-r--r--docs/PETS'11_-_DefenestraTor.pdf (renamed from docs/PETS'11 - DefenestraTor.pdf)bin772304 -> 772304 bytes
-rw-r--r--docs/PINS'04_-__Free-riding_and_whitewashing_in_P2P_systems.pdf (renamed from docs/PINS'04 - Free-riding and whitewashing in P2P systems.pdf)bin121347 -> 121347 bytes
-rw-r--r--docs/PNAS_(2003)_-_The_evolution_of_altruistic_punishment.pdf (renamed from docs/PNAS (2003) - The evolution of altruistic punishment.pdf)bin239344 -> 239344 bytes
-rw-r--r--docs/PNAS_-_Nash_-_Equilibrium_points_in_n-person_games.pdf (renamed from docs/PNAS - Nash - Equilibrium points in n-person games.pdf)bin235487 -> 235487 bytes
-rw-r--r--docs/PODC'02_-_Building_secure_file_systems_out_of_Byzantine_storage.pdf (renamed from docs/PODC'02 - Building secure file systems out of Byzantine storage.pdf)bin159568 -> 159568 bytes
-rw-r--r--docs/PODC'06_-_Peer_counting_and_sampling_in_overlay_networks.pdf (renamed from docs/PODC'06 - Peer counting and sampling in overlay networks.pdf)bin208212 -> 208212 bytes
-rw-r--r--docs/Peek-a-Boo,_I_Still_See_You:_Why_Efficient_Traffic_Analysis_Countermeasures_Fail.pdf (renamed from docs/Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail.pdf)bin652864 -> 652864 bytes
-rw-r--r--docs/Prospects_for_Remailers.pdf (renamed from docs/Prospects for Remailers.pdf)bin97840 -> 97840 bytes
-rw-r--r--docs/Reed_&_Solomon_-_Polynomial_Codes_Over_Certain_Finite_Fields.pdf (renamed from docs/Reed & Solomon - Polynomial Codes Over Certain Finite Fields.pdf)0
-rw-r--r--docs/SAINT'03_-_Kwon_&_Ryu.pdf (renamed from docs/SAINT'03 - Kwon & Ryu.pdf)bin339233 -> 339233 bytes
-rw-r--r--docs/SAINT'07_-_Local_production,_local_consumption_p2p_architecture.pdf (renamed from docs/SAINT'07 - Local production, local consumption p2p architecture.pdf)bin1096754 -> 1096754 bytes
-rw-r--r--docs/SASO'07_-_Garbacki,_Epema_&_van_Steen.pdf (renamed from docs/SASO'07 - Garbacki, Epema & van Steen.pdf)bin407897 -> 407897 bytes
-rw-r--r--docs/SELMAS_-_Software_framework_for_automated_negotiation.pdf (renamed from docs/SELMAS - Software framework for automated negotiation.pdf)bin339107 -> 339107 bytes
-rw-r--r--docs/SIGCOMM'03_-_On_selfish_routing_in_internet-like_environments.pdf (renamed from docs/SIGCOMM'03 - On selfish routing in internet-like environments.pdf)bin228887 -> 228887 bytes
-rw-r--r--docs/SIGCOMM'03_-_The_impact_of_DHT_routing_geometry_on_resilience_and_proximity.pdf (renamed from docs/SIGCOMM'03 - The impact of DHT routing geometry on resilience and proximity.pdf)bin420760 -> 420760 bytes
-rw-r--r--docs/SIGCOMM'04_-_Qui_&_Srikant_-_Modeling_and_performance_analysis.pdf (renamed from docs/SIGCOMM'04 - Qui & Srikant - Modeling and performance analysis.pdf)bin510688 -> 510688 bytes
-rw-r--r--docs/SIGCOMM'06_-_SybilGuard.pdf (renamed from docs/SIGCOMM'06 - SybilGuard.pdf)bin368617 -> 368617 bytes
-rw-r--r--docs/SIGCOMM'08_-_Rationality_and_traffic_attraction.pdf (renamed from docs/SIGCOMM'08 - Rationality and traffic attraction.pdf)bin386963 -> 386963 bytes
-rw-r--r--docs/SIGCOMM'11_-_Uncovering_social_network_sybils.pdf (renamed from docs/SIGCOMM'11 - Uncovering social network sybils.pdf)bin536897 -> 536897 bytes
-rw-r--r--docs/SIGCOMM'87_-_Strategies_for_decentralized_resource_management.pdf (renamed from docs/SIGCOMM'87 - Strategies for decentralized resource management.pdf)bin1172234 -> 1172234 bytes
-rw-r--r--docs/SIGCOMM_Comp._Comm._Rev._-_Minimizing_churn_in_distributed_systems.pdf (renamed from docs/SIGCOMM Comp. Comm. Rev. - Minimizing churn in distributed systems.pdf)bin493993 -> 493993 bytes
-rw-r--r--docs/SIGCOMM_Compt._Commun._Rev._-_Vivaldi.pdf (renamed from docs/SIGCOMM Compt. Commun. Rev. - Vivaldi.pdf)bin649008 -> 649008 bytes
-rw-r--r--docs/SIGCOMM_Comput._Commun._Rev._-_BitTorrent_is_an_Auction.pdf (renamed from docs/SIGCOMM Comput. Commun. Rev. - BitTorrent is an Auction.pdf)bin362312 -> 362312 bytes
-rw-r--r--docs/SIGCOMM_Comput._Commun._Rev._-_P4P:_Provider_Portal_for_Applications.pdf (renamed from docs/SIGCOMM Comput. Commun. Rev. - P4P: Provider Portal for Applications.pdf)bin507572 -> 507572 bytes
-rw-r--r--docs/SIGCOMM_Comput._Commun._Rev._-_Practical,_distributed_network_coordinates.pdf (renamed from docs/SIGCOMM Comput. Commun. Rev. - Practical, distributed network coordinates.pdf)bin277622 -> 277622 bytes
-rw-r--r--docs/SIGCOMM_Comput._Commun._Rev._-_Securing_Internet_Coordinate_Embedding_Systems.pdf (renamed from docs/SIGCOMM Comput. Commun. Rev. - Securing Internet Coordinate Embedding Systems.pdf)0
-rw-r--r--docs/SIGCOMM_Comput._Commun._Rev_-_Network_Coding:_an_Instant_Primer.pdf (renamed from docs/SIGCOMM Comput. Commun. Rev - Network Coding: an Instant Primer.pdf)bin145102 -> 145102 bytes
-rw-r--r--docs/SIGCOMM_Computers_Communication_Review_-_Bubblestorm.pdf (renamed from docs/SIGCOMM Computers Communication Review - Bubblestorm.pdf)bin776426 -> 776426 bytes
-rw-r--r--docs/SIGKDD_Explor._Newsl._-_Distributed_data_mining.pdf (renamed from docs/SIGKDD Explor. Newsl. - Distributed data mining.pdf)bin125039 -> 125039 bytes
-rw-r--r--docs/SIGMETRICS'05_-_Bharambe,_Herley_&_Padmanabhan.pdf (renamed from docs/SIGMETRICS'05 - Bharambe, Herley & Padmanabhan.pdf)0
-rw-r--r--docs/SIGMETRICS'05_-_Coupon_replication_systems.pdf (renamed from docs/SIGMETRICS'05 - Coupon replication systems.pdf)bin239323 -> 239323 bytes
-rw-r--r--docs/SIGOPS_-_FARSITE.pdf (renamed from docs/SIGOPS - FARSITE.pdf)bin290248 -> 290248 bytes
-rw-r--r--docs/SIGOSP'03_-_Spitstream:_High-bandwidth_multicast.pdf (renamed from docs/SIGOSP'03 - Spitstream: High-bandwidth multicast.pdf)bin1650124 -> 1650124 bytes
-rw-r--r--docs/SIGecom_Exch._(5)_-_Overcoming_free-riding_behavior.pdf (renamed from docs/SIGecom Exch. (5) - Overcoming free-riding behavior.pdf)bin119236 -> 119236 bytes
-rw-r--r--docs/SODA'04_-_Network_failure_detection_and_graph_connectivity%0A.pdf (renamed from docs/SODA'04 - Network failure detection and graph connectivity%0A.pdf)bin172158 -> 172158 bytes
-rw-r--r--docs/SOSP'03_-_Bullet.pdf (renamed from docs/SOSP'03 - Bullet.pdf)bin375512 -> 375512 bytes
-rw-r--r--docs/SPAA'05_-_Selfish_routing_with_incomplete_information.pdf (renamed from docs/SPAA'05 - Selfish routing with incomplete information.pdf)bin630211 -> 630211 bytes
-rw-r--r--docs/SRDS'06_-_Cryptree.pdf (renamed from docs/SRDS'06 - Cryptree.pdf)bin339393 -> 339393 bytes
-rw-r--r--docs/STACS'99_-_Nisan_-_Algorithms_for_selfish_agents.pdf (renamed from docs/STACS'99 - Nisan - Algorithms for selfish agents.pdf)bin239886 -> 239886 bytes
-rw-r--r--docs/STOC'08_-_Optimal_mechanism_design_and_money_burning.pdf (renamed from docs/STOC'08 - Optimal mechanism design and money burning.pdf)bin282489 -> 282489 bytes
-rw-r--r--docs/STOC'97_-_Practical_Loss-Resilient_Codes.pdf (renamed from docs/STOC'97 - Practical Loss-Resilient Codes.pdf)bin159206 -> 159206 bytes
-rw-r--r--docs/STOC'99_-_Nisan_&_Ronen_-_Algorithmic_mechanism_design.pdf (renamed from docs/STOC'99 - Nisan & Ronen - Algorithmic mechanism design.pdf)bin321145 -> 321145 bytes
-rw-r--r--docs/Saito_-_i-WAT_Dissertation.pdf (renamed from docs/Saito - i-WAT Dissertation.pdf)bin14256574 -> 14256574 bytes
-rw-r--r--docs/Schollmeier_-_Signaling_and_networking_in_unstructured_p2p_networks.pdf (renamed from docs/Schollmeier - Signaling and networking in unstructured p2p networks.pdf)bin5555941 -> 5555941 bytes
-rw-r--r--docs/Science_-_Hardin_-_The_Tragedy_of_the_Commons.pdf (renamed from docs/Science - Hardin - The Tragedy of the Commons.pdf)bin341229 -> 341229 bytes
-rw-r--r--docs/Secure_Collaborative_Planning_Forecasting_and_Replenishment.pdf (renamed from docs/Secure Collaborative Planning Forecasting and Replenishment.pdf)bin556200 -> 556200 bytes
-rw-r--r--docs/TISSEC_-_PEREA.pdf (renamed from docs/TISSEC - PEREA.pdf)bin983616 -> 983616 bytes
-rw-r--r--docs/Tech_Report_-_A_Survey_of_Solutions_to_the_Sybil_Attack.pdf (renamed from docs/Tech Report - A Survey of Solutions to the Sybil Attack.pdf)bin140676 -> 140676 bytes
-rw-r--r--docs/Tech_Report_-_Analyzing_peer_behavior_in_KAD.pdf (renamed from docs/Tech Report - Analyzing peer behavior in KAD.pdf)bin1072069 -> 1072069 bytes
-rw-r--r--docs/Tech_Report_-_Privacy_guarantees_through_DCS.pdf (renamed from docs/Tech Report - Privacy guarantees through DCS.pdf)bin233931 -> 233931 bytes
-rw-r--r--docs/Tech_report_-_DCOP_as_a_formal_model_of_PARC.pdf (renamed from docs/Tech report - DCOP as a formal model of PARC.pdf)bin186769 -> 186769 bytes
-rw-r--r--docs/Telex:_Anticensorship_in_the_Network_Infrastructure.pdf (renamed from docs/Telex: Anticensorship in the Network Infrastructure.pdf)bin2482127 -> 2482127 bytes
-rw-r--r--docs/Thesis_-_Autonomic_distributed_systems.pdf (renamed from docs/Thesis - Autonomic distributed systems.pdf)bin1584594 -> 1584594 bytes
-rw-r--r--docs/Thesis_-_F.Schadd.pdf (renamed from docs/Thesis - F.Schadd.pdf)bin1228723 -> 1228723 bytes
-rw-r--r--docs/Thesis_-_P.Harvey.pdf (renamed from docs/Thesis - P.Harvey.pdf)bin1461610 -> 1461610 bytes
-rw-r--r--docs/Trivers_-_The_evolution_of_reciprocal_altruism.pdf (renamed from docs/Trivers - The evolution of reciprocal altruism.pdf)bin504072 -> 504072 bytes
-rw-r--r--docs/USENIX_-_PIR-Tor.pdf (renamed from docs/USENIX - PIR-Tor.pdf)bin529570 -> 529570 bytes
-rw-r--r--docs/USENIX_Security'10_-_SEPIA.pdf (renamed from docs/USENIX Security'10 - SEPIA.pdf)bin513008 -> 513008 bytes
-rw-r--r--docs/User-Perceived_Performance_of_the_NICE_Application_Layer_Multicast_Protocol_in_Large_and_Highly_Dynamic_Groups_1.pdf (renamed from docs/User-Perceived Performance of the NICE Application Layer Multicast Protocol in Large and Highly Dynamic Groups_1.pdf)bin700467 -> 700467 bytes
-rw-r--r--docs/WEIS'05_-_Moore_-_Counterin_hidden-action_attacks.pdf (renamed from docs/WEIS'05 - Moore - Counterin hidden-action attacks.pdf)bin137878 -> 137878 bytes
-rw-r--r--docs/WIAPP'03_-_Deconstructing_the_Kazaa_network.pdf (renamed from docs/WIAPP'03 - Deconstructing the Kazaa network.pdf)bin331345 -> 331345 bytes
-rw-r--r--docs/WPES'04_-_Forecasting_and_benchamking.pdf (renamed from docs/WPES'04 - Forecasting and benchamking.pdf)bin238177 -> 238177 bytes
-rw-r--r--docs/WPES'11_-_FAUST.pdf (renamed from docs/WPES'11 - FAUST.pdf)bin241209 -> 241209 bytes
-rw-r--r--docs/WPES'11_-_Fingerprinting.pdf (renamed from docs/WPES'11 - Fingerprinting.pdf)bin476010 -> 476010 bytes
-rw-r--r--docs/WPES'11_-_bridgeSPA.pdf (renamed from docs/WPES'11 - bridgeSPA.pdf)bin186580 -> 186580 bytes
-rw-r--r--docs/WWW'03_-_The_EigenTrust_algorithm.pdf (renamed from docs/WWW'03 - The EigenTrust algorithm.pdf)bin223109 -> 223109 bytes
-rw-r--r--docs/WiOpt'03_-_Buchegger_&_Le_Boudec_-_Reputation_Systems.pdf (renamed from docs/WiOpt'03 - Buchegger & Le Boudec - Reputation Systems.pdf)bin167171 -> 167171 bytes
-rw-r--r--docs/Workshop_on_Economics_of_P2P_Systems'03_-_Chun,_Fu_&_Vahdat.pdf (renamed from docs/Workshop on Economics of P2P Systems'03 - Chun, Fu & Vahdat.pdf)bin282657 -> 282657 bytes
-rw-r--r--docs/eScholarship_UC_item_4x6723n2.pdf (renamed from docs/eScholarship UC item 4x6723n2.pdf)bin398273 -> 398273 bytes
-rw-r--r--docs/hill_climbing.pdf (renamed from docs/hill climbing.pdf)bin215057 -> 215057 bytes
249 files changed, 0 insertions, 0 deletions
diff --git a/docs/10.1.1.27.1639 (2).pdf b/docs/10.1.1.27.1639_(2).pdf
index 2d9f36a..2d9f36a 100644
--- a/docs/10.1.1.27.1639 (2).pdf
+++ b/docs/10.1.1.27.1639_(2).pdf
Binary files differ
diff --git a/docs/10.1.1.4.7003 (1).pdf b/docs/10.1.1.4.7003_(1).pdf
index e908da1..e908da1 100644
--- a/docs/10.1.1.4.7003 (1).pdf
+++ b/docs/10.1.1.4.7003_(1).pdf
Binary files differ
diff --git a/docs/2004-ISLPED-Energy-aware demand paging on NAND flash-based embedded storages.pdf b/docs/2004-ISLPED-Energy-aware_demand_paging_on_NAND_flash-based_embedded_storages.pdf
index c587d3c..c587d3c 100644
--- a/docs/2004-ISLPED-Energy-aware demand paging on NAND flash-based embedded storages.pdf
+++ b/docs/2004-ISLPED-Energy-aware_demand_paging_on_NAND_flash-based_embedded_storages.pdf
Binary files differ
diff --git a/docs/A02370_DF_CFP_SpringerOpen SI CFP EURASIP JWCN_Global_A42.pdf b/docs/A02370_DF_CFP_SpringerOpen_SI_CFP_EURASIP_JWCN_Global_A42.pdf
index e4cb993..e4cb993 100644
--- a/docs/A02370_DF_CFP_SpringerOpen SI CFP EURASIP JWCN_Global_A42.pdf
+++ b/docs/A02370_DF_CFP_SpringerOpen_SI_CFP_EURASIP_JWCN_Global_A42.pdf
Binary files differ
diff --git a/docs/AAAI'08 - Local search for DCOP.pdf b/docs/AAAI'08_-_Local_search_for_DCOP.pdf
index 5d2c000..5d2c000 100644
--- a/docs/AAAI'08 - Local search for DCOP.pdf
+++ b/docs/AAAI'08_-_Local_search_for_DCOP.pdf
Binary files differ
diff --git a/docs/AAAI'96 - Mixed constraint satisfaction.pdf b/docs/AAAI'96_-_Mixed_constraint_satisfaction.pdf
index 39429f6..39429f6 100644
--- a/docs/AAAI'96 - Mixed constraint satisfaction.pdf
+++ b/docs/AAAI'96_-_Mixed_constraint_satisfaction.pdf
Binary files differ
diff --git a/docs/AAMAS'05 - Accelerating the DCOP algorithm ADOPT.pdf b/docs/AAMAS'05_-_Accelerating_the_DCOP_algorithm_ADOPT.pdf
index 12af360..12af360 100644
--- a/docs/AAMAS'05 - Accelerating the DCOP algorithm ADOPT.pdf
+++ b/docs/AAMAS'05_-_Accelerating_the_DCOP_algorithm_ADOPT.pdf
Binary files differ
diff --git a/docs/AAMAS08 - DCOP algorithms in a real world problem.pdf b/docs/AAMAS08_-_DCOP_algorithms_in_a_real_world_problem.pdf
index 2bb19bb..2bb19bb 100644
--- a/docs/AAMAS08 - DCOP algorithms in a real world problem.pdf
+++ b/docs/AAMAS08_-_DCOP_algorithms_in_a_real_world_problem.pdf
Binary files differ
diff --git a/docs/ACM Computing Surveys - A survey of p2p content distribution technologies.pdf b/docs/ACM_Computing_Surveys_-_A_survey_of_p2p_content_distribution_technologies.pdf
index e7b930e..e7b930e 100644
--- a/docs/ACM Computing Surveys - A survey of p2p content distribution technologies.pdf
+++ b/docs/ACM_Computing_Surveys_-_A_survey_of_p2p_content_distribution_technologies.pdf
Binary files differ
diff --git a/docs/ACM SIGCOMM'05 - Cheng & Friedman - Sybilproof reputation mechanisms.pdf b/docs/ACM_SIGCOMM'05_-_Cheng_&_Friedman_-_Sybilproof_reputation_mechanisms.pdf
index e0c3a21..e0c3a21 100644
--- a/docs/ACM SIGCOMM'05 - Cheng & Friedman - Sybilproof reputation mechanisms.pdf
+++ b/docs/ACM_SIGCOMM'05_-_Cheng_&_Friedman_-_Sybilproof_reputation_mechanisms.pdf
Binary files differ
diff --git a/docs/ACNS'05 - Garcia & Hoepman - Off-line Karma.pdf b/docs/ACNS'05_-_Garcia_&_Hoepman_-_Off-line_Karma.pdf
index 0eda18e..0eda18e 100644
--- a/docs/ACNS'05 - Garcia & Hoepman - Off-line Karma.pdf
+++ b/docs/ACNS'05_-_Garcia_&_Hoepman_-_Off-line_Karma.pdf
Binary files differ
diff --git a/docs/ACSAC'02 - A secure directory service based on exclusive encryption.pdf b/docs/ACSAC'02_-_A_secure_directory_service_based_on_exclusive_encryption.pdf
index ff71ea5..ff71ea5 100644
--- a/docs/ACSAC'02 - A secure directory service based on exclusive encryption.pdf
+++ b/docs/ACSAC'02_-_A_secure_directory_service_based_on_exclusive_encryption.pdf
Binary files differ
diff --git a/docs/ACSAC'11 - BACKLIT.pdf b/docs/ACSAC'11_-_BACKLIT.pdf
index f233304..f233304 100644
--- a/docs/ACSAC'11 - BACKLIT.pdf
+++ b/docs/ACSAC'11_-_BACKLIT.pdf
Binary files differ
diff --git a/docs/ACSAC'11 - Tortoise.pdf b/docs/ACSAC'11_-_Tortoise.pdf
index dcfe109..dcfe109 100644
--- a/docs/ACSAC'11 - Tortoise.pdf
+++ b/docs/ACSAC'11_-_Tortoise.pdf
Binary files differ
diff --git a/docs/AIMS'09 - Sybil attacks protection schemes in KAD.pdf b/docs/AIMS'09_-_Sybil_attacks_protection_schemes_in_KAD.pdf
index 7b36d3a..7b36d3a 100644
--- a/docs/AIMS'09 - Sybil attacks protection schemes in KAD.pdf
+++ b/docs/AIMS'09_-_Sybil_attacks_protection_schemes_in_KAD.pdf
Binary files differ
diff --git a/docs/ARES'06 - Fair Trading of Information.pdf b/docs/ARES'06_-_Fair_Trading_of_Information.pdf
index d2ac338..d2ac338 100644
--- a/docs/ARES'06 - Fair Trading of Information.pdf
+++ b/docs/ARES'06_-_Fair_Trading_of_Information.pdf
Binary files differ
diff --git a/docs/ASIACRYPT'07 - IBBE with constant size ciphertexts and private keys.pdf b/docs/ASIACRYPT'07_-_IBBE_with_constant_size_ciphertexts_and_private_keys.pdf
index d3ccf86..d3ccf86 100644
--- a/docs/ASIACRYPT'07 - IBBE with constant size ciphertexts and private keys.pdf
+++ b/docs/ASIACRYPT'07_-_IBBE_with_constant_size_ciphertexts_and_private_keys.pdf
Binary files differ
diff --git a/docs/ATEC'04 - A network positioning system.pdf b/docs/ATEC'04_-_A_network_positioning_system.pdf
index 1c704c4..1c704c4 100644
--- a/docs/ATEC'04 - A network positioning system.pdf
+++ b/docs/ATEC'04_-_A_network_positioning_system.pdf
Binary files differ
diff --git a/docs/A Novel Testbed for P2P Networks.pdf b/docs/A_Novel_Testbed_for_P2P_Networks.pdf
index 3a82807..3a82807 100644
--- a/docs/A Novel Testbed for P2P Networks.pdf
+++ b/docs/A_Novel_Testbed_for_P2P_Networks.pdf
Binary files differ
diff --git a/docs/Amann - Secure asynchronous change notifications.pdf b/docs/Amann_-_Secure_asynchronous_change_notifications.pdf
index d2e1aa6..d2e1aa6 100644
--- a/docs/Amann - Secure asynchronous change notifications.pdf
+++ b/docs/Amann_-_Secure_asynchronous_change_notifications.pdf
Binary files differ
diff --git a/docs/Amnefelt & Svenningsson - Keso.pdf b/docs/Amnefelt_&_Svenningsson_-_Keso.pdf
index 06e239c..06e239c 100644
--- a/docs/Amnefelt & Svenningsson - Keso.pdf
+++ b/docs/Amnefelt_&_Svenningsson_-_Keso.pdf
Binary files differ
diff --git a/docs/Applied Intelligence - Combinatorial Auctions.pdf b/docs/Applied_Intelligence_-_Combinatorial_Auctions.pdf
index 2fe6c00..2fe6c00 100644
--- a/docs/Applied Intelligence - Combinatorial Auctions.pdf
+++ b/docs/Applied_Intelligence_-_Combinatorial_Auctions.pdf
Binary files differ
diff --git a/docs/Bogetoft et al. - Secure multiparty computation goes live.pdf b/docs/Bogetoft_et_al._-_Secure_multiparty_computation_goes_live.pdf
index 23dd23f..23dd23f 100644
--- a/docs/Bogetoft et al. - Secure multiparty computation goes live.pdf
+++ b/docs/Bogetoft_et_al._-_Secure_multiparty_computation_goes_live.pdf
Binary files differ
diff --git a/docs/Browne et al - A survey of MCTS methods.pdf b/docs/Browne_et_al_-_A_survey_of_MCTS_methods.pdf
index 0f3bb99..0f3bb99 100644
--- a/docs/Browne et al - A survey of MCTS methods.pdf
+++ b/docs/Browne_et_al_-_A_survey_of_MCTS_methods.pdf
Binary files differ
diff --git a/docs/Brumley & Tuveri - Timing Attacks.pdf b/docs/Brumley_&_Tuveri_-_Timing_Attacks.pdf
index 11eb077..11eb077 100644
--- a/docs/Brumley & Tuveri - Timing Attacks.pdf
+++ b/docs/Brumley_&_Tuveri_-_Timing_Attacks.pdf
Binary files differ
diff --git a/docs/CCS'03 - Yang & Garcia-Molina - PPay.pdf b/docs/CCS'03_-_Yang_&_Garcia-Molina_-_PPay.pdf
index 486c420..486c420 100644
--- a/docs/CCS'03 - Yang & Garcia-Molina - PPay.pdf
+++ b/docs/CCS'03_-_Yang_&_Garcia-Molina_-_PPay.pdf
diff --git a/docs/CCS'06 - Attributed-based encryption for fine-grained access control of encrypted data.pdf b/docs/CCS'06_-_Attributed-based_encryption_for_fine-grained_access_control_of_encrypted_data.pdf
index 0cf2242..0cf2242 100644
--- a/docs/CCS'06 - Attributed-based encryption for fine-grained access control of encrypted data.pdf
+++ b/docs/CCS'06_-_Attributed-based_encryption_for_fine-grained_access_control_of_encrypted_data.pdf
Binary files differ
diff --git a/docs/CCS'07 - ABE with non-monotonic access structures.pdf b/docs/CCS'07_-_ABE_with_non-monotonic_access_structures.pdf
index 6545658..6545658 100644
--- a/docs/CCS'07 - ABE with non-monotonic access structures.pdf
+++ b/docs/CCS'07_-_ABE_with_non-monotonic_access_structures.pdf
Binary files differ
diff --git a/docs/CCS'08 - FairplayMP.pdf b/docs/CCS'08_-_FairplayMP.pdf
index b7c50e6..b7c50e6 100644
--- a/docs/CCS'08 - FairplayMP.pdf
+++ b/docs/CCS'08_-_FairplayMP.pdf
Binary files differ
diff --git a/docs/CCS'08 - Identity-based encryption with efficient revocation.pdf b/docs/CCS'08_-_Identity-based_encryption_with_efficient_revocation.pdf
index 9bde934..9bde934 100644
--- a/docs/CCS'08 - Identity-based encryption with efficient revocation.pdf
+++ b/docs/CCS'08_-_Identity-based_encryption_with_efficient_revocation.pdf
Binary files differ
diff --git a/docs/CCS'11 - Cirripede.pdf b/docs/CCS'11_-_Cirripede.pdf
index 3059a44..3059a44 100644
--- a/docs/CCS'11 - Cirripede.pdf
+++ b/docs/CCS'11_-_Cirripede.pdf
Binary files differ
diff --git a/docs/CCS'11 - Throughput-fingerprinting.pdf b/docs/CCS'11_-_Throughput-fingerprinting.pdf
index 1d4e072..1d4e072 100644
--- a/docs/CCS'11 - Throughput-fingerprinting.pdf
+++ b/docs/CCS'11_-_Throughput-fingerprinting.pdf
Binary files differ
diff --git a/docs/CCS'11 - Trust-based Anonymous Communication1.pdf b/docs/CCS'11_-_Trust-based_Anonymous_Communication1.pdf
index ffd1c80..ffd1c80 100644
--- a/docs/CCS'11 - Trust-based Anonymous Communication1.pdf
+++ b/docs/CCS'11_-_Trust-based_Anonymous_Communication1.pdf
Binary files differ
diff --git a/docs/CG'06 - Selectivity and backup operators in MCTS.pdf b/docs/CG'06_-_Selectivity_and_backup_operators_in_MCTS.pdf
index bc95b93..bc95b93 100644
--- a/docs/CG'06 - Selectivity and backup operators in MCTS.pdf
+++ b/docs/CG'06_-_Selectivity_and_backup_operators_in_MCTS.pdf
Binary files differ
diff --git a/docs/CIA'04 - Despotovic & Aberer - Peers' performance in P2P networks.pdf b/docs/CIA'04_-_Despotovic_&_Aberer_-_Peers'_performance_in_P2P_networks.pdf
index 22e8041..22e8041 100644
--- a/docs/CIA'04 - Despotovic & Aberer - Peers' performance in P2P networks.pdf
+++ b/docs/CIA'04_-_Despotovic_&_Aberer_-_Peers'_performance_in_P2P_networks.pdf
Binary files differ
diff --git a/docs/CRYPTO'02 - The LSD broadcast encryption scheme.pdf b/docs/CRYPTO'02_-_The_LSD_broadcast_encryption_scheme.pdf
index 155152b..155152b 100644
--- a/docs/CRYPTO'02 - The LSD broadcast encryption scheme.pdf
+++ b/docs/CRYPTO'02_-_The_LSD_broadcast_encryption_scheme.pdf
Binary files differ
diff --git a/docs/CRYPTO'84 - El Gamal - Public Key Cryptosystem.pdf b/docs/CRYPTO'84_-_El_Gamal_-_Public_Key_Cryptosystem.pdf
index 73c3532..73c3532 100644
--- a/docs/CRYPTO'84 - El Gamal - Public Key Cryptosystem.pdf
+++ b/docs/CRYPTO'84_-_El_Gamal_-_Public_Key_Cryptosystem.pdf
Binary files differ
diff --git a/docs/CSET'11 - ExperimenTor.pdf b/docs/CSET'11_-_ExperimenTor.pdf
index 97b9027..97b9027 100644
--- a/docs/CSET'11 - ExperimenTor.pdf
+++ b/docs/CSET'11_-_ExperimenTor.pdf
Binary files differ
diff --git a/docs/CaberNet Radicals Workshop - Puzzles in P2P Systems.pdf b/docs/CaberNet_Radicals_Workshop_-_Puzzles_in_P2P_Systems.pdf
index 6428d54..6428d54 100644
--- a/docs/CaberNet Radicals Workshop - Puzzles in P2P Systems.pdf
+++ b/docs/CaberNet_Radicals_Workshop_-_Puzzles_in_P2P_Systems.pdf
Binary files differ
diff --git a/docs/ChinaCom'06 - Combating hidden action in unstructured p2p systems.pdf b/docs/ChinaCom'06_-_Combating_hidden_action_in_unstructured_p2p_systems.pdf
index 8c4b87c..8c4b87c 100644
--- a/docs/ChinaCom'06 - Combating hidden action in unstructured p2p systems.pdf
+++ b/docs/ChinaCom'06_-_Combating_hidden_action_in_unstructured_p2p_systems.pdf
Binary files differ
diff --git a/docs/CoRR - Critical look at decentralization.pdf b/docs/CoRR_-_Critical_look_at_decentralization.pdf
index 690a15e..690a15e 100644
--- a/docs/CoRR - Critical look at decentralization.pdf
+++ b/docs/CoRR_-_Critical_look_at_decentralization.pdf
Binary files differ
diff --git a/docs/CoRR - X-Vine.pdf b/docs/CoRR_-_X-Vine.pdf
index 02c98c8..02c98c8 100644
--- a/docs/CoRR - X-Vine.pdf
+++ b/docs/CoRR_-_X-Vine.pdf
Binary files differ
diff --git a/docs/Combining Virtual and Physical Structures for Self-organized Routing_0.pdf b/docs/Combining_Virtual_and_Physical_Structures_for_Self-organized_Routing_0.pdf
index 2033a80..2033a80 100644
--- a/docs/Combining Virtual and Physical Structures for Self-organized Routing_0.pdf
+++ b/docs/Combining_Virtual_and_Physical_Structures_for_Self-organized_Routing_0.pdf
Binary files differ
diff --git a/docs/Communications of the ACM - Reputation Systems.pdf b/docs/Communications_of_the_ACM_-_Reputation_Systems.pdf
index a85509e..a85509e 100644
--- a/docs/Communications of the ACM - Reputation Systems.pdf
+++ b/docs/Communications_of_the_ACM_-_Reputation_Systems.pdf
Binary files differ
diff --git a/docs/Compcon '97 - Privacy-enhancing Technologies for the Internet.pdf b/docs/Compcon_'97_-_Privacy-enhancing_Technologies_for_the_Internet.pdf
index 2577ad0..2577ad0 100644
--- a/docs/Compcon '97 - Privacy-enhancing Technologies for the Internet.pdf
+++ b/docs/Compcon_'97_-_Privacy-enhancing_Technologies_for_the_Internet.pdf
Binary files differ
diff --git a/docs/Computer Networks - Wang, Chiu & Lui - Overlay network traffic on ISP peering.pdf b/docs/Computer_Networks_-_Wang,_Chiu_&_Lui_-_Overlay_network_traffic_on_ISP_peering.pdf
index a5d7778..a5d7778 100644
--- a/docs/Computer Networks - Wang, Chiu & Lui - Overlay network traffic on ISP peering.pdf
+++ b/docs/Computer_Networks_-_Wang,_Chiu_&_Lui_-_Overlay_network_traffic_on_ISP_peering.pdf
Binary files differ
diff --git a/docs/Concurrency and Computation - TRIBLER.pdf b/docs/Concurrency_and_Computation_-_TRIBLER.pdf
index 2650336..2650336 100644
--- a/docs/Concurrency and Computation - TRIBLER.pdf
+++ b/docs/Concurrency_and_Computation_-_TRIBLER.pdf
Binary files differ
diff --git a/docs/DIALM'02 - Feigenbaum & Shenker - Distributed algorithmic mechanism design.pdf b/docs/DIALM'02_-_Feigenbaum_&_Shenker_-_Distributed_algorithmic_mechanism_design.pdf
index 0f0ec16..0f0ec16 100644
--- a/docs/DIALM'02 - Feigenbaum & Shenker - Distributed algorithmic mechanism design.pdf
+++ b/docs/DIALM'02_-_Feigenbaum_&_Shenker_-_Distributed_algorithmic_mechanism_design.pdf
Binary files differ
diff --git a/docs/DP5: A Private Presence Service.pdf b/docs/DP5:_A_Private_Presence_Service.pdf
index c91e3ef..c91e3ef 100644
--- a/docs/DP5: A Private Presence Service.pdf
+++ b/docs/DP5:_A_Private_Presence_Service.pdf
Binary files differ
diff --git a/docs/Dellarocas - Reputation Mechanisms.pdf b/docs/Dellarocas_-_Reputation_Mechanisms.pdf
index 309571c..309571c 100644
--- a/docs/Dellarocas - Reputation Mechanisms.pdf
+++ b/docs/Dellarocas_-_Reputation_Mechanisms.pdf
Binary files differ
diff --git a/docs/Dependent Link Padding Algorithms for.pdf b/docs/Dependent_Link_Padding_Algorithms_for.pdf
index fe760b1..fe760b1 100644
--- a/docs/Dependent Link Padding Algorithms for.pdf
+++ b/docs/Dependent_Link_Padding_Algorithms_for.pdf
Binary files differ
diff --git a/docs/Duminuco & Biersack - Hierarchical Codes.pdf b/docs/Duminuco_&_Biersack_-_Hierarchical_Codes.pdf
index 4e44699..4e44699 100644
--- a/docs/Duminuco & Biersack - Hierarchical Codes.pdf
+++ b/docs/Duminuco_&_Biersack_-_Hierarchical_Codes.pdf
Binary files differ
diff --git a/docs/EC'04 - Robust incentive techniques for P2P networks.pdf b/docs/EC'04_-_Robust_incentive_techniques_for_P2P_networks.pdf
index 5fa8c08..5fa8c08 100644
--- a/docs/EC'04 - Robust incentive techniques for P2P networks.pdf
+++ b/docs/EC'04_-_Robust_incentive_techniques_for_P2P_networks.pdf
Binary files differ
diff --git a/docs/EC'05 - Hidden-action in multi-hop routing.pdf b/docs/EC'05_-_Hidden-action_in_multi-hop_routing.pdf
index 2678ab2..2678ab2 100644
--- a/docs/EC'05 - Hidden-action in multi-hop routing.pdf
+++ b/docs/EC'05_-_Hidden-action_in_multi-hop_routing.pdf
Binary files differ
diff --git a/docs/EC'06 - Incentive-compatible interdomain routing.pdf b/docs/EC'06_-_Incentive-compatible_interdomain_routing.pdf
index 92d6288..92d6288 100644
--- a/docs/EC'06 - Incentive-compatible interdomain routing.pdf
+++ b/docs/EC'06_-_Incentive-compatible_interdomain_routing.pdf
Binary files differ
diff --git a/docs/EC'08 - Why share in peer-to-peer networks.pdf b/docs/EC'08_-_Why_share_in_peer-to-peer_networks.pdf
index b259037..b259037 100644
--- a/docs/EC'08 - Why share in peer-to-peer networks.pdf
+++ b/docs/EC'08_-_Why_share_in_peer-to-peer_networks.pdf
Binary files differ
diff --git a/docs/EC'09 - Sybilproof transitive trust protocols.pdf b/docs/EC'09_-_Sybilproof_transitive_trust_protocols.pdf
index 2a949d1..2a949d1 100644
--- a/docs/EC'09 - Sybilproof transitive trust protocols.pdf
+++ b/docs/EC'09_-_Sybilproof_transitive_trust_protocols.pdf
Binary files differ
diff --git a/docs/EUROCRYPT'05 - Fuzzy Identity-Based Encryption.pdf b/docs/EUROCRYPT'05_-_Fuzzy_Identity-Based_Encryption.pdf
index 675fd94..675fd94 100644
--- a/docs/EUROCRYPT'05 - Fuzzy Identity-Based Encryption.pdf
+++ b/docs/EUROCRYPT'05_-_Fuzzy_Identity-Based_Encryption.pdf
Binary files differ
diff --git a/docs/EUROCRYPT'89 - Waidner&Pfitzmann - The dining cryptographers in the disco .pdf b/docs/EUROCRYPT'89_-_Waidner&Pfitzmann_-_The_dining_cryptographers_in_the_disco_.pdf
index e40a3e0..e40a3e0 100644
--- a/docs/EUROCRYPT'89 - Waidner&Pfitzmann - The dining cryptographers in the disco .pdf
+++ b/docs/EUROCRYPT'89_-_Waidner&Pfitzmann_-_The_dining_cryptographers_in_the_disco_.pdf
Binary files differ
diff --git a/docs/EUROCRYPT'92 - Chaun & Pedersen - Transferred cash grows in size.PDF b/docs/EUROCRYPT'92_-_Chaun_&_Pedersen_-_Transferred_cash_grows_in_size.PDF
index b32532f..b32532f 100644
--- a/docs/EUROCRYPT'92 - Chaun & Pedersen - Transferred cash grows in size.PDF
+++ b/docs/EUROCRYPT'92_-_Chaun_&_Pedersen_-_Transferred_cash_grows_in_size.PDF
diff --git a/docs/Erdős & Rényi - On Random Graphs.pdf b/docs/Erdős_&_Rényi_-_On_Random_Graphs.pdf
index 1676869..1676869 100644
--- a/docs/Erdős & Rényi - On Random Graphs.pdf
+++ b/docs/Erdős_&_Rényi_-_On_Random_Graphs.pdf
Binary files differ
diff --git a/docs/Euro-Par'05 - Pastis.pdf b/docs/Euro-Par'05_-_Pastis.pdf
index f32d541..f32d541 100644
--- a/docs/Euro-Par'05 - Pastis.pdf
+++ b/docs/Euro-Par'05_-_Pastis.pdf
Binary files differ
diff --git a/docs/FAST'09 - Open-source erasure coding libraries for storage.pdf b/docs/FAST'09_-_Open-source_erasure_coding_libraries_for_storage.pdf
index 0a21ed6..0a21ed6 100644
--- a/docs/FAST'09 - Open-source erasure coding libraries for storage.pdf
+++ b/docs/FAST'09_-_Open-source_erasure_coding_libraries_for_storage.pdf
Binary files differ
diff --git a/docs/FC'11 - BNymble.pdf b/docs/FC'11_-_BNymble.pdf
index 22dbb4a..22dbb4a 100644
--- a/docs/FC'11 - BNymble.pdf
+++ b/docs/FC'11_-_BNymble.pdf
Binary files differ
diff --git a/docs/FC'11 - Malice versus AN.ON_.pdf b/docs/FC'11_-_Malice_versus_AN.ON_.pdf
index c04c4d3..c04c4d3 100644
--- a/docs/FC'11 - Malice versus AN.ON_.pdf
+++ b/docs/FC'11_-_Malice_versus_AN.ON_.pdf
Binary files differ
diff --git a/docs/FC'11 - Proximax.pdf b/docs/FC'11_-_Proximax.pdf
index 9c1f7bf..9c1f7bf 100644
--- a/docs/FC'11 - Proximax.pdf
+++ b/docs/FC'11_-_Proximax.pdf
Binary files differ
diff --git a/docs/FC'12 - Congestion-aware Path Selection for Tor.pdf b/docs/FC'12_-_Congestion-aware_Path_Selection_for_Tor.pdf
index 9e48007..9e48007 100644
--- a/docs/FC'12 - Congestion-aware Path Selection for Tor.pdf
+++ b/docs/FC'12_-_Congestion-aware_Path_Selection_for_Tor.pdf
Binary files differ
diff --git a/docs/FGCS - P2P Contracts: a Framework for Resource and Service Exchange.pdf b/docs/FGCS_-_P2P_Contracts:_a_Framework_for_Resource_and_Service_Exchange.pdf
index f3c11f0..f3c11f0 100644
--- a/docs/FGCS - P2P Contracts: a Framework for Resource and Service Exchange.pdf
+++ b/docs/FGCS_-_P2P_Contracts:_a_Framework_for_Resource_and_Service_Exchange.pdf
Binary files differ
diff --git a/docs/FOCI'11 - Decoy Routing: Toward Unblockable Internet Communication.pdf b/docs/FOCI'11_-_Decoy_Routing:_Toward_Unblockable_Internet_Communication.pdf
index 5590429..5590429 100644
--- a/docs/FOCI'11 - Decoy Routing: Toward Unblockable Internet Communication.pdf
+++ b/docs/FOCI'11_-_Decoy_Routing:_Toward_Unblockable_Internet_Communication.pdf
Binary files differ
diff --git a/docs/FREENIX'01 - A transparent cryptographic file system for UNIX.pdf b/docs/FREENIX'01_-_A_transparent_cryptographic_file_system_for_UNIX.pdf
index e340329..e340329 100644
--- a/docs/FREENIX'01 - A transparent cryptographic file system for UNIX.pdf
+++ b/docs/FREENIX'01_-_A_transparent_cryptographic_file_system_for_UNIX.pdf
Binary files differ
diff --git a/docs/Feldman, Lai, Chuang & Stoica - Quantifying disincentives in peer-to-peer networks.pdf b/docs/Feldman,_Lai,_Chuang_&_Stoica_-_Quantifying_disincentives_in_peer-to-peer_networks.pdf
index 4e2fc77..4e2fc77 100644
--- a/docs/Feldman, Lai, Chuang & Stoica - Quantifying disincentives in peer-to-peer networks.pdf
+++ b/docs/Feldman,_Lai,_Chuang_&_Stoica_-_Quantifying_disincentives_in_peer-to-peer_networks.pdf
Binary files differ
diff --git a/docs/Finite-length analysis of low-density parity-check codes on.pdf b/docs/Finite-length_analysis_of_low-density_parity-check_codes_on.pdf
index 51c91c2..51c91c2 100644
--- a/docs/Finite-length analysis of low-density parity-check codes on.pdf
+++ b/docs/Finite-length_analysis_of_low-density_parity-check_codes_on.pdf
Binary files differ
diff --git a/docs/Formalizing Anonymous Blacklisting Systems.pdf b/docs/Formalizing_Anonymous_Blacklisting_Systems.pdf
index bad209a..bad209a 100644
--- a/docs/Formalizing Anonymous Blacklisting Systems.pdf
+++ b/docs/Formalizing_Anonymous_Blacklisting_Systems.pdf
Binary files differ
diff --git a/docs/GECON'04 - Designing incentive mechanisms for p2p systems.pdf b/docs/GECON'04_-_Designing_incentive_mechanisms_for_p2p_systems.pdf
index 88ed6ab..88ed6ab 100644
--- a/docs/GECON'04 - Designing incentive mechanisms for p2p systems.pdf
+++ b/docs/GECON'04_-_Designing_incentive_mechanisms_for_p2p_systems.pdf
Binary files differ
diff --git a/docs/Ghodsi - Distributed k-ary System.pdf b/docs/Ghodsi_-_Distributed_k-ary_System.pdf
index f96cf7f..f96cf7f 100644
--- a/docs/Ghodsi - Distributed k-ary System.pdf
+++ b/docs/Ghodsi_-_Distributed_k-ary_System.pdf
Binary files differ
diff --git a/docs/Grid Computing - Estimating The Size Of Peer-To-Peer Networks.pdf b/docs/Grid_Computing_-_Estimating_The_Size_Of_Peer-To-Peer_Networks.pdf
index 0249094..0249094 100644
--- a/docs/Grid Computing - Estimating The Size Of Peer-To-Peer Networks.pdf
+++ b/docs/Grid_Computing_-_Estimating_The_Size_Of_Peer-To-Peer_Networks.pdf
Binary files differ
diff --git a/docs/Group Decision and Negociation - Automated Negociation.pdf b/docs/Group_Decision_and_Negociation_-_Automated_Negociation.pdf
index 8da8a8a..8da8a8a 100644
--- a/docs/Group Decision and Negociation - Automated Negociation.pdf
+++ b/docs/Group_Decision_and_Negociation_-_Automated_Negociation.pdf
Binary files differ
diff --git a/docs/HICSS'02 - A computational model of trust and reputation.pdf b/docs/HICSS'02_-_A_computational_model_of_trust_and_reputation.pdf
index 22cf091..22cf091 100644
--- a/docs/HICSS'02 - A computational model of trust and reputation.pdf
+++ b/docs/HICSS'02_-_A_computational_model_of_trust_and_reputation.pdf
Binary files differ
diff --git a/docs/HOT-P2P'05 - Khorshadi, Liu & Ghosal.pdf b/docs/HOT-P2P'05_-_Khorshadi,_Liu_&_Ghosal.pdf
index 3652562..3652562 100644
--- a/docs/HOT-P2P'05 - Khorshadi, Liu & Ghosal.pdf
+++ b/docs/HOT-P2P'05_-_Khorshadi,_Liu_&_Ghosal.pdf
Binary files differ
diff --git a/docs/HPDC'06 - Peer to peer size estimation in large and dynamic networks.pdf b/docs/HPDC'06_-_Peer_to_peer_size_estimation_in_large_and_dynamic_networks.pdf
index aef799f..aef799f 100644
--- a/docs/HPDC'06 - Peer to peer size estimation in large and dynamic networks.pdf
+++ b/docs/HPDC'06_-_Peer_to_peer_size_estimation_in_large_and_dynamic_networks.pdf
Binary files differ
diff --git a/docs/HotOS IX - High available, scalable storage, dynamic peer networks.pdf b/docs/HotOS_IX_-_High_available,_scalable_storage,_dynamic_peer_networks.pdf
index 275eb15..275eb15 100644
--- a/docs/HotOS IX - High available, scalable storage, dynamic peer networks.pdf
+++ b/docs/HotOS_IX_-_High_available,_scalable_storage,_dynamic_peer_networks.pdf
Binary files differ
diff --git a/docs/HotP2P'10 - KAD DHT attack mitigation.pdf b/docs/HotP2P'10_-_KAD_DHT_attack_mitigation.pdf
index 833211a..833211a 100644
--- a/docs/HotP2P'10 - KAD DHT attack mitigation.pdf
+++ b/docs/HotP2P'10_-_KAD_DHT_attack_mitigation.pdf
Binary files differ
diff --git a/docs/ICC'08 - Super-Seeding in BitTorrent.PDF b/docs/ICC'08_-_Super-Seeding_in_BitTorrent.PDF
index dff089a..dff089a 100644
--- a/docs/ICC'08 - Super-Seeding in BitTorrent.PDF
+++ b/docs/ICC'08_-_Super-Seeding_in_BitTorrent.PDF
Binary files differ
diff --git a/docs/ICDCN'10 - Poisoning the Kad Network.pdf b/docs/ICDCN'10_-_Poisoning_the_Kad_Network.pdf
index 18506ab..18506ab 100644
--- a/docs/ICDCN'10 - Poisoning the Kad Network.pdf
+++ b/docs/ICDCN'10_-_Poisoning_the_Kad_Network.pdf
Binary files differ
diff --git a/docs/ICDCS'02 - Reclaiming space for duplicate files.pdf b/docs/ICDCS'02_-_Reclaiming_space_for_duplicate_files.pdf
index 77ca689..77ca689 100644
--- a/docs/ICDCS'02 - Reclaiming space for duplicate files.pdf
+++ b/docs/ICDCS'02_-_Reclaiming_space_for_duplicate_files.pdf
Binary files differ
diff --git a/docs/ICDCS'06 - Improving traffic locality in BitTorrent.pdf b/docs/ICDCS'06_-_Improving_traffic_locality_in_BitTorrent.pdf
index 9e1f26f..9e1f26f 100644
--- a/docs/ICDCS'06 - Improving traffic locality in BitTorrent.pdf
+++ b/docs/ICDCS'06_-_Improving_traffic_locality_in_BitTorrent.pdf
Binary files differ
diff --git a/docs/ICDCS'09 - Regenerating codes for p2p backup systems.pdf b/docs/ICDCS'09_-_Regenerating_codes_for_p2p_backup_systems.pdf
index 0922224..0922224 100644
--- a/docs/ICDCS'09 - Regenerating codes for p2p backup systems.pdf
+++ b/docs/ICDCS'09_-_Regenerating_codes_for_p2p_backup_systems.pdf
Binary files differ
diff --git a/docs/ICN'07 - PlanetLab.pdf b/docs/ICN'07_-_PlanetLab.pdf
index 1ff1fb5..1ff1fb5 100644
--- a/docs/ICN'07 - PlanetLab.pdf
+++ b/docs/ICN'07_-_PlanetLab.pdf
Binary files differ
diff --git a/docs/ICNP'03 - Resilient peer-to-peer streaming.pdf b/docs/ICNP'03_-_Resilient_peer-to-peer_streaming.pdf
index 3df4371..3df4371 100644
--- a/docs/ICNP'03 - Resilient peer-to-peer streaming.pdf
+++ b/docs/ICNP'03_-_Resilient_peer-to-peer_streaming.pdf
Binary files differ
diff --git a/docs/IEEE CST - A Survey and Comparison of Peer-to-Peer Overlay.pdf b/docs/IEEE_CST_-_A_Survey_and_Comparison_of_Peer-to-Peer_Overlay.pdf
index 49e6f21..49e6f21 100644
--- a/docs/IEEE CST - A Survey and Comparison of Peer-to-Peer Overlay.pdf
+++ b/docs/IEEE_CST_-_A_Survey_and_Comparison_of_Peer-to-Peer_Overlay.pdf
Binary files differ
diff --git a/docs/IEEE Communications Magazine - Video Streaming in P2P Systems.pdf b/docs/IEEE_Communications_Magazine_-_Video_Streaming_in_P2P_Systems.pdf
index 13b01f9..13b01f9 100644
--- a/docs/IEEE Communications Magazine - Video Streaming in P2P Systems.pdf
+++ b/docs/IEEE_Communications_Magazine_-_Video_Streaming_in_P2P_Systems.pdf
Binary files differ
diff --git a/docs/IEEE Computer Society - 2Fast.pdf b/docs/IEEE_Computer_Society_-_2Fast.pdf
index d9b4617..d9b4617 100644
--- a/docs/IEEE Computer Society - 2Fast.pdf
+++ b/docs/IEEE_Computer_Society_-_2Fast.pdf
Binary files differ
diff --git a/docs/IEEE DSO - Free riding on Gnutella revisited.pdf b/docs/IEEE_DSO_-_Free_riding_on_Gnutella_revisited.pdf
index 6784508..6784508 100644
--- a/docs/IEEE DSO - Free riding on Gnutella revisited.pdf
+++ b/docs/IEEE_DSO_-_Free_riding_on_Gnutella_revisited.pdf
Binary files differ
diff --git a/docs/IEEE Journal (25) - Hidden-action in network routing.pdf b/docs/IEEE_Journal_(25)_-_Hidden-action_in_network_routing.pdf
index df064bc..df064bc 100644
--- a/docs/IEEE Journal (25) - Hidden-action in network routing.pdf
+++ b/docs/IEEE_Journal_(25)_-_Hidden-action_in_network_routing.pdf
Binary files differ
diff --git a/docs/IEEE Trans. on Info. - New directions in cryptography.pdf b/docs/IEEE_Trans._on_Info._-_New_directions_in_cryptography.pdf
index 80b1da4..80b1da4 100644
--- a/docs/IEEE Trans. on Info. - New directions in cryptography.pdf
+++ b/docs/IEEE_Trans._on_Info._-_New_directions_in_cryptography.pdf
Binary files differ
diff --git a/docs/IEEE Transactions on Systems - Descentralized learning.pdf b/docs/IEEE_Transactions_on_Systems_-_Descentralized_learning.pdf
index f325eec..f325eec 100644
--- a/docs/IEEE Transactions on Systems - Descentralized learning.pdf
+++ b/docs/IEEE_Transactions_on_Systems_-_Descentralized_learning.pdf
Binary files differ
diff --git a/docs/IEEE⁄ACM Banner & Orda.pdf b/docs/IEEE⁄ACM_Banner_&_Orda.pdf
index c66a3d5..c66a3d5 100644
--- a/docs/IEEE⁄ACM Banner & Orda.pdf
+++ b/docs/IEEE⁄ACM_Banner_&_Orda.pdf
Binary files differ
diff --git a/docs/IEEE⁄ACM Trans. Netw.'02 (10)- Internet pricing.pdf b/docs/IEEE⁄ACM_Trans._Netw.'02_(10)-_Internet_pricing.pdf
index 964f25a..964f25a 100644
--- a/docs/IEEE⁄ACM Trans. Netw.'02 (10)- Internet pricing.pdf
+++ b/docs/IEEE⁄ACM_Trans._Netw.'02_(10)-_Internet_pricing.pdf
Binary files differ
diff --git a/docs/IEEE⁄ACM Transactions on Networking - Detecting shared congestion of flows.pdf b/docs/IEEE⁄ACM_Transactions_on_Networking_-_Detecting_shared_congestion_of_flows.pdf
index cbc0f7d..cbc0f7d 100644
--- a/docs/IEEE⁄ACM Transactions on Networking - Detecting shared congestion of flows.pdf
+++ b/docs/IEEE⁄ACM_Transactions_on_Networking_-_Detecting_shared_congestion_of_flows.pdf
Binary files differ
diff --git a/docs/IJCAI'07 - PC-DPOP.pdf b/docs/IJCAI'07_-_PC-DPOP.pdf
index 5c239e4..5c239e4 100644
--- a/docs/IJCAI'07 - PC-DPOP.pdf
+++ b/docs/IJCAI'07_-_PC-DPOP.pdf
Binary files differ
diff --git a/docs/IJCCR vol 10 (2006) 1 Ardron and Lietaer.pdf b/docs/IJCCR_vol_10_(2006)_1_Ardron_and_Lietaer.pdf
index 718dc35..718dc35 100644
--- a/docs/IJCCR vol 10 (2006) 1 Ardron and Lietaer.pdf
+++ b/docs/IJCCR_vol_10_(2006)_1_Ardron_and_Lietaer.pdf
Binary files differ
diff --git a/docs/IMC'04 - Availability, Usage, and Deployment Characteristics of the DNS.pdf b/docs/IMC'04_-_Availability,_Usage,_and_Deployment_Characteristics_of_the_DNS.pdf
index d93c938..d93c938 100644
--- a/docs/IMC'04 - Availability, Usage, and Deployment Characteristics of the DNS.pdf
+++ b/docs/IMC'04_-_Availability,_Usage,_and_Deployment_Characteristics_of_the_DNS.pdf
Binary files differ
diff --git a/docs/IMC'05 - Measurement, analysis and modeling of BitTorrent-like systems.pdf b/docs/IMC'05_-_Measurement,_analysis_and_modeling_of_BitTorrent-like_systems.pdf
index cbac650..cbac650 100644
--- a/docs/IMC'05 - Measurement, analysis and modeling of BitTorrent-like systems.pdf
+++ b/docs/IMC'05_-_Measurement,_analysis_and_modeling_of_BitTorrent-like_systems.pdf
Binary files differ
diff --git a/docs/IMC'06 - Understanding churn in p2p networks.pdf b/docs/IMC'06_-_Understanding_churn_in_p2p_networks.pdf
index 33aa4e8..33aa4e8 100644
--- a/docs/IMC'06 - Understanding churn in p2p networks.pdf
+++ b/docs/IMC'06_-_Understanding_churn_in_p2p_networks.pdf
Binary files differ
diff --git a/docs/IMC'07 - A global view of KAD.pdf b/docs/IMC'07_-_A_global_view_of_KAD.pdf
index a77ea26..a77ea26 100644
--- a/docs/IMC'07 - A global view of KAD.pdf
+++ b/docs/IMC'07_-_A_global_view_of_KAD.pdf
Binary files differ
diff --git a/docs/IMC'08 - Detecting BitTorrent Blocking.pdf b/docs/IMC'08_-_Detecting_BitTorrent_Blocking.pdf
index 2b178c7..2b178c7 100644
--- a/docs/IMC'08 - Detecting BitTorrent Blocking.pdf
+++ b/docs/IMC'08_-_Detecting_BitTorrent_Blocking.pdf
Binary files differ
diff --git a/docs/INFOCOM'02 - Probabilistic location and routing.pdf b/docs/INFOCOM'02_-_Probabilistic_location_and_routing.pdf
index f5ef6ab..f5ef6ab 100644
--- a/docs/INFOCOM'02 - Probabilistic location and routing.pdf
+++ b/docs/INFOCOM'02_-_Probabilistic_location_and_routing.pdf
Binary files differ
diff --git a/docs/INFOCOM'05 - Designing incentives for peer-to-peer routing.pdf b/docs/INFOCOM'05_-_Designing_incentives_for_peer-to-peer_routing.pdf
index b05bcbd..b05bcbd 100644
--- a/docs/INFOCOM'05 - Designing incentives for peer-to-peer routing.pdf
+++ b/docs/INFOCOM'05_-_Designing_incentives_for_peer-to-peer_routing.pdf
Binary files differ
diff --git a/docs/INFOCOM'05 - Exploiting anarchy in networks.pdf b/docs/INFOCOM'05_-_Exploiting_anarchy_in_networks.pdf
index 0fab665..0fab665 100644
--- a/docs/INFOCOM'05 - Exploiting anarchy in networks.pdf
+++ b/docs/INFOCOM'05_-_Exploiting_anarchy_in_networks.pdf
Binary files differ
diff --git a/docs/INFOCOM'05 - Market-driven bandwidth allocation.pdf b/docs/INFOCOM'05_-_Market-driven_bandwidth_allocation.pdf
index d9a2944..d9a2944 100644
--- a/docs/INFOCOM'05 - Market-driven bandwidth allocation.pdf
+++ b/docs/INFOCOM'05_-_Market-driven_bandwidth_allocation.pdf
Binary files differ
diff --git a/docs/INFOCOM'05 - Network coding for large scale content distribution.pdf b/docs/INFOCOM'05_-_Network_coding_for_large_scale_content_distribution.pdf
index e0ced69..e0ced69 100644
--- a/docs/INFOCOM'05 - Network coding for large scale content distribution.pdf
+++ b/docs/INFOCOM'05_-_Network_coding_for_large_scale_content_distribution.pdf
Binary files differ
diff --git a/docs/INFOCOM'06 - Pianese, Keller & Biersack - PULSE.pdf b/docs/INFOCOM'06_-_Pianese,_Keller_&_Biersack_-_PULSE.pdf
index c440013..c440013 100644
--- a/docs/INFOCOM'06 - Pianese, Keller & Biersack - PULSE.pdf
+++ b/docs/INFOCOM'06_-_Pianese,_Keller_&_Biersack_-_PULSE.pdf
Binary files differ
diff --git a/docs/INFOCOM'07 - MARCH.pdf b/docs/INFOCOM'07_-_MARCH.pdf
index 2c442dc..2c442dc 100644
--- a/docs/INFOCOM'07 - MARCH.pdf
+++ b/docs/INFOCOM'07_-_MARCH.pdf
Binary files differ
diff --git a/docs/INFOCOM'07 - Mesh or multiple-tree.pdf b/docs/INFOCOM'07_-_Mesh_or_multiple-tree.pdf
index 9bcabd8..9bcabd8 100644
--- a/docs/INFOCOM'07 - Mesh or multiple-tree.pdf
+++ b/docs/INFOCOM'07_-_Mesh_or_multiple-tree.pdf
Binary files differ
diff --git a/docs/INFOCOM'07 - Network coding for distributed storage systems.pdf b/docs/INFOCOM'07_-_Network_coding_for_distributed_storage_systems.pdf
index f69991c..f69991c 100644
--- a/docs/INFOCOM'07 - Network coding for distributed storage systems.pdf
+++ b/docs/INFOCOM'07_-_Network_coding_for_distributed_storage_systems.pdf
Binary files differ
diff --git a/docs/INFOCOM'07 - PRIME.pdf b/docs/INFOCOM'07_-_PRIME.pdf
index 2e09f82..2e09f82 100644
--- a/docs/INFOCOM'07 - PRIME.pdf
+++ b/docs/INFOCOM'07_-_PRIME.pdf
Binary files differ
diff --git a/docs/INFOCOM'08 - Stable peers.PDF b/docs/INFOCOM'08_-_Stable_peers.PDF
index a8d10c0..a8d10c0 100644
--- a/docs/INFOCOM'08 - Stable peers.PDF
+++ b/docs/INFOCOM'08_-_Stable_peers.PDF
Binary files differ
diff --git a/docs/INFOCOM'09 - Queusing models for p2p streaming systems.pdf b/docs/INFOCOM'09_-_Queusing_models_for_p2p_streaming_systems.pdf
index 33345c3..33345c3 100644
--- a/docs/INFOCOM'09 - Queusing models for p2p streaming systems.pdf
+++ b/docs/INFOCOM'09_-_Queusing_models_for_p2p_streaming_systems.pdf
Binary files differ
diff --git a/docs/INFOCOM'09 - Sybilproof Indirect Reprocity Mechanism for P2P Networks .pdf b/docs/INFOCOM'09_-_Sybilproof_Indirect_Reprocity_Mechanism_for_P2P_Networks_.pdf
index 3ee9cbc..3ee9cbc 100644
--- a/docs/INFOCOM'09 - Sybilproof Indirect Reprocity Mechanism for P2P Networks .pdf
+++ b/docs/INFOCOM'09_-_Sybilproof_Indirect_Reprocity_Mechanism_for_P2P_Networks_.pdf
Binary files differ
diff --git a/docs/INFOCOM'09 - Traffic Engineering vs. Content Distribution.PDF b/docs/INFOCOM'09_-_Traffic_Engineering_vs._Content_Distribution.PDF
index 4bdd919..4bdd919 100644
--- a/docs/INFOCOM'09 - Traffic Engineering vs. Content Distribution.PDF
+++ b/docs/INFOCOM'09_-_Traffic_Engineering_vs._Content_Distribution.PDF
Binary files differ
diff --git a/docs/INFOCOMM'09 - Mechanism design without payments.pdf b/docs/INFOCOMM'09_-_Mechanism_design_without_payments.pdf
index c9e6b70..c9e6b70 100644
--- a/docs/INFOCOMM'09 - Mechanism design without payments.pdf
+++ b/docs/INFOCOMM'09_-_Mechanism_design_without_payments.pdf
Binary files differ
diff --git a/docs/IPTPS'01 - Complex queries in DHT-based p2p networks.pdf b/docs/IPTPS'01_-_Complex_queries_in_DHT-based_p2p_networks.pdf
index a793533..a793533 100644
--- a/docs/IPTPS'01 - Complex queries in DHT-based p2p networks.pdf
+++ b/docs/IPTPS'01_-_Complex_queries_in_DHT-based_p2p_networks.pdf
Binary files differ
diff --git a/docs/IPTPS'01 - Erasure coding vs. replication.pdf b/docs/IPTPS'01_-_Erasure_coding_vs._replication.pdf
index 884bbbe..884bbbe 100644
--- a/docs/IPTPS'01 - Erasure coding vs. replication.pdf
+++ b/docs/IPTPS'01_-_Erasure_coding_vs._replication.pdf
Binary files differ
diff --git a/docs/IPTPS'02 - Douceur - The Sybil Attack.pdf b/docs/IPTPS'02_-_Douceur_-_The_Sybil_Attack.pdf
index 45f7453..45f7453 100644
--- a/docs/IPTPS'02 - Douceur - The Sybil Attack.pdf
+++ b/docs/IPTPS'02_-_Douceur_-_The_Sybil_Attack.pdf
Binary files differ
diff --git a/docs/IPTPS'03 - Rateless codes and big downloads.pdf b/docs/IPTPS'03_-_Rateless_codes_and_big_downloads.pdf
index 0795d88..0795d88 100644
--- a/docs/IPTPS'03 - Rateless codes and big downloads.pdf
+++ b/docs/IPTPS'03_-_Rateless_codes_and_big_downloads.pdf
Binary files differ
diff --git a/docs/IPTPS'03 - Towards a common API.pdf b/docs/IPTPS'03_-_Towards_a_common_API.pdf
index f6a37f6..f6a37f6 100644
--- a/docs/IPTPS'03 - Towards a common API.pdf
+++ b/docs/IPTPS'03_-_Towards_a_common_API.pdf
Binary files differ
diff --git a/docs/IPTPS'05 - High availability in DHTs: erasure coding vs. replication.pdf b/docs/IPTPS'05_-_High_availability_in_DHTs:_erasure_coding_vs._replication.pdf
index 0da8852..0da8852 100644
--- a/docs/IPTPS'05 - High availability in DHTs: erasure coding vs. replication.pdf
+++ b/docs/IPTPS'05_-_High_availability_in_DHTs:_erasure_coding_vs._replication.pdf
Binary files differ
diff --git a/docs/IPTPS'05 - The BitTorrent: measurements and analysis.pdf b/docs/IPTPS'05_-_The_BitTorrent:_measurements_and_analysis.pdf
index 5c27664..5c27664 100644
--- a/docs/IPTPS'05 - The BitTorrent: measurements and analysis.pdf
+++ b/docs/IPTPS'05_-_The_BitTorrent:_measurements_and_analysis.pdf
Binary files differ
diff --git a/docs/IPTPS'06 - On object maintenance in p2p systems.pdf b/docs/IPTPS'06_-_On_object_maintenance_in_p2p_systems.pdf
index 9d3b974..9d3b974 100644
--- a/docs/IPTPS'06 - On object maintenance in p2p systems.pdf
+++ b/docs/IPTPS'06_-_On_object_maintenance_in_p2p_systems.pdf
Binary files differ
diff --git a/docs/IPTPS'06 - Skype p2p VoIP System.pdf b/docs/IPTPS'06_-_Skype_p2p_VoIP_System.pdf
index 974663b..974663b 100644
--- a/docs/IPTPS'06 - Skype p2p VoIP System.pdf
+++ b/docs/IPTPS'06_-_Skype_p2p_VoIP_System.pdf
Binary files differ
diff --git a/docs/ITC-20'07 - Estimating churn in structured p2p networks.pdf b/docs/ITC-20'07_-_Estimating_churn_in_structured_p2p_networks.pdf
index 5d887da..5d887da 100644
--- a/docs/ITC-20'07 - Estimating churn in structured p2p networks.pdf
+++ b/docs/ITC-20'07_-_Estimating_churn_in_structured_p2p_networks.pdf
Binary files differ
diff --git a/docs/IWSOS'08 - Network Size Estimation for Structured Overlays.pdf b/docs/IWSOS'08_-_Network_Size_Estimation_for_Structured_Overlays.pdf
index 4c6c05c..4c6c05c 100644
--- a/docs/IWSOS'08 - Network Size Estimation for Structured Overlays.pdf
+++ b/docs/IWSOS'08_-_Network_Size_Estimation_for_Structured_Overlays.pdf
Binary files differ
diff --git a/docs/Informatik Spektrum - Peer-to-peer networking & -computing.pdf b/docs/Informatik_Spektrum_-_Peer-to-peer_networking_&_-computing.pdf
index 7a29021..7a29021 100644
--- a/docs/Informatik Spektrum - Peer-to-peer networking & -computing.pdf
+++ b/docs/Informatik_Spektrum_-_Peer-to-peer_networking_&_-computing.pdf
Binary files differ
diff --git a/docs/JPE (1993) - Gode & Sunder - Allocative Efficiency.pdf b/docs/JPE_(1993)_-_Gode_&_Sunder_-_Allocative_Efficiency.pdf
index 88208b8..88208b8 100644
--- a/docs/JPE (1993) - Gode & Sunder - Allocative Efficiency.pdf
+++ b/docs/JPE_(1993)_-_Gode_&_Sunder_-_Allocative_Efficiency.pdf
diff --git a/docs/Jelasity, Montresor & Babaoglu - Gossip-based aggregation.pdf b/docs/Jelasity,_Montresor_&_Babaoglu_-_Gossip-based_aggregation.pdf
index e8c1c5e..e8c1c5e 100644
--- a/docs/Jelasity, Montresor & Babaoglu - Gossip-based aggregation.pdf
+++ b/docs/Jelasity,_Montresor_&_Babaoglu_-_Gossip-based_aggregation.pdf
Binary files differ
diff --git a/docs/Jiang, Bai & Wang - Trust and Cooperation in Peer-to-Peer Systems.pdf b/docs/Jiang,_Bai_&_Wang_-_Trust_and_Cooperation_in_Peer-to-Peer_Systems.pdf
index ea71e63..ea71e63 100644
--- a/docs/Jiang, Bai & Wang - Trust and Cooperation in Peer-to-Peer Systems.pdf
+++ b/docs/Jiang,_Bai_&_Wang_-_Trust_and_Cooperation_in_Peer-to-Peer_Systems.pdf
Binary files differ
diff --git a/docs/Journal of AI - BnB-ADOPT.pdf b/docs/Journal_of_AI_-_BnB-ADOPT.pdf
index 24042cc..24042cc 100644
--- a/docs/Journal of AI - BnB-ADOPT.pdf
+++ b/docs/Journal_of_AI_-_BnB-ADOPT.pdf
Binary files differ
diff --git a/docs/Journal of Parallel & Distributed Computing - Deleting files in the Celeste p2p storage systems.pdf b/docs/Journal_of_Parallel_&_Distributed_Computing_-_Deleting_files_in_the_Celeste_p2p_storage_systems.pdf
index 615079a..615079a 100644
--- a/docs/Journal of Parallel & Distributed Computing - Deleting files in the Celeste p2p storage systems.pdf
+++ b/docs/Journal_of_Parallel_&_Distributed_Computing_-_Deleting_files_in_the_Celeste_p2p_storage_systems.pdf
Binary files differ
diff --git a/docs/Journal of Public Economics - Bolton, Katok & Ockenfels.pdf b/docs/Journal_of_Public_Economics_-_Bolton,_Katok_&_Ockenfels.pdf
index e527ac2..e527ac2 100644
--- a/docs/Journal of Public Economics - Bolton, Katok & Ockenfels.pdf
+++ b/docs/Journal_of_Public_Economics_-_Bolton,_Katok_&_Ockenfels.pdf
Binary files differ
diff --git a/docs/Journal of Supercomputing - Insight into redundancy schemes in DHTs.pdf b/docs/Journal_of_Supercomputing_-_Insight_into_redundancy_schemes_in_DHTs.pdf
index 4a064ae..4a064ae 100644
--- a/docs/Journal of Supercomputing - Insight into redundancy schemes in DHTs.pdf
+++ b/docs/Journal_of_Supercomputing_-_Insight_into_redundancy_schemes_in_DHTs.pdf
Binary files differ
diff --git a/docs/Kernighan & Lin - An Efficient Heuristic Procedure for Partitioning Graphs%0A.pdf b/docs/Kernighan_&_Lin_-_An_Efficient_Heuristic_Procedure_for_Partitioning_Graphs%0A.pdf
index a59ecf7..a59ecf7 100644
--- a/docs/Kernighan & Lin - An Efficient Heuristic Procedure for Partitioning Graphs%0A.pdf
+++ b/docs/Kernighan_&_Lin_-_An_Efficient_Heuristic_Procedure_for_Partitioning_Graphs%0A.pdf
Binary files differ
diff --git a/docs/Kising - Proximity Neighbor Selection for IGOR.pdf b/docs/Kising_-_Proximity_Neighbor_Selection_for_IGOR.pdf
index 32b9112..32b9112 100644
--- a/docs/Kising - Proximity Neighbor Selection for IGOR.pdf
+++ b/docs/Kising_-_Proximity_Neighbor_Selection_for_IGOR.pdf
Binary files differ
diff --git a/docs/LAP: Lightweight Anonymity and Privacy.pdf b/docs/LAP:_Lightweight_Anonymity_and_Privacy.pdf
index ce92444..ce92444 100644
--- a/docs/LAP: Lightweight Anonymity and Privacy.pdf
+++ b/docs/LAP:_Lightweight_Anonymity_and_Privacy.pdf
Binary files differ
diff --git a/docs/LASTor: A Low-Latency AS-Aware Tor Client.pdf b/docs/LASTor:_A_Low-Latency_AS-Aware_Tor_Client.pdf
index ba2a296..ba2a296 100644
--- a/docs/LASTor: A Low-Latency AS-Aware Tor Client.pdf
+++ b/docs/LASTor:_A_Low-Latency_AS-Aware_Tor_Client.pdf
Binary files differ
diff --git a/docs/LNCS - Distributed Hash Tables.pdf b/docs/LNCS_-_Distributed_Hash_Tables.pdf
index c5e218f..c5e218f 100644
--- a/docs/LNCS - Distributed Hash Tables.pdf
+++ b/docs/LNCS_-_Distributed_Hash_Tables.pdf
Binary files differ
diff --git a/docs/Laffont & Martimort - The Theory of Incentives.pdf b/docs/Laffont_&_Martimort_-_The_Theory_of_Incentives.pdf
index 5bbf4f6..5bbf4f6 100644
--- a/docs/Laffont & Martimort - The Theory of Incentives.pdf
+++ b/docs/Laffont_&_Martimort_-_The_Theory_of_Incentives.pdf
Binary files differ
diff --git a/docs/Lecture Notes in Computer Science - Selected DHT Algorithms .pdf b/docs/Lecture_Notes_in_Computer_Science_-_Selected_DHT_Algorithms_.pdf
index 67ff5e3..67ff5e3 100644
--- a/docs/Lecture Notes in Computer Science - Selected DHT Algorithms .pdf
+++ b/docs/Lecture_Notes_in_Computer_Science_-_Selected_DHT_Algorithms_.pdf
Binary files differ
diff --git a/docs/Long Term Study of Peer Behavior in the kad DHT.pdf b/docs/Long_Term_Study_of_Peer_Behavior_in_the_kad_DHT.pdf
index 78634ee..78634ee 100644
--- a/docs/Long Term Study of Peer Behavior in the kad DHT.pdf
+++ b/docs/Long_Term_Study_of_Peer_Behavior_in_the_kad_DHT.pdf
diff --git a/docs/MDS'07 - Conner & Nahrstedt - Securing peer-to-peer media streaming systems.pdf b/docs/MDS'07_-_Conner_&_Nahrstedt_-_Securing_peer-to-peer_media_streaming_systems.pdf
index 27afd93..27afd93 100644
--- a/docs/MDS'07 - Conner & Nahrstedt - Securing peer-to-peer media streaming systems.pdf
+++ b/docs/MDS'07_-_Conner_&_Nahrstedt_-_Securing_peer-to-peer_media_streaming_systems.pdf
Binary files differ
diff --git a/docs/Marx - Parameterized graph separation problems.pdf b/docs/Marx_-_Parameterized_graph_separation_problems.pdf
index 4f67681..4f67681 100644
--- a/docs/Marx - Parameterized graph separation problems.pdf
+++ b/docs/Marx_-_Parameterized_graph_separation_problems.pdf
Binary files differ
diff --git a/docs/Menezes & Monteiro - An Introduction to Auction Theory.pdf b/docs/Menezes_&_Monteiro_-_An_Introduction_to_Auction_Theory.pdf
index f7e7fa7..f7e7fa7 100644
--- a/docs/Menezes & Monteiro - An Introduction to Auction Theory.pdf
+++ b/docs/Menezes_&_Monteiro_-_An_Introduction_to_Auction_Theory.pdf
Binary files differ
diff --git a/docs/Mies - SpoVNet.pdf b/docs/Mies_-_SpoVNet.pdf
index 9868747..9868747 100644
--- a/docs/Mies - SpoVNet.pdf
+++ b/docs/Mies_-_SpoVNet.pdf
Binary files differ
diff --git a/docs/NCA'05 - Decentralized Schemes for Size Estimation in Large and Dynamic Groups.pdf b/docs/NCA'05_-_Decentralized_Schemes_for_Size_Estimation_in_Large_and_Dynamic_Groups.pdf
index 4de25f8..4de25f8 100644
--- a/docs/NCA'05 - Decentralized Schemes for Size Estimation in Large and Dynamic Groups.pdf
+++ b/docs/NCA'05_-_Decentralized_Schemes_for_Size_Estimation_in_Large_and_Dynamic_Groups.pdf
Binary files differ
diff --git a/docs/NDSS'11 - Security API for Distributed Social Networks.pdf b/docs/NDSS'11_-_Security_API_for_Distributed_Social_Networks.pdf
index 72018e5..72018e5 100644
--- a/docs/NDSS'11 - Security API for Distributed Social Networks.pdf
+++ b/docs/NDSS'11_-_Security_API_for_Distributed_Social_Networks.pdf
Binary files differ
diff --git a/docs/NGC'03 - Scalable Application-level Anycast .pdf b/docs/NGC'03_-_Scalable_Application-level_Anycast_.pdf
index 5089e6e..5089e6e 100644
--- a/docs/NGC'03 - Scalable Application-level Anycast .pdf
+++ b/docs/NGC'03_-_Scalable_Application-level_Anycast_.pdf
Binary files differ
diff --git a/docs/NMNC - Progressive strategies for MCTS.pdf b/docs/NMNC_-_Progressive_strategies_for_MCTS.pdf
index 4c07f4a..4c07f4a 100644
--- a/docs/NMNC - Progressive strategies for MCTS.pdf
+++ b/docs/NMNC_-_Progressive_strategies_for_MCTS.pdf
Binary files differ
diff --git a/docs/NSDI'04 - Designing a DHT for low latency and high throughput.pdf b/docs/NSDI'04_-_Designing_a_DHT_for_low_latency_and_high_throughput.pdf
index 7dbf778..7dbf778 100644
--- a/docs/NSDI'04 - Designing a DHT for low latency and high throughput.pdf
+++ b/docs/NSDI'04_-_Designing_a_DHT_for_low_latency_and_high_throughput.pdf
Binary files differ
diff --git a/docs/NSDI'07 - Do incentives build robustness in BitTorrent.pdf b/docs/NSDI'07_-_Do_incentives_build_robustness_in_BitTorrent.pdf
index 428880c..428880c 100644
--- a/docs/NSDI'07 - Do incentives build robustness in BitTorrent.pdf
+++ b/docs/NSDI'07_-_Do_incentives_build_robustness_in_BitTorrent.pdf
Binary files differ
diff --git a/docs/NetCod'05 - Random linear coding based distributed networked storage.pdf b/docs/NetCod'05_-_Random_linear_coding_based_distributed_networked_storage.pdf
index bcc962e..bcc962e 100644
--- a/docs/NetCod'05 - Random linear coding based distributed networked storage.pdf
+++ b/docs/NetCod'05_-_Random_linear_coding_based_distributed_networked_storage.pdf
Binary files differ
diff --git a/docs/NetEcon'03 - Cohen - Incentives build robustness in BitTorrent.pdf b/docs/NetEcon'03_-_Cohen_-_Incentives_build_robustness_in_BitTorrent.pdf
index 06ae156..06ae156 100644
--- a/docs/NetEcon'03 - Cohen - Incentives build robustness in BitTorrent.pdf
+++ b/docs/NetEcon'03_-_Cohen_-_Incentives_build_robustness_in_BitTorrent.pdf
Binary files differ
diff --git a/docs/NetEcon'06 - Harvelaar.pdf b/docs/NetEcon'06_-_Harvelaar.pdf
index 0b599e4..0b599e4 100644
--- a/docs/NetEcon'06 - Harvelaar.pdf
+++ b/docs/NetEcon'06_-_Harvelaar.pdf
Binary files differ
diff --git a/docs/NetEcon'06 - Improving robustness of p2p streaming.pdf b/docs/NetEcon'06_-_Improving_robustness_of_p2p_streaming.pdf
index bbfd03e..bbfd03e 100644
--- a/docs/NetEcon'06 - Improving robustness of p2p streaming.pdf
+++ b/docs/NetEcon'06_-_Improving_robustness_of_p2p_streaming.pdf
Binary files differ
diff --git a/docs/NetEcon'08 - Yang - Auction, but don't block.pdf b/docs/NetEcon'08_-_Yang_-_Auction,_but_don't_block.pdf
index f9b0376..f9b0376 100644
--- a/docs/NetEcon'08 - Yang - Auction, but don't block.pdf
+++ b/docs/NetEcon'08_-_Yang_-_Auction,_but_don't_block.pdf
Binary files differ
diff --git a/docs/Neumann & Morgenstern - Theory of Games and Economic Behavior.pdf b/docs/Neumann_&_Morgenstern_-_Theory_of_Games_and_Economic_Behavior.pdf
index 62c6d72..62c6d72 100644
--- a/docs/Neumann & Morgenstern - Theory of Games and Economic Behavior.pdf
+++ b/docs/Neumann_&_Morgenstern_-_Theory_of_Games_and_Economic_Behavior.pdf
Binary files differ
diff --git a/docs/OSDI'00 - Fast and Secure Distributed Read-Only File System.pdf b/docs/OSDI'00_-_Fast_and_Secure_Distributed_Read-Only_File_System.pdf
index 7377811..7377811 100644
--- a/docs/OSDI'00 - Fast and Secure Distributed Read-Only File System.pdf
+++ b/docs/OSDI'00_-_Fast_and_Secure_Distributed_Read-Only_File_System.pdf
Binary files differ
diff --git a/docs/OSDI'00 - Overcast.pdf b/docs/OSDI'00_-_Overcast.pdf
index 13ccd6a..13ccd6a 100644
--- a/docs/OSDI'00 - Overcast.pdf
+++ b/docs/OSDI'00_-_Overcast.pdf
diff --git a/docs/Oper. Res. - Optimal Resource Allocation.pdf b/docs/Oper._Res._-_Optimal_Resource_Allocation.pdf
index 6c20b45..6c20b45 100644
--- a/docs/Oper. Res. - Optimal Resource Allocation.pdf
+++ b/docs/Oper._Res._-_Optimal_Resource_Allocation.pdf
Binary files differ
diff --git a/docs/P2P'03 - Buragohain, Agrawal & Suri - Incentives in P2P systems.pdf b/docs/P2P'03_-_Buragohain,_Agrawal_&_Suri_-_Incentives_in_P2P_systems.pdf
index 57eac0c..57eac0c 100644
--- a/docs/P2P'03 - Buragohain, Agrawal & Suri - Incentives in P2P systems.pdf
+++ b/docs/P2P'03_-_Buragohain,_Agrawal_&_Suri_-_Incentives_in_P2P_systems.pdf
Binary files differ
diff --git a/docs/P2P'03 - Identity crisis: anonymity vs reputation.pdf b/docs/P2P'03_-_Identity_crisis:_anonymity_vs_reputation.pdf
index d3acd2a..d3acd2a 100644
--- a/docs/P2P'03 - Identity crisis: anonymity vs reputation.pdf
+++ b/docs/P2P'03_-_Identity_crisis:_anonymity_vs_reputation.pdf
Binary files differ
diff --git a/docs/P2P'04 - Reputation management framework.pdf b/docs/P2P'04_-_Reputation_management_framework.pdf
index 649800d..649800d 100644
--- a/docs/P2P'04 - Reputation management framework.pdf
+++ b/docs/P2P'04_-_Reputation_management_framework.pdf
Binary files differ
diff --git a/docs/P2P'09 - PeerSim.pdf b/docs/P2P'09_-_PeerSim.pdf
index b7a1637..b7a1637 100644
--- a/docs/P2P'09 - PeerSim.pdf
+++ b/docs/P2P'09_-_PeerSim.pdf
Binary files differ
diff --git a/docs/P2PECON'05 - Incentives in BitTorrent induce free riding.pdf b/docs/P2PECON'05_-_Incentives_in_BitTorrent_induce_free_riding.pdf
index 7551380..7551380 100644
--- a/docs/P2PECON'05 - Incentives in BitTorrent induce free riding.pdf
+++ b/docs/P2PECON'05_-_Incentives_in_BitTorrent_induce_free_riding.pdf
Binary files differ
diff --git a/docs/P2PECON'05 - KARMA.pdf b/docs/P2PECON'05_-_KARMA.pdf
index 2c12ddb..2c12ddb 100644
--- a/docs/P2PECON'05 - KARMA.pdf
+++ b/docs/P2PECON'05_-_KARMA.pdf
Binary files differ
diff --git a/docs/P2PECON'05 - Self-recharging virtual currency.pdf b/docs/P2PECON'05_-_Self-recharging_virtual_currency.pdf
index 895972c..895972c 100644
--- a/docs/P2PECON'05 - Self-recharging virtual currency.pdf
+++ b/docs/P2PECON'05_-_Self-recharging_virtual_currency.pdf
Binary files differ
diff --git a/docs/P2PEcon'04 - SWIFT.pdf b/docs/P2PEcon'04_-_SWIFT.pdf
index 994b0af..994b0af 100644
--- a/docs/P2PEcon'04 - SWIFT.pdf
+++ b/docs/P2PEcon'04_-_SWIFT.pdf
Binary files differ
diff --git a/docs/P2PEcon'05 - A new mechanism for the free-rider problem.pdf b/docs/P2PEcon'05_-_A_new_mechanism_for_the_free-rider_problem.pdf
index 85af0dc..85af0dc 100644
--- a/docs/P2PEcon'05 - A new mechanism for the free-rider problem.pdf
+++ b/docs/P2PEcon'05_-_A_new_mechanism_for_the_free-rider_problem.pdf
Binary files differ
diff --git a/docs/PAM'04 - Dissecting bittorrent.pdf b/docs/PAM'04_-_Dissecting_bittorrent.pdf
index c708693..c708693 100644
--- a/docs/PAM'04 - Dissecting bittorrent.pdf
+++ b/docs/PAM'04_-_Dissecting_bittorrent.pdf
Binary files differ
diff --git a/docs/PASSAT'11 - Multiparty linear programming.pdf b/docs/PASSAT'11_-_Multiparty_linear_programming.pdf
index 680911b..680911b 100644
--- a/docs/PASSAT'11 - Multiparty linear programming.pdf
+++ b/docs/PASSAT'11_-_Multiparty_linear_programming.pdf
Binary files differ
diff --git a/docs/PETS'11 - An Accurate System-Wide Anonymity Metric for Probabilistic Attacks.pdf b/docs/PETS'11_-_An_Accurate_System-Wide_Anonymity_Metric_for_Probabilistic_Attacks.pdf
index 9599754..9599754 100644
--- a/docs/PETS'11 - An Accurate System-Wide Anonymity Metric for Probabilistic Attacks.pdf
+++ b/docs/PETS'11_-_An_Accurate_System-Wide_Anonymity_Metric_for_Probabilistic_Attacks.pdf
Binary files differ
diff --git a/docs/PETS'11 - DefenestraTor.pdf b/docs/PETS'11_-_DefenestraTor.pdf
index d254901..d254901 100644
--- a/docs/PETS'11 - DefenestraTor.pdf
+++ b/docs/PETS'11_-_DefenestraTor.pdf
Binary files differ
diff --git a/docs/PINS'04 - Free-riding and whitewashing in P2P systems.pdf b/docs/PINS'04_-__Free-riding_and_whitewashing_in_P2P_systems.pdf
index 269e28c..269e28c 100644
--- a/docs/PINS'04 - Free-riding and whitewashing in P2P systems.pdf
+++ b/docs/PINS'04_-__Free-riding_and_whitewashing_in_P2P_systems.pdf
Binary files differ
diff --git a/docs/PNAS (2003) - The evolution of altruistic punishment.pdf b/docs/PNAS_(2003)_-_The_evolution_of_altruistic_punishment.pdf
index 563fc86..563fc86 100644
--- a/docs/PNAS (2003) - The evolution of altruistic punishment.pdf
+++ b/docs/PNAS_(2003)_-_The_evolution_of_altruistic_punishment.pdf
Binary files differ
diff --git a/docs/PNAS - Nash - Equilibrium points in n-person games.pdf b/docs/PNAS_-_Nash_-_Equilibrium_points_in_n-person_games.pdf
index 8ba7fa1..8ba7fa1 100644
--- a/docs/PNAS - Nash - Equilibrium points in n-person games.pdf
+++ b/docs/PNAS_-_Nash_-_Equilibrium_points_in_n-person_games.pdf
Binary files differ
diff --git a/docs/PODC'02 - Building secure file systems out of Byzantine storage.pdf b/docs/PODC'02_-_Building_secure_file_systems_out_of_Byzantine_storage.pdf
index d154d3e..d154d3e 100644
--- a/docs/PODC'02 - Building secure file systems out of Byzantine storage.pdf
+++ b/docs/PODC'02_-_Building_secure_file_systems_out_of_Byzantine_storage.pdf
Binary files differ
diff --git a/docs/PODC'06 - Peer counting and sampling in overlay networks.pdf b/docs/PODC'06_-_Peer_counting_and_sampling_in_overlay_networks.pdf
index 705ff14..705ff14 100644
--- a/docs/PODC'06 - Peer counting and sampling in overlay networks.pdf
+++ b/docs/PODC'06_-_Peer_counting_and_sampling_in_overlay_networks.pdf
Binary files differ
diff --git a/docs/Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail.pdf b/docs/Peek-a-Boo,_I_Still_See_You:_Why_Efficient_Traffic_Analysis_Countermeasures_Fail.pdf
index f6fc1eb..f6fc1eb 100644
--- a/docs/Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail.pdf
+++ b/docs/Peek-a-Boo,_I_Still_See_You:_Why_Efficient_Traffic_Analysis_Countermeasures_Fail.pdf
Binary files differ
diff --git a/docs/Prospects for Remailers.pdf b/docs/Prospects_for_Remailers.pdf
index 4a4b432..4a4b432 100644
--- a/docs/Prospects for Remailers.pdf
+++ b/docs/Prospects_for_Remailers.pdf
Binary files differ
diff --git a/docs/Reed & Solomon - Polynomial Codes Over Certain Finite Fields.pdf b/docs/Reed_&_Solomon_-_Polynomial_Codes_Over_Certain_Finite_Fields.pdf
index 88600df..88600df 100644
--- a/docs/Reed & Solomon - Polynomial Codes Over Certain Finite Fields.pdf
+++ b/docs/Reed_&_Solomon_-_Polynomial_Codes_Over_Certain_Finite_Fields.pdf
diff --git a/docs/SAINT'03 - Kwon & Ryu.pdf b/docs/SAINT'03_-_Kwon_&_Ryu.pdf
index b9549d3..b9549d3 100644
--- a/docs/SAINT'03 - Kwon & Ryu.pdf
+++ b/docs/SAINT'03_-_Kwon_&_Ryu.pdf
Binary files differ
diff --git a/docs/SAINT'07 - Local production, local consumption p2p architecture.pdf b/docs/SAINT'07_-_Local_production,_local_consumption_p2p_architecture.pdf
index 87de01a..87de01a 100644
--- a/docs/SAINT'07 - Local production, local consumption p2p architecture.pdf
+++ b/docs/SAINT'07_-_Local_production,_local_consumption_p2p_architecture.pdf
Binary files differ
diff --git a/docs/SASO'07 - Garbacki, Epema & van Steen.pdf b/docs/SASO'07_-_Garbacki,_Epema_&_van_Steen.pdf
index 4b4625d..4b4625d 100644
--- a/docs/SASO'07 - Garbacki, Epema & van Steen.pdf
+++ b/docs/SASO'07_-_Garbacki,_Epema_&_van_Steen.pdf
Binary files differ
diff --git a/docs/SELMAS - Software framework for automated negotiation.pdf b/docs/SELMAS_-_Software_framework_for_automated_negotiation.pdf
index ccb3980..ccb3980 100644
--- a/docs/SELMAS - Software framework for automated negotiation.pdf
+++ b/docs/SELMAS_-_Software_framework_for_automated_negotiation.pdf
Binary files differ
diff --git a/docs/SIGCOMM'03 - On selfish routing in internet-like environments.pdf b/docs/SIGCOMM'03_-_On_selfish_routing_in_internet-like_environments.pdf
index 5f0f6cd..5f0f6cd 100644
--- a/docs/SIGCOMM'03 - On selfish routing in internet-like environments.pdf
+++ b/docs/SIGCOMM'03_-_On_selfish_routing_in_internet-like_environments.pdf
Binary files differ
diff --git a/docs/SIGCOMM'03 - The impact of DHT routing geometry on resilience and proximity.pdf b/docs/SIGCOMM'03_-_The_impact_of_DHT_routing_geometry_on_resilience_and_proximity.pdf
index 225e4c9..225e4c9 100644
--- a/docs/SIGCOMM'03 - The impact of DHT routing geometry on resilience and proximity.pdf
+++ b/docs/SIGCOMM'03_-_The_impact_of_DHT_routing_geometry_on_resilience_and_proximity.pdf
Binary files differ
diff --git a/docs/SIGCOMM'04 - Qui & Srikant - Modeling and performance analysis.pdf b/docs/SIGCOMM'04_-_Qui_&_Srikant_-_Modeling_and_performance_analysis.pdf
index ffe62f5..ffe62f5 100644
--- a/docs/SIGCOMM'04 - Qui & Srikant - Modeling and performance analysis.pdf
+++ b/docs/SIGCOMM'04_-_Qui_&_Srikant_-_Modeling_and_performance_analysis.pdf
Binary files differ
diff --git a/docs/SIGCOMM'06 - SybilGuard.pdf b/docs/SIGCOMM'06_-_SybilGuard.pdf
index 842a2bb..842a2bb 100644
--- a/docs/SIGCOMM'06 - SybilGuard.pdf
+++ b/docs/SIGCOMM'06_-_SybilGuard.pdf
Binary files differ
diff --git a/docs/SIGCOMM'08 - Rationality and traffic attraction.pdf b/docs/SIGCOMM'08_-_Rationality_and_traffic_attraction.pdf
index 3e303f3..3e303f3 100644
--- a/docs/SIGCOMM'08 - Rationality and traffic attraction.pdf
+++ b/docs/SIGCOMM'08_-_Rationality_and_traffic_attraction.pdf
Binary files differ
diff --git a/docs/SIGCOMM'11 - Uncovering social network sybils.pdf b/docs/SIGCOMM'11_-_Uncovering_social_network_sybils.pdf
index e997fe5..e997fe5 100644
--- a/docs/SIGCOMM'11 - Uncovering social network sybils.pdf
+++ b/docs/SIGCOMM'11_-_Uncovering_social_network_sybils.pdf
Binary files differ
diff --git a/docs/SIGCOMM'87 - Strategies for decentralized resource management.pdf b/docs/SIGCOMM'87_-_Strategies_for_decentralized_resource_management.pdf
index 2d6caac..2d6caac 100644
--- a/docs/SIGCOMM'87 - Strategies for decentralized resource management.pdf
+++ b/docs/SIGCOMM'87_-_Strategies_for_decentralized_resource_management.pdf
Binary files differ
diff --git a/docs/SIGCOMM Comp. Comm. Rev. - Minimizing churn in distributed systems.pdf b/docs/SIGCOMM_Comp._Comm._Rev._-_Minimizing_churn_in_distributed_systems.pdf
index 443855d..443855d 100644
--- a/docs/SIGCOMM Comp. Comm. Rev. - Minimizing churn in distributed systems.pdf
+++ b/docs/SIGCOMM_Comp._Comm._Rev._-_Minimizing_churn_in_distributed_systems.pdf
Binary files differ
diff --git a/docs/SIGCOMM Compt. Commun. Rev. - Vivaldi.pdf b/docs/SIGCOMM_Compt._Commun._Rev._-_Vivaldi.pdf
index 5dbfdff..5dbfdff 100644
--- a/docs/SIGCOMM Compt. Commun. Rev. - Vivaldi.pdf
+++ b/docs/SIGCOMM_Compt._Commun._Rev._-_Vivaldi.pdf
Binary files differ
diff --git a/docs/SIGCOMM Comput. Commun. Rev. - BitTorrent is an Auction.pdf b/docs/SIGCOMM_Comput._Commun._Rev._-_BitTorrent_is_an_Auction.pdf
index eddcba0..eddcba0 100644
--- a/docs/SIGCOMM Comput. Commun. Rev. - BitTorrent is an Auction.pdf
+++ b/docs/SIGCOMM_Comput._Commun._Rev._-_BitTorrent_is_an_Auction.pdf
Binary files differ
diff --git a/docs/SIGCOMM Comput. Commun. Rev. - P4P: Provider Portal for Applications.pdf b/docs/SIGCOMM_Comput._Commun._Rev._-_P4P:_Provider_Portal_for_Applications.pdf
index 0b39dbc..0b39dbc 100644
--- a/docs/SIGCOMM Comput. Commun. Rev. - P4P: Provider Portal for Applications.pdf
+++ b/docs/SIGCOMM_Comput._Commun._Rev._-_P4P:_Provider_Portal_for_Applications.pdf
Binary files differ
diff --git a/docs/SIGCOMM Comput. Commun. Rev. - Practical, distributed network coordinates.pdf b/docs/SIGCOMM_Comput._Commun._Rev._-_Practical,_distributed_network_coordinates.pdf
index 46ca523..46ca523 100644
--- a/docs/SIGCOMM Comput. Commun. Rev. - Practical, distributed network coordinates.pdf
+++ b/docs/SIGCOMM_Comput._Commun._Rev._-_Practical,_distributed_network_coordinates.pdf
Binary files differ
diff --git a/docs/SIGCOMM Comput. Commun. Rev. - Securing Internet Coordinate Embedding Systems.pdf b/docs/SIGCOMM_Comput._Commun._Rev._-_Securing_Internet_Coordinate_Embedding_Systems.pdf
index bc5af95..bc5af95 100644
--- a/docs/SIGCOMM Comput. Commun. Rev. - Securing Internet Coordinate Embedding Systems.pdf
+++ b/docs/SIGCOMM_Comput._Commun._Rev._-_Securing_Internet_Coordinate_Embedding_Systems.pdf
diff --git a/docs/SIGCOMM Comput. Commun. Rev - Network Coding: an Instant Primer.pdf b/docs/SIGCOMM_Comput._Commun._Rev_-_Network_Coding:_an_Instant_Primer.pdf
index cf7f746..cf7f746 100644
--- a/docs/SIGCOMM Comput. Commun. Rev - Network Coding: an Instant Primer.pdf
+++ b/docs/SIGCOMM_Comput._Commun._Rev_-_Network_Coding:_an_Instant_Primer.pdf
Binary files differ
diff --git a/docs/SIGCOMM Computers Communication Review - Bubblestorm.pdf b/docs/SIGCOMM_Computers_Communication_Review_-_Bubblestorm.pdf
index 6dfc75c..6dfc75c 100644
--- a/docs/SIGCOMM Computers Communication Review - Bubblestorm.pdf
+++ b/docs/SIGCOMM_Computers_Communication_Review_-_Bubblestorm.pdf
Binary files differ
diff --git a/docs/SIGKDD Explor. Newsl. - Distributed data mining.pdf b/docs/SIGKDD_Explor._Newsl._-_Distributed_data_mining.pdf
index 18f0341..18f0341 100644
--- a/docs/SIGKDD Explor. Newsl. - Distributed data mining.pdf
+++ b/docs/SIGKDD_Explor._Newsl._-_Distributed_data_mining.pdf
Binary files differ
diff --git a/docs/SIGMETRICS'05 - Bharambe, Herley & Padmanabhan.pdf b/docs/SIGMETRICS'05_-_Bharambe,_Herley_&_Padmanabhan.pdf
index ecf43b5..ecf43b5 100644
--- a/docs/SIGMETRICS'05 - Bharambe, Herley & Padmanabhan.pdf
+++ b/docs/SIGMETRICS'05_-_Bharambe,_Herley_&_Padmanabhan.pdf
diff --git a/docs/SIGMETRICS'05 - Coupon replication systems.pdf b/docs/SIGMETRICS'05_-_Coupon_replication_systems.pdf
index f302ddd..f302ddd 100644
--- a/docs/SIGMETRICS'05 - Coupon replication systems.pdf
+++ b/docs/SIGMETRICS'05_-_Coupon_replication_systems.pdf
Binary files differ
diff --git a/docs/SIGOPS - FARSITE.pdf b/docs/SIGOPS_-_FARSITE.pdf
index 775b484..775b484 100644
--- a/docs/SIGOPS - FARSITE.pdf
+++ b/docs/SIGOPS_-_FARSITE.pdf
Binary files differ
diff --git a/docs/SIGOSP'03 - Spitstream: High-bandwidth multicast.pdf b/docs/SIGOSP'03_-_Spitstream:_High-bandwidth_multicast.pdf
index d5ac170..d5ac170 100644
--- a/docs/SIGOSP'03 - Spitstream: High-bandwidth multicast.pdf
+++ b/docs/SIGOSP'03_-_Spitstream:_High-bandwidth_multicast.pdf
Binary files differ
diff --git a/docs/SIGecom Exch. (5) - Overcoming free-riding behavior.pdf b/docs/SIGecom_Exch._(5)_-_Overcoming_free-riding_behavior.pdf
index 0b3a3d5..0b3a3d5 100644
--- a/docs/SIGecom Exch. (5) - Overcoming free-riding behavior.pdf
+++ b/docs/SIGecom_Exch._(5)_-_Overcoming_free-riding_behavior.pdf
Binary files differ
diff --git a/docs/SODA'04 - Network failure detection and graph connectivity%0A.pdf b/docs/SODA'04_-_Network_failure_detection_and_graph_connectivity%0A.pdf
index afe5a24..afe5a24 100644
--- a/docs/SODA'04 - Network failure detection and graph connectivity%0A.pdf
+++ b/docs/SODA'04_-_Network_failure_detection_and_graph_connectivity%0A.pdf
Binary files differ
diff --git a/docs/SOSP'03 - Bullet.pdf b/docs/SOSP'03_-_Bullet.pdf
index 06bb287..06bb287 100644
--- a/docs/SOSP'03 - Bullet.pdf
+++ b/docs/SOSP'03_-_Bullet.pdf
Binary files differ
diff --git a/docs/SPAA'05 - Selfish routing with incomplete information.pdf b/docs/SPAA'05_-_Selfish_routing_with_incomplete_information.pdf
index da89532..da89532 100644
--- a/docs/SPAA'05 - Selfish routing with incomplete information.pdf
+++ b/docs/SPAA'05_-_Selfish_routing_with_incomplete_information.pdf
Binary files differ
diff --git a/docs/SRDS'06 - Cryptree.pdf b/docs/SRDS'06_-_Cryptree.pdf
index 0d672a8..0d672a8 100644
--- a/docs/SRDS'06 - Cryptree.pdf
+++ b/docs/SRDS'06_-_Cryptree.pdf
Binary files differ
diff --git a/docs/STACS'99 - Nisan - Algorithms for selfish agents.pdf b/docs/STACS'99_-_Nisan_-_Algorithms_for_selfish_agents.pdf
index cbcecd0..cbcecd0 100644
--- a/docs/STACS'99 - Nisan - Algorithms for selfish agents.pdf
+++ b/docs/STACS'99_-_Nisan_-_Algorithms_for_selfish_agents.pdf
Binary files differ
diff --git a/docs/STOC'08 - Optimal mechanism design and money burning.pdf b/docs/STOC'08_-_Optimal_mechanism_design_and_money_burning.pdf
index 11f6d04..11f6d04 100644
--- a/docs/STOC'08 - Optimal mechanism design and money burning.pdf
+++ b/docs/STOC'08_-_Optimal_mechanism_design_and_money_burning.pdf
Binary files differ
diff --git a/docs/STOC'97 - Practical Loss-Resilient Codes.pdf b/docs/STOC'97_-_Practical_Loss-Resilient_Codes.pdf
index 5ddd0cd..5ddd0cd 100644
--- a/docs/STOC'97 - Practical Loss-Resilient Codes.pdf
+++ b/docs/STOC'97_-_Practical_Loss-Resilient_Codes.pdf
Binary files differ
diff --git a/docs/STOC'99 - Nisan & Ronen - Algorithmic mechanism design.pdf b/docs/STOC'99_-_Nisan_&_Ronen_-_Algorithmic_mechanism_design.pdf
index ff98ac5..ff98ac5 100644
--- a/docs/STOC'99 - Nisan & Ronen - Algorithmic mechanism design.pdf
+++ b/docs/STOC'99_-_Nisan_&_Ronen_-_Algorithmic_mechanism_design.pdf
Binary files differ
diff --git a/docs/Saito - i-WAT Dissertation.pdf b/docs/Saito_-_i-WAT_Dissertation.pdf
index be7e792..be7e792 100644
--- a/docs/Saito - i-WAT Dissertation.pdf
+++ b/docs/Saito_-_i-WAT_Dissertation.pdf
Binary files differ
diff --git a/docs/Schollmeier - Signaling and networking in unstructured p2p networks.pdf b/docs/Schollmeier_-_Signaling_and_networking_in_unstructured_p2p_networks.pdf
index 0910833..0910833 100644
--- a/docs/Schollmeier - Signaling and networking in unstructured p2p networks.pdf
+++ b/docs/Schollmeier_-_Signaling_and_networking_in_unstructured_p2p_networks.pdf
Binary files differ
diff --git a/docs/Science - Hardin - The Tragedy of the Commons.pdf b/docs/Science_-_Hardin_-_The_Tragedy_of_the_Commons.pdf
index 0087262..0087262 100644
--- a/docs/Science - Hardin - The Tragedy of the Commons.pdf
+++ b/docs/Science_-_Hardin_-_The_Tragedy_of_the_Commons.pdf
Binary files differ
diff --git a/docs/Secure Collaborative Planning Forecasting and Replenishment.pdf b/docs/Secure_Collaborative_Planning_Forecasting_and_Replenishment.pdf
index 0a9646f..0a9646f 100644
--- a/docs/Secure Collaborative Planning Forecasting and Replenishment.pdf
+++ b/docs/Secure_Collaborative_Planning_Forecasting_and_Replenishment.pdf
Binary files differ
diff --git a/docs/TISSEC - PEREA.pdf b/docs/TISSEC_-_PEREA.pdf
index b77bde1..b77bde1 100644
--- a/docs/TISSEC - PEREA.pdf
+++ b/docs/TISSEC_-_PEREA.pdf
Binary files differ
diff --git a/docs/Tech Report - A Survey of Solutions to the Sybil Attack.pdf b/docs/Tech_Report_-_A_Survey_of_Solutions_to_the_Sybil_Attack.pdf
index cda149e..cda149e 100644
--- a/docs/Tech Report - A Survey of Solutions to the Sybil Attack.pdf
+++ b/docs/Tech_Report_-_A_Survey_of_Solutions_to_the_Sybil_Attack.pdf
Binary files differ
diff --git a/docs/Tech Report - Analyzing peer behavior in KAD.pdf b/docs/Tech_Report_-_Analyzing_peer_behavior_in_KAD.pdf
index 2861d07..2861d07 100644
--- a/docs/Tech Report - Analyzing peer behavior in KAD.pdf
+++ b/docs/Tech_Report_-_Analyzing_peer_behavior_in_KAD.pdf
Binary files differ
diff --git a/docs/Tech Report - Privacy guarantees through DCS.pdf b/docs/Tech_Report_-_Privacy_guarantees_through_DCS.pdf
index 29632a9..29632a9 100644
--- a/docs/Tech Report - Privacy guarantees through DCS.pdf
+++ b/docs/Tech_Report_-_Privacy_guarantees_through_DCS.pdf
Binary files differ
diff --git a/docs/Tech report - DCOP as a formal model of PARC.pdf b/docs/Tech_report_-_DCOP_as_a_formal_model_of_PARC.pdf
index b28e14d..b28e14d 100644
--- a/docs/Tech report - DCOP as a formal model of PARC.pdf
+++ b/docs/Tech_report_-_DCOP_as_a_formal_model_of_PARC.pdf
Binary files differ
diff --git a/docs/Telex: Anticensorship in the Network Infrastructure.pdf b/docs/Telex:_Anticensorship_in_the_Network_Infrastructure.pdf
index 0b1a27c..0b1a27c 100644
--- a/docs/Telex: Anticensorship in the Network Infrastructure.pdf
+++ b/docs/Telex:_Anticensorship_in_the_Network_Infrastructure.pdf
Binary files differ
diff --git a/docs/Thesis - Autonomic distributed systems.pdf b/docs/Thesis_-_Autonomic_distributed_systems.pdf
index 8a2e3fb..8a2e3fb 100644
--- a/docs/Thesis - Autonomic distributed systems.pdf
+++ b/docs/Thesis_-_Autonomic_distributed_systems.pdf
Binary files differ
diff --git a/docs/Thesis - F.Schadd.pdf b/docs/Thesis_-_F.Schadd.pdf
index 0c9f748..0c9f748 100644
--- a/docs/Thesis - F.Schadd.pdf
+++ b/docs/Thesis_-_F.Schadd.pdf
Binary files differ
diff --git a/docs/Thesis - P.Harvey.pdf b/docs/Thesis_-_P.Harvey.pdf
index 0141690..0141690 100644
--- a/docs/Thesis - P.Harvey.pdf
+++ b/docs/Thesis_-_P.Harvey.pdf
Binary files differ
diff --git a/docs/Trivers - The evolution of reciprocal altruism.pdf b/docs/Trivers_-_The_evolution_of_reciprocal_altruism.pdf
index 685da29..685da29 100644
--- a/docs/Trivers - The evolution of reciprocal altruism.pdf
+++ b/docs/Trivers_-_The_evolution_of_reciprocal_altruism.pdf
Binary files differ
diff --git a/docs/USENIX - PIR-Tor.pdf b/docs/USENIX_-_PIR-Tor.pdf
index b705343..b705343 100644
--- a/docs/USENIX - PIR-Tor.pdf
+++ b/docs/USENIX_-_PIR-Tor.pdf
Binary files differ
diff --git a/docs/USENIX Security'10 - SEPIA.pdf b/docs/USENIX_Security'10_-_SEPIA.pdf
index 7942f11..7942f11 100644
--- a/docs/USENIX Security'10 - SEPIA.pdf
+++ b/docs/USENIX_Security'10_-_SEPIA.pdf
Binary files differ
diff --git a/docs/User-Perceived Performance of the NICE Application Layer Multicast Protocol in Large and Highly Dynamic Groups_1.pdf b/docs/User-Perceived_Performance_of_the_NICE_Application_Layer_Multicast_Protocol_in_Large_and_Highly_Dynamic_Groups_1.pdf
index b6e24c3..b6e24c3 100644
--- a/docs/User-Perceived Performance of the NICE Application Layer Multicast Protocol in Large and Highly Dynamic Groups_1.pdf
+++ b/docs/User-Perceived_Performance_of_the_NICE_Application_Layer_Multicast_Protocol_in_Large_and_Highly_Dynamic_Groups_1.pdf
Binary files differ
diff --git a/docs/WEIS'05 - Moore - Counterin hidden-action attacks.pdf b/docs/WEIS'05_-_Moore_-_Counterin_hidden-action_attacks.pdf
index 8659c56..8659c56 100644
--- a/docs/WEIS'05 - Moore - Counterin hidden-action attacks.pdf
+++ b/docs/WEIS'05_-_Moore_-_Counterin_hidden-action_attacks.pdf
Binary files differ
diff --git a/docs/WIAPP'03 - Deconstructing the Kazaa network.pdf b/docs/WIAPP'03_-_Deconstructing_the_Kazaa_network.pdf
index dbc7d66..dbc7d66 100644
--- a/docs/WIAPP'03 - Deconstructing the Kazaa network.pdf
+++ b/docs/WIAPP'03_-_Deconstructing_the_Kazaa_network.pdf
Binary files differ
diff --git a/docs/WPES'04 - Forecasting and benchamking.pdf b/docs/WPES'04_-_Forecasting_and_benchamking.pdf
index fc1c84a..fc1c84a 100644
--- a/docs/WPES'04 - Forecasting and benchamking.pdf
+++ b/docs/WPES'04_-_Forecasting_and_benchamking.pdf
Binary files differ
diff --git a/docs/WPES'11 - FAUST.pdf b/docs/WPES'11_-_FAUST.pdf
index e97228f..e97228f 100644
--- a/docs/WPES'11 - FAUST.pdf
+++ b/docs/WPES'11_-_FAUST.pdf
Binary files differ
diff --git a/docs/WPES'11 - Fingerprinting.pdf b/docs/WPES'11_-_Fingerprinting.pdf
index 8544e27..8544e27 100644
--- a/docs/WPES'11 - Fingerprinting.pdf
+++ b/docs/WPES'11_-_Fingerprinting.pdf
Binary files differ
diff --git a/docs/WPES'11 - bridgeSPA.pdf b/docs/WPES'11_-_bridgeSPA.pdf
index 7466064..7466064 100644
--- a/docs/WPES'11 - bridgeSPA.pdf
+++ b/docs/WPES'11_-_bridgeSPA.pdf
Binary files differ
diff --git a/docs/WWW'03 - The EigenTrust algorithm.pdf b/docs/WWW'03_-_The_EigenTrust_algorithm.pdf
index 0dc23a3..0dc23a3 100644
--- a/docs/WWW'03 - The EigenTrust algorithm.pdf
+++ b/docs/WWW'03_-_The_EigenTrust_algorithm.pdf
Binary files differ
diff --git a/docs/WiOpt'03 - Buchegger & Le Boudec - Reputation Systems.pdf b/docs/WiOpt'03_-_Buchegger_&_Le_Boudec_-_Reputation_Systems.pdf
index 79e1925..79e1925 100644
--- a/docs/WiOpt'03 - Buchegger & Le Boudec - Reputation Systems.pdf
+++ b/docs/WiOpt'03_-_Buchegger_&_Le_Boudec_-_Reputation_Systems.pdf
Binary files differ
diff --git a/docs/Workshop on Economics of P2P Systems'03 - Chun, Fu & Vahdat.pdf b/docs/Workshop_on_Economics_of_P2P_Systems'03_-_Chun,_Fu_&_Vahdat.pdf
index af5fa0e..af5fa0e 100644
--- a/docs/Workshop on Economics of P2P Systems'03 - Chun, Fu & Vahdat.pdf
+++ b/docs/Workshop_on_Economics_of_P2P_Systems'03_-_Chun,_Fu_&_Vahdat.pdf
Binary files differ
diff --git a/docs/eScholarship UC item 4x6723n2.pdf b/docs/eScholarship_UC_item_4x6723n2.pdf
index 30efc6a..30efc6a 100644
--- a/docs/eScholarship UC item 4x6723n2.pdf
+++ b/docs/eScholarship_UC_item_4x6723n2.pdf
Binary files differ
diff --git a/docs/hill climbing.pdf b/docs/hill_climbing.pdf
index f700791..f700791 100644
--- a/docs/hill climbing.pdf
+++ b/docs/hill_climbing.pdf
Binary files differ