| R | docs/10.1.1.27.1639 (2).pdf -> docs/10.1.1.27.1639_(2).pdf | | | 0 | |
| R | docs/10.1.1.4.7003 (1).pdf -> docs/10.1.1.4.7003_(1).pdf | | | 0 | |
| R | docs/2004-ISLPED-Energy-aware demand paging on NAND flash-based embedded storages.pdf -> docs/2004-ISLPED-Energy-aware_demand_paging_on_NAND_flash-based_embedded_storages.pdf | | | 0 | |
| R | docs/A02370_DF_CFP_SpringerOpen SI CFP EURASIP JWCN_Global_A42.pdf -> docs/A02370_DF_CFP_SpringerOpen_SI_CFP_EURASIP_JWCN_Global_A42.pdf | | | 0 | |
| R | docs/AAAI'08 - Local search for DCOP.pdf -> docs/AAAI'08_-_Local_search_for_DCOP.pdf | | | 0 | |
| R | docs/AAAI'96 - Mixed constraint satisfaction.pdf -> docs/AAAI'96_-_Mixed_constraint_satisfaction.pdf | | | 0 | |
| R | docs/AAMAS'05 - Accelerating the DCOP algorithm ADOPT.pdf -> docs/AAMAS'05_-_Accelerating_the_DCOP_algorithm_ADOPT.pdf | | | 0 | |
| R | docs/AAMAS08 - DCOP algorithms in a real world problem.pdf -> docs/AAMAS08_-_DCOP_algorithms_in_a_real_world_problem.pdf | | | 0 | |
| R | docs/ACM Computing Surveys - A survey of p2p content distribution technologies.pdf -> docs/ACM_Computing_Surveys_-_A_survey_of_p2p_content_distribution_technologies.pdf | | | 0 | |
| R | docs/ACM SIGCOMM'05 - Cheng & Friedman - Sybilproof reputation mechanisms.pdf -> docs/ACM_SIGCOMM'05_-_Cheng_&_Friedman_-_Sybilproof_reputation_mechanisms.pdf | | | 0 | |
| R | docs/ACNS'05 - Garcia & Hoepman - Off-line Karma.pdf -> docs/ACNS'05_-_Garcia_&_Hoepman_-_Off-line_Karma.pdf | | | 0 | |
| R | docs/ACSAC'02 - A secure directory service based on exclusive encryption.pdf -> docs/ACSAC'02_-_A_secure_directory_service_based_on_exclusive_encryption.pdf | | | 0 | |
| R | docs/ACSAC'11 - BACKLIT.pdf -> docs/ACSAC'11_-_BACKLIT.pdf | | | 0 | |
| R | docs/ACSAC'11 - Tortoise.pdf -> docs/ACSAC'11_-_Tortoise.pdf | | | 0 | |
| R | docs/AIMS'09 - Sybil attacks protection schemes in KAD.pdf -> docs/AIMS'09_-_Sybil_attacks_protection_schemes_in_KAD.pdf | | | 0 | |
| R | docs/ARES'06 - Fair Trading of Information.pdf -> docs/ARES'06_-_Fair_Trading_of_Information.pdf | | | 0 | |
| R | docs/ASIACRYPT'07 - IBBE with constant size ciphertexts and private keys.pdf -> docs/ASIACRYPT'07_-_IBBE_with_constant_size_ciphertexts_and_private_keys.pdf | | | 0 | |
| R | docs/ATEC'04 - A network positioning system.pdf -> docs/ATEC'04_-_A_network_positioning_system.pdf | | | 0 | |
| R | docs/A Novel Testbed for P2P Networks.pdf -> docs/A_Novel_Testbed_for_P2P_Networks.pdf | | | 0 | |
| R | docs/Amann - Secure asynchronous change notifications.pdf -> docs/Amann_-_Secure_asynchronous_change_notifications.pdf | | | 0 | |
| R | docs/Amnefelt & Svenningsson - Keso.pdf -> docs/Amnefelt_&_Svenningsson_-_Keso.pdf | | | 0 | |
| R | docs/Applied Intelligence - Combinatorial Auctions.pdf -> docs/Applied_Intelligence_-_Combinatorial_Auctions.pdf | | | 0 | |
| R | docs/Bogetoft et al. - Secure multiparty computation goes live.pdf -> docs/Bogetoft_et_al._-_Secure_multiparty_computation_goes_live.pdf | | | 0 | |
| R | docs/Browne et al - A survey of MCTS methods.pdf -> docs/Browne_et_al_-_A_survey_of_MCTS_methods.pdf | | | 0 | |
| R | docs/Brumley & Tuveri - Timing Attacks.pdf -> docs/Brumley_&_Tuveri_-_Timing_Attacks.pdf | | | 0 | |
| R | docs/CCS'03 - Yang & Garcia-Molina - PPay.pdf -> docs/CCS'03_-_Yang_&_Garcia-Molina_-_PPay.pdf | | | 0 | |
| R | docs/CCS'06 - Attributed-based encryption for fine-grained access control of encrypted data.pdf -> docs/CCS'06_-_Attributed-based_encryption_for_fine-grained_access_control_of_encrypted_data.pdf | | | 0 | |
| R | docs/CCS'07 - ABE with non-monotonic access structures.pdf -> docs/CCS'07_-_ABE_with_non-monotonic_access_structures.pdf | | | 0 | |
| R | docs/CCS'08 - FairplayMP.pdf -> docs/CCS'08_-_FairplayMP.pdf | | | 0 | |
| R | docs/CCS'08 - Identity-based encryption with efficient revocation.pdf -> docs/CCS'08_-_Identity-based_encryption_with_efficient_revocation.pdf | | | 0 | |
| R | docs/CCS'11 - Cirripede.pdf -> docs/CCS'11_-_Cirripede.pdf | | | 0 | |
| R | docs/CCS'11 - Throughput-fingerprinting.pdf -> docs/CCS'11_-_Throughput-fingerprinting.pdf | | | 0 | |
| R | docs/CCS'11 - Trust-based Anonymous Communication1.pdf -> docs/CCS'11_-_Trust-based_Anonymous_Communication1.pdf | | | 0 | |
| R | docs/CG'06 - Selectivity and backup operators in MCTS.pdf -> docs/CG'06_-_Selectivity_and_backup_operators_in_MCTS.pdf | | | 0 | |
| R | docs/CIA'04 - Despotovic & Aberer - Peers' performance in P2P networks.pdf -> docs/CIA'04_-_Despotovic_&_Aberer_-_Peers'_performance_in_P2P_networks.pdf | | | 0 | |
| R | docs/CRYPTO'02 - The LSD broadcast encryption scheme.pdf -> docs/CRYPTO'02_-_The_LSD_broadcast_encryption_scheme.pdf | | | 0 | |
| R | docs/CRYPTO'84 - El Gamal - Public Key Cryptosystem.pdf -> docs/CRYPTO'84_-_El_Gamal_-_Public_Key_Cryptosystem.pdf | | | 0 | |
| R | docs/CSET'11 - ExperimenTor.pdf -> docs/CSET'11_-_ExperimenTor.pdf | | | 0 | |
| R | docs/CaberNet Radicals Workshop - Puzzles in P2P Systems.pdf -> docs/CaberNet_Radicals_Workshop_-_Puzzles_in_P2P_Systems.pdf | | | 0 | |
| R | docs/ChinaCom'06 - Combating hidden action in unstructured p2p systems.pdf -> docs/ChinaCom'06_-_Combating_hidden_action_in_unstructured_p2p_systems.pdf | | | 0 | |
| R | docs/CoRR - Critical look at decentralization.pdf -> docs/CoRR_-_Critical_look_at_decentralization.pdf | | | 0 | |
| R | docs/CoRR - X-Vine.pdf -> docs/CoRR_-_X-Vine.pdf | | | 0 | |
| R | docs/Combining Virtual and Physical Structures for Self-organized Routing_0.pdf -> docs/Combining_Virtual_and_Physical_Structures_for_Self-organized_Routing_0.pdf | | | 0 | |
| R | docs/Communications of the ACM - Reputation Systems.pdf -> docs/Communications_of_the_ACM_-_Reputation_Systems.pdf | | | 0 | |
| R | docs/Compcon '97 - Privacy-enhancing Technologies for the Internet.pdf -> docs/Compcon_'97_-_Privacy-enhancing_Technologies_for_the_Internet.pdf | | | 0 | |
| R | docs/Computer Networks - Wang, Chiu & Lui - Overlay network traffic on ISP peering.pdf -> docs/Computer_Networks_-_Wang,_Chiu_&_Lui_-_Overlay_network_traffic_on_ISP_peering.pdf | | | 0 | |
| R | docs/Concurrency and Computation - TRIBLER.pdf -> docs/Concurrency_and_Computation_-_TRIBLER.pdf | | | 0 | |
| R | docs/DIALM'02 - Feigenbaum & Shenker - Distributed algorithmic mechanism design.pdf -> docs/DIALM'02_-_Feigenbaum_&_Shenker_-_Distributed_algorithmic_mechanism_design.pdf | | | 0 | |
| R | docs/DP5: A Private Presence Service.pdf -> docs/DP5:_A_Private_Presence_Service.pdf | | | 0 | |
| R | docs/Dellarocas - Reputation Mechanisms.pdf -> docs/Dellarocas_-_Reputation_Mechanisms.pdf | | | 0 | |
| R | docs/Dependent Link Padding Algorithms for.pdf -> docs/Dependent_Link_Padding_Algorithms_for.pdf | | | 0 | |
| R | docs/Duminuco & Biersack - Hierarchical Codes.pdf -> docs/Duminuco_&_Biersack_-_Hierarchical_Codes.pdf | | | 0 | |
| R | docs/EC'04 - Robust incentive techniques for P2P networks.pdf -> docs/EC'04_-_Robust_incentive_techniques_for_P2P_networks.pdf | | | 0 | |
| R | docs/EC'05 - Hidden-action in multi-hop routing.pdf -> docs/EC'05_-_Hidden-action_in_multi-hop_routing.pdf | | | 0 | |
| R | docs/EC'06 - Incentive-compatible interdomain routing.pdf -> docs/EC'06_-_Incentive-compatible_interdomain_routing.pdf | | | 0 | |
| R | docs/EC'08 - Why share in peer-to-peer networks.pdf -> docs/EC'08_-_Why_share_in_peer-to-peer_networks.pdf | | | 0 | |
| R | docs/EC'09 - Sybilproof transitive trust protocols.pdf -> docs/EC'09_-_Sybilproof_transitive_trust_protocols.pdf | | | 0 | |
| R | docs/EUROCRYPT'05 - Fuzzy Identity-Based Encryption.pdf -> docs/EUROCRYPT'05_-_Fuzzy_Identity-Based_Encryption.pdf | | | 0 | |
| R | docs/EUROCRYPT'89 - Waidner&Pfitzmann - The dining cryptographers in the disco .pdf -> docs/EUROCRYPT'89_-_Waidner&Pfitzmann_-_The_dining_cryptographers_in_the_disco_.pdf | | | 0 | |
| R | docs/EUROCRYPT'92 - Chaun & Pedersen - Transferred cash grows in size.PDF -> docs/EUROCRYPT'92_-_Chaun_&_Pedersen_-_Transferred_cash_grows_in_size.PDF | | | 0 | |
| R | docs/Erdős & Rényi - On Random Graphs.pdf -> docs/Erdős_&_Rényi_-_On_Random_Graphs.pdf | | | 0 | |
| R | docs/Euro-Par'05 - Pastis.pdf -> docs/Euro-Par'05_-_Pastis.pdf | | | 0 | |
| R | docs/FAST'09 - Open-source erasure coding libraries for storage.pdf -> docs/FAST'09_-_Open-source_erasure_coding_libraries_for_storage.pdf | | | 0 | |
| R | docs/FC'11 - BNymble.pdf -> docs/FC'11_-_BNymble.pdf | | | 0 | |
| R | docs/FC'11 - Malice versus AN.ON_.pdf -> docs/FC'11_-_Malice_versus_AN.ON_.pdf | | | 0 | |
| R | docs/FC'11 - Proximax.pdf -> docs/FC'11_-_Proximax.pdf | | | 0 | |
| R | docs/FC'12 - Congestion-aware Path Selection for Tor.pdf -> docs/FC'12_-_Congestion-aware_Path_Selection_for_Tor.pdf | | | 0 | |
| R | docs/FGCS - P2P Contracts: a Framework for Resource and Service Exchange.pdf -> docs/FGCS_-_P2P_Contracts:_a_Framework_for_Resource_and_Service_Exchange.pdf | | | 0 | |
| R | docs/FOCI'11 - Decoy Routing: Toward Unblockable Internet Communication.pdf -> docs/FOCI'11_-_Decoy_Routing:_Toward_Unblockable_Internet_Communication.pdf | | | 0 | |
| R | docs/FREENIX'01 - A transparent cryptographic file system for UNIX.pdf -> docs/FREENIX'01_-_A_transparent_cryptographic_file_system_for_UNIX.pdf | | | 0 | |
| R | docs/Feldman, Lai, Chuang & Stoica - Quantifying disincentives in peer-to-peer networks.pdf -> docs/Feldman,_Lai,_Chuang_&_Stoica_-_Quantifying_disincentives_in_peer-to-peer_networks.pdf | | | 0 | |
| R | docs/Finite-length analysis of low-density parity-check codes on.pdf -> docs/Finite-length_analysis_of_low-density_parity-check_codes_on.pdf | | | 0 | |
| R | docs/Formalizing Anonymous Blacklisting Systems.pdf -> docs/Formalizing_Anonymous_Blacklisting_Systems.pdf | | | 0 | |
| R | docs/GECON'04 - Designing incentive mechanisms for p2p systems.pdf -> docs/GECON'04_-_Designing_incentive_mechanisms_for_p2p_systems.pdf | | | 0 | |
| R | docs/Ghodsi - Distributed k-ary System.pdf -> docs/Ghodsi_-_Distributed_k-ary_System.pdf | | | 0 | |
| R | docs/Grid Computing - Estimating The Size Of Peer-To-Peer Networks.pdf -> docs/Grid_Computing_-_Estimating_The_Size_Of_Peer-To-Peer_Networks.pdf | | | 0 | |
| R | docs/Group Decision and Negociation - Automated Negociation.pdf -> docs/Group_Decision_and_Negociation_-_Automated_Negociation.pdf | | | 0 | |
| R | docs/HICSS'02 - A computational model of trust and reputation.pdf -> docs/HICSS'02_-_A_computational_model_of_trust_and_reputation.pdf | | | 0 | |
| R | docs/HOT-P2P'05 - Khorshadi, Liu & Ghosal.pdf -> docs/HOT-P2P'05_-_Khorshadi,_Liu_&_Ghosal.pdf | | | 0 | |
| R | docs/HPDC'06 - Peer to peer size estimation in large and dynamic networks.pdf -> docs/HPDC'06_-_Peer_to_peer_size_estimation_in_large_and_dynamic_networks.pdf | | | 0 | |
| R | docs/HotOS IX - High available, scalable storage, dynamic peer networks.pdf -> docs/HotOS_IX_-_High_available,_scalable_storage,_dynamic_peer_networks.pdf | | | 0 | |
| R | docs/HotP2P'10 - KAD DHT attack mitigation.pdf -> docs/HotP2P'10_-_KAD_DHT_attack_mitigation.pdf | | | 0 | |
| R | docs/ICC'08 - Super-Seeding in BitTorrent.PDF -> docs/ICC'08_-_Super-Seeding_in_BitTorrent.PDF | | | 0 | |
| R | docs/ICDCN'10 - Poisoning the Kad Network.pdf -> docs/ICDCN'10_-_Poisoning_the_Kad_Network.pdf | | | 0 | |
| R | docs/ICDCS'02 - Reclaiming space for duplicate files.pdf -> docs/ICDCS'02_-_Reclaiming_space_for_duplicate_files.pdf | | | 0 | |
| R | docs/ICDCS'06 - Improving traffic locality in BitTorrent.pdf -> docs/ICDCS'06_-_Improving_traffic_locality_in_BitTorrent.pdf | | | 0 | |
| R | docs/ICDCS'09 - Regenerating codes for p2p backup systems.pdf -> docs/ICDCS'09_-_Regenerating_codes_for_p2p_backup_systems.pdf | | | 0 | |
| R | docs/ICN'07 - PlanetLab.pdf -> docs/ICN'07_-_PlanetLab.pdf | | | 0 | |
| R | docs/ICNP'03 - Resilient peer-to-peer streaming.pdf -> docs/ICNP'03_-_Resilient_peer-to-peer_streaming.pdf | | | 0 | |
| R | docs/IEEE CST - A Survey and Comparison of Peer-to-Peer Overlay.pdf -> docs/IEEE_CST_-_A_Survey_and_Comparison_of_Peer-to-Peer_Overlay.pdf | | | 0 | |
| R | docs/IEEE Communications Magazine - Video Streaming in P2P Systems.pdf -> docs/IEEE_Communications_Magazine_-_Video_Streaming_in_P2P_Systems.pdf | | | 0 | |
| R | docs/IEEE Computer Society - 2Fast.pdf -> docs/IEEE_Computer_Society_-_2Fast.pdf | | | 0 | |
| R | docs/IEEE DSO - Free riding on Gnutella revisited.pdf -> docs/IEEE_DSO_-_Free_riding_on_Gnutella_revisited.pdf | | | 0 | |
| R | docs/IEEE Journal (25) - Hidden-action in network routing.pdf -> docs/IEEE_Journal_(25)_-_Hidden-action_in_network_routing.pdf | | | 0 | |
| R | docs/IEEE Trans. on Info. - New directions in cryptography.pdf -> docs/IEEE_Trans._on_Info._-_New_directions_in_cryptography.pdf | | | 0 | |
| R | docs/IEEE Transactions on Systems - Descentralized learning.pdf -> docs/IEEE_Transactions_on_Systems_-_Descentralized_learning.pdf | | | 0 | |
| R | docs/IEEE⁄ACM Banner & Orda.pdf -> docs/IEEE⁄ACM_Banner_&_Orda.pdf | | | 0 | |
| R | docs/IEEE⁄ACM Trans. Netw.'02 (10)- Internet pricing.pdf -> docs/IEEE⁄ACM_Trans._Netw.'02_(10)-_Internet_pricing.pdf | | | 0 | |
| R | docs/IEEE⁄ACM Transactions on Networking - Detecting shared congestion of flows.pdf -> docs/IEEE⁄ACM_Transactions_on_Networking_-_Detecting_shared_congestion_of_flows.pdf | | | 0 | |
| R | docs/IJCAI'07 - PC-DPOP.pdf -> docs/IJCAI'07_-_PC-DPOP.pdf | | | 0 | |
| R | docs/IJCCR vol 10 (2006) 1 Ardron and Lietaer.pdf -> docs/IJCCR_vol_10_(2006)_1_Ardron_and_Lietaer.pdf | | | 0 | |
| R | docs/IMC'04 - Availability, Usage, and Deployment Characteristics of the DNS.pdf -> docs/IMC'04_-_Availability,_Usage,_and_Deployment_Characteristics_of_the_DNS.pdf | | | 0 | |
| R | docs/IMC'05 - Measurement, analysis and modeling of BitTorrent-like systems.pdf -> docs/IMC'05_-_Measurement,_analysis_and_modeling_of_BitTorrent-like_systems.pdf | | | 0 | |
| R | docs/IMC'06 - Understanding churn in p2p networks.pdf -> docs/IMC'06_-_Understanding_churn_in_p2p_networks.pdf | | | 0 | |
| R | docs/IMC'07 - A global view of KAD.pdf -> docs/IMC'07_-_A_global_view_of_KAD.pdf | | | 0 | |
| R | docs/IMC'08 - Detecting BitTorrent Blocking.pdf -> docs/IMC'08_-_Detecting_BitTorrent_Blocking.pdf | | | 0 | |
| R | docs/INFOCOM'02 - Probabilistic location and routing.pdf -> docs/INFOCOM'02_-_Probabilistic_location_and_routing.pdf | | | 0 | |
| R | docs/INFOCOM'05 - Designing incentives for peer-to-peer routing.pdf -> docs/INFOCOM'05_-_Designing_incentives_for_peer-to-peer_routing.pdf | | | 0 | |
| R | docs/INFOCOM'05 - Exploiting anarchy in networks.pdf -> docs/INFOCOM'05_-_Exploiting_anarchy_in_networks.pdf | | | 0 | |
| R | docs/INFOCOM'05 - Market-driven bandwidth allocation.pdf -> docs/INFOCOM'05_-_Market-driven_bandwidth_allocation.pdf | | | 0 | |
| R | docs/INFOCOM'05 - Network coding for large scale content distribution.pdf -> docs/INFOCOM'05_-_Network_coding_for_large_scale_content_distribution.pdf | | | 0 | |
| R | docs/INFOCOM'06 - Pianese, Keller & Biersack - PULSE.pdf -> docs/INFOCOM'06_-_Pianese,_Keller_&_Biersack_-_PULSE.pdf | | | 0 | |
| R | docs/INFOCOM'07 - MARCH.pdf -> docs/INFOCOM'07_-_MARCH.pdf | | | 0 | |
| R | docs/INFOCOM'07 - Mesh or multiple-tree.pdf -> docs/INFOCOM'07_-_Mesh_or_multiple-tree.pdf | | | 0 | |
| R | docs/INFOCOM'07 - Network coding for distributed storage systems.pdf -> docs/INFOCOM'07_-_Network_coding_for_distributed_storage_systems.pdf | | | 0 | |
| R | docs/INFOCOM'07 - PRIME.pdf -> docs/INFOCOM'07_-_PRIME.pdf | | | 0 | |
| R | docs/INFOCOM'08 - Stable peers.PDF -> docs/INFOCOM'08_-_Stable_peers.PDF | | | 0 | |
| R | docs/INFOCOM'09 - Queusing models for p2p streaming systems.pdf -> docs/INFOCOM'09_-_Queusing_models_for_p2p_streaming_systems.pdf | | | 0 | |
| R | docs/INFOCOM'09 - Sybilproof Indirect Reprocity Mechanism for P2P Networks .pdf -> docs/INFOCOM'09_-_Sybilproof_Indirect_Reprocity_Mechanism_for_P2P_Networks_.pdf | | | 0 | |
| R | docs/INFOCOM'09 - Traffic Engineering vs. Content Distribution.PDF -> docs/INFOCOM'09_-_Traffic_Engineering_vs._Content_Distribution.PDF | | | 0 | |
| R | docs/INFOCOMM'09 - Mechanism design without payments.pdf -> docs/INFOCOMM'09_-_Mechanism_design_without_payments.pdf | | | 0 | |
| R | docs/IPTPS'01 - Complex queries in DHT-based p2p networks.pdf -> docs/IPTPS'01_-_Complex_queries_in_DHT-based_p2p_networks.pdf | | | 0 | |
| R | docs/IPTPS'01 - Erasure coding vs. replication.pdf -> docs/IPTPS'01_-_Erasure_coding_vs._replication.pdf | | | 0 | |
| R | docs/IPTPS'02 - Douceur - The Sybil Attack.pdf -> docs/IPTPS'02_-_Douceur_-_The_Sybil_Attack.pdf | | | 0 | |
| R | docs/IPTPS'03 - Rateless codes and big downloads.pdf -> docs/IPTPS'03_-_Rateless_codes_and_big_downloads.pdf | | | 0 | |
| R | docs/IPTPS'03 - Towards a common API.pdf -> docs/IPTPS'03_-_Towards_a_common_API.pdf | | | 0 | |
| R | docs/IPTPS'05 - High availability in DHTs: erasure coding vs. replication.pdf -> docs/IPTPS'05_-_High_availability_in_DHTs:_erasure_coding_vs._replication.pdf | | | 0 | |
| R | docs/IPTPS'05 - The BitTorrent: measurements and analysis.pdf -> docs/IPTPS'05_-_The_BitTorrent:_measurements_and_analysis.pdf | | | 0 | |
| R | docs/IPTPS'06 - On object maintenance in p2p systems.pdf -> docs/IPTPS'06_-_On_object_maintenance_in_p2p_systems.pdf | | | 0 | |
| R | docs/IPTPS'06 - Skype p2p VoIP System.pdf -> docs/IPTPS'06_-_Skype_p2p_VoIP_System.pdf | | | 0 | |
| R | docs/ITC-20'07 - Estimating churn in structured p2p networks.pdf -> docs/ITC-20'07_-_Estimating_churn_in_structured_p2p_networks.pdf | | | 0 | |
| R | docs/IWSOS'08 - Network Size Estimation for Structured Overlays.pdf -> docs/IWSOS'08_-_Network_Size_Estimation_for_Structured_Overlays.pdf | | | 0 | |
| R | docs/Informatik Spektrum - Peer-to-peer networking & -computing.pdf -> docs/Informatik_Spektrum_-_Peer-to-peer_networking_&_-computing.pdf | | | 0 | |
| R | docs/JPE (1993) - Gode & Sunder - Allocative Efficiency.pdf -> docs/JPE_(1993)_-_Gode_&_Sunder_-_Allocative_Efficiency.pdf | | | 0 | |
| R | docs/Jelasity, Montresor & Babaoglu - Gossip-based aggregation.pdf -> docs/Jelasity,_Montresor_&_Babaoglu_-_Gossip-based_aggregation.pdf | | | 0 | |
| R | docs/Jiang, Bai & Wang - Trust and Cooperation in Peer-to-Peer Systems.pdf -> docs/Jiang,_Bai_&_Wang_-_Trust_and_Cooperation_in_Peer-to-Peer_Systems.pdf | | | 0 | |
| R | docs/Journal of AI - BnB-ADOPT.pdf -> docs/Journal_of_AI_-_BnB-ADOPT.pdf | | | 0 | |
| R | docs/Journal of Parallel & Distributed Computing - Deleting files in the Celeste p2p storage systems.pdf -> docs/Journal_of_Parallel_&_Distributed_Computing_-_Deleting_files_in_the_Celeste_p2p_storage_systems.pdf | | | 0 | |
| R | docs/Journal of Public Economics - Bolton, Katok & Ockenfels.pdf -> docs/Journal_of_Public_Economics_-_Bolton,_Katok_&_Ockenfels.pdf | | | 0 | |
| R | docs/Journal of Supercomputing - Insight into redundancy schemes in DHTs.pdf -> docs/Journal_of_Supercomputing_-_Insight_into_redundancy_schemes_in_DHTs.pdf | | | 0 | |
| R | docs/Kernighan & Lin - An Efficient Heuristic Procedure for Partitioning Graphs%0A.pdf -> docs/Kernighan_&_Lin_-_An_Efficient_Heuristic_Procedure_for_Partitioning_Graphs%0A.pdf | | | 0 | |
| R | docs/Kising - Proximity Neighbor Selection for IGOR.pdf -> docs/Kising_-_Proximity_Neighbor_Selection_for_IGOR.pdf | | | 0 | |
| R | docs/LAP: Lightweight Anonymity and Privacy.pdf -> docs/LAP:_Lightweight_Anonymity_and_Privacy.pdf | | | 0 | |
| R | docs/LASTor: A Low-Latency AS-Aware Tor Client.pdf -> docs/LASTor:_A_Low-Latency_AS-Aware_Tor_Client.pdf | | | 0 | |
| R | docs/LNCS - Distributed Hash Tables.pdf -> docs/LNCS_-_Distributed_Hash_Tables.pdf | | | 0 | |
| R | docs/Laffont & Martimort - The Theory of Incentives.pdf -> docs/Laffont_&_Martimort_-_The_Theory_of_Incentives.pdf | | | 0 | |
| R | docs/Lecture Notes in Computer Science - Selected DHT Algorithms .pdf -> docs/Lecture_Notes_in_Computer_Science_-_Selected_DHT_Algorithms_.pdf | | | 0 | |
| R | docs/Long Term Study of Peer Behavior in the kad DHT.pdf -> docs/Long_Term_Study_of_Peer_Behavior_in_the_kad_DHT.pdf | | | 0 | |
| R | docs/MDS'07 - Conner & Nahrstedt - Securing peer-to-peer media streaming systems.pdf -> docs/MDS'07_-_Conner_&_Nahrstedt_-_Securing_peer-to-peer_media_streaming_systems.pdf | | | 0 | |
| R | docs/Marx - Parameterized graph separation problems.pdf -> docs/Marx_-_Parameterized_graph_separation_problems.pdf | | | 0 | |
| R | docs/Menezes & Monteiro - An Introduction to Auction Theory.pdf -> docs/Menezes_&_Monteiro_-_An_Introduction_to_Auction_Theory.pdf | | | 0 | |
| R | docs/Mies - SpoVNet.pdf -> docs/Mies_-_SpoVNet.pdf | | | 0 | |
| R | docs/NCA'05 - Decentralized Schemes for Size Estimation in Large and Dynamic Groups.pdf -> docs/NCA'05_-_Decentralized_Schemes_for_Size_Estimation_in_Large_and_Dynamic_Groups.pdf | | | 0 | |
| R | docs/NDSS'11 - Security API for Distributed Social Networks.pdf -> docs/NDSS'11_-_Security_API_for_Distributed_Social_Networks.pdf | | | 0 | |
| R | docs/NGC'03 - Scalable Application-level Anycast .pdf -> docs/NGC'03_-_Scalable_Application-level_Anycast_.pdf | | | 0 | |
| R | docs/NMNC - Progressive strategies for MCTS.pdf -> docs/NMNC_-_Progressive_strategies_for_MCTS.pdf | | | 0 | |
| R | docs/NSDI'04 - Designing a DHT for low latency and high throughput.pdf -> docs/NSDI'04_-_Designing_a_DHT_for_low_latency_and_high_throughput.pdf | | | 0 | |
| R | docs/NSDI'07 - Do incentives build robustness in BitTorrent.pdf -> docs/NSDI'07_-_Do_incentives_build_robustness_in_BitTorrent.pdf | | | 0 | |
| R | docs/NetCod'05 - Random linear coding based distributed networked storage.pdf -> docs/NetCod'05_-_Random_linear_coding_based_distributed_networked_storage.pdf | | | 0 | |
| R | docs/NetEcon'03 - Cohen - Incentives build robustness in BitTorrent.pdf -> docs/NetEcon'03_-_Cohen_-_Incentives_build_robustness_in_BitTorrent.pdf | | | 0 | |
| R | docs/NetEcon'06 - Harvelaar.pdf -> docs/NetEcon'06_-_Harvelaar.pdf | | | 0 | |
| R | docs/NetEcon'06 - Improving robustness of p2p streaming.pdf -> docs/NetEcon'06_-_Improving_robustness_of_p2p_streaming.pdf | | | 0 | |
| R | docs/NetEcon'08 - Yang - Auction, but don't block.pdf -> docs/NetEcon'08_-_Yang_-_Auction,_but_don't_block.pdf | | | 0 | |
| R | docs/Neumann & Morgenstern - Theory of Games and Economic Behavior.pdf -> docs/Neumann_&_Morgenstern_-_Theory_of_Games_and_Economic_Behavior.pdf | | | 0 | |
| R | docs/OSDI'00 - Fast and Secure Distributed Read-Only File System.pdf -> docs/OSDI'00_-_Fast_and_Secure_Distributed_Read-Only_File_System.pdf | | | 0 | |
| R | docs/OSDI'00 - Overcast.pdf -> docs/OSDI'00_-_Overcast.pdf | | | 0 | |
| R | docs/Oper. Res. - Optimal Resource Allocation.pdf -> docs/Oper._Res._-_Optimal_Resource_Allocation.pdf | | | 0 | |
| R | docs/P2P'03 - Buragohain, Agrawal & Suri - Incentives in P2P systems.pdf -> docs/P2P'03_-_Buragohain,_Agrawal_&_Suri_-_Incentives_in_P2P_systems.pdf | | | 0 | |
| R | docs/P2P'03 - Identity crisis: anonymity vs reputation.pdf -> docs/P2P'03_-_Identity_crisis:_anonymity_vs_reputation.pdf | | | 0 | |
| R | docs/P2P'04 - Reputation management framework.pdf -> docs/P2P'04_-_Reputation_management_framework.pdf | | | 0 | |
| R | docs/P2P'09 - PeerSim.pdf -> docs/P2P'09_-_PeerSim.pdf | | | 0 | |
| R | docs/P2PECON'05 - Incentives in BitTorrent induce free riding.pdf -> docs/P2PECON'05_-_Incentives_in_BitTorrent_induce_free_riding.pdf | | | 0 | |
| R | docs/P2PECON'05 - KARMA.pdf -> docs/P2PECON'05_-_KARMA.pdf | | | 0 | |
| R | docs/P2PECON'05 - Self-recharging virtual currency.pdf -> docs/P2PECON'05_-_Self-recharging_virtual_currency.pdf | | | 0 | |
| R | docs/P2PEcon'04 - SWIFT.pdf -> docs/P2PEcon'04_-_SWIFT.pdf | | | 0 | |
| R | docs/P2PEcon'05 - A new mechanism for the free-rider problem.pdf -> docs/P2PEcon'05_-_A_new_mechanism_for_the_free-rider_problem.pdf | | | 0 | |
| R | docs/PAM'04 - Dissecting bittorrent.pdf -> docs/PAM'04_-_Dissecting_bittorrent.pdf | | | 0 | |
| R | docs/PASSAT'11 - Multiparty linear programming.pdf -> docs/PASSAT'11_-_Multiparty_linear_programming.pdf | | | 0 | |
| R | docs/PETS'11 - An Accurate System-Wide Anonymity Metric for Probabilistic Attacks.pdf -> docs/PETS'11_-_An_Accurate_System-Wide_Anonymity_Metric_for_Probabilistic_Attacks.pdf | | | 0 | |
| R | docs/PETS'11 - DefenestraTor.pdf -> docs/PETS'11_-_DefenestraTor.pdf | | | 0 | |
| R | docs/PINS'04 - Free-riding and whitewashing in P2P systems.pdf -> docs/PINS'04_-__Free-riding_and_whitewashing_in_P2P_systems.pdf | | | 0 | |
| R | docs/PNAS (2003) - The evolution of altruistic punishment.pdf -> docs/PNAS_(2003)_-_The_evolution_of_altruistic_punishment.pdf | | | 0 | |
| R | docs/PNAS - Nash - Equilibrium points in n-person games.pdf -> docs/PNAS_-_Nash_-_Equilibrium_points_in_n-person_games.pdf | | | 0 | |
| R | docs/PODC'02 - Building secure file systems out of Byzantine storage.pdf -> docs/PODC'02_-_Building_secure_file_systems_out_of_Byzantine_storage.pdf | | | 0 | |
| R | docs/PODC'06 - Peer counting and sampling in overlay networks.pdf -> docs/PODC'06_-_Peer_counting_and_sampling_in_overlay_networks.pdf | | | 0 | |
| R | docs/Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail.pdf -> docs/Peek-a-Boo,_I_Still_See_You:_Why_Efficient_Traffic_Analysis_Countermeasures_Fail.pdf | | | 0 | |
| R | docs/Prospects for Remailers.pdf -> docs/Prospects_for_Remailers.pdf | | | 0 | |
| R | docs/Reed & Solomon - Polynomial Codes Over Certain Finite Fields.pdf -> docs/Reed_&_Solomon_-_Polynomial_Codes_Over_Certain_Finite_Fields.pdf | | | 0 | |
| R | docs/SAINT'03 - Kwon & Ryu.pdf -> docs/SAINT'03_-_Kwon_&_Ryu.pdf | | | 0 | |
| R | docs/SAINT'07 - Local production, local consumption p2p architecture.pdf -> docs/SAINT'07_-_Local_production,_local_consumption_p2p_architecture.pdf | | | 0 | |
| R | docs/SASO'07 - Garbacki, Epema & van Steen.pdf -> docs/SASO'07_-_Garbacki,_Epema_&_van_Steen.pdf | | | 0 | |
| R | docs/SELMAS - Software framework for automated negotiation.pdf -> docs/SELMAS_-_Software_framework_for_automated_negotiation.pdf | | | 0 | |
| R | docs/SIGCOMM'03 - On selfish routing in internet-like environments.pdf -> docs/SIGCOMM'03_-_On_selfish_routing_in_internet-like_environments.pdf | | | 0 | |
| R | docs/SIGCOMM'03 - The impact of DHT routing geometry on resilience and proximity.pdf -> docs/SIGCOMM'03_-_The_impact_of_DHT_routing_geometry_on_resilience_and_proximity.pdf | | | 0 | |
| R | docs/SIGCOMM'04 - Qui & Srikant - Modeling and performance analysis.pdf -> docs/SIGCOMM'04_-_Qui_&_Srikant_-_Modeling_and_performance_analysis.pdf | | | 0 | |
| R | docs/SIGCOMM'06 - SybilGuard.pdf -> docs/SIGCOMM'06_-_SybilGuard.pdf | | | 0 | |
| R | docs/SIGCOMM'08 - Rationality and traffic attraction.pdf -> docs/SIGCOMM'08_-_Rationality_and_traffic_attraction.pdf | | | 0 | |
| R | docs/SIGCOMM'11 - Uncovering social network sybils.pdf -> docs/SIGCOMM'11_-_Uncovering_social_network_sybils.pdf | | | 0 | |
| R | docs/SIGCOMM'87 - Strategies for decentralized resource management.pdf -> docs/SIGCOMM'87_-_Strategies_for_decentralized_resource_management.pdf | | | 0 | |
| R | docs/SIGCOMM Comp. Comm. Rev. - Minimizing churn in distributed systems.pdf -> docs/SIGCOMM_Comp._Comm._Rev._-_Minimizing_churn_in_distributed_systems.pdf | | | 0 | |
| R | docs/SIGCOMM Compt. Commun. Rev. - Vivaldi.pdf -> docs/SIGCOMM_Compt._Commun._Rev._-_Vivaldi.pdf | | | 0 | |
| R | docs/SIGCOMM Comput. Commun. Rev. - BitTorrent is an Auction.pdf -> docs/SIGCOMM_Comput._Commun._Rev._-_BitTorrent_is_an_Auction.pdf | | | 0 | |
| R | docs/SIGCOMM Comput. Commun. Rev. - P4P: Provider Portal for Applications.pdf -> docs/SIGCOMM_Comput._Commun._Rev._-_P4P:_Provider_Portal_for_Applications.pdf | | | 0 | |
| R | docs/SIGCOMM Comput. Commun. Rev. - Practical, distributed network coordinates.pdf -> docs/SIGCOMM_Comput._Commun._Rev._-_Practical,_distributed_network_coordinates.pdf | | | 0 | |
| R | docs/SIGCOMM Comput. Commun. Rev. - Securing Internet Coordinate Embedding Systems.pdf -> docs/SIGCOMM_Comput._Commun._Rev._-_Securing_Internet_Coordinate_Embedding_Systems.pdf | | | 0 | |
| R | docs/SIGCOMM Comput. Commun. Rev - Network Coding: an Instant Primer.pdf -> docs/SIGCOMM_Comput._Commun._Rev_-_Network_Coding:_an_Instant_Primer.pdf | | | 0 | |
| R | docs/SIGCOMM Computers Communication Review - Bubblestorm.pdf -> docs/SIGCOMM_Computers_Communication_Review_-_Bubblestorm.pdf | | | 0 | |
| R | docs/SIGKDD Explor. Newsl. - Distributed data mining.pdf -> docs/SIGKDD_Explor._Newsl._-_Distributed_data_mining.pdf | | | 0 | |
| R | docs/SIGMETRICS'05 - Bharambe, Herley & Padmanabhan.pdf -> docs/SIGMETRICS'05_-_Bharambe,_Herley_&_Padmanabhan.pdf | | | 0 | |
| R | docs/SIGMETRICS'05 - Coupon replication systems.pdf -> docs/SIGMETRICS'05_-_Coupon_replication_systems.pdf | | | 0 | |
| R | docs/SIGOPS - FARSITE.pdf -> docs/SIGOPS_-_FARSITE.pdf | | | 0 | |
| R | docs/SIGOSP'03 - Spitstream: High-bandwidth multicast.pdf -> docs/SIGOSP'03_-_Spitstream:_High-bandwidth_multicast.pdf | | | 0 | |
| R | docs/SIGecom Exch. (5) - Overcoming free-riding behavior.pdf -> docs/SIGecom_Exch._(5)_-_Overcoming_free-riding_behavior.pdf | | | 0 | |
| R | docs/SODA'04 - Network failure detection and graph connectivity%0A.pdf -> docs/SODA'04_-_Network_failure_detection_and_graph_connectivity%0A.pdf | | | 0 | |
| R | docs/SOSP'03 - Bullet.pdf -> docs/SOSP'03_-_Bullet.pdf | | | 0 | |
| R | docs/SPAA'05 - Selfish routing with incomplete information.pdf -> docs/SPAA'05_-_Selfish_routing_with_incomplete_information.pdf | | | 0 | |
| R | docs/SRDS'06 - Cryptree.pdf -> docs/SRDS'06_-_Cryptree.pdf | | | 0 | |
| R | docs/STACS'99 - Nisan - Algorithms for selfish agents.pdf -> docs/STACS'99_-_Nisan_-_Algorithms_for_selfish_agents.pdf | | | 0 | |
| R | docs/STOC'08 - Optimal mechanism design and money burning.pdf -> docs/STOC'08_-_Optimal_mechanism_design_and_money_burning.pdf | | | 0 | |
| R | docs/STOC'97 - Practical Loss-Resilient Codes.pdf -> docs/STOC'97_-_Practical_Loss-Resilient_Codes.pdf | | | 0 | |
| R | docs/STOC'99 - Nisan & Ronen - Algorithmic mechanism design.pdf -> docs/STOC'99_-_Nisan_&_Ronen_-_Algorithmic_mechanism_design.pdf | | | 0 | |
| R | docs/Saito - i-WAT Dissertation.pdf -> docs/Saito_-_i-WAT_Dissertation.pdf | | | 0 | |
| R | docs/Schollmeier - Signaling and networking in unstructured p2p networks.pdf -> docs/Schollmeier_-_Signaling_and_networking_in_unstructured_p2p_networks.pdf | | | 0 | |
| R | docs/Science - Hardin - The Tragedy of the Commons.pdf -> docs/Science_-_Hardin_-_The_Tragedy_of_the_Commons.pdf | | | 0 | |
| R | docs/Secure Collaborative Planning Forecasting and Replenishment.pdf -> docs/Secure_Collaborative_Planning_Forecasting_and_Replenishment.pdf | | | 0 | |
| R | docs/TISSEC - PEREA.pdf -> docs/TISSEC_-_PEREA.pdf | | | 0 | |
| R | docs/Tech Report - A Survey of Solutions to the Sybil Attack.pdf -> docs/Tech_Report_-_A_Survey_of_Solutions_to_the_Sybil_Attack.pdf | | | 0 | |
| R | docs/Tech Report - Analyzing peer behavior in KAD.pdf -> docs/Tech_Report_-_Analyzing_peer_behavior_in_KAD.pdf | | | 0 | |
| R | docs/Tech Report - Privacy guarantees through DCS.pdf -> docs/Tech_Report_-_Privacy_guarantees_through_DCS.pdf | | | 0 | |
| R | docs/Tech report - DCOP as a formal model of PARC.pdf -> docs/Tech_report_-_DCOP_as_a_formal_model_of_PARC.pdf | | | 0 | |
| R | docs/Telex: Anticensorship in the Network Infrastructure.pdf -> docs/Telex:_Anticensorship_in_the_Network_Infrastructure.pdf | | | 0 | |
| R | docs/Thesis - Autonomic distributed systems.pdf -> docs/Thesis_-_Autonomic_distributed_systems.pdf | | | 0 | |
| R | docs/Thesis - F.Schadd.pdf -> docs/Thesis_-_F.Schadd.pdf | | | 0 | |
| R | docs/Thesis - P.Harvey.pdf -> docs/Thesis_-_P.Harvey.pdf | | | 0 | |
| R | docs/Trivers - The evolution of reciprocal altruism.pdf -> docs/Trivers_-_The_evolution_of_reciprocal_altruism.pdf | | | 0 | |
| R | docs/USENIX - PIR-Tor.pdf -> docs/USENIX_-_PIR-Tor.pdf | | | 0 | |
| R | docs/USENIX Security'10 - SEPIA.pdf -> docs/USENIX_Security'10_-_SEPIA.pdf | | | 0 | |
| R | docs/User-Perceived Performance of the NICE Application Layer Multicast Protocol in Large and Highly Dynamic Groups_1.pdf -> docs/User-Perceived_Performance_of_the_NICE_Application_Layer_Multicast_Protocol_in_Large_and_Highly_Dynamic_Groups_1.pdf | | | 0 | |
| R | docs/WEIS'05 - Moore - Counterin hidden-action attacks.pdf -> docs/WEIS'05_-_Moore_-_Counterin_hidden-action_attacks.pdf | | | 0 | |
| R | docs/WIAPP'03 - Deconstructing the Kazaa network.pdf -> docs/WIAPP'03_-_Deconstructing_the_Kazaa_network.pdf | | | 0 | |
| R | docs/WPES'04 - Forecasting and benchamking.pdf -> docs/WPES'04_-_Forecasting_and_benchamking.pdf | | | 0 | |
| R | docs/WPES'11 - FAUST.pdf -> docs/WPES'11_-_FAUST.pdf | | | 0 | |
| R | docs/WPES'11 - Fingerprinting.pdf -> docs/WPES'11_-_Fingerprinting.pdf | | | 0 | |
| R | docs/WPES'11 - bridgeSPA.pdf -> docs/WPES'11_-_bridgeSPA.pdf | | | 0 | |
| R | docs/WWW'03 - The EigenTrust algorithm.pdf -> docs/WWW'03_-_The_EigenTrust_algorithm.pdf | | | 0 | |
| R | docs/WiOpt'03 - Buchegger & Le Boudec - Reputation Systems.pdf -> docs/WiOpt'03_-_Buchegger_&_Le_Boudec_-_Reputation_Systems.pdf | | | 0 | |
| R | docs/Workshop on Economics of P2P Systems'03 - Chun, Fu & Vahdat.pdf -> docs/Workshop_on_Economics_of_P2P_Systems'03_-_Chun,_Fu_&_Vahdat.pdf | | | 0 | |
| R | docs/eScholarship UC item 4x6723n2.pdf -> docs/eScholarship_UC_item_4x6723n2.pdf | | | 0 | |
| R | docs/hill climbing.pdf -> docs/hill_climbing.pdf | | | 0 | |