The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
<
Volume 17,
Issue 2
Volume 17,
Issue 1
Volume 16,
Issue 6
Volume 16,
Issue 5
Volume 16,
Issue 4
Volume 16,
Issue 3
Volume 16,
Issue 1
Volume 15,
Issue 6
Volume 15,
Issue 5
Volume 15,
Issue 4
Volume 15,
Issue 3
Volume 15,
Issue 2
Volume 15,
Issue 1
Volume 14,
Issue 6
Volume 14,
Issue 5
Volume 14,
Issue 4
Volume 14,
Issue 3
Volume 14,
Issue 2
Volume 14,
Issue 1
Volume 13,
Issue 6
Volume 13,
Issue 5
Volume 13,
Issue 4
Volume 13,
Issue 3
Volume 13,
Issue 2
Volume 13,
Issue 1
Volume 12,
Issue 6
Volume 12,
Issue 5
Volume 12,
Issue 4
Volume 12,
Issue 3
Volume 12,
Issue 2
Volume 12,
Issue 1
Volume 11,
Issue 6
Volume 11,
Issue 5
Volume 11,
Issue 4
Volume 11,
Issue 3
Volume 11,
Issue 2
Volume 11,
Issue 1
Volume 10,
Issue 6
Volume 10,
Issue 5
Volume 10,
Issue 4
Volume 10,
Issue 3
Volume 10,
Issue 2
Volume 10,
Issue 1
Volume 9,
Issue 6
Volume 9,
Issue 5
Volume 9,
Issue 4
Volume 9,
Issue 3
Volume 9,
Issue 2
Volume 9,
Issue 1
Volume 8,
Issue 6
Volume 8,
Issue 5
Volume 8,
Issue 4
Volume 8,
Issue 3
Volume 8,
Issue 2
Volume 8,
Issue 1
Volume 7,
Issue 4
Volume 7,
Issue 3
Volume 7,
Issue 2
Volume 7,
Issue 1
Volume 6,
Issue 4
Volume 6,
Issue 3
Volume 6,
Issue 2
Volume 6,
Issue 1
Volume 5,
Issue 4
Volume 5,
Issue 3
Volume 5,
Issue 2
Volume 5,
Issue 1
Volume 4,
Issue 4
Volume 4,
Issue 3
Volume 4,
Issue 2
Volume 4,
Issue 1
Volume 3,
Issue 4
Volume 3,
Issue 3
Volume 3,
Issue 2
Volume 3,
Issue 1
Volume 2,
Issue 4
Volume 2,
Issue 3
Volume 2,
Issue 2
Volume 2,
Issue 1
Volume 1,
Issue 2
Volume 1,
Issue 1
>
Table of contents
1
Editorial: Special issue on dependable peer-to-peer systems
Liu, Lu
/ Xu, Jie
et al.
| 2010
3
Performance-driven calibration of ERGO
Vinod, Radhika
/ Exarchakos, Georgios
/ Antonopoulos, Nick
et al.
| 2009
17
User selfishness vs. file availability in P2P file-sharing systems: Evolutionary game theoretic approach
Sasabe, Masahiro
/ Wakamiya, Naoki
/ Murata, Masayuki
et al.
| 2009
27
Enhancing tit-for-tat for incentive in BitTorrent networks
Liu, Weidong
/ Peng, Dongsheng
/ Lin, Chuang
et al.
| 2009
36
On the feasibility of exploiting P2P systems to launch DDoS attacks
Sun, Xin
/ Torres, Ruben
/ Rao, Sanjay G.
et al.
| 2009
52
Hierarchical codes: A flexible trade-off for erasure codes in peer-to-peer storage systems
Duminuco, Alessandro
/ Biersack, Ernst W.
et al.
| 2009
67
Efficient search based on content similarity over self-organizing P2P networks
Doulkeridis, Christos
/ Vlachou, Akrivi
/ Nørvåg, Kjetil
et al.
| 2009