Abstract is missing.
- Frontmatter, Preface, Table of Contents, List of AuthorsNorbert Luttenberger, Hagen Peters. [doi]
- The Scope of the IBGP Routing Anomaly ProblemUli Bornhauser, Peter Martini, Martin Horneffer. 2-13 [doi]
- A Reputation-Based Approach to Self-Adaptive Service SelectionJan Sudeikat, Wolfgang Renz, Ante Vilenica, Winfried Lamersdorf. 14-25 [doi]
- A Service-Oriented Operating System and an Application Development Infrastructure for Distributed Embedded SystemsMartin Lipphardt, Nils Glombitza, Jana Neumann, Christian Werner, Stefan Fischer. 26-37 [doi]
- An adaptive protocol for distributed beamformingStephan Sigg, Michael Beigl. 38-48 [doi]
- Web Workload Generation According to the UniLoG ApproachAndrey W. Kolesnikov, Bernd E. Wolfinger. 49-60 [doi]
- Improving Markov-based TCP Traffic ClassificationGerhard Münz, Stephan Heckmüller, Lothar Braun, Georg Carle. 61-72 [doi]
- IT Management Using a Heavyweight CIM OntologyAndreas Textor, Jeanne Stynes, Reinhold Kröger. 73-84 [doi]
- TOGBAD-LQ - Using Challenge-Response to Detect Fake Link QualitiesElmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini. 85-96 [doi]
- Avoiding Publication and Privatization Problems on Software Transactional MemoryHolger Machens, Volker Turau. 97-108 [doi]
- A Resilient and Energy-saving Incentive System for Resource Sharing in MANETsHolger Teske, Jochen Wolfgang Furthmüller, Oliver P. Waldhorst. 109-120 [doi]
- Supporting Cooperative Traffic Information Systems through Street-Graph-based Peer-to-Peer NetworksJedrzej Rybicki, Benjamin Pesch, Martin Mauve, Björn Scheuermann. 121-132 [doi]
- Distributed Probabilistic Network Traffic MeasurementsAlexander Marold, Peter Lieven, Björn Scheuermann. 133-144 [doi]
- A Feasibility Check for Geographical Cluster Based Routing under Inaccurate Node Localization in Wireless Sensor NetworksHannes Frey, Ranjith Pillay. 145-156 [doi]
- An Arbitrary 2D Structured Replica Control ProtocolRobert Basmadjian, Hermann de Meer. 157-168 [doi]
- Resolving Conflicts in Highly Reactive TeamsHendrik Skubch, Daniel Saur, Kurt Geihs. 170-175 [doi]
- A Privacy-Preserving Social P2P Infrastructure for People-Centric SensingMichael Dürr, Kevin Wiesner. 176-181 [doi]
- Optimization-based Secure Multi-hop Localization in Wireless Ad Hoc NetworksSander Wozniak, Tobias Gerlach, Guenter Schaefer. 182-187 [doi]
- Efficient Distributed Intrusion Detection applying Multi Step SignaturesMichael Vogel, Sebastian Schmerl. 188-193 [doi]
- Node Degree based Improved Hop Count Weighted Centroid Localization AlgorithmRico Radeke, Stefan Türk. 194-199 [doi]
- Automated generic integration of flight logbook data into aircraft maintenance systemsOliver Hunte, Carsten Kleiner, Uwe Koch, Arne Koschel, Björn Koschel. 201-204 [doi]
- Alister 2.0 - Programmable Logic Controllers in Railway Interlocking Systems for Regional Lines of the DB Netze AGReiner Saykowski, Elferik Schultz, Joachim Bleidiessel. 205-207 [doi]
- Browser as a Service (BaaS): Security and Performance Enhancements for the Rich WebNils Gruschka, Luigi Lo Iacono. 208-210 [doi]
- Model Driven Development of Distributed Business ApplicationsWolfgang Goerigk. 211-213 [doi]
- A Mobility Model for the Realistic Simulation of Social ContextDaniel Fischer. 215-220 [doi]
- Anonymous Communication in the Digital WorldAndriy Panchenko. 221-226 [doi]
- Optimized DTN-Routing for Urban Public Transport SystemsTobias Pögel. 227-232 [doi]
- A Novel Algorithm for Distributed Dynamic Interference Coordination in Cellular NetworksMarc C. Necker. 233-238 [doi]
- Does Proactive Secret Sharing Perform in Peer-to-Peer Systems?Nicolas Liebau, Andreas Mauthe, Vasilios Darlagiannis, Ralf Steinmetz. 239-244 [doi]