2 | -- | 0 | Thomas Bonald. Guest editor s foreword |
3 | -- | 4 | Sophie Hautphenne, Kenji Leibnitz, Marie-Ange Remiche. Extinction probability in peer-to-peer file diffusion |
5 | -- | 6 | J. Mundinger, R. R. Weber, G. Weiss. Analysis of peer-to-peer file dissemination amongst users of different upload capacities |
7 | -- | 8 | Emmanuel Bresson, Aline Gouget, Hervé Sibert. The GAIA sensor: an early DDoS detection tool |
9 | -- | 10 | Gary Hardy, Corinne Lucet, Nikolaos Limnios. Probability of connection in regular stochastic networks |
11 | -- | 12 | Ana Busic, Jean-Michel Fourneau. Bounding transient and steady-state dependability measures through algorithmic stochastic comparison |
13 | -- | 15 | Craig Bossie, Pierre M. Fiorini. On checkpointing and heavy-tails in unreliable computing environments |
16 | -- | 18 | James W. Mickens, Brian D. Noble. Improving distributed system performance using machine availability prediction |
19 | -- | 21 | Andrzej Chydzinski. Buffer overflow calculations in a batch arrival queue |
22 | -- | 23 | Daniel A. Menascé, Vasudeva Akula. Evaluating caching policies for online auctions |
24 | -- | 25 | Jean-Marc Vincent, Jérôme Vienne. Perfect simulation of index based routing queueing networks |
26 | -- | 28 | Cheng-Shang Chang, Yi-Ting Chen, Jay Cheng, Po-Kai Huang, Duan-Shin Lee. From switching theory to queueing theory |
29 | -- | 31 | Anastasios Giannoulis, Konstantinos P. Tsoukatos, Leandros Tassiulas. Cross-layer power control in wireless networks |