. Webbft:-byzantine-fault-tolerance and .. For-resilient-interactive-web-applications,

C. Berger and P. Hans, Reiser Malicious Behaviour Identification in Online Social Networks

P. Raad-bin-tareaf and . Berger, Patrick Hennig, and Christoph Meinel Dynamic Modeling of Location Privacy Protection Mechanisms, p.26

S. Cerf, S. B. Mokhtar, S. Bouchenak, N. Marchand, B. Robu et al., Energy-Aware Data-Stream Processing, p.40

C. Eibel and C. Gulden, Wolfgang Schröder-Preikschat, and Tobias Distler Totally Ordered Replication for Massive Scale Key-Value Stores, p.58

J. Ribeiro, N. Machado, F. Maia, M. Matos-reversible-choreographies, and .. Via-monitoring-in-erlang, , p.75

A. Francalanza, C. A. Mezzina, E. Tuosto, S. , and M. , A Distributed Protocol for Dynamic Community Detection, p.93

B. Guidi, A. Michienzi, L. Ricci, A. Decentralized-resilient, and .. Short-term-cache-for-messaging, , p.110

H. Heck, O. Kieselmann, and .. , Arno Wacker Improving the Performance of Actor-Based Programs Using a New Actor to Thread Association Technique, 122 Fahimeh Rahemi, Ehsan Khamespanah, and Ramtin Khosravi Video Dissemination in Untethered Edge-Clouds: A Case Study . . . . . . . . . . 137

J. Rodrigues, E. R. Marques, J. Silva, and M. B. Luís,

.. , Autonomic Adaptation of Multimedia Content Adhering to Application Mobility, p.153

F. J. Velázquez-garcía, P. Halvorsen, and .. , Håkon Kvale Stensland, and Frank Eliassen A Game of Microservices: Automated Intrusion Response, 169 Tetiana Yarygina and Christian Otterstad