C. Sajjad-ali-musthaq and A. Lohr, Gravey Support Technologies Evaluation of the Resource Requirements of SNMP Agents on Constrained Devices, p.100

R. Hofstede, I. Drago, C. M. Giovane, and .. , Moura, and Aiko Pras P2P and Aggregation Schemes Using Diffusive Load Balancing to Improve Performance of Peer-to-Peer Systems for Hosting Services, p.124

Y. Qiao, G. Von-bochmann, and .. , On the Dimensioning of an Aggregation Service for P2P Service Overlay Networks, p.136

A. Fiorese and P. Simões, and Fernando Boavida Impact of Dynamics on Situated and Global Aggregation Schemes, p.148

R. Makhloufi, G. Doyen, G. Bonnet, D. Ga¨?tiga¨?ti-phd-workshop, and .. , Monitoring and Security Towards Self-Adaptive Monitoring Framework For Integrated Management, p.160

A. Moui, T. Desprats, A. Novel, and S. , Approach to Support the Visual Exploration and Management of Heterogeneous Home Area Network Devices 164 Yuqian Song and Owen Conlan Estimating Bandwidth Requirements Using Flow-Level Measurements, p.169

O. Ricardo-de, Schmidt and Aiko Pras Using of Time Characteristics in Data Flow for Traffic Classification, p.173

P. Piskac and J. .. Novotny, Intrusion Detection in Open Peer-to-Peer Multi-Agent Systems