default search action
6th NETYS 2018: Essaouira, Morocco
- Andreas Podelski, François Taïani:
Networked Systems - 6th International Conference, NETYS 2018, Essaouira, Morocco, May 9-11, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11028, Springer 2019, ISBN 978-3-030-05528-8
Invited Paper
- Thomas W. Reps:
Program Analyses Using Newton's Method (Invited Paper). 3-16
Distribution
- Antonio Fernández Anta, Chryssis Georgiou, Kishori M. Konwar, Nicolas C. Nicolaou:
Formalizing and Implementing Distributed Ledger Objects. 19-35 - Rachid Guerraoui, Jingjing Wang:
On the Unfairness of Blockchain. 36-50 - Gadi Taubenfeld:
Weak Failures: Definitions, Algorithms and Impossibility Results. 51-66 - Gokarna Sharma, Costas Busch, Supratik Mukhopadhyay:
Complete Visibility for Oblivious Robots in 풪(N) Time. 67-84 - Masashi Tsuchida, Fukuhito Ooshita, Michiko Inoue:
Gathering of Mobile Agents in Asynchronous Byzantine Environments with Authenticated Whiteboards. 85-99 - Anass Rachdi, Abdeslam En-Nouaary, Mohamed Dahchour:
Short Paper: BPMN Process Analysis: A Formal Validation and Verification Eclipse Plugin for BPMN Process Models. 100-104
Concurency
- Vitaly Aksenov, Petr Kuznetsov, Anatoly Shalyto:
On Helping and Stacks. 107-121 - Michel Raynal, Jiannong Cao:
Anonymity in Distributed Read/Write Systems: An Introductory Survey. 122-140 - Carole Delporte-Gallet, Hugues Fauconnier, Sergio Rajsbaum, Nayuta Yanagisawa:
An Anonymous Wait-Free Weak-Set Object Implementation. 141-156 - Sathya Peri, Ajay Singh, Archit Somani:
Efficient Means of Achieving Composability Using Object Based Semantics in Transactional Memory Systems. 157-174 - Chryssis Georgiou, Theophanis Hadjistasi, Nicolas C. Nicolaou, Alexander A. Schwarzmann:
Unleashing and Speeding Up Readers in Atomic Object Implementations. 175-190 - Prasad Jayanti, Siddhartha V. Jayanti, Anup Joshi:
Optimal Recoverable Mutual Exclusion Using only FASAS. 191-206
Verification
- Sylvain Conchon, Giorgio Delzanno, Angelo Ferrando:
Declarative Parameterized Verification of Topology-Sensitive Distributed Protocols. 209-224 - Ahmed Bouajjani, Constantin Enea, Madhavan Mukund, Rajarshi Roy:
On Verifying TSO Robustness for Event-Driven Asynchronous Programs. 225-239 - Marcio Diaz, Tayssir Touili:
Model Checking Dynamic Pushdown Networks with Locks and Priorities. 240-251
Networking
- Youssef Baddi, Mohamed Dafir Ech-Cherif El Kettani:
OSM-GKM Optimal Shared Multicast-Based Solution for Group Key Management in Mobile IPv6. 255-269 - Driss Ait Omar, Mohamed El Amrani, Mohamed Baslam, Mohamed Fakir:
A Game-Theoretic Approach for the Internet Content Distribution Chain. 270-285 - Hamid Garmani, M'hamed Outanoute, Mohamed Baslam, Mostafa Jourhmane:
New Competition-Based Approach for Caching Popular Content in ICN. 286-300
Self-Stabilization
- Dianne Foreback, Mikhail Nesterenko, Sébastien Tixeuil:
Churn Possibilities and Impossibilities. 303-317 - Iosif Salem, Elad Michael Schiller:
Practically-Self-stabilizing Vector Clocks in the Absence of Execution Fairness. 318-333 - Michiko Inoue, Sébastien Tixeuil:
Short Paper: Tight Bounds for Universal and Cautious Self-stabilizing 1-Maximal Matching. 334-339
Security
- Ahmed Khoumsi, Mohammed Erradi:
Automata-Based Bottom-Up Design of Conflict-Free Security Policies Specified as Policy Expressions. 343-357 - Sébastien Vaucher, Valerio Schiavoni, Pascal Felber:
Short Paper: Stress-SGX: Load and Stress Your Enclaves for Fun and Profit. 358-363 - Ayidh Alharbi, M. Tahar Kechadi:
Short Paper: Application of Noisy Attacks on Image Steganography. 364-368
Graph
- Meryam Zeryouh, Mohamed El Marraki, Mohamed Essalih:
A Measure for Quantifying the Topological Structure of Some Networks. 371-381 - Muktikanta Sa:
Short Paper: Maintenance of Strongly Connected Component in Shared-Memory Graph. 382-387
Middleware
- Khadija Letrache, Omar El Beggar, Mohammed Ramdani:
Comparative Analysis of Our Association Rules Based Approach and a Genetic Approach for OLAP Partitioning. 391-403 - Radia Belkeziz, Zahi Jarir:
Short Paper: IoT Context-Driven Architecture: Characterization of the Behavioral Aspect. 404-409
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.