default search action
5th NETYS 2017: Marrakech, Morocco
- Amr El Abbadi, Benoît Garbinato:
Networked Systems - 5th International Conference, NETYS 2017, Marrakech, Morocco, May 17-19, 2017, Proceedings. Lecture Notes in Computer Science 10299, 2017, ISBN 978-3-319-59646-4
Networking
- Raihana Mokhlissi, Dounia Lotfi, Joyati C. Debnath, Mohamed El Marraki:
An Innovative Combinatorial Approach for the Spanning Tree Entropy in Flower Network. 3-14 - Mohammed Gabli, Soufiane Dahmani, El Bekkaye Mermri, Abdelhafid Serghini:
A Dynamic Genetic Algorithm Approach to the Problem of UMTS Network Assignment. 15-26 - Hassan Faouzi, Mohamed Er-rouidi, Houda Moudni, Hicham Mouncif, Mohamed Lamsaadi:
Improving Network Lifetime of Ad Hoc Network Using Energy Aodv (E-AODV) Routing Protocol in Real Radio Environments. 27-39 - Mohamed Er-rouidi, Houda Moudni, Hassan Faouzi, Hicham Mouncif, Abdelkrim Merbouha:
A Fuzzy-Based Routing Strategy to Improve Route Stability in MANET Based on AODV. 40-48
Distributed Algorithms
- Shlomi Dolev, Chryssis Georgiou, Ioannis Marcoullis, Elad Michael Schiller:
Self-stabilizing Reconfiguration. 51-68 - Debasish Pattanayak, Kaushik Mondal, Partha Sarathi Mandal, Stefan Schmid:
Convergence of Even Simpler Robots without Position Information. 69-85 - Maryem Ait El Hadj, Yahya Benkaouz, Bernd Freisleben, Mohammed Erradi:
ABAC Rule Reduction via Similarity Computation. 86-100 - Khalil Laghmari, Christophe Marsala, Mohammed Ramdani:
A Distributed Recommender System Based on Graded Multi-label Classification. 101-108 - Anne-Marie Kermarrec, Nupur Mittal, Javier Olivares:
Multithreading Approach to Process Real-Time Updates in KNN Algorithms. 109-114
Atomicity
- Theophanis Hadjistasi, Nicolas C. Nicolaou, Alexander A. Schwarzmann:
Oh-RAM! One and a Half Round Atomic Memory. 117-132 - Egor Derevenetc, Roland Meyer, Sebastian Schweizer:
Locality and Singularity for Store-Atomic Memory Models. 133-148
Policies
- Rezwana Reaz, Hrishikesh B. Acharya, Ehab S. Elmallah, Jorge Arturo Cobb, Mohamed G. Gouda:
Policy Expressions and the Bottom-Up Design of Computing Policies. 151-165 - Meryeme Ayache, Mohammed Erradi, Bernd Freisleben, Ahmed Khoumsi:
Aspect-Oriented State Machines for Resolving Conflicts in XACML Policies. 166-171
Agreement and Consensus
- Petr Kuznetsov, Thibault Rieutord:
Agreement Functions for Distributed Computing Models. 175-190 - Edward Talmage, Jennifer L. Welch:
Anomalies and Similarities Among Consensus Numbers of Variously-Relaxed Queues. 191-205 - Armando Castañeda, Yoram Moses, Michel Raynal, Matthieu Roy:
Early Decision and Stopping in Synchronous Consensus: A Predicate-Based Guided Tour. 206-221 - Peva Blanchard, Rachid Guerraoui, Julien Stainer, Igor Zablotchi:
The Disclosure Power of Shared Objects. 222-227
Clustering-Based Techniques
- Chen Avin, Louis Cohen, Stefan Schmid:
Competitive Clustering of Stochastic Communication Patterns on a Ring. 231-247 - Moufida Rahmani, Mahfoud Benchaïba:
Toward a Resource Availability Measurement in Peer to Peer Systems. 248-252
Verification
- Truc L. Nguyen, Bernd Fischer, Salvatore La Torre, Gennaro Parlato:
Concurrent Program Verification with Lazy Sequentialization and Interval Analysis. 255-271 - Mohamed Faouzi Atig, Ahmed Bouajjani, K. Narayan Kumar, Prakash Saivasan:
Parity Games on Bounded Phase Multi-pushdown Systems. 272-287 - Marcio Diaz, Tayssir Touili:
Reachability Analysis of Dynamic Pushdown Networks with Priorities. 288-303
Security and Privacy
- Shlomi Dolev, Daniel Khankin:
Monitorability Bounds via Expander, Sparsifier and Random Walks - The Interplay Between On-Demand Monitoring and Anonymity (Extendend Abstract). 307-321 - Arielle Moro, Benoît Garbinato:
A Location Privacy Estimator Based on Spatio-Temporal Location Uncertainties. 322-337 - Amira Soliman, Sarunas Girdzijauskas:
AdaGraph: Adaptive Graph-Based Algorithms for Spam Detection in Social Networks. 338-354 - Wafa Neji, Kaouther Blibech, Narjes Ben Rajeb:
Incoercible Fully-Remote Electronic Voting Protocol. 355-369
Software Engineering
- Meriem Atifi, Abdelaziz Mamouni, Abdelaziz Marzak:
A Comparative Study of Software Testing Techniques. 373-390 - Rachida Hassani, Younès El Bouzekri El Idrissi, Abdellah Abouabdellah:
Software Project Management in the Era of Digital Transformation. 391-395 - Mouâd Mansouri, Leghris Cherkaoui:
Using Fuzzy Gray Relational Analysis in the Vertical Handover Process in Wireless Networks. 396-401
Concurrency and Specifications
- Karolos Antoniadis, Rachid Guerraoui, Julien Stainer, Vasileios Trigonakis:
Sequential Proximity - Towards Provably Scalable Concurrent Search Algorithms. 405-420 - Yu-Fang Chen, Chih-Duo Hong, Ondrej Lengál, Shin-Cheng Mu, Nishant Sinha, Bow-Yaw Wang:
An Executable Sequential Specification for Spark Aggregation. 421-438 - Armando Castañeda, Sergio Rajsbaum, Michel Raynal:
Long-Lived Tasks. 439-454
Communication
- Driss Ait Omar, M'hamed Outanoute, Mohamed Baslam, Mohamed Fakir, Belaid Bouikhalene:
Joint Price and QoS Competition with Bounded Rational Customers. 457-471 - Achraf Ait-Beni-Ifit, Othmane Alaoui Fdili, Patrick Corlay, François-Xavier Coudoux, Driss Aboutajdine:
Profiling and Modelling of HEVC Intra Video Encoder's Energy Consumption for Next Generation WVSNS. 472-482
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.