


default search action
6th NETYS 2018: Essaouira, Morocco
- Andreas Podelski, François Taïani

:
Networked Systems - 6th International Conference, NETYS 2018, Essaouira, Morocco, May 9-11, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11028, Springer 2019, ISBN 978-3-030-05528-8
Invited Paper
- Thomas W. Reps:

Program Analyses Using Newton's Method (Invited Paper). 3-16
Distribution
- Antonio Fernández Anta, Chryssis Georgiou, Kishori M. Konwar, Nicolas C. Nicolaou:

Formalizing and Implementing Distributed Ledger Objects. 19-35 - Rachid Guerraoui, Jingjing Wang:

On the Unfairness of Blockchain. 36-50 - Gadi Taubenfeld:

Weak Failures: Definitions, Algorithms and Impossibility Results. 51-66 - Gokarna Sharma, Costas Busch, Supratik Mukhopadhyay:

Complete Visibility for Oblivious Robots in 풪(N) Time. 67-84 - Masashi Tsuchida, Fukuhito Ooshita, Michiko Inoue:

Gathering of Mobile Agents in Asynchronous Byzantine Environments with Authenticated Whiteboards. 85-99 - Anass Rachdi, Abdeslam En-Nouaary, Mohamed Dahchour:

Short Paper: BPMN Process Analysis: A Formal Validation and Verification Eclipse Plugin for BPMN Process Models. 100-104
Concurency
- Vitaly Aksenov

, Petr Kuznetsov, Anatoly Shalyto:
On Helping and Stacks. 107-121 - Michel Raynal, Jiannong Cao:

Anonymity in Distributed Read/Write Systems: An Introductory Survey. 122-140 - Carole Delporte-Gallet, Hugues Fauconnier, Sergio Rajsbaum, Nayuta Yanagisawa:

An Anonymous Wait-Free Weak-Set Object Implementation. 141-156 - Sathya Peri, Ajay Singh

, Archit Somani:
Efficient Means of Achieving Composability Using Object Based Semantics in Transactional Memory Systems. 157-174 - Chryssis Georgiou, Theophanis Hadjistasi, Nicolas C. Nicolaou, Alexander A. Schwarzmann

:
Unleashing and Speeding Up Readers in Atomic Object Implementations. 175-190 - Prasad Jayanti, Siddhartha V. Jayanti, Anup Joshi:

Optimal Recoverable Mutual Exclusion Using only FASAS. 191-206
Verification
- Sylvain Conchon, Giorgio Delzanno, Angelo Ferrando

:
Declarative Parameterized Verification of Topology-Sensitive Distributed Protocols. 209-224 - Ahmed Bouajjani, Constantin Enea, Madhavan Mukund, Rajarshi Roy:

On Verifying TSO Robustness for Event-Driven Asynchronous Programs. 225-239 - Marcio Diaz, Tayssir Touili:

Model Checking Dynamic Pushdown Networks with Locks and Priorities. 240-251
Networking
- Youssef Baddi

, Mohamed Dafir Ech-Cherif El Kettani:
OSM-GKM Optimal Shared Multicast-Based Solution for Group Key Management in Mobile IPv6. 255-269 - Driss Ait Omar

, Mohamed El Amrani, Mohamed Baslam
, Mohamed Fakir
:
A Game-Theoretic Approach for the Internet Content Distribution Chain. 270-285 - Hamid Garmani

, M'hamed Outanoute, Mohamed Baslam
, Mostafa Jourhmane:
New Competition-Based Approach for Caching Popular Content in ICN. 286-300
Self-Stabilization
- Dianne Foreback, Mikhail Nesterenko, Sébastien Tixeuil:

Churn Possibilities and Impossibilities. 303-317 - Iosif Salem

, Elad Michael Schiller:
Practically-Self-stabilizing Vector Clocks in the Absence of Execution Fairness. 318-333 - Michiko Inoue, Sébastien Tixeuil:

Short Paper: Tight Bounds for Universal and Cautious Self-stabilizing 1-Maximal Matching. 334-339
Security
- Ahmed Khoumsi, Mohammed Erradi:

Automata-Based Bottom-Up Design of Conflict-Free Security Policies Specified as Policy Expressions. 343-357 - Sébastien Vaucher

, Valerio Schiavoni
, Pascal Felber
:
Short Paper: Stress-SGX: Load and Stress Your Enclaves for Fun and Profit. 358-363 - Ayidh Alharbi, M. Tahar Kechadi

:
Short Paper: Application of Noisy Attacks on Image Steganography. 364-368
Graph
- Meryam Zeryouh, Mohamed El Marraki, Mohamed Essalih

:
A Measure for Quantifying the Topological Structure of Some Networks. 371-381 - Muktikanta Sa:

Short Paper: Maintenance of Strongly Connected Component in Shared-Memory Graph. 382-387
Middleware
- Khadija Letrache, Omar El Beggar

, Mohammed Ramdani:
Comparative Analysis of Our Association Rules Based Approach and a Genetic Approach for OLAP Partitioning. 391-403 - Radia Belkeziz, Zahi Jarir

:
Short Paper: IoT Context-Driven Architecture: Characterization of the Behavioral Aspect. 404-409

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














