Networked Systems 7th International Conference, NETYS 2019, Marrakech, Morocco, June 19-21, 2019, Revised Selected Papers /
This book constitutes the revised selected papers of the 7th International Conference on Networked Systems, NETYS 2019, held in Marrakech, Morocco, in June 2019. The 23 revised full papers and 3 short papers presented were carefully reviewed and selected from 60 submissions. The papers are organized...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Cham :
Springer International Publishing : Imprint: Springer,
2019.
|
Έκδοση: | 1st ed. 2019. |
Σειρά: | Computer Communication Networks and Telecommunications ;
11704 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Dynamic Partial Order Reduction under the Release-Acquire Semantics
- On the Complexity of Fault-Tolerant Consensus
- Formal Verification
- Checking Causal Consistency of Distributed Databases
- Liveness in Broadcast Networks
- Formal Verification of UML State Machine Diagrams using Petri Nets
- Synthesize Models for Quantitative Analysis using Automata Learning
- Continuous vs. Discrete Asynchronous Moves: a Certified Approach for Mobile Robots on Graphs
- Distributed Systems
- Self-Stabilizing Snapshot Objects for Asynchronous Failure-Prone Networked Systems
- Self-stabilization overhead: a case study on coded atomic storage
- StakeCube: Combining Sharding and Proof-of-Stake to build Fork-free Secure Permissionless Distributed Ledgers
- Dissecting Tendermint
- CUDA-DTM: Distributed Transactional Memory for GPU Clusters
- Towards synthesis of distribued algorithms with SMT solvers
- Recoverable Mutual Exclusion with Abortability
- Security
- An Efficient network IDS for Cloud Environments Based on a Combination of Deep Learning and an Optimized Self-Adaptive Heuristic Search Algorithm
- Efficient Security Policy Management using Suspicious Rules through Access Log Analysis
- A Vaccination Game for Mitigation Active Worms Propagation in P2P Networks
- (Short Paper) How to Choose its Parents in the Tangle
- Bitcoin Security With Post Quantum Cryptography
- Concurrency
- Achieving Starvation-Freedom in Multi-Version Transactional Memory Systems
- Mutex-based Desanonymization of an Anonymous Read/Write Memory
- A Pragmatic Non-blocking Concurrent Directed Acyclic Graph
- Networks
- The Fake News Vaccine
- Distributed Online Data Aggregation in Dynamic Graphs
- A Multi-Criteria Group Decision Making Method for Big Data Storage Selection.