Networked Systems 7th International Conference, NETYS 2019, Marrakech, Morocco, June 19-21, 2019, Revised Selected Papers /

This book constitutes the revised selected papers of the 7th International Conference on Networked Systems, NETYS 2019, held in Marrakech, Morocco, in June 2019. The 23 revised full papers and 3 short papers presented were carefully reviewed and selected from 60 submissions. The papers are organized...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Atig, Mohamed Faouzi (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Schwarzmann, Alexander A. (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Σειρά:Computer Communication Networks and Telecommunications ; 11704
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Dynamic Partial Order Reduction under the Release-Acquire Semantics
  • On the Complexity of Fault-Tolerant Consensus
  • Formal Verification
  • Checking Causal Consistency of Distributed Databases
  • Liveness in Broadcast Networks
  • Formal Verification of UML State Machine Diagrams using Petri Nets
  • Synthesize Models for Quantitative Analysis using Automata Learning
  • Continuous vs. Discrete Asynchronous Moves: a Certified Approach for Mobile Robots on Graphs
  • Distributed Systems
  • Self-Stabilizing Snapshot Objects for Asynchronous Failure-Prone Networked Systems
  • Self-stabilization overhead: a case study on coded atomic storage
  • StakeCube: Combining Sharding and Proof-of-Stake to build Fork-free Secure Permissionless Distributed Ledgers
  • Dissecting Tendermint
  • CUDA-DTM: Distributed Transactional Memory for GPU Clusters
  • Towards synthesis of distribued algorithms with SMT solvers
  • Recoverable Mutual Exclusion with Abortability
  • Security
  • An Efficient network IDS for Cloud Environments Based on a Combination of Deep Learning and an Optimized Self-Adaptive Heuristic Search Algorithm
  • Efficient Security Policy Management using Suspicious Rules through Access Log Analysis
  • A Vaccination Game for Mitigation Active Worms Propagation in P2P Networks
  • (Short Paper) How to Choose its Parents in the Tangle
  • Bitcoin Security With Post Quantum Cryptography
  • Concurrency
  • Achieving Starvation-Freedom in Multi-Version Transactional Memory Systems
  • Mutex-based Desanonymization of an Anonymous Read/Write Memory
  • A Pragmatic Non-blocking Concurrent Directed Acyclic Graph
  • Networks
  • The Fake News Vaccine
  • Distributed Online Data Aggregation in Dynamic Graphs
  • A Multi-Criteria Group Decision Making Method for Big Data Storage Selection.