Stabilization, Safety, and Security of Distributed Systems 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedings /
This book constitutes the refereed proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2008, held in Detroit, MI, USA, in November 2008. The 17 revised full papers presented together with the abstracts of 3 invited lectures were carefull...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2008.
|
Σειρά: | Lecture Notes in Computer Science,
5340 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Keynote Talks
- Keynote: Primitives for Physical Trust
- Keynote: Trustworthy Services and the Biological Analogy
- Keynote: Distributed Algorithms and VLSI
- MAC Layer Protocols
- A Distributed and Deterministic TDMA Algorithm for Write-All-With-Collision Model
- Distance-2 Self-stabilizing Algorithm for a b-Coloring of Graphs
- Wireless Networks I
- Duty Cycle Stabilization in Semi-mobile Wireless Networks
- DISH: Distributed Self-Healing
- Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
- Stabilizing Algorithms I
- Self-stabilizing Numerical Iterative Computation
- A Self-stabilizing -Approximation Algorithm for the Maximum Matching Problem
- Self-Stabilizing Leader Election in Optimal Space
- Stabilizing Algorithms II
- Tiara: A Self-stabilizing Deterministic Skip List
- Local Synchronization on Oriented Rings
- Stabilization of Max-Min Fair Networks without Per-flow State
- Wireless Networks II
- Convergence Time Analysis of Self-stabilizing Algorithms in Wireless Sensor Networks with Unreliable Links
- Self-stabilizing Mobile Robot Formations with Virtual Nodes
- An Application of Specification-Based Design of Self-stabilization to Tracking in Wireless Sensor Networks
- Security and System Models
- Our Brothers’ Keepers: Secure Routing with High Performance
- Pharewell to Phishing
- The Asynchronous Bounded-Cycle Model
- Tutorial Abstract
- Tutorial Abstract Virtual Infrastructure.