Networked systems : 7th International Conference, NETYS 2019, Marrakech, Morocco, June 19-21, 2019, Revised selected papers /

This book constitutes the revised selected papers of the 7th International Conference on Networked Systems, NETYS 2019, held in Marrakech, Morocco, in June 2019. The 23 revised full papers and 3 short papers presented were carefully reviewed and selected from 60 submissions. The papers are organized...

Full description

Bibliographic Details
Corporate Author: NETYS (Conference) Marrakech, Morocco)
Other Authors: Atig, Mohamed Faouzi (Editor), Schwarzmann, Alexander A. (Editor)
Format: Conference Proceeding Book
Language:English
Published: Cham, Switzerland : Springer, 2019
Series:LNCS sublibrary Computer communication networks and telecommunications.
Lecture notes in computer science ; 11704
Subjects:
Table of Contents:
  • Dynamic Partial Order Reduction under the Release-Acquire Semantics
  • On the Complexity of Fault-Tolerant Consensus
  • Formal Verification
  • Checking Causal Consistency of Distributed Databases
  • Liveness in Broadcast Networks
  • Formal Verification of UML State Machine Diagrams using Petri Nets
  • Synthesize Models for Quantitative Analysis using Automata Learning
  • Continuous vs. Discrete Asynchronous Moves: a Certified Approach for Mobile Robots on Graphs
  • Distributed Systems
  • Self-Stabilizing Snapshot Objects for Asynchronous Failure-Prone Networked Systems
  • Self-stabilization overhead: a case study on coded atomic storage
  • StakeCube: Combining Sharding and Proof-of-Stake to build Fork-free Secure Permissionless Distributed Ledgers
  • Dissecting Tendermint
  • CUDA-DTM: Distributed Transactional Memory for GPU Clusters
  • Towards synthesis of distribued algorithms with SMT solvers
  • Recoverable Mutual Exclusion with Abortability
  • Security
  • An Efficient network IDS for Cloud Environments Based on a Combination of Deep Learning and an Optimized Self-Adaptive Heuristic Search Algorithm
  • Efficient Security Policy Management using Suspicious Rules through Access Log Analysis
  • A Vaccination Game for Mitigation Active Worms Propagation in P2P Networks
  • (Short Paper) How to Choose its Parents in the Tangle
  • Bitcoin Security With Post Quantum Cryptography
  • Concurrency
  • Achieving Starvation-Freedom in Multi-Version Transactional Memory Systems
  • Mutex-based Desanonymization of an Anonymous Read/Write Memory
  • A Pragmatic Non-blocking Concurrent Directed Acyclic Graph
  • Networks
  • The Fake News Vaccine
  • Distributed Online Data Aggregation in Dynamic Graphs
  • A Multi-Criteria Group Decision Making Method for Big Data Storage Selection