default search action
3rd NETYS 2015: Agadir, Morocco
- Ahmed Bouajjani, Hugues Fauconnier:
Networked Systems - Third International Conference, NETYS 2015, Agadir, Morocco, May 13-15, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9466, Springer 2015, ISBN 978-3-319-26849-1 - Andreas Haas, Thomas Hütter, Christoph M. Kirsch, Michael Lippautz, Mario Preishuber, Ana Sokolova:
Scal: A Benchmarking Suite for Concurrent Data Structures. 1-14 - Parosh Aziz Abdulla, Mohamed Faouzi Atig, Ahmet Kara, Othmane Rezine:
Verification of Buffered Dynamic Register Automata. 15-31 - Parosh Aziz Abdulla, Mohamed Faouzi Atig, Magnus Lång, Tuan Phong Ngo:
Precise and Sound Automatic Fence Insertion Procedure under PSO. 32-47 - C. Aiswarya:
Model Checking Dynamic Distributed Systems. 48-61 - Paulo Sérgio Almeida, Ali Shoker, Carlos Baquero:
Efficient State-Based CRDTs by Delta-Mutation. 62-76 - Karine Altisen, Stéphane Devismes, Anaïs Durand:
Concurrency in Snap-Stabilizing Local Resource Allocation. 77-93 - Yahya Benkaouz, Mohammed Erradi, Bernd Freisleben:
Distributed Privacy-Preserving Data Aggregation via Anonymization. 94-108 - Martin Biely, Peter Robinson, Ulrich Schmid, Manfred Schwarz, Kyrill Winkler:
Gracefully Degrading Consensus and k-Set Agreement in Directed Dynamic Networks. 109-124 - Olivier Bournez, Johanne Cohen, Mikaël Rabie:
Homonym Population Protocols. 125-139 - Anis Charfi, Haolin Zhi:
Aspect-Based Realization of Non-functional Concerns in Business Processes. 140-154 - Tong Che:
Verifying Concurrent Data Structures Using Data-Expansion. 155-169 - Imane Daha Belghiti, Ismail Berrada, Mohamed El-Kamili:
Improving Cognitive Radio Wireless Network Performances Using Clustering Schemes and Coalitional Games. 170-182 - Stéphane Devismes, Anissa Lamani, Franck Petit, Sébastien Tixeuil:
Optimal Torus Exploration by Oblivious Robots. 183-199 - Dacfey Dzung, Rachid Guerraoui, David Kozhaya, Yvonne-Anne Pignolet:
Source Routing in Time-Varing Lossy Networks. 200-215 - Hajar Elhammouti, Loubna Echabbi, Rachid El Azouzi:
A Fully Distributed Learning Algorithm for Power Allocation in Heterogeneous Networks. 216-229 - Antonio Fernández Anta, Chryssis Georgiou, Elli Zavou:
Packet Scheduling over a Wireless Channel: AQT-Based Constrained Jamming. 230-245 - Roy Friedman, Michel Raynal, François Taïani:
Fisheye Consistency: Keeping Data in Synch in a Georeplicated World. 246-262 - Sonia Gaied Fantar, Habib Youssef:
Peer-to-Peer Full-Text Keyword Search of the Web. 263-277 - Vincent Gramoli, Rachid Guerraoui, Anne-Marie Kermarrec:
Profiling Transactional Applications. 278-292 - Vincent Gramoli, Guillaume Jourjon, Olivier Mehani:
Disaster-Tolerant Storage with SDN. 293-307 - Jad Hamza:
On the Complexity of Linearizability. 308-321 - Lukás Holík, Roland Meyer:
Antichains for the Verification of Recursive Programs. 322-336 - Tao Jin, Triet D. Vo-Huu, Erik-Oliver Blass, Guevara Noubir:
BaPu: Efficient and Practical Bunching of Access Point Uplinks. 337-353 - Colette Johnen:
Memory Efficient Self-stabilizing Distance-k Independent Dominating Set Construction. 354-366 - Soufiana Mekouar, Sihame El-Hammani, Khalil Ibrahimi, El-Houssine Bouyakhf:
Optimizing Diffusion Time of the Content Through the Social Networks: Stochastic Learning Game. 367-381 - Matthieu Perrin, Claude Jard, Achour Mostéfaoui:
Tracking Causal Dependencies in Web Services Orchestrations Defined in ORC. 382-396 - Zohra Saoud, Noura Faci, Zakaria Maamar, Djamal Benslimane:
Web Services Trust Assessment Based on Probabilistic Databases. 397-410 - Telesphore Tiendrebeogo, Damien Magoni:
Virtual and Consistent Hyperbolic Tree: A New Structure for Distributed Database Management. 411-425 - Triet D. Vo-Huu, Erik-Oliver Blass, Guevara Noubir:
EPiC: Efficient Privacy-Preserving Counting for MapReduce. 426-443 - Cheng Wang, Rachid Guerraoui:
A Thrifty Universal Construction. 444-455 - Bertil Chapuis, Benoît Garbinato:
Knowledgeable Chunking. 456-460 - Michael Diamond, Prasad Jayanti, Jake Leichtling:
Enhancing Readers-Writers Exclusion with Upgrade/Downgrade Primitives. 461-467 - Btihal El Ghali, Abderrahim El Qadi, Mohamed Ouadou, Driss Aboutajdine:
Context-Based Query Expansion Method for Short Queries Using Latent Semantic Analyses. 468-473 - Outman El Hichami, Mohamed Naoum, Mohammed Al Achhab, Ismail Berrada, Badr Eddine El Mohajir:
Towards a Formal Semantics and Analysis of BPMN Gateways. 474-478 - Widad Ettazi, Hatim Hafiddi, Mahmoud Nassar:
A User Centered Design Approach for Transactional Service Adaptation in Context Aware Environment. 479-484 - Oday Jubran, Oliver E. Theel:
A Self-stabilizing PIF Algorithm for Educated Unique Process Selection. 485-489 - Abdelfettah Mabrouk, Abdellatif Kobbane, Essaid Sabir, Mohammed El Koutbi:
Coalitional Game Theory for Cooperative Transmission in VANET: Internet Access via Fixed and Mobile Gateways. 490-495 - Hassan Faouzi, Hicham Mouncif, Mohamed Lamsaadi:
Performance Evaluation for Ad hoc Routing Protocols in Realistic Physical Layer. 496-500 - Daniela Oliveira, Paulo Carvalho, Solange Rito Lima:
Understanding Cloud Storage Services Usage: A Practical Case Study. 501-506 - Mohammed Raiss El-Fenni, Mohamed El-Kamili, Sidi Ahmed Ezzahidi, Ismail Berrada, El-Houssine Bouyakhf:
Towards an Optimal Pricing for Mobile Virtual Network Operators. 507-512 - Mohammed Saber, Sara Chadli, Mohamed Emharraf, Ilhame El Farissi:
Modeling and Implementation Approach to Evaluate the Intrusion Detection System. 513-517 - Saima Raza, Waleej Haider, Nouman M. Durrani, Nadeem Kafi Khan, Mohammad Asad Abbasi:
Trust Based Energy Preserving Routing Protocol in Multi-hop WSN. 518-523
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.