default search action
8th NETYS 2020: Marrakech, Morocco
- Chryssis Georgiou, Rupak Majumdar:
Networked Systems - 8th International Conference, NETYS 2020, Marrakech, Morocco, June 3-5, 2020, Proceedings. Lecture Notes in Computer Science 12129, Springer 2021, ISBN 978-3-030-67086-3
Invited Papers
- C. Aiswarya:
On Network Topologies and the Decidability of Reachability Problem. 3-10 - Tobias Meuser, Oluwasegun Taiwo Ojo, Daniel Bischoff, Antonio Fernández Anta, Ioannis Stavrakakis, Ralf Steinmetz:
Hide Me: Enabling Location Privacy in Heterogeneous Vehicular Networks. 11-27 - Maria Potop-Butucaru:
Blockchains and the Commons. 28-44
Regular Papers
- Parosh Aziz Abdulla, Mohamed Faouzi Atig, Ahmed Bouajjani, Egor Derevenetc, Carl Leonardsson, Roland Meyer:
On the State Reachability Problem for Concurrent Programs Under Power. 47-59 - Yackolley Amoussou-Guenou, Souheib Baarir, Maria Potop-Butucaru, Nathalie Sznajder, Léo Tible, Sébastien Tixeuil:
On the Encoding and Solving of Partial Information Games. 60-76 - Parwat Singh Anjana, Hagit Attiya, Sweta Kumari, Sathya Peri, Archit Somani:
Efficient Concurrent Execution of Smart Contracts in Blockchains Using Object-Based Transactional Memory. 77-93 - Boutheina Bannour, Arnault Lapitre, Pascale Le Gall:
Exploring IoT Trickle-Based Dissemination Using Timed Model-Checking and Symbolic Execution. 94-111 - Silvia Bonomi, Giovanni Farina, Sébastien Tixeuil:
Broadcasting Information in Multi-hop Networks Prone to Mobile Byzantine Faults. 112-128 - Quentin Bramas, Stéphane Devismes, Pascal Lafourcade:
Infinite Grid Exploration by Disoriented Robots. 129-145 - Gewu Bu, Maria Potop-Butucaru, Mikaël Rabie:
Wireless Broadcast with Short Labels. 146-169 - Georgios Damaskinos, Rachid Guerraoui, Erwan Le Merrer, Christoph Neumann:
The Imitation Game: Algorithm Selection by Exploiting Black-Box Recommenders. 170-182 - Carole Delporte-Gallet, Hugues Fauconnier, Mouna Safir:
Byzantine k-Set Agreement. 183-191 - Dave Dice, Alex Kogan:
Fissile Locks. 192-208 - Zeinab Ganjei, Ahmed Rezine, Petru Eles, Zebo Peng:
Verifying Safety of Parameterized Heard-Of Algorithms. 209-226 - Hagit Attiya, Panagiota Fatourou, Sandeep Hans, Eleni Kanellou:
Staleness and Local Progress in Transactional Memory. 227-243 - Dariusz R. Kowalski, Miguel A. Mosteiro, Krutika Wadhwa:
Generic Framework for Optimization of Local Dissemination in Wireless Networks. 244-260 - Burcu Kulahcioglu Ozkan:
Verifying Weakly Consistent Transactional Programs Using Symbolic Execution. 261-278 - Paolo Laffranchini, João Miranda, Nuno Machado, Luís Rodrigues, Etienne Rivière, Ramin Sadre:
NetSheriff: Sheltering Software-Defined Networks from Rogue Switches. 279-295 - Oskar Lundström, Michel Raynal, Elad Michael Schiller:
Self-stabilizing Uniform Reliable Broadcast. 296-313 - Michel Raynal, Gadi Taubenfeld:
Fully Anonymous Consensus and Set Agreement Algorithms. 314-328 - Thanh-Hai Tran, Igor Konnov, Josef Widder:
Cutoffs for Symmetric Point-to-Point Distributed Algorithms. 329-346
Short Papers
- François Bonnet, Quentin Bramas, Xavier Défago:
Stateless Distributed Ledgers. 349-354 - Vicent Cholvi, Juan Echagüe, Antonio Fernández Anta, Christopher Thraves Caro:
Stability Under Adversarial Injection of Dependent Tasks (Extended Abstract). 355-360 - Driss El Alaoui, Jamal Riffi, Badraddine Aghoutane, My Abdelouahed Sabri, Ali Yahyaouy, Hamid Tairi:
Collaborative Filtering: Comparative Study Between Matrix Factorization and Neural Network Method. 361-367 - Andrés Sevilla, Antonio Fernández Anta:
Routing in Generalized Geometric Inhomogeneous Random Graphs - (Extended Abstract). 368-373
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.