Buch, Englisch, 376 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 598 g
Reihe: Computer Communication Networks and Telecommunications
8th International Conference, NETYS 2020, Marrakech, Morocco, June 3-5, 2020, Proceedings
Buch, Englisch, 376 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 598 g
Reihe: Computer Communication Networks and Telecommunications
ISBN: 978-3-030-67086-3
Verlag: Springer International Publishing
The 18 revised full papers and 4 short papers presented together with 3 invited papers were carefully reviewed and selected from 46 submissions. The papers cover all aspects related to the design and the development of these systems, including, but not restricted to, concurrent and distributed algorithms, parallel/concurrent/distributed programming, multi-core architectures, formal verification, distributed databases, cloud systems, networks, security, formal verification, etc.
*The conference was held virtually due to the COVID-19 pandemic.
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Invited Papers.- On Network Topologies and the Decidability of Reachability Problem.- Hide Me: Enabling Location Privacy in Heterogeneous Vehicular Networks.- Blockchains and the Commons.- Regular Papers.- On the State Reachability Problem for Concurrent Programs under Power.- On the Encoding and Solving of Partial Information Games.- Efficient Concurrent Execution of Smart Contracts in Blockchains using Object-based Transactional Memory.- Exploring IoT Trickle-based Dissemination using Timed Model-checking and Symbolic Execution.- Broadcasting Information in Multi-hop Networks prone to Mobile Byzantine Faults.- Infinite Grid Exploration by Disoriented Robots.- Wireless Broadcast with short labels.- The Imitation Game: Algorithm Selection by Exploiting Black-Box Recommenders.- Byzantine k-Set Agreement.- Fissile Locks.- Verifying Safety of Parameterized Heard-Of Algorithms.- Staleness and Local Progress in Transactional Memory.- Generic Framework for Optimization of Local Dissemination in Wireless Networks.- Verifying Weakly Consistent Transactional Programs using Symbolic Execution.- NetSheriff: Sheltering Software-Defined Networks from Rogue Switches.- Self-stabilizing Uniform Reliable Broadcast.- Fully Anonymous Consensus and Set Agreement Algorithms.- Cutoffs for symmetric point-to-point distributed algorithms.- Short Papers.- Stateless Distributed Ledgers.- Stability Under Adversarial Injection of Dependent Tasks.- Collaborative filtering: comparative study between Matrix Factorization and Neural Network method.- Routing in Generalized Geometric Inhomogeneous Random Graphs (Extended Abstract).