


default search action
3rd NETYS 2015: Agadir, Morocco
- Ahmed Bouajjani, Hugues Fauconnier:

Networked Systems - Third International Conference, NETYS 2015, Agadir, Morocco, May 13-15, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9466, Springer 2015, ISBN 978-3-319-26849-1 - Andreas Haas, Thomas Hütter

, Christoph M. Kirsch, Michael Lippautz, Mario Preishuber, Ana Sokolova
:
Scal: A Benchmarking Suite for Concurrent Data Structures. 1-14 - Parosh Aziz Abdulla, Mohamed Faouzi Atig, Ahmet Kara, Othmane Rezine:

Verification of Buffered Dynamic Register Automata. 15-31 - Parosh Aziz Abdulla, Mohamed Faouzi Atig, Magnus Lång

, Tuan Phong Ngo
:
Precise and Sound Automatic Fence Insertion Procedure under PSO. 32-47 - C. Aiswarya

:
Model Checking Dynamic Distributed Systems. 48-61 - Paulo Sérgio Almeida

, Ali Shoker
, Carlos Baquero
:
Efficient State-Based CRDTs by Delta-Mutation. 62-76 - Karine Altisen, Stéphane Devismes

, Anaïs Durand
:
Concurrency in Snap-Stabilizing Local Resource Allocation. 77-93 - Yahya Benkaouz, Mohammed Erradi, Bernd Freisleben

:
Distributed Privacy-Preserving Data Aggregation via Anonymization. 94-108 - Martin Biely, Peter Robinson, Ulrich Schmid, Manfred Schwarz, Kyrill Winkler

:
Gracefully Degrading Consensus and k-Set Agreement in Directed Dynamic Networks. 109-124 - Olivier Bournez, Johanne Cohen, Mikaël Rabie:

Homonym Population Protocols. 125-139 - Anis Charfi, Haolin Zhi:

Aspect-Based Realization of Non-functional Concerns in Business Processes. 140-154 - Tong Che:

Verifying Concurrent Data Structures Using Data-Expansion. 155-169 - Imane Daha Belghiti, Ismail Berrada, Mohamed El-Kamili

:
Improving Cognitive Radio Wireless Network Performances Using Clustering Schemes and Coalitional Games. 170-182 - Stéphane Devismes

, Anissa Lamani, Franck Petit, Sébastien Tixeuil:
Optimal Torus Exploration by Oblivious Robots. 183-199 - Dacfey Dzung, Rachid Guerraoui, David Kozhaya, Yvonne-Anne Pignolet:

Source Routing in Time-Varing Lossy Networks. 200-215 - Hajar Elhammouti, Loubna Echabbi, Rachid El Azouzi:

A Fully Distributed Learning Algorithm for Power Allocation in Heterogeneous Networks. 216-229 - Antonio Fernández Anta, Chryssis Georgiou

, Elli Zavou:
Packet Scheduling over a Wireless Channel: AQT-Based Constrained Jamming. 230-245 - Roy Friedman, Michel Raynal, François Taïani

:
Fisheye Consistency: Keeping Data in Synch in a Georeplicated World. 246-262 - Sonia Gaied Fantar, Habib Youssef:

Peer-to-Peer Full-Text Keyword Search of the Web. 263-277 - Vincent Gramoli, Rachid Guerraoui, Anne-Marie Kermarrec:

Profiling Transactional Applications. 278-292 - Vincent Gramoli, Guillaume Jourjon, Olivier Mehani:

Disaster-Tolerant Storage with SDN. 293-307 - Jad Hamza:

On the Complexity of Linearizability. 308-321 - Lukás Holík

, Roland Meyer:
Antichains for the Verification of Recursive Programs. 322-336 - Tao Jin, Triet D. Vo-Huu, Erik-Oliver Blass, Guevara Noubir:

BaPu: Efficient and Practical Bunching of Access Point Uplinks. 337-353 - Colette Johnen

:
Memory Efficient Self-stabilizing Distance-k Independent Dominating Set Construction. 354-366 - Soufiana Mekouar

, Sihame El-Hammani, Khalil Ibrahimi
, El-Houssine Bouyakhf:
Optimizing Diffusion Time of the Content Through the Social Networks: Stochastic Learning Game. 367-381 - Matthieu Perrin, Claude Jard, Achour Mostéfaoui:

Tracking Causal Dependencies in Web Services Orchestrations Defined in ORC. 382-396 - Zohra Saoud, Noura Faci, Zakaria Maamar

, Djamal Benslimane:
Web Services Trust Assessment Based on Probabilistic Databases. 397-410 - Telesphore Tiendrebeogo, Damien Magoni

:
Virtual and Consistent Hyperbolic Tree: A New Structure for Distributed Database Management. 411-425 - Triet D. Vo-Huu, Erik-Oliver Blass, Guevara Noubir:

EPiC: Efficient Privacy-Preserving Counting for MapReduce. 426-443 - Cheng Wang, Rachid Guerraoui:

A Thrifty Universal Construction. 444-455 - Bertil Chapuis, Benoît Garbinato:

Knowledgeable Chunking. 456-460 - Michael Diamond, Prasad Jayanti, Jake Leichtling:

Enhancing Readers-Writers Exclusion with Upgrade/Downgrade Primitives. 461-467 - Btihal El Ghali

, Abderrahim El Qadi, Mohamed Ouadou, Driss Aboutajdine:
Context-Based Query Expansion Method for Short Queries Using Latent Semantic Analyses. 468-473 - Outman El Hichami

, Mohamed Naoum
, Mohammed Al Achhab, Ismail Berrada, Badr Eddine El Mohajir:
Towards a Formal Semantics and Analysis of BPMN Gateways. 474-478 - Widad Ettazi, Hatim Hafiddi, Mahmoud Nassar

:
A User Centered Design Approach for Transactional Service Adaptation in Context Aware Environment. 479-484 - Oday Jubran, Oliver E. Theel:

A Self-stabilizing PIF Algorithm for Educated Unique Process Selection. 485-489 - Abdelfettah Mabrouk, Abdellatif Kobbane

, Essaid Sabir
, Mohammed El Koutbi:
Coalitional Game Theory for Cooperative Transmission in VANET: Internet Access via Fixed and Mobile Gateways. 490-495 - Hassan Faouzi

, Hicham Mouncif
, Mohamed Lamsaadi:
Performance Evaluation for Ad hoc Routing Protocols in Realistic Physical Layer. 496-500 - Daniela Oliveira, Paulo Carvalho

, Solange Rito Lima
:
Understanding Cloud Storage Services Usage: A Practical Case Study. 501-506 - Mohammed Raiss El-Fenni

, Mohamed El-Kamili
, Sidi Ahmed Ezzahidi, Ismail Berrada, El-Houssine Bouyakhf:
Towards an Optimal Pricing for Mobile Virtual Network Operators. 507-512 - Mohammed Saber

, Sara Chadli
, Mohamed Emharraf
, Ilhame El Farissi
:
Modeling and Implementation Approach to Evaluate the Intrusion Detection System. 513-517 - Saima Raza, Waleej Haider, Nouman M. Durrani, Nadeem Kafi Khan, Mohammad Asad Abbasi:

Trust Based Energy Preserving Routing Protocol in Multi-hop WSN. 518-523

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














