


default search action
5th NETYS 2017: Marrakech, Morocco
- Amr El Abbadi, Benoît Garbinato:

Networked Systems - 5th International Conference, NETYS 2017, Marrakech, Morocco, May 17-19, 2017, Proceedings. Lecture Notes in Computer Science 10299, 2017, ISBN 978-3-319-59646-4
Networking
- Raihana Mokhlissi

, Dounia Lotfi
, Joyati C. Debnath, Mohamed El Marraki:
An Innovative Combinatorial Approach for the Spanning Tree Entropy in Flower Network. 3-14 - Mohammed Gabli

, Soufiane Dahmani
, El Bekkaye Mermri, Abdelhafid Serghini:
A Dynamic Genetic Algorithm Approach to the Problem of UMTS Network Assignment. 15-26 - Hassan Faouzi

, Mohamed Er-rouidi, Houda Moudni
, Hicham Mouncif
, Mohamed Lamsaadi:
Improving Network Lifetime of Ad Hoc Network Using Energy Aodv (E-AODV) Routing Protocol in Real Radio Environments. 27-39 - Mohamed Er-rouidi, Houda Moudni

, Hassan Faouzi
, Hicham Mouncif
, Abdelkrim Merbouha
:
A Fuzzy-Based Routing Strategy to Improve Route Stability in MANET Based on AODV. 40-48
Distributed Algorithms
- Shlomi Dolev, Chryssis Georgiou, Ioannis Marcoullis, Elad Michael Schiller:

Self-stabilizing Reconfiguration. 51-68 - Debasish Pattanayak

, Kaushik Mondal, Partha Sarathi Mandal
, Stefan Schmid
:
Convergence of Even Simpler Robots without Position Information. 69-85 - Maryem Ait El Hadj

, Yahya Benkaouz, Bernd Freisleben
, Mohammed Erradi:
ABAC Rule Reduction via Similarity Computation. 86-100 - Khalil Laghmari, Christophe Marsala

, Mohammed Ramdani:
A Distributed Recommender System Based on Graded Multi-label Classification. 101-108 - Anne-Marie Kermarrec, Nupur Mittal, Javier Olivares:

Multithreading Approach to Process Real-Time Updates in KNN Algorithms. 109-114
Atomicity
- Theophanis Hadjistasi, Nicolas C. Nicolaou, Alexander A. Schwarzmann

:
Oh-RAM! One and a Half Round Atomic Memory. 117-132 - Egor Derevenetc, Roland Meyer, Sebastian Schweizer:

Locality and Singularity for Store-Atomic Memory Models. 133-148
Policies
- Rezwana Reaz, Hrishikesh B. Acharya, Ehab S. Elmallah, Jorge Arturo Cobb, Mohamed G. Gouda:

Policy Expressions and the Bottom-Up Design of Computing Policies. 151-165 - Meryeme Ayache, Mohammed Erradi, Bernd Freisleben

, Ahmed Khoumsi:
Aspect-Oriented State Machines for Resolving Conflicts in XACML Policies. 166-171
Agreement and Consensus
- Petr Kuznetsov, Thibault Rieutord:

Agreement Functions for Distributed Computing Models. 175-190 - Edward Talmage, Jennifer L. Welch:

Anomalies and Similarities Among Consensus Numbers of Variously-Relaxed Queues. 191-205 - Armando Castañeda, Yoram Moses, Michel Raynal, Matthieu Roy:

Early Decision and Stopping in Synchronous Consensus: A Predicate-Based Guided Tour. 206-221 - Peva Blanchard, Rachid Guerraoui, Julien Stainer, Igor Zablotchi:

The Disclosure Power of Shared Objects. 222-227
Clustering-Based Techniques
- Chen Avin

, Louis Cohen, Stefan Schmid
:
Competitive Clustering of Stochastic Communication Patterns on a Ring. 231-247 - Moufida Rahmani, Mahfoud Benchaïba:

Toward a Resource Availability Measurement in Peer to Peer Systems. 248-252
Verification
- Truc L. Nguyen, Bernd Fischer

, Salvatore La Torre, Gennaro Parlato
:
Concurrent Program Verification with Lazy Sequentialization and Interval Analysis. 255-271 - Mohamed Faouzi Atig, Ahmed Bouajjani, K. Narayan Kumar, Prakash Saivasan:

Parity Games on Bounded Phase Multi-pushdown Systems. 272-287 - Marcio Diaz, Tayssir Touili:

Reachability Analysis of Dynamic Pushdown Networks with Priorities. 288-303
Security and Privacy
- Shlomi Dolev, Daniel Khankin:

Monitorability Bounds via Expander, Sparsifier and Random Walks - The Interplay Between On-Demand Monitoring and Anonymity (Extendend Abstract). 307-321 - Arielle Moro, Benoît Garbinato:

A Location Privacy Estimator Based on Spatio-Temporal Location Uncertainties. 322-337 - Amira Soliman, Sarunas Girdzijauskas

:
AdaGraph: Adaptive Graph-Based Algorithms for Spam Detection in Social Networks. 338-354 - Wafa Neji, Kaouther Blibech, Narjes Ben Rajeb:

Incoercible Fully-Remote Electronic Voting Protocol. 355-369
Software Engineering
- Meriem Atifi, Abdelaziz Mamouni

, Abdelaziz Marzak:
A Comparative Study of Software Testing Techniques. 373-390 - Rachida Hassani

, Younès El Bouzekri El Idrissi
, Abdellah Abouabdellah:
Software Project Management in the Era of Digital Transformation. 391-395 - Mouâd Mansouri

, Leghris Cherkaoui
:
Using Fuzzy Gray Relational Analysis in the Vertical Handover Process in Wireless Networks. 396-401
Concurrency and Specifications
- Karolos Antoniadis, Rachid Guerraoui, Julien Stainer, Vasileios Trigonakis:

Sequential Proximity - Towards Provably Scalable Concurrent Search Algorithms. 405-420 - Yu-Fang Chen, Chih-Duo Hong

, Ondrej Lengál
, Shin-Cheng Mu
, Nishant Sinha, Bow-Yaw Wang:
An Executable Sequential Specification for Spark Aggregation. 421-438 - Armando Castañeda, Sergio Rajsbaum

, Michel Raynal:
Long-Lived Tasks. 439-454
Communication
- Driss Ait Omar

, M'hamed Outanoute, Mohamed Baslam
, Mohamed Fakir
, Belaid Bouikhalene:
Joint Price and QoS Competition with Bounded Rational Customers. 457-471 - Achraf Ait-Beni-Ifit

, Othmane Alaoui Fdili
, Patrick Corlay, François-Xavier Coudoux, Driss Aboutajdine:
Profiling and Modelling of HEVC Intra Video Encoder's Energy Consumption for Next Generation WVSNS. 472-482

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














