


default search action
8th NETYS 2020: Marrakech, Morocco
- Chryssis Georgiou, Rupak Majumdar:

Networked Systems - 8th International Conference, NETYS 2020, Marrakech, Morocco, June 3-5, 2020, Proceedings. Lecture Notes in Computer Science 12129, Springer 2021, ISBN 978-3-030-67086-3
Invited Papers
- C. Aiswarya

:
On Network Topologies and the Decidability of Reachability Problem. 3-10 - Tobias Meuser, Oluwasegun Taiwo Ojo

, Daniel Bischoff, Antonio Fernández Anta, Ioannis Stavrakakis, Ralf Steinmetz
:
Hide Me: Enabling Location Privacy in Heterogeneous Vehicular Networks. 11-27 - Maria Potop-Butucaru:

Blockchains and the Commons. 28-44
Regular Papers
- Parosh Aziz Abdulla, Mohamed Faouzi Atig, Ahmed Bouajjani, Egor Derevenetc, Carl Leonardsson, Roland Meyer:

On the State Reachability Problem for Concurrent Programs Under Power. 47-59 - Yackolley Amoussou-Guenou

, Souheib Baarir, Maria Potop-Butucaru, Nathalie Sznajder, Léo Tible, Sébastien Tixeuil:
On the Encoding and Solving of Partial Information Games. 60-76 - Parwat Singh Anjana

, Hagit Attiya, Sweta Kumari, Sathya Peri, Archit Somani:
Efficient Concurrent Execution of Smart Contracts in Blockchains Using Object-Based Transactional Memory. 77-93 - Boutheina Bannour

, Arnault Lapitre, Pascale Le Gall:
Exploring IoT Trickle-Based Dissemination Using Timed Model-Checking and Symbolic Execution. 94-111 - Silvia Bonomi

, Giovanni Farina, Sébastien Tixeuil:
Broadcasting Information in Multi-hop Networks Prone to Mobile Byzantine Faults. 112-128 - Quentin Bramas, Stéphane Devismes, Pascal Lafourcade:

Infinite Grid Exploration by Disoriented Robots. 129-145 - Gewu Bu, Maria Potop-Butucaru, Mikaël Rabie:

Wireless Broadcast with Short Labels. 146-169 - Georgios Damaskinos, Rachid Guerraoui, Erwan Le Merrer, Christoph Neumann:

The Imitation Game: Algorithm Selection by Exploiting Black-Box Recommenders. 170-182 - Carole Delporte-Gallet, Hugues Fauconnier, Mouna Safir:

Byzantine k-Set Agreement. 183-191 - Dave Dice

, Alex Kogan
:
Fissile Locks. 192-208 - Zeinab Ganjei, Ahmed Rezine, Petru Eles, Zebo Peng:

Verifying Safety of Parameterized Heard-Of Algorithms. 209-226 - Hagit Attiya, Panagiota Fatourou, Sandeep Hans, Eleni Kanellou:

Staleness and Local Progress in Transactional Memory. 227-243 - Dariusz R. Kowalski

, Miguel A. Mosteiro
, Krutika Wadhwa:
Generic Framework for Optimization of Local Dissemination in Wireless Networks. 244-260 - Burcu Kulahcioglu Ozkan

:
Verifying Weakly Consistent Transactional Programs Using Symbolic Execution. 261-278 - Paolo Laffranchini

, João Miranda, Nuno Machado, Luís Rodrigues, Etienne Rivière, Ramin Sadre:
NetSheriff: Sheltering Software-Defined Networks from Rogue Switches. 279-295 - Oskar Lundström, Michel Raynal, Elad Michael Schiller:

Self-stabilizing Uniform Reliable Broadcast. 296-313 - Michel Raynal, Gadi Taubenfeld:

Fully Anonymous Consensus and Set Agreement Algorithms. 314-328 - Thanh-Hai Tran, Igor Konnov, Josef Widder:

Cutoffs for Symmetric Point-to-Point Distributed Algorithms. 329-346
Short Papers
- François Bonnet

, Quentin Bramas, Xavier Défago
:
Stateless Distributed Ledgers. 349-354 - Vicent Cholvi, Juan Echagüe

, Antonio Fernández Anta, Christopher Thraves Caro:
Stability Under Adversarial Injection of Dependent Tasks (Extended Abstract). 355-360 - Driss El Alaoui, Jamal Riffi, Badraddine Aghoutane

, My Abdelouahed Sabri, Ali Yahyaouy, Hamid Tairi:
Collaborative Filtering: Comparative Study Between Matrix Factorization and Neural Network Method. 361-367 - Andrés Sevilla

, Antonio Fernández Anta
:
Routing in Generalized Geometric Inhomogeneous Random Graphs - (Extended Abstract). 368-373

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














