This book constitutes the revised selected papers of the 8th International Conference on Networked Systems, NETYS 2020, held in Marrakech, Morocco, in June 2020._ The 18 revised full papers and 4 short papers presented together with 3 invited papers were carefully reviewed and selected from 46 submissions. The papers cover all aspects related to the design and the development of these systems, including, but not restricted to, concurrent and distributed algorithms, parallel/concurrent/distributed programming, multi-core architectures, formal verification, distributed databases, cloud systems,…mehr
This book constitutes the revised selected papers of the 8th International Conference on Networked Systems, NETYS 2020, held in Marrakech, Morocco, in June 2020._ The 18 revised full papers and 4 short papers presented together with 3 invited papers were carefully reviewed and selected from 46 submissions. The papers cover all aspects related to the design and the development of these systems, including, but not restricted to, concurrent and distributed algorithms, parallel/concurrent/distributed programming, multi-core architectures, formal verification, distributed databases, cloud systems, networks, security, formal verification, etc.
_The conference was held virtually due to the COVID-19 pandemic.
Invited Papers.- On Network Topologies and the Decidability of Reachability Problem.- Hide Me: Enabling Location Privacy in Heterogeneous Vehicular Networks.- Blockchains and the Commons.- Regular Papers.- On the State Reachability Problem for Concurrent Programs under Power.- On the Encoding and Solving of Partial Information Games.- Efficient Concurrent Execution of Smart Contracts in Blockchains using Object-based Transactional Memory.- Exploring IoT Trickle-based Dissemination using Timed Model-checking and Symbolic Execution.- Broadcasting Information in Multi-hop Networks prone to Mobile Byzantine Faults.- Infinite Grid Exploration by Disoriented Robots.- Wireless Broadcast with short labels.- The Imitation Game: Algorithm Selection by Exploiting Black-Box Recommenders.- Byzantine k-Set Agreement.- Fissile Locks.- Verifying Safety of Parameterized Heard-Of Algorithms.- Staleness and Local Progress in Transactional Memory.- Generic Framework for Optimization of Local Dissemination in Wireless Networks.- Verifying Weakly Consistent Transactional Programs using Symbolic Execution.- NetSheriff: Sheltering Software-Defined Networks from Rogue Switches.- Self-stabilizing Uniform Reliable Broadcast.- Fully Anonymous Consensus and Set Agreement Algorithms.- Cutoffs for symmetric point-to-point distributed algorithms.- Short Papers.- Stateless Distributed Ledgers.- Stability Under Adversarial Injection of Dependent Tasks.- Collaborative filtering: comparative study between Matrix Factorization and Neural Network method.- Routing in Generalized Geometric Inhomogeneous Random Graphs (Extended Abstract).
Invited Papers.- On Network Topologies and the Decidability of Reachability Problem.- Hide Me: Enabling Location Privacy in Heterogeneous Vehicular Networks.- Blockchains and the Commons.- Regular Papers.- On the State Reachability Problem for Concurrent Programs under Power.- On the Encoding and Solving of Partial Information Games.- Efficient Concurrent Execution of Smart Contracts in Blockchains using Object-based Transactional Memory.- Exploring IoT Trickle-based Dissemination using Timed Model-checking and Symbolic Execution.- Broadcasting Information in Multi-hop Networks prone to Mobile Byzantine Faults.- Infinite Grid Exploration by Disoriented Robots.- Wireless Broadcast with short labels.- The Imitation Game: Algorithm Selection by Exploiting Black-Box Recommenders.- Byzantine k-Set Agreement.- Fissile Locks.- Verifying Safety of Parameterized Heard-Of Algorithms.- Staleness and Local Progress in Transactional Memory.- Generic Framework for Optimization of Local Dissemination in Wireless Networks.- Verifying Weakly Consistent Transactional Programs using Symbolic Execution.- NetSheriff: Sheltering Software-Defined Networks from Rogue Switches.- Self-stabilizing Uniform Reliable Broadcast.- Fully Anonymous Consensus and Set Agreement Algorithms.- Cutoffs for symmetric point-to-point distributed algorithms.- Short Papers.- Stateless Distributed Ledgers.- Stability Under Adversarial Injection of Dependent Tasks.- Collaborative filtering: comparative study between Matrix Factorization and Neural Network method.- Routing in Generalized Geometric Inhomogeneous Random Graphs (Extended Abstract).
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826