


default search action
4th NETYS 2016: Marrakech, Morocco
- Parosh Aziz Abdulla, Carole Delporte-Gallet:
Networked Systems - 4th International Conference, NETYS 2016, Marrakech, Morocco, May 18-20, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9944, Springer 2016, ISBN 978-3-319-46139-7 - Muqeet Ali, Rezwana Reaz, Mohamed G. Gouda:
Nonrepudiation Protocols Without a Trusted Party. 1-15 - Raphaël P. Barazzutti, Yaroslav Hayduk, Pascal Felber
, Etienne Rivière:
Exploiting Concurrency in Domain-Specific Data Structures: A Concurrent Order Book and Workload Generator for Online Trading. 16-31 - Khaled Ben Hafaiedh, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Fault Tolerant P2P RIA Crawling. 32-47 - Yahya Benkaouz, Mohammed Erradi, Anne-Marie Kermarrec
:
Nearest Neighbors Graph Construction: Peer Sampling to the Rescue. 48-62 - Aissam Berrahou
:
Accurate Optimization Method for Allocation of Heterogeneous Resources in Embedded Systems. 63-70 - Antoine Blin, Cédric Courtaud, Julien Sopena, Julia Lawall, Gilles Muller:
Understanding the Memory Consumption of the MiBench Embedded Benchmark. 71-86 - Quentin Bramas
, Sébastien Tixeuil:
Benchmarking Energy-Centric Broadcast Protocols in Wireless Sensor Networks. 87-101 - Maria Carpen-Amarie
, Dave Dice, Gaël Thomas, Pascal Felber
:
Transactional Pointers: Experiences with HTM-Based Reference Counting in C++. 102-116 - Alami Chaibrassou, Ahmed Mouhsen:
A Multi-channel Energy Efficient Cooperative MIMO Routing Protocol for Clustered WSNs. 117-130 - Maitri Chakraborty, Alessia Milani, Miguel A. Mosteiro:
Counting in Practical Anonymous Dynamic Networks is Polynomial. 131-136 - Evgenia Christoforou, Antonio Fernández Anta
, Chryssis Georgiou, Miguel A. Mosteiro:
Internet Computing: Using Reputation to Select Workers from a Pool. 137-153 - Carole Delporte-Gallet, Hugues Fauconnier:
Asynchronous Consensus with Bounded Memory. 154-168 - Maroua Drissi
, Mohammed Oumsis
, Driss Aboutajdine:
A Fuzzy AHP Approach to Network Selection Improvement in Heterogeneous Wireless Networks. 169-182 - Niklas Ekström, Seif Haridi:
A Fault-Tolerant Sequentially Consistent DSM with a Compositional Correctness Proof. 183-192 - Sara El Aouad, Christophe Dupuy, Renata Teixeira, Francis R. Bach, Christophe Diot:
Exploiting Crowd Sourced Reviews to Explain Movie Recommendation. 193-201 - Asma El Hamzaoui, Hicham Bensaid, Abdeslam En-Nouaary:
A Formal Model for WebRTC Signaling Using SDL. 202-208 - Sanae El Mimouni
, Mohamed Bouhdadi:
An Incremental Proof-Based Process of the NetBill Electronic Commerce Protocol. 209-213 - Oliver Jensen, Tyler O'Meara, Mohamed G. Gouda:
Securing NFC Credit Card Payments Against Malicious Retailers. 214-228 - Ahmed Khoumsi, Mohamed Erradi, Meryeme Ayache, Wadie Krombi:
An Approach to Resolve NP-Hard Problems of Firewalls. 229-243 - Zouheir Labbi, Ahmed Maarof, Mohamed Senhadji, Mostafa Belkasmi
:
Hybrid Encryption Approach Using Dynamic Key Generation and Symmetric Key Algorithm for RFID Systems. 244-249 - Achour Mostéfaoui, Michel Raynal:
Time-Efficient Read/Write Register in Crash-Prone Asynchronous Message-Passing Systems. 250-265 - Mouhcine Elgarej, Khalifa Mansouri
, Mohamed Youssfi
:
Traffic Lights Optimization with Distributed Ant Colony Optimization Based on Multi-agent System. 266-279 - Suha Orhun Mutluergil, Serdar Tasiran:
A Mechanized Refinement Proof of the Chase-Lev Deque Using a Proof System. 280-294 - Nitin Chiluka, Anne-Marie Kermarrec
, Javier Olivares:
The Out-of-core KNN Awakens: - The Light Side of Computation Force on Large Datasets. 295-310 - Rachid Oucheikh
, Ismail Berrada, Outman El Hichami
:
The 4-Octahedron Abstract Domain. 311-317 - Ruma R. Paul, Peter Van Roy, Vladimir Vlassov
:
Reversible Phase Transitions in a Structured Overlay Network with Churn. 318-333 - Anass Rachdi, Abdeslam En-Nouaary, Mohamed Dahchour:
Verification of Common Business Rules in BPMN Process Models. 334-339 - Nada Sbihi, Mounir Ghogho:
Is Youtube Popularity Prediction a Good Way to Improve Caching Efficiency? 340-344 - Gadi Taubenfeld:
Waiting in Concurrent Algorithms. 345-360 - Fouad Yakoubi
, Mohamed El Marraki:
Corona Product Complexity of Planar Graph and S-chain Graph. 361-366 - Imane Zaimi, Zineb Squalli Houssaini
, Abdelali Boushaba, Mohammed Oumsis
, Driss Aboutajdine:
Vehicular Ad-Hoc Network: Evaluation of QoS and QoE for Multimedia Application. 367-371

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.