


default search action
4th NETYS 2016: Marrakech, Morocco
- Parosh Aziz Abdulla, Carole Delporte-Gallet:

Networked Systems - 4th International Conference, NETYS 2016, Marrakech, Morocco, May 18-20, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9944, Springer 2016, ISBN 978-3-319-46139-7 - Muqeet Ali, Rezwana Reaz, Mohamed G. Gouda:

Nonrepudiation Protocols Without a Trusted Party. 1-15 - Raphaël P. Barazzutti, Yaroslav Hayduk, Pascal Felber

, Etienne Rivière:
Exploiting Concurrency in Domain-Specific Data Structures: A Concurrent Order Book and Workload Generator for Online Trading. 16-31 - Khaled Ben Hafaiedh, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:

Fault Tolerant P2P RIA Crawling. 32-47 - Yahya Benkaouz, Mohammed Erradi, Anne-Marie Kermarrec

:
Nearest Neighbors Graph Construction: Peer Sampling to the Rescue. 48-62 - Aissam Berrahou

:
Accurate Optimization Method for Allocation of Heterogeneous Resources in Embedded Systems. 63-70 - Antoine Blin, Cédric Courtaud, Julien Sopena, Julia Lawall, Gilles Muller:

Understanding the Memory Consumption of the MiBench Embedded Benchmark. 71-86 - Quentin Bramas

, Sébastien Tixeuil:
Benchmarking Energy-Centric Broadcast Protocols in Wireless Sensor Networks. 87-101 - Maria Carpen-Amarie

, Dave Dice, Gaël Thomas, Pascal Felber
:
Transactional Pointers: Experiences with HTM-Based Reference Counting in C++. 102-116 - Alami Chaibrassou, Ahmed Mouhsen:

A Multi-channel Energy Efficient Cooperative MIMO Routing Protocol for Clustered WSNs. 117-130 - Maitri Chakraborty, Alessia Milani, Miguel A. Mosteiro:

Counting in Practical Anonymous Dynamic Networks is Polynomial. 131-136 - Evgenia Christoforou, Antonio Fernández Anta

, Chryssis Georgiou, Miguel A. Mosteiro:
Internet Computing: Using Reputation to Select Workers from a Pool. 137-153 - Carole Delporte-Gallet, Hugues Fauconnier:

Asynchronous Consensus with Bounded Memory. 154-168 - Maroua Drissi

, Mohammed Oumsis
, Driss Aboutajdine:
A Fuzzy AHP Approach to Network Selection Improvement in Heterogeneous Wireless Networks. 169-182 - Niklas Ekström, Seif Haridi:

A Fault-Tolerant Sequentially Consistent DSM with a Compositional Correctness Proof. 183-192 - Sara El Aouad, Christophe Dupuy, Renata Teixeira, Francis R. Bach, Christophe Diot:

Exploiting Crowd Sourced Reviews to Explain Movie Recommendation. 193-201 - Asma El Hamzaoui, Hicham Bensaid, Abdeslam En-Nouaary:

A Formal Model for WebRTC Signaling Using SDL. 202-208 - Sanae El Mimouni

, Mohamed Bouhdadi:
An Incremental Proof-Based Process of the NetBill Electronic Commerce Protocol. 209-213 - Oliver Jensen, Tyler O'Meara, Mohamed G. Gouda:

Securing NFC Credit Card Payments Against Malicious Retailers. 214-228 - Ahmed Khoumsi, Mohamed Erradi, Meryeme Ayache, Wadie Krombi:

An Approach to Resolve NP-Hard Problems of Firewalls. 229-243 - Zouheir Labbi, Ahmed Maarof, Mohamed Senhadji, Mostafa Belkasmi

:
Hybrid Encryption Approach Using Dynamic Key Generation and Symmetric Key Algorithm for RFID Systems. 244-249 - Achour Mostéfaoui, Michel Raynal:

Time-Efficient Read/Write Register in Crash-Prone Asynchronous Message-Passing Systems. 250-265 - Mouhcine Elgarej, Khalifa Mansouri

, Mohamed Youssfi
:
Traffic Lights Optimization with Distributed Ant Colony Optimization Based on Multi-agent System. 266-279 - Suha Orhun Mutluergil

, Serdar Tasiran:
A Mechanized Refinement Proof of the Chase-Lev Deque Using a Proof System. 280-294 - Nitin Chiluka, Anne-Marie Kermarrec

, Javier Olivares:
The Out-of-core KNN Awakens: - The Light Side of Computation Force on Large Datasets. 295-310 - Rachid Oucheikh

, Ismail Berrada, Outman El Hichami
:
The 4-Octahedron Abstract Domain. 311-317 - Ruma R. Paul, Peter Van Roy, Vladimir Vlassov

:
Reversible Phase Transitions in a Structured Overlay Network with Churn. 318-333 - Anass Rachdi, Abdeslam En-Nouaary, Mohamed Dahchour:

Verification of Common Business Rules in BPMN Process Models. 334-339 - Nada Sbihi, Mounir Ghogho:

Is Youtube Popularity Prediction a Good Way to Improve Caching Efficiency? 340-344 - Gadi Taubenfeld:

Waiting in Concurrent Algorithms. 345-360 - Fouad Yakoubi

, Mohamed El Marraki:
Corona Product Complexity of Planar Graph and S-chain Graph. 361-366 - Imane Zaimi, Zineb Squalli Houssaini

, Abdelali Boushaba, Mohammed Oumsis
, Driss Aboutajdine:
Vehicular Ad-Hoc Network: Evaluation of QoS and QoE for Multimedia Application. 367-371

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














