:facetid:toc:\"db/conf/netys/netys2013.bht\"OK:facetid:toc:db/conf/netys/netys2013.bhtMohamed Riduan AbidSaad BiazAirtime Ping-Pong Effect in IEEE 802.11s Wireless Mesh Networks.NETYS105-1192013Conference and Workshop Papersclosedconf/netys/AbidB1310.1007/978-3-642-40148-0_8https://doi.org/10.1007/978-3-642-40148-0_8https://dblp.org/rec/conf/netys/AbidB13URL#4208653Sergio ArévaloErnesto JiménezJian Tang 0010Set Agreement and the Loneliness Failure Detector in Crash-Recovery Systems.NETYS13-272013Conference and Workshop Papersclosedconf/netys/ArevaloJT1310.1007/978-3-642-40148-0_2https://doi.org/10.1007/978-3-642-40148-0_2https://dblp.org/rec/conf/netys/ArevaloJT13URL#4208654Sara BakkaliHafssa BenaboudMouad Ben MamounOn Ensuring End-to-End Quality of Service in Inter-Domain Environment.NETYS326-3302013Conference and Workshop Papersclosedconf/netys/BakkaliBM1310.1007/978-3-642-40148-0_33https://doi.org/10.1007/978-3-642-40148-0_33https://dblp.org/rec/conf/netys/BakkaliBM13URL#4208655Yahya BenkaouzMohammed ErradiA Distributed Protocol for Privacy Preserving Aggregation.NETYS221-2322013Conference and Workshop Papersclosedconf/netys/BenkaouzE1310.1007/978-3-642-40148-0_16https://doi.org/10.1007/978-3-642-40148-0_16https://dblp.org/rec/conf/netys/BenkaouzE13URL#4208656Younes BenlcouiriMohammed BenabdellahMoulay Chrif IsmailiAbdelmalek AziziVideo Encryption Based on the Permutation of the (ℤ/pℤ) Fields.NETYS135-1432013Conference and Workshop Papersclosedconf/netys/BenlcouiriBIA1310.1007/978-3-642-40148-0_10https://doi.org/10.1007/978-3-642-40148-0_10https://dblp.org/rec/conf/netys/BenlcouiriBIA13URL#4208657Ismail BennisOuadoudi ZytouneDriss AboutajdineEnhanced AntNet Protocol for Wireless Multimedia Sensor Networks.NETYS316-3202013Conference and Workshop Papersclosedconf/netys/BennisZA1310.1007/978-3-642-40148-0_31https://doi.org/10.1007/978-3-642-40148-0_31https://dblp.org/rec/conf/netys/BennisZA13URL#4208658David BermbachJörn KuhlenkampConsistency in Distributed Storage Systems - An Overview of Models, Metrics and Measurement Approaches.NETYS175-1892013Conference and Workshop Papersclosedconf/netys/BermbachK1310.1007/978-3-642-40148-0_13https://doi.org/10.1007/978-3-642-40148-0_13https://dblp.org/rec/conf/netys/BermbachK13URL#4208659Gregor von BochmannShah AsaduzzamanDistributed B-Tree with Weak Consistency.NETYS159-1742013Conference and Workshop Papersclosedconf/netys/BochmannA1310.1007/978-3-642-40148-0_12https://doi.org/10.1007/978-3-642-40148-0_12https://dblp.org/rec/conf/netys/BochmannA13URL#4208660Antoine BoutetDavide FreyArnaud JégouAnne-Marie KermarrecHeverson B. RibeiroFreeRec: An Anonymous and Distributed Personalization Architecture.NETYS58-732013Conference and Workshop Papersclosedconf/netys/BoutetFJKR1310.1007/978-3-642-40148-0_5https://doi.org/10.1007/978-3-642-40148-0_5https://dblp.org/rec/conf/netys/BoutetFJKR13URL#4208661Antoine BoutetKonstantinos KloudasAnne-Marie KermarrecFStream: A Decentralized and Social Music Streamer.NETYS253-2572013Conference and Workshop Papersclosedconf/netys/BoutetKK1310.1007/978-3-642-40148-0_19https://doi.org/10.1007/978-3-642-40148-0_19https://dblp.org/rec/conf/netys/BoutetKK13URL#4208662Armando CastañedaMichel RaynalOn the Consensus Number of Non-adaptive Perfect Renaming.NETYS1-122013Conference and Workshop Papersclosedconf/netys/CastanedaR1310.1007/978-3-642-40148-0_1https://doi.org/10.1007/978-3-642-40148-0_1https://dblp.org/rec/conf/netys/CastanedaR13URL#4208663Bogdan S. ChlebusVicent CholviDariusz R. KowalskiStability of Adversarial Routing with Feedback.NETYS206-2202013Conference and Workshop Papersclosedconf/netys/ChlebusCK1310.1007/978-3-642-40148-0_15https://doi.org/10.1007/978-3-642-40148-0_15https://dblp.org/rec/conf/netys/ChlebusCK13URL#4208664Elwardani DadiEl Mostafa DaoudiLarge Scale 3D Shape Retrieval Based on Multi-core Architectures.NETYS295-2992013Conference and Workshop Papersclosedconf/netys/DadiD1310.1007/978-3-642-40148-0_27https://doi.org/10.1007/978-3-642-40148-0_27https://dblp.org/rec/conf/netys/DadiD13URL#4208665Carole Delporte-GalletHugues FauconnierEli GafniSergio RajsbaumBlack Art: Obstruction-Free k-set Agreement with MWMR registers < proccesses .NETYS28-412013Conference and Workshop Papersclosedconf/netys/Delporte-GalletFGR1310.1007/978-3-642-40148-0_3https://doi.org/10.1007/978-3-642-40148-0_3https://dblp.org/rec/conf/netys/Delporte-GalletFGR13URL#4208666Diego DidonaPascal FelberDerin HarmanciPaolo Romano 0002Jörg SchenkerIdentifying the Optimal Level of Parallelism in Transactional Memory Applications.NETYS233-2472013Conference and Workshop Papersclosedconf/netys/DidonaFHRS1310.1007/978-3-642-40148-0_17https://doi.org/10.1007/978-3-642-40148-0_17https://dblp.org/rec/conf/netys/DidonaFHRS13URL#4208667Shlomi DolevOmri LibaElad Michael SchillerSelf-stabilizing Byzantine Resilient Topology Discovery and Message Delivery - (Extended Abstract).NETYS42-572013Conference and Workshop Papersclosedconf/netys/DolevLS1310.1007/978-3-642-40148-0_4https://doi.org/10.1007/978-3-642-40148-0_4https://dblp.org/rec/conf/netys/DolevLS13URL#4208668Adel EchchaachouiAli ChoukriAhmed HabbaniMohammed ElkoutbiComparative Performance Analysis of AODV and AOMDV to Transmit H.264 Traffic.NETYS289-2942013Conference and Workshop Papersclosedconf/netys/EchchaachouiCHE1310.1007/978-3-642-40148-0_26https://doi.org/10.1007/978-3-642-40148-0_26https://dblp.org/rec/conf/netys/EchchaachouiCHE13URL#4208669Mohammed ErritaliBouabid El OuahidiDaniel BourgetSecured Geographic Routing Protocol for Vehicular Ad Hoc Networks (VANETs).NETYS311-3152013Conference and Workshop Papersclosedconf/netys/ErritaliOB1310.1007/978-3-642-40148-0_30https://doi.org/10.1007/978-3-642-40148-0_30https://dblp.org/rec/conf/netys/ErritaliOB13URL#4208670Siham EzzouakMohammed El AmraniAbdelmalek AziziImproving Miller's Algorithm Using the NAF and the Window NAF.NETYS279-2832013Conference and Workshop Papersclosedconf/netys/EzzouakAA1310.1007/978-3-642-40148-0_24https://doi.org/10.1007/978-3-642-40148-0_24https://dblp.org/rec/conf/netys/EzzouakAA13URL#4208671István FehérváriAnita SobeWilfried ElmenreichBiologically Sound Neural Networks for Embedded Systems Using OpenCL.NETYS248-2522013Conference and Workshop Papersclosedconf/netys/FehervariSE1310.1007/978-3-642-40148-0_18https://doi.org/10.1007/978-3-642-40148-0_18https://dblp.org/rec/conf/netys/FehervariSE13URL#4208672Mohammed GabliEl Miloud JaâraEl Bekkaye MermriPlanning UMTS Base Station Location Using Genetic Algorithm with a Dynamic Trade-Off Parameter.NETYS120-1342013Conference and Workshop Papersclosedconf/netys/GabliJM1310.1007/978-3-642-40148-0_9https://doi.org/10.1007/978-3-642-40148-0_9https://dblp.org/rec/conf/netys/GabliJM13URL#4208673Mohamed LahbyLeghris CherkaouiAbdellah AdibNew Validation Approach Based on Group MADM for Network Selection.NETYS306-3102013Conference and Workshop Papersclosedconf/netys/LahbyCA1310.1007/978-3-642-40148-0_29https://doi.org/10.1007/978-3-642-40148-0_29https://dblp.org/rec/conf/netys/LahbyCA13URL#4208674Sihem LoukilSlim KallelMohamed JmaielRuntime Adaptation of Component Based Systems.NETYS284-2882013Conference and Workshop Papersclosedconf/netys/LoukilKJ1310.1007/978-3-642-40148-0_25https://doi.org/10.1007/978-3-642-40148-0_25https://dblp.org/rec/conf/netys/LoukilKJ13URL#4208675Ahmed Zakaria ManouareAbdelilah GhammazAbdelaziz El IdrissiSaida IbnyaichModeling of Human Head Interaction with Planar Antenna for Multi Standard Cellular Phones.NETYS263-2672013Conference and Workshop Papersclosedconf/netys/ManouareGiI1310.1007/978-3-642-40148-0_21https://doi.org/10.1007/978-3-642-40148-0_21https://dblp.org/rec/conf/netys/ManouareGiI13URL#4208676Erwan Le MerrerNicolas Le ScouarnecGilles StraubBitbox: Eventually Consistent File Sharing.NETYS274-2782013Conference and Workshop Papersclosedconf/netys/MerrerSS1310.1007/978-3-642-40148-0_23https://doi.org/10.1007/978-3-642-40148-0_23https://dblp.org/rec/conf/netys/MerrerSS13URL#4208677Víctor López MillánVicent CholviLuis LópezAntonio Fernández AntaImproving Resource Location with Locally Precomputed Partial Random Walks.NETYS144-1582013Conference and Workshop Papersclosedconf/netys/MillanCLA1310.1007/978-3-642-40148-0_11https://doi.org/10.1007/978-3-642-40148-0_11https://dblp.org/rec/conf/netys/MillanCLA13URL#4208678Youssef NahraouiElhoucein AassifRachid LatifGérard MazeModeling the Cut-off Frequency of Acoustic Signal with a Fuzzy Logic System.NETYS268-2732013Conference and Workshop Papersclosedconf/netys/NahraouiALM1310.1007/978-3-642-40148-0_22https://doi.org/10.1007/978-3-642-40148-0_22https://dblp.org/rec/conf/netys/NahraouiALM13URL#4208679Ahmed El OuadrhiriMohamed El-KamiliMohammed Raiss El-FenniLahcen OmariNew Forwarding Strategy for PROPHET Routing in Delay Tolerant Networks.NETYS300-3052013Conference and Workshop Papersclosedconf/netys/OuadrhiriEEO1310.1007/978-3-642-40148-0_28https://doi.org/10.1007/978-3-642-40148-0_28https://dblp.org/rec/conf/netys/OuadrhiriEEO13URL#4208680Yvonne-Anne PignoletStefan Schmid 0001Gilles TrédanRequest Complexity of VNet Topology Extraction: Dictionary-Based Attacks.NETYS190-2052013Conference and Workshop Papersclosedconf/netys/PignoletST1310.1007/978-3-642-40148-0_14https://doi.org/10.1007/978-3-642-40148-0_14https://dblp.org/rec/conf/netys/PignoletST13URL#4208681Yassine SabriNajib El KamounForest Fire Detection and Localization with Wireless Sensor Networks.NETYS321-3252013Conference and Workshop Papersclosedconf/netys/SabriK1310.1007/978-3-642-40148-0_32https://doi.org/10.1007/978-3-642-40148-0_32https://dblp.org/rec/conf/netys/SabriK13URL#4208682