Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    UID:
    almahu_9948170578802882
    Umfang: XIX, 388 p. 303 illus., 79 illus. in color. , online resource.
    Ausgabe: 1st ed. 2019.
    ISBN: 9783030312770
    Serie: Computer Communication Networks and Telecommunications ; 11704
    Inhalt: This book constitutes the revised selected papers of the 7th International Conference on Networked Systems, NETYS 2019, held in Marrakech, Morocco, in June 2019. The 23 revised full papers and 3 short papers presented were carefully reviewed and selected from 60 submissions. The papers are organized in the following topics: formal verification, distributed systems, security, concurrency, and networks.
    Anmerkung: Dynamic Partial Order Reduction under the Release-Acquire Semantics -- On the Complexity of Fault-Tolerant Consensus -- Formal Verification -- Checking Causal Consistency of Distributed Databases -- Liveness in Broadcast Networks -- Formal Verification of UML State Machine Diagrams using Petri Nets -- Synthesize Models for Quantitative Analysis using Automata Learning -- Continuous vs. Discrete Asynchronous Moves: a Certified Approach for Mobile Robots on Graphs -- Distributed Systems -- Self-Stabilizing Snapshot Objects for Asynchronous Failure-Prone Networked Systems -- Self-stabilization overhead: a case study on coded atomic storage -- StakeCube: Combining Sharding and Proof-of-Stake to build Fork-free Secure Permissionless Distributed Ledgers -- Dissecting Tendermint -- CUDA-DTM: Distributed Transactional Memory for GPU Clusters -- Towards synthesis of distribued algorithms with SMT solvers -- Recoverable Mutual Exclusion with Abortability -- Security -- An Efficient network IDS for Cloud Environments Based on a Combination of Deep Learning and an Optimized Self-Adaptive Heuristic Search Algorithm -- Efficient Security Policy Management using Suspicious Rules through Access Log Analysis -- A Vaccination Game for Mitigation Active Worms Propagation in P2P Networks -- (Short Paper) How to Choose its Parents in the Tangle -- Bitcoin Security With Post Quantum Cryptography -- Concurrency -- Achieving Starvation-Freedom in Multi-Version Transactional Memory Systems -- Mutex-based Desanonymization of an Anonymous Read/Write Memory -- A Pragmatic Non-blocking Concurrent Directed Acyclic Graph -- Networks -- The Fake News Vaccine -- Distributed Online Data Aggregation in Dynamic Graphs -- A Multi-Criteria Group Decision Making Method for Big Data Storage Selection.
    In: Springer eBooks
    Weitere Ausg.: Printed edition: ISBN 9783030312763
    Weitere Ausg.: Printed edition: ISBN 9783030312787
    Sprache: Englisch
    Schlagwort(e): Konferenzschrift
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz