04681nam 22006975 450 991034928130332120230915131729.03-030-31277-110.1007/978-3-030-31277-0(CKB)4100000009273665(DE-He213)978-3-030-31277-0(MiAaPQ)EBC5924438(PPN)250193655(EXLCZ)99410000000927366520190913d2019 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierNetworked Systems 7th International Conference, NETYS 2019, Marrakech, Morocco, June 19–21, 2019, Revised Selected Papers /edited by Mohamed Faouzi Atig, Alexander A. Schwarzmann1st ed. 2019.Cham :Springer International Publishing :Imprint: Springer,2019.1 online resource (XIX, 388 p. 303 illus., 79 illus. in color.) Computer Communication Networks and Telecommunications,2945-9184 ;11704Includes index.3-030-31276-3 Dynamic Partial Order Reduction under the Release-Acquire Semantics -- On the Complexity of Fault-Tolerant Consensus -- Formal Verification -- Checking Causal Consistency of Distributed Databases -- Liveness in Broadcast Networks -- Formal Verification of UML State Machine Diagrams using Petri Nets -- Synthesize Models for Quantitative Analysis using Automata Learning -- Continuous vs. Discrete Asynchronous Moves: a Certified Approach for Mobile Robots on Graphs -- Distributed Systems -- Self-Stabilizing Snapshot Objects for Asynchronous Failure-Prone Networked Systems -- Self-stabilization overhead: a case study on coded atomic storage -- StakeCube: Combining Sharding and Proof-of-Stake to build Fork-free Secure Permissionless Distributed Ledgers -- Dissecting Tendermint -- CUDA-DTM: Distributed Transactional Memory for GPU Clusters -- Towards synthesis of distribued algorithms with SMT solvers -- Recoverable Mutual Exclusion with Abortability -- Security -- An Efficient network IDS for Cloud Environments Based on a Combination of Deep Learning and an Optimized Self-Adaptive Heuristic Search Algorithm -- Efficient Security Policy Management using Suspicious Rules through Access Log Analysis -- A Vaccination Game for Mitigation Active Worms Propagation in P2P Networks -- (Short Paper) How to Choose its Parents in the Tangle -- Bitcoin Security With Post Quantum Cryptography -- Concurrency -- Achieving Starvation-Freedom in Multi-Version Transactional Memory Systems -- Mutex-based Desanonymization of an Anonymous Read/Write Memory -- A Pragmatic Non-blocking Concurrent Directed Acyclic Graph -- Networks -- The Fake News Vaccine -- Distributed Online Data Aggregation in Dynamic Graphs -- A Multi-Criteria Group Decision Making Method for Big Data Storage Selection.This book constitutes the revised selected papers of the 7th International Conference on Networked Systems, NETYS 2019, held in Marrakech, Morocco, in June 2019. The 23 revised full papers and 3 short papers presented were carefully reviewed and selected from 60 submissions. The papers are organized in the following topics: formal verification, distributed systems, security, concurrency, and networks.Computer Communication Networks and Telecommunications,2945-9184 ;11704Computer networksSoftware engineeringArtificial intelligenceMicroprogrammingComputer input-output equipmentComputer Communication NetworksSoftware EngineeringArtificial IntelligenceControl Structures and MicroprogrammingInput/Output and Data CommunicationsComputer networks.Software engineering.Artificial intelligence.Microprogramming.Computer input-output equipment.Computer Communication Networks.Software Engineering.Artificial Intelligence.Control Structures and Microprogramming.Input/Output and Data Communications.004.6004.6Atig Mohamed Faouziedthttp://id.loc.gov/vocabulary/relators/edtSchwarzmann Alexander Aedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910349281303321Networked Systems2499603UNINA