LEADER 05740nam 22008895 450 001 9910767584403321 005 20230405235844.0 010 $a3-540-76627-8 024 7 $a10.1007/978-3-540-76627-8 035 $a(CKB)1000000000490999 035 $a(SSID)ssj0000320179 035 $a(PQKBManifestationID)11255890 035 $a(PQKBTitleCode)TC0000320179 035 $a(PQKBWorkID)10343628 035 $a(PQKB)11735971 035 $a(DE-He213)978-3-540-76627-8 035 $a(MiAaPQ)EBC6281696 035 $a(MiAaPQ)EBC4976425 035 $a(MiAaPQ)EBC5596277 035 $a(Au-PeEL)EBL4976425 035 $a(CaONFJC)MIL135485 035 $a(OCoLC)1024271725 035 $a(Au-PeEL)EBL5596277 035 $a(OCoLC)1076252948 035 $a(PPN)123728908 035 $a(EXLCZ)991000000000490999 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aStabilization, Safety, and Security of Distributed Systems $e9th International Symposium, SSS 2007 Paris, France, November 14-16, 2007 Proceedings /$fedited by Toshimitsu Masuzawa, Sébastien Tixeuil 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (XIII, 414 p.) 225 1 $aTheoretical Computer Science and General Issues,$x2512-2029 ;$v4838 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-76626-X 320 $aIncludes bibliographical references and index. 327 $aThe Power of Cryptographic Attacks: Is Your Network Really Secure Against Side Channels Attacks and Malicious Faults? -- Role-Based Self-configuration of Sensor Networks -- Robots and Molecules -- Relating Stabilizing Timing Assumptions to Stabilizing Failure Detectors Regarding Solvability and Efficiency -- Distributed Synthesis of Fault-Tolerant Programs in the High Atomicity Model -- Decentralized Detector Generation in Cooperative Intrusion Detection Systems -- Stabilizing Flocking Via Leader Election in Robot Networks -- Stabilization in Dynamic Systems with Varying Equilibrium -- Snap-Stabilizing Prefix Tree for Peer-to-Peer Systems -- Decentralized, Connectivity-Preserving, and Cost-Effective Structured Overlay Maintenance -- On the Performance of Dijkstra?s Third Self-stabilizing Algorithm for Mutual Exclusion -- Stability of the Multiple-Access Channel Under Maximum Broadcast Loads -- Stabilization of Flood Sequencing Protocols in Sensor Networks -- Stabilization of Loop-Free Redundant Routing -- Secure Failure Detection in TrustedPals -- Probabilistic Fault-Containment -- Self* Minimum Connected Covers of Query Regions in Sensor Networks -- Robust Stabilizing Leader Election -- Byzantine Self-stabilizing Pulse in a Bounded-Delay Model -- Magnifying Computing Gaps Establishing Encrypted Communication over Unidirectional Channels (Extended Abstract) -- Stabilizing Trust and Reputation for Self-Stabilizing Efficient Hosts in Spite of Byzantine Guests (Extended Abstract) -- r-Semi-Groups: A Generic Approach for Designing Stabilizing Silent Tasks -- Global Predicate Detection in Distributed Systems with Small Faults -- The Truth System: Can a System of Lying Processes Stabilize? -- Temporal Partition in Sensor Networks -- Secure and Self-stabilizing Clock Synchronization in Sensor Networks -- On the Probabilistic Omission Adversary -- Upper Bounds for Stabilization in Acyclic Preference-Based Systems -- A Self-stabilizing Weighted Matching Algorithm -- Self-stabilization and Virtual Node Layer Emulations. 330 $aThis book constitutes the refereed proceedings of the 9th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2007, held in Paris, France, November 14-16, 2007. The 27 regular papers presented together with the extended abstracts of 3 invited lectures were carefully reviewed and selected from 64 submissions. The papers address all aspects of self-stabilization, safety and security, recovery oriented systems and programing, from theoretical contributions, to reports of the actual experience of applying the principles of self-stabilization to static and dynamic systems. 410 0$aTheoretical Computer Science and General Issues,$x2512-2029 ;$v4838 606 $aArtificial intelligence 606 $aComputer networks 606 $aComputers, Special purpose 606 $aComputer science 606 $aAlgorithms 606 $aElectronic data processing?Management 606 $aArtificial Intelligence 606 $aComputer Communication Networks 606 $aSpecial Purpose and Application-Based Systems 606 $aTheory of Computation 606 $aAlgorithms 606 $aIT Operations 615 0$aArtificial intelligence. 615 0$aComputer networks. 615 0$aComputers, Special purpose. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aElectronic data processing?Management. 615 14$aArtificial Intelligence. 615 24$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aTheory of Computation. 615 24$aAlgorithms. 615 24$aIT Operations. 676 $a005.8 702 $aMasuzawa$b Toshimitsu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTixeuil$b Sébastien$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910767584403321 996 $aStabilization, Safety, and Security of Distributed Systems$9772094 997 $aUNINA