LEADER 05144nam 22006855 450 001 996466309903316 005 20200704192109.0 010 $a3-030-31277-1 024 7 $a10.1007/978-3-030-31277-0 035 $a(CKB)4100000009273665 035 $a(DE-He213)978-3-030-31277-0 035 $a(MiAaPQ)EBC5924438 035 $a(PPN)250193655 035 $a(EXLCZ)994100000009273665 100 $a20190913d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aNetworked Systems$b[electronic resource] $e7th International Conference, NETYS 2019, Marrakech, Morocco, June 19?21, 2019, Revised Selected Papers /$fedited by Mohamed Faouzi Atig, Alexander A. Schwarzmann 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XIX, 388 p. 303 illus., 79 illus. in color.) 225 1 $aComputer Communication Networks and Telecommunications ;$v11704 300 $aIncludes index. 311 $a3-030-31276-3 327 $aDynamic Partial Order Reduction under the Release-Acquire Semantics -- On the Complexity of Fault-Tolerant Consensus -- Formal Verification -- Checking Causal Consistency of Distributed Databases -- Liveness in Broadcast Networks -- Formal Verification of UML State Machine Diagrams using Petri Nets -- Synthesize Models for Quantitative Analysis using Automata Learning -- Continuous vs. Discrete Asynchronous Moves: a Certified Approach for Mobile Robots on Graphs -- Distributed Systems -- Self-Stabilizing Snapshot Objects for Asynchronous Failure-Prone Networked Systems -- Self-stabilization overhead: a case study on coded atomic storage -- StakeCube: Combining Sharding and Proof-of-Stake to build Fork-free Secure Permissionless Distributed Ledgers -- Dissecting Tendermint -- CUDA-DTM: Distributed Transactional Memory for GPU Clusters -- Towards synthesis of distribued algorithms with SMT solvers -- Recoverable Mutual Exclusion with Abortability -- Security -- An Efficient network IDS for Cloud Environments Based on a Combination of Deep Learning and an Optimized Self-Adaptive Heuristic Search Algorithm -- Efficient Security Policy Management using Suspicious Rules through Access Log Analysis -- A Vaccination Game for Mitigation Active Worms Propagation in P2P Networks -- (Short Paper) How to Choose its Parents in the Tangle -- Bitcoin Security With Post Quantum Cryptography -- Concurrency -- Achieving Starvation-Freedom in Multi-Version Transactional Memory Systems -- Mutex-based Desanonymization of an Anonymous Read/Write Memory -- A Pragmatic Non-blocking Concurrent Directed Acyclic Graph -- Networks -- The Fake News Vaccine -- Distributed Online Data Aggregation in Dynamic Graphs -- A Multi-Criteria Group Decision Making Method for Big Data Storage Selection. 330 $aThis book constitutes the revised selected papers of the 7th International Conference on Networked Systems, NETYS 2019, held in Marrakech, Morocco, in June 2019. The 23 revised full papers and 3 short papers presented were carefully reviewed and selected from 60 submissions. The papers are organized in the following topics: formal verification, distributed systems, security, concurrency, and networks. 410 0$aComputer Communication Networks and Telecommunications ;$v11704 606 $aComputer communication systems 606 $aSoftware engineering 606 $aArtificial intelligence 606 $aMicroprogramming  606 $aInput-output equipment (Computers) 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aControl Structures and Microprogramming$3https://scigraph.springernature.com/ontologies/product-market-codes/I12018 606 $aInput/Output and Data Communications$3https://scigraph.springernature.com/ontologies/product-market-codes/I12042 615 0$aComputer communication systems. 615 0$aSoftware engineering. 615 0$aArtificial intelligence. 615 0$aMicroprogramming . 615 0$aInput-output equipment (Computers). 615 14$aComputer Communication Networks. 615 24$aSoftware Engineering/Programming and Operating Systems. 615 24$aArtificial Intelligence. 615 24$aControl Structures and Microprogramming. 615 24$aInput/Output and Data Communications. 676 $a004.6 702 $aAtig$b Mohamed Faouzi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSchwarzmann$b Alexander A$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466309903316 996 $aNetworked Systems$92499603 997 $aUNISA LEADER 00953nam0 22002771i 450 001 UON00279662 005 20231205103831.640 010 $a99-669-9220-4 100 $a20060706d1997 |0itac50 ba 101 $aswa 102 $aKE 105 $a|||| ||||| 200 1 $aMchezo wa karata$fKithaka wa Mberia 210 $aNairobi$cMarimba Publications$d1997 215 $avi, 58 p.$d18 cm 606 $aPoesia Swahili$3UONC019596$2FI 620 $aKE$dNairobi$3UONL000730 676 $a896.3921$cPOESIA SWAHILI$v21 700 0$aKITHAKA wa Mberia$3UONV184290$0692499 712 $aMarimba$3UONV275283$4650 801 $aIT$bSOL$c20250516$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00279662 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI LETT S a 172 $eSI AA 28049 5 172 996 $aMchezo wa karata$91247271 997 $aUNIOR