|
|
|
Challenges in Personalizing and Decentralizing the Web: An Overview of GOSSPLE |
|
|
1 | (16) |
|
|
Local Algorithms: Self-stabilization on Speed |
|
|
17 | (18) |
|
|
|
|
As Good as It Gets: Competitive Fault Tolerance in Network Structures |
|
|
35 | (12) |
|
|
|
|
Multicore Constraint-Based Automated Stabilization |
|
|
47 | (15) |
|
|
|
A Theory of Network Tracing |
|
|
62 | (13) |
|
|
|
Developing Autonomic and Secure Virtual Organisations with Chemical Programming |
|
|
75 | (15) |
|
|
|
|
Making Population Protocols Self-stabilizing |
|
|
90 | (15) |
|
|
|
|
Analysis of Wireless Sensor Network Protocols in Dynamic Scenarios |
|
|
105 | (15) |
|
|
|
|
Consensus When All Processes May Be Byzantine for Some Time |
|
|
120 | (13) |
|
|
|
A Superstabilizing log(n)-Approximation Algorithm for Dynamic Steiner Trees |
|
|
133 | (16) |
|
|
Maria Gradinariu Potop-Butucaru |
|
|
|
Looking for the Weakest Failure Detector for k-Set Agreement in Message-Passing Systems: Is IIk the End of the Road? |
|
|
149 | (382) |
|
|
|
Model Checking Coalition Nash Equilibria in MAD Distributed Systems |
|
|
531 | (16) |
|
|
|
|
|
|
|
|
Open MP Support for NBTI-Induced Aging Tolerance in MPSoCs |
|
|
547 | (16) |
|
|
|
|
A Self-stabilizing Algorithm for Graph Searching in Trees |
|
|
563 | (15) |
|
|
|
A Metastability-Free Multi-synchronous Communication Scheme for SoCs |
|
|
578 | (15) |
|
|
|
|
From Local Impact Functions to Global Adaptation of Service Compositions |
|
|
593 | (16) |
|
|
|
|
|
|
A Wireless Security Framework without Shared Secrets |
|
|
609 | (15) |
|
|
|
Read-Write-Codes: An Erasure Resilient Encoding System for Flexible Reading and Writing in Storage Networks |
|
|
624 | (16) |
|
|
|
Distributed Sleep Scheduling in Wireless Sensor Networks via Fractional Domatic Partitioning |
|
|
640 | (15) |
|
|
|
Network-Friendly Gossiping |
|
|
655 | (15) |
|
|
|
|
Black Hole Search with Tokens in Interconnected Networks |
|
|
670 | (13) |
|
|
Oracle-Based Flocking of Mobile Robots in Crash-Recovery Model |
|
|
683 | (15) |
|
|
|
|
Speculation for Parallelizing Runtime Checks |
|
|
698 | (13) |
|
|
|
|
|
|
|
|
Optimistic Fair Exchange Using Trusted Devices |
|
|
711 | (15) |
|
|
Application Data Consistency Checking for Anomaly Based Intrusion Detection |
|
|
726 | (15) |
|
|
|
|
Self Adaptive High Interaction Honeypots Driven by Game Theory |
|
|
741 | (15) |
|
|
|
|
|
Cooperative Autonomic Management in Dynamic Distributed Systems |
|
|
756 | (15) |
|
|
|
|
|
|
Consistent Fixed Points and Negative Gain |
|
|
771 | (2) |
|
|
|
|
Induced Churn to Face Adversarial Behavior in Peer-to-Peer Systems |
|
|
773 | (2) |
|
|
|
|
|
|
Safer Than Safe: On the Initial State of Self-stabilizing Systems |
|
|
775 | (2) |
|
|
|
|
Unique Permutation Hashing |
|
|
777 | (2) |
|
|
|
|
Randomization Adaptive Self-stabilization |
|
|
779 | (2) |
|
|
|
On the Time COmplexity of Distributed Topological Self-stablization |
|
|
781 | (2) |
|
|
|
|
|
|
|
An OS Architecture for Device Self-protection |
|
|
783 | (2) |
|
|
|
|
Towards Secure Cloud Computing |
|
|
785 | (2) |
|
|
|
|
|
|
Robust Self-stabilizing Construction of Bounded Size Weight-Based Clusters |
|
|
787 | (2) |
|
|
|
A Stabilizing Algorithm for Finding Two Disjoint Paths in Arbitrary Networks |
|
|
789 | (2) |
|
|
|
Relocation Analysis of Stabilizing MAC Algorithms for Large-Scale Mobile Ad Hoc Networks |
|
|
791 | (2) |
|
|
|
|
A Simple and Quiescent Omega Algorithm in the Crash-Recovery Model |
|
|
793 | (2) |
|
|
|
How to Overcome the Limits of Bounds |
|
|
795 | (2) |
|
|
The Design and Evaluation of a Distributed Reliable File System |
|
|
797 | (2) |
|
|
|
|
|
Author Index |
|
799 | |