TY - BOOK AU - Atig,Mohamed Faouzi AU - Schwarzmann,Alexander A. ED - NETYS (Conference) TI - Networked systems: 7th International Conference, NETYS 2019, Marrakech, Morocco, June 19-21, 2019, Revised selected papers T2 - Lecture notes in computer science SN - 9783030312770 AV - TK5105.5 U1 - 004.6 23 PY - 2019/// CY - Cham, Switzerland PB - Springer KW - Computer networks KW - Congresses KW - Wireless communication systems KW - Mobile computing KW - Cloud computing KW - Réseaux d'ordinateurs KW - Congrès KW - Transmission sans fil KW - Informatique mobile KW - Infonuagique KW - fast KW - Congress KW - proceedings (reports) KW - aat KW - Conference papers and proceedings KW - lcgft KW - Actes de congrès KW - rvmgf N1 - Includes author index; Dynamic Partial Order Reduction under the Release-Acquire Semantics -- On the Complexity of Fault-Tolerant Consensus -- Formal Verification -- Checking Causal Consistency of Distributed Databases -- Liveness in Broadcast Networks -- Formal Verification of UML State Machine Diagrams using Petri Nets -- Synthesize Models for Quantitative Analysis using Automata Learning -- Continuous vs. Discrete Asynchronous Moves: a Certified Approach for Mobile Robots on Graphs -- Distributed Systems -- Self-Stabilizing Snapshot Objects for Asynchronous Failure-Prone Networked Systems -- Self-stabilization overhead: a case study on coded atomic storage -- StakeCube: Combining Sharding and Proof-of-Stake to build Fork-free Secure Permissionless Distributed Ledgers -- Dissecting Tendermint -- CUDA-DTM: Distributed Transactional Memory for GPU Clusters -- Towards synthesis of distribued algorithms with SMT solvers -- Recoverable Mutual Exclusion with Abortability -- Security -- An Efficient network IDS for Cloud Environments Based on a Combination of Deep Learning and an Optimized Self-Adaptive Heuristic Search Algorithm -- Efficient Security Policy Management using Suspicious Rules through Access Log Analysis -- A Vaccination Game for Mitigation Active Worms Propagation in P2P Networks -- (Short Paper) How to Choose its Parents in the Tangle -- Bitcoin Security With Post Quantum Cryptography -- Concurrency -- Achieving Starvation-Freedom in Multi-Version Transactional Memory Systems -- Mutex-based Desanonymization of an Anonymous Read/Write Memory -- A Pragmatic Non-blocking Concurrent Directed Acyclic Graph -- Networks -- The Fake News Vaccine -- Distributed Online Data Aggregation in Dynamic Graphs -- A Multi-Criteria Group Decision Making Method for Big Data Storage Selection N2 - This book constitutes the revised selected papers of the 7th International Conference on Networked Systems, NETYS 2019, held in Marrakech, Morocco, in June 2019. The 23 revised full papers and 3 short papers presented were carefully reviewed and selected from 60 submissions. The papers are organized in the following topics: formal verification, distributed systems, security, concurrency, and networks UR - https://link.springer.com/10.1007/978-3-030-31277-0 ER -