Amazon cover image
Image from Amazon.com

Networked systems : 4th International Conference, NETYS 2016, Marrakech, Morocco, May 18-20, 2016, Revised selected papers / Parosh Aziz Abdulla, Carole Delporte-Gallet (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 9944.Publisher: Cham, Switzerland : Springer, 2016Description: 1 online resource (x, 396 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783319461403
  • 3319461400
Other title:
  • NETYS 2016
Subject(s): Genre/Form: Additional physical formats: Printed edition:: No titleDDC classification:
  • 004.6 23
LOC classification:
  • TK5105.5
Online resources:
Contents:
Intro -- Preface -- Organization -- Contents -- Nonrepudiation Protocols Without a Trusted Party -- 1 Introduction -- 2 Related Work -- 3 Nonrepudiation Protocols -- 4 Necessary and Sufficient Conditions for Nonrepudiation Protocols -- 5 Nonrepudiation Protocols with Message Loss -- 6 Necessary and Sufficient Conditions for Nonrepudiation Protocols with Message Loss -- 7 An -Nonrepudiation Protocol -- 8 Concluding Remarks -- References -- Exploiting Concurrency in Domain-Specific Data Structures: A Concurrent Order Book and Workload Generator for Online Trading -- 1 Introduction
2 Online Trading and the Order Book -- 3 A Concurrent Order Book -- 3.1 Coarse-Grained Locking -- 3.2 Two-Level Fine-Grained Locking -- 3.3 Toward Lock-Free Algorithms -- 4 Generating Workloads -- 5 Evaluation -- 6 Related Work -- 7 Conclusion -- References -- Fault Tolerant P2P RIA Crawling -- 1 Introduction -- 2 Related Work -- 3 Fault Tolerant RIA Crawling -- 3.1 Assumptions -- 3.2 Protocol Description -- 4 Data Recovery Mechanisms -- 4.1 Retry Strategy -- 4.2 Redundancy Strategy -- 4.3 Combined Strategy -- 5 Evaluation -- 5.1 Retry Strategy -- 5.2 Redundancy Strategy
5.3 Comparison of the Retry and the Redundancy Strategies When Controllers Are Not Overloaded -- 5.4 Combined Strategy -- 6 Conclusion -- References -- Nearest Neighbors Graph Construction: Peer Sampling to the Rescue -- 1 Introduction -- 2 The KNN Peer Sampling Service -- 3 Experimental Setup -- 3.1 NNDescent Algorithm -- 3.2 Datasets Description -- 3.3 Similarity Metrics -- 3.4 Evaluation Metrics -- 4 Experimental Results -- 4.1 Recall Versus Cost -- 4.2 Quality Versus Cost -- 4.3 Utility Study -- 4.4 Recall at Equal Cost -- 4.5 Discussion -- 5 Related Work -- 6 Conclusion -- References
Accurate Optimization Method for Allocation of Heterogeneous Resources in Embedded Systems -- Abstract -- 1 Introduction -- 2 Model of Embedded System -- 2.1 Hardware Platform Model -- 2.2 Application Model -- 3 Proposed Formulation -- 3.1 Notation -- 3.2 Quadratic Formulation -- 4 Case Study -- 5 Conclusion -- References -- Understanding the Memory Consumption of the MiBench Embedded Benchmark -- 1 Introduction -- 2 Platform -- 2.1 Hardware -- 2.2 Software Stack -- 3 Memory Profiler -- 3.1 Profiler Overview -- 3.2 Profiler Design Choices -- 4 Origins of the Memory Spikes -- 4.1 Methodology
4.2 I/O Functions -- 4.3 Operating System -- 4.4 Applications -- 5 Related Work -- 6 Conclusion -- References -- Benchmarking Energy-Centric Broadcast Protocols in Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 3 Our Model -- 4 Experimental Setup -- 5 Experimental Results and Discussion -- 5.1 Single Source Broadcast -- 5.2 Multiple Source Broadcast (Gossip) -- 5.3 Discussion -- 6 Conclusion -- References -- Transactional Pointers: Experiences with HTM-Based Reference Counting in C++ -- 1 Introduction -- 2 Background and Related Work -- 2.1 C++ Smart Pointers
Summary: This book constitutes the refereed post-proceedings of the 4th International Conference on Networked Systems, NETYS 2016, held in Marrakech, Morocco, in May 2016. The 22 full papers and 11 short papers presented together with 19 poster abstracts were carefully reviewed and selected from 121 submissions. They report on best practices and novel algorithms, results and techniques on networked systems and cover topics such as multi-core architectures, concurrent and distributed algorithms, parallel/concurrent/distributed programming, distributed databases, cloud systems, networks, security, and formal verification.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Includes author index.

Online resource; title from PDF title page (SpringerLink, viewed September 23, 2016).

This book constitutes the refereed post-proceedings of the 4th International Conference on Networked Systems, NETYS 2016, held in Marrakech, Morocco, in May 2016. The 22 full papers and 11 short papers presented together with 19 poster abstracts were carefully reviewed and selected from 121 submissions. They report on best practices and novel algorithms, results and techniques on networked systems and cover topics such as multi-core architectures, concurrent and distributed algorithms, parallel/concurrent/distributed programming, distributed databases, cloud systems, networks, security, and formal verification.

Intro -- Preface -- Organization -- Contents -- Nonrepudiation Protocols Without a Trusted Party -- 1 Introduction -- 2 Related Work -- 3 Nonrepudiation Protocols -- 4 Necessary and Sufficient Conditions for Nonrepudiation Protocols -- 5 Nonrepudiation Protocols with Message Loss -- 6 Necessary and Sufficient Conditions for Nonrepudiation Protocols with Message Loss -- 7 An -Nonrepudiation Protocol -- 8 Concluding Remarks -- References -- Exploiting Concurrency in Domain-Specific Data Structures: A Concurrent Order Book and Workload Generator for Online Trading -- 1 Introduction

2 Online Trading and the Order Book -- 3 A Concurrent Order Book -- 3.1 Coarse-Grained Locking -- 3.2 Two-Level Fine-Grained Locking -- 3.3 Toward Lock-Free Algorithms -- 4 Generating Workloads -- 5 Evaluation -- 6 Related Work -- 7 Conclusion -- References -- Fault Tolerant P2P RIA Crawling -- 1 Introduction -- 2 Related Work -- 3 Fault Tolerant RIA Crawling -- 3.1 Assumptions -- 3.2 Protocol Description -- 4 Data Recovery Mechanisms -- 4.1 Retry Strategy -- 4.2 Redundancy Strategy -- 4.3 Combined Strategy -- 5 Evaluation -- 5.1 Retry Strategy -- 5.2 Redundancy Strategy

5.3 Comparison of the Retry and the Redundancy Strategies When Controllers Are Not Overloaded -- 5.4 Combined Strategy -- 6 Conclusion -- References -- Nearest Neighbors Graph Construction: Peer Sampling to the Rescue -- 1 Introduction -- 2 The KNN Peer Sampling Service -- 3 Experimental Setup -- 3.1 NNDescent Algorithm -- 3.2 Datasets Description -- 3.3 Similarity Metrics -- 3.4 Evaluation Metrics -- 4 Experimental Results -- 4.1 Recall Versus Cost -- 4.2 Quality Versus Cost -- 4.3 Utility Study -- 4.4 Recall at Equal Cost -- 4.5 Discussion -- 5 Related Work -- 6 Conclusion -- References

Accurate Optimization Method for Allocation of Heterogeneous Resources in Embedded Systems -- Abstract -- 1 Introduction -- 2 Model of Embedded System -- 2.1 Hardware Platform Model -- 2.2 Application Model -- 3 Proposed Formulation -- 3.1 Notation -- 3.2 Quadratic Formulation -- 4 Case Study -- 5 Conclusion -- References -- Understanding the Memory Consumption of the MiBench Embedded Benchmark -- 1 Introduction -- 2 Platform -- 2.1 Hardware -- 2.2 Software Stack -- 3 Memory Profiler -- 3.1 Profiler Overview -- 3.2 Profiler Design Choices -- 4 Origins of the Memory Spikes -- 4.1 Methodology

4.2 I/O Functions -- 4.3 Operating System -- 4.4 Applications -- 5 Related Work -- 6 Conclusion -- References -- Benchmarking Energy-Centric Broadcast Protocols in Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 3 Our Model -- 4 Experimental Setup -- 5 Experimental Results and Discussion -- 5.1 Single Source Broadcast -- 5.2 Multiple Source Broadcast (Gossip) -- 5.3 Discussion -- 6 Conclusion -- References -- Transactional Pointers: Experiences with HTM-Based Reference Counting in C++ -- 1 Introduction -- 2 Background and Related Work -- 2.1 C++ Smart Pointers

Powered by Koha