Networked systems : 4th International Conference, NETYS 2016, Marrakech, Morocco, May 18-20, 2016, Revised selected papers / Parosh Aziz Abdulla, Carole Delporte-Gallet (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 9944.Publisher: Cham, Switzerland : Springer, 2016Description: 1 online resource (x, 396 pages) : illustrationsContent type: - text
- computer
- online resource
- 9783319461403
- 3319461400
- NETYS 2016
- Computer networks -- Congresses
- Wireless communication systems -- Congresses
- Mobile computing -- Congresses
- Cloud computing -- Congresses
- Réseaux d'ordinateurs -- Congrès
- Transmission sans fil -- Congrès
- Informatique mobile -- Congrès
- Infonuagique -- Congrès
- Algorithms & data structures
- Computer programming -- software development
- Software Engineering
- Information retrieval
- Network hardware
- Computers -- Programming -- Algorithms
- Computers -- Programming -- General
- Computers -- Software Development & Engineering -- General
- Computers -- Information Technology
- Computers -- Hardware -- Network Hardware
- Cloud computing
- Computer networks
- Mobile computing
- Wireless communication systems
- 004.6 23
- TK5105.5
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Includes author index.
Online resource; title from PDF title page (SpringerLink, viewed September 23, 2016).
This book constitutes the refereed post-proceedings of the 4th International Conference on Networked Systems, NETYS 2016, held in Marrakech, Morocco, in May 2016. The 22 full papers and 11 short papers presented together with 19 poster abstracts were carefully reviewed and selected from 121 submissions. They report on best practices and novel algorithms, results and techniques on networked systems and cover topics such as multi-core architectures, concurrent and distributed algorithms, parallel/concurrent/distributed programming, distributed databases, cloud systems, networks, security, and formal verification.
Intro -- Preface -- Organization -- Contents -- Nonrepudiation Protocols Without a Trusted Party -- 1 Introduction -- 2 Related Work -- 3 Nonrepudiation Protocols -- 4 Necessary and Sufficient Conditions for Nonrepudiation Protocols -- 5 Nonrepudiation Protocols with Message Loss -- 6 Necessary and Sufficient Conditions for Nonrepudiation Protocols with Message Loss -- 7 An -Nonrepudiation Protocol -- 8 Concluding Remarks -- References -- Exploiting Concurrency in Domain-Specific Data Structures: A Concurrent Order Book and Workload Generator for Online Trading -- 1 Introduction
2 Online Trading and the Order Book -- 3 A Concurrent Order Book -- 3.1 Coarse-Grained Locking -- 3.2 Two-Level Fine-Grained Locking -- 3.3 Toward Lock-Free Algorithms -- 4 Generating Workloads -- 5 Evaluation -- 6 Related Work -- 7 Conclusion -- References -- Fault Tolerant P2P RIA Crawling -- 1 Introduction -- 2 Related Work -- 3 Fault Tolerant RIA Crawling -- 3.1 Assumptions -- 3.2 Protocol Description -- 4 Data Recovery Mechanisms -- 4.1 Retry Strategy -- 4.2 Redundancy Strategy -- 4.3 Combined Strategy -- 5 Evaluation -- 5.1 Retry Strategy -- 5.2 Redundancy Strategy
5.3 Comparison of the Retry and the Redundancy Strategies When Controllers Are Not Overloaded -- 5.4 Combined Strategy -- 6 Conclusion -- References -- Nearest Neighbors Graph Construction: Peer Sampling to the Rescue -- 1 Introduction -- 2 The KNN Peer Sampling Service -- 3 Experimental Setup -- 3.1 NNDescent Algorithm -- 3.2 Datasets Description -- 3.3 Similarity Metrics -- 3.4 Evaluation Metrics -- 4 Experimental Results -- 4.1 Recall Versus Cost -- 4.2 Quality Versus Cost -- 4.3 Utility Study -- 4.4 Recall at Equal Cost -- 4.5 Discussion -- 5 Related Work -- 6 Conclusion -- References
Accurate Optimization Method for Allocation of Heterogeneous Resources in Embedded Systems -- Abstract -- 1 Introduction -- 2 Model of Embedded System -- 2.1 Hardware Platform Model -- 2.2 Application Model -- 3 Proposed Formulation -- 3.1 Notation -- 3.2 Quadratic Formulation -- 4 Case Study -- 5 Conclusion -- References -- Understanding the Memory Consumption of the MiBench Embedded Benchmark -- 1 Introduction -- 2 Platform -- 2.1 Hardware -- 2.2 Software Stack -- 3 Memory Profiler -- 3.1 Profiler Overview -- 3.2 Profiler Design Choices -- 4 Origins of the Memory Spikes -- 4.1 Methodology
4.2 I/O Functions -- 4.3 Operating System -- 4.4 Applications -- 5 Related Work -- 6 Conclusion -- References -- Benchmarking Energy-Centric Broadcast Protocols in Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 3 Our Model -- 4 Experimental Setup -- 5 Experimental Results and Discussion -- 5.1 Single Source Broadcast -- 5.2 Multiple Source Broadcast (Gossip) -- 5.3 Discussion -- 6 Conclusion -- References -- Transactional Pointers: Experiences with HTM-Based Reference Counting in C++ -- 1 Introduction -- 2 Background and Related Work -- 2.1 C++ Smart Pointers