Abstract is missing.
- Abandonment Attack on the LEACH ProtocolAlbatool Alhawas, Nigel Thomas. 1-15 [doi]
- Coherent Resolutions of NondeterminismMarco Bernardo 0001. 16-32 [doi]
- Emulating Self-adaptive Stochastic Petri NetsLorenzo Capra, Matteo Camilli. 33-49 [doi]
- Design and Evaluation of an Edge Concurrency Control Protocol for Distributed Graph DatabasesPaul D. Ezhilchelvan, Isi Mitrani, Jack Waudby, Jim Webber. 50-64 [doi]
- A Novel Data-Driven Algorithm for the Automated Detection of Unexpectedly High Traffic Flow in Uncongested Traffic StatesBo Klaasse, Rik Timmerman, Tessel van Ballegooijen, Marko A. A. Boon, Gerard Eijkelenboom. 65-83 [doi]
- A Network Aware Resource Discovery ServiceLuigi Liquori, Rossano Gaeta, Matteo Sereno. 84-99 [doi]
- EthExplorer: A Tool for Forensic Analysis of the Ethereum BlockchainYuriy Marchenko, William J. Knottenbelt, Katinka Wolter. 100-117 [doi]
- A Queueing Model that Works Only on the Biggest JobsAndrea Marin, Sabina Rossi. 118-132 [doi]
- Performance Evaluation of Thermal-Constrained Scheduling Strategies in Multi-core SystemsMuhammad Usama Sardar, Clemens Dubslaff, Sascha Klüppelholz, Christel Baier, Akash Kumar 0001. 133-147 [doi]
- Bounding the Rate of Convergence for One Class of Finite Capacity Time Varying Markov QueuesAlexander I. Zeifman, Yacov Satin, Rostislav Razumchik, Anastasia Kryukova, Galina Shilova. 148-159 [doi]