Abstract is missing.
- Scal: A Benchmarking Suite for Concurrent Data StructuresAndreas Haas, Thomas Hütter, Christoph M. Kirsch, Michael Lippautz, Mario Preishuber, Ana Sokolova. 1-14 [doi]
- Verification of Buffered Dynamic Register AutomataParosh Aziz Abdulla, Mohamed Faouzi Atig, Ahmet Kara, Othmane Rezine. 15-31 [doi]
- Precise and Sound Automatic Fence Insertion Procedure under PSOParosh Aziz Abdulla, Mohamed Faouzi Atig, Magnus Lång, Tuan Phong Ngo. 32-47 [doi]
- Model Checking Dynamic Distributed SystemsCyriac Aiswarya. 48-61 [doi]
- Efficient State-Based CRDTs by Delta-MutationPaulo Sérgio Almeida, Ali Shoker, Carlos Baquero. 62-76 [doi]
- Concurrency in Snap-Stabilizing Local Resource AllocationKarine Altisen, Stéphane Devismes, Anaïs Durand. 77-93 [doi]
- Distributed Privacy-Preserving Data Aggregation via AnonymizationYahya Benkaouz, Mohammed Erradi, Bernd Freisleben. 94-108 [doi]
- Gracefully Degrading Consensus and k-Set Agreement in Directed Dynamic NetworksMartin Biely, Peter Robinson 0002, Ulrich Schmid, Manfred Schwarz, Kyrill Winkler. 109-124 [doi]
- Homonym Population ProtocolsOlivier Bournez, Johanne Cohen, Mikaël Rabie. 125-139 [doi]
- Aspect-Based Realization of Non-functional Concerns in Business ProcessesAnis Charfi, Haolin Zhi. 140-154 [doi]
- Verifying Concurrent Data Structures Using Data-ExpansionTong Che. 155-169 [doi]
- Improving Cognitive Radio Wireless Network Performances Using Clustering Schemes and Coalitional GamesImane Daha Belghiti, Ismail Berrada, Mohamed El-Kamili. 170-182 [doi]
- Optimal Torus Exploration by Oblivious RobotsStéphane Devismes, Anissa Lamani, Franck Petit, Sébastien Tixeuil. 183-199 [doi]
- Source Routing in Time-Varing Lossy NetworksDacfey Dzung, Rachid Guerraoui, David Kozhaya, Yvonne Anne Pignolet. 200-215 [doi]
- A Fully Distributed Learning Algorithm for Power Allocation in Heterogeneous NetworksHajar Elhammouti, Loubna Echabbi, Rachid El Azouzi. 216-229 [doi]
- Packet Scheduling over a Wireless Channel: AQT-Based Constrained JammingAntonio Fernández Anta, Chryssis Georgiou, Elli Zavou. 230-245 [doi]
- Fisheye Consistency: Keeping Data in Synch in a Georeplicated WorldRoy Friedman, Michel Raynal, François Taïani. 246-262 [doi]
- Peer-to-Peer Full-Text Keyword Search of the WebSonia Gaied Fantar, Habib Youssef. 263-277 [doi]
- Profiling Transactional ApplicationsVincent Gramoli, Rachid Guerraoui, Anne-Marie Kermarrec. 278-292 [doi]
- Disaster-Tolerant Storage with SDNVincent Gramoli, Guillaume Jourjon, Olivier Mehani. 293-307 [doi]
- On the Complexity of LinearizabilityJad Hamza. 308-321 [doi]
- Antichains for the Verification of Recursive ProgramsLukás Holík, Roland Meyer. 322-336 [doi]
- BaPu: Efficient and Practical Bunching of Access Point UplinksTao Jin, Triet D. Vo-Huu, Erik-Oliver Blass, Guevara Noubir. 337-353 [doi]
- Memory Efficient Self-stabilizing Distance-k Independent Dominating Set ConstructionColette Johnen. 354-366 [doi]
- Optimizing Diffusion Time of the Content Through the Social Networks: Stochastic Learning GameSoufiana Mekouar, Sihame El-Hammani, Khalil Ibrahimi, El-Houssine Bouyakhf. 367-381 [doi]
- Tracking Causal Dependencies in Web Services Orchestrations Defined in ORCMatthieu Perrin, Claude Jard, Achour Mostéfaoui. 382-396 [doi]
- Web Services Trust Assessment Based on Probabilistic DatabasesZohra Saoud, Noura Faci, Zakaria Maamar, Djamal Benslimane. 397-410 [doi]
- Virtual and Consistent Hyperbolic Tree: A New Structure for Distributed Database ManagementTelesphore Tiendrebeogo, Damien Magoni. 411-425 [doi]
- EPiC: Efficient Privacy-Preserving Counting for MapReduceTriet D. Vo-Huu, Erik-Oliver Blass, Guevara Noubir. 426-443 [doi]
- A Thrifty Universal ConstructionCheng Wang, Rachid Guerraoui. 444-455 [doi]
- Knowledgeable ChunkingBertil Chapuis, Benoît Garbinato. 456-460 [doi]
- Enhancing Readers-Writers Exclusion with Upgrade/Downgrade PrimitivesMichael Diamond, Prasad Jayanti, Jake Leichtling. 461-467 [doi]
- Context-Based Query Expansion Method for Short Queries Using Latent Semantic AnalysesBtihal El Ghali, Abderrahim El Qadi, Mohamed Ouadou, Driss Aboutajdine. 468-473 [doi]
- Towards a Formal Semantics and Analysis of BPMN GatewaysOutman El Hichami, Mohamed Naoum, Mohammed Al Achhab, Ismail Berrada, Badr Eddine El Mohajir. 474-478 [doi]
- A User Centered Design Approach for Transactional Service Adaptation in Context Aware EnvironmentWidad Ettazi, Hatim Hafiddi, Mahmoud Nassar. 479-484 [doi]
- A Self-stabilizing PIF Algorithm for Educated Unique Process SelectionOday Jubran, Oliver E. Theel. 485-489 [doi]
- Coalitional Game Theory for Cooperative Transmission in VANET: Internet Access via Fixed and Mobile GatewaysAbdelfettah Mabrouk, Abdellatif Kobbane, Essaid Sabir, Mohammed El Koutbi. 490-495 [doi]
- Performance Evaluation for Ad hoc Routing Protocols in Realistic Physical LayerHassan Faouzi, Hicham Mouncif, Mohamed Lamsaadi. 496-500 [doi]
- Understanding Cloud Storage Services Usage: A Practical Case StudyDaniela Oliveira, Paulo Carvalho, Solange Rito Lima. 501-506 [doi]
- Towards an Optimal Pricing for Mobile Virtual Network OperatorsMohammed Raiss El-Fenni, Mohamed El-Kamili, Sidi Ahmed Ezzahidi, Ismail Berrada, El-Houssine Bouyakhf. 507-512 [doi]
- Modeling and Implementation Approach to Evaluate the Intrusion Detection SystemMohammed Saber, Sara Chadli, Mohamed Emharraf, Ilhame El Farissi. 513-517 [doi]
- Trust Based Energy Preserving Routing Protocol in Multi-hop WSNSaima Raza, Waleej Haider, Nouman M. Durrani, Nadeem Kafi Khan, Mohammad Asad Abbasi. 518-523 [doi]