Abstract is missing.
- Dynamic Partial Order Reduction Under the Release-Acquire Semantics (Tutorial)Parosh Aziz Abdulla, Mohamed Faouzi Atig, Bengt Jonsson, Tuan Phong Ngo. 3-18 [doi]
- On the Complexity of Fault-Tolerant ConsensusDariusz R. Kowalski, Jaroslaw Mirek. 19-31 [doi]
- Checking Causal Consistency of Distributed DatabasesRachid Zennou, Ranadeep Biswas, Ahmed Bouajjani, Constantin Enea, Mohammed Erradi. 35-51 [doi]
- Liveness in Broadcast NetworksPeter Chini, Roland Meyer 0001, Prakash Saivasan. 52-66 [doi]
- Formal Verification of UML State Machine Diagrams Using Petri NetsAchraf Lyazidi, Salma Mouline. 67-74 [doi]
- Synthesize Models for Quantitative Analysis Using Automata LearningYu-Fang Chen, Hsiao-chen Chung, Wen-Chi Hung, Ming-Hsien Tsai, Bow-Yaw Wang, Farn Wang. 75-92 [doi]
- Continuous vs. Discrete Asynchronous Moves: A Certified Approach for Mobile RobotsThibaut Balabonski, Pierre Courtieu, Robin Pelle, Lionel Rieg, Sébastien Tixeuil, Xavier Urbain. 93-109 [doi]
- Self-stabilizing Snapshot Objects for Asynchronous Failure-Prone Networked SystemsChryssis Georgiou, Oskar Lundström, Elad Michael Schiller. 113-130 [doi]
- Self-stabilization Overhead: A Case Study on Coded Atomic StorageChryssis Georgiou, Robert Gustafsson, Andreas Lindhé, Elad Michael Schiller. 131-147 [doi]
- StakeCube: Combining Sharding and Proof-of-Stake to Build Fork-Free Secure Permissionless Distributed LedgersAntoine Durand, Emmanuelle Anceaume, Romaric Ludinard. 148-165 [doi]
- Dissecting TendermintYackolley Amoussou-Guenou, Antonella Del Pozzo, Maria Potop-Butucaru, Sara Tucci Piergiovanni. 166-182 [doi]
- CUDA-DTM: Distributed Transactional Memory for GPU ClustersSamuel Irving, Sui Chen, Lu Peng, Costas Busch, Maurice Herlihy, Christopher J. Michael. 183-199 [doi]
- Towards Synthesis of Distributed Algorithms with SMT SolversCarole Delporte-Gallet, Hugues Fauconnier, Yan Jurski, François Laroussinie, Arnaud Sangnier. 200-216 [doi]
- Recoverable Mutual Exclusion with AbortabilityPrasad Jayanti, Anup Joshi. 217-232 [doi]
- An Efficient Network IDS for Cloud Environments Based on a Combination of Deep Learning and an Optimized Self-adaptive Heuristic Search AlgorithmZouhair Chiba, Noreddine Abghour, Khalid Moussaid, Amina El Omri, Mohamed Rida. 235-249 [doi]
- Efficient Security Policy Management Using Suspicious Rules Through Access Log AnalysisMaryem Ait El Hadj, Ahmed Khoumsi, Yahya Benkaouz, Mohammed Erradi. 250-266 [doi]
- A Vaccination Game for Mitigation Active Worms Propagation in P2P NetworksMohamed Amine Rguibi, Najem Moussa. 267-274 [doi]
- How to Choose Its Parents in the TangleVidal Attias, Quentin Bramas. 275-280 [doi]
- Bitcoin Security with Post Quantum CryptographyMeryem Cherkaoui Semmouni, Abderrahmane Nitaj, Mostafa Belkasmi. 281-288 [doi]
- Achieving Starvation-Freedom in Multi-version Transactional Memory SystemsVed Prakash Chaudhary, Chirag Juyal, Sandeep S. Kulkarni, Sweta Kumari, Sathya Peri. 291-310 [doi]
- Mutex-Based De-anonymization of an Anonymous Read/Write MemoryEmmanuel Godard, Damien Imbs, Michel Raynal, Gadi Taubenfeld. 311-326 [doi]
- A Pragmatic Non-blocking Concurrent Directed Acyclic GraphSathya Peri, Muktikanta Sa, Nandini Singhal. 327-344 [doi]
- The Fake News Vaccine - A Content-Agnostic System for Preventing Fake News from Becoming ViralOana Balmau, Rachid Guerraoui, Anne-Marie Kermarrec, Alexandre Maurer, Matej Pavlovic, Willy Zwaenepoel. 347-364 [doi]
- Distributed Online Data Aggregation in Dynamic GraphsQuentin Bramas, Toshimitsu Masuzawa, Sébastien Tixeuil. 365-380 [doi]
- A Multi-criteria Group Decision Making Method for Big Data Storage SelectionJabrane Kachaoui, Abdessamad Belangour. 381-386 [doi]