Abstract is missing.
- On the Impossibility of Confidentiality, Integrity and Accessibility in Highly-Available File SystemsElena Yanakieva, Michael Youssef, Ahmad Hussein Rezae, Annette Bieniusa. 3-18 [doi]
- Byzantine GeoconsensusJoseph Oglio, Kendric Hood, Gokarna Sharma, Mikhail Nesterenko. 19-35 [doi]
- Loosely-self-stabilizing Byzantine-Tolerant Binary Consensus for Signature-Free Message-Passing SystemsChryssis Georgiou, Ioannis Marcoullis, Michel Raynal, Elad Michael Schiller. 36-53 [doi]
- Leader Election in Arbitrarily Connected Networks with Process Crashes and Weak Channel ReliabilityCarlos López, Sergio Rajsbaum, Michel Raynal, Karla Vargas. 54-70 [doi]
- Fault-Tolerant Termination Detection with Safra's AlgorithmGeorgios Karlos, Wan J. Fokkink, Per Fuchs. 71-87 [doi]
- Weak Amnesiac Flooding of Multiple MessagesZahra Bayramzadeh, Ajay D. Kshemkalyani, Anisur Rahaman Molla, Gokarna Sharma. 88-94 [doi]
- Optimal Exclusive Perpetual Grid Exploration by Luminous Myopic Robots Without Common ChiralityArthur Rauch, Quentin Bramas, Stéphane Devismes, Pascal Lafourcade 0001, Anissa Lamani. 95-110 [doi]
- AUCCCR: Agent Utility Centered Clustering for Cooperation RecommendationAmaury Bouchra Pilet, Davide Frey, François Taïani. 111-125 [doi]
- Blockchain Using Proof-of-InteractionJean-Philippe Abegg, Quentin Bramas, Thomas Noël. 129-143 [doi]
- LighTx: A Lightweight Proof-of-Bandwidth Transactions Transfer SystemImane El Abid, Yahya Benkaouz, Ahmed Khoumsi. 144-160 [doi]
- Efficient and Secure TSA for the TangleQuentin Bramas. 161-166 [doi]
- Separating Map Variables in a Logic-Based Intermediate Verification LanguageDaniel Dietsch, Matthias Heizmann, Jochen Hoenicke, Alexander Nutz, Andreas Podelski. 169-186 [doi]
- Petri Net Invariant SynthesisPeter Chini, Florian Furbach. 187-205 [doi]
- Towards Efficient Shape Analysis with Tree AutomataMartin Hruska, Lukás Holík. 206-214 [doi]
- Deciding S1S: Down the Rabbit Hole and Through the Looking GlassVojtech Havlena, Ondrej Lengál, Barbora Smahlíková. 215-222 [doi]
- BAM: Efficient Model Checking for BarriersMichalis Kokologiannakis, Viktor Vafeiadis. 223-239 [doi]
- Verifying and Optimizing the HMCS Lock for Arm ServersJonas Oberhauser, Lilith Oberhauser, Antonio Paolillo, Diogo Behrens, Ming Fu, Viktor Vafeiadis. 240-260 [doi]