000 | 05250nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-3-642-33536-5 | ||
003 | DE-He213 | ||
005 | 20160624102218.0 | ||
007 | cr nn 008mamaa | ||
008 | 120928s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642335365 _9978-3-642-33536-5 |
||
024 | 7 |
_a10.1007/978-3-642-33536-5 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM075000 _2bisacsh |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aStabilization, Safety, and Security of Distributed Systems _h[electronic resource] : _b14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012. Proceedings / _cedited by Andréa W. Richa, Christian Scheideler. |
260 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
300 |
_aXIX, 330 p. 70 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7596 |
|
505 | 0 | _aCommunication-Efficient Self-stabilization in Wireless Networks -- Self-stabilizing Local k-Placement of Replicas with Minimal Variance -- Self-stabilizing Algorithm for Maximal Graph Partitioning into Triangles -- Brief Announcement: Self-stabilizing Synchronization of Arbitrary Digraphs in Presence of Faults -- Brief Announcement: Self-stabilizing Silent Disjunction in an Anonymous Network -- On the Self-stabilization of Mobile Oblivious Robots in Uniform Rings -- Optimal Grid Exploration by Asynchronous Oblivious Robots -- Terminating Population Protocols via Some Minimal Global Knowledge Assumptions -- Brief Announcement: The Degrading Effect of Forgetting on a Synchronizer -- Brief Announcement: Mobile Agent Rendezvous on Edge Evolving Rings -- High-Level Executable Specifications of Distributed Algorithms -- Formal Verification of Security Preservation for Migrating Virtual Machines in the Cloud -- Evaluating Practical Tolerance Properties of Stabilizing Programs through Simulation: The Case of Propagation of Information with Feedback -- Self-stabilizing End-to-End Communication in (Bounded Capacity, Omitting, Duplicating and non-FIFO) Dynamic Networks (Extended Abstract) -- Self-stabilizing Distributed Data Fusion -- From Self- to Self-stabilizing with Service Guarantee 1-hop Weight-Based Clustering -- Brief Announcement: Verification of Stabilizing Programs with SMT Solvers -- Brief Announcement: MP-State: State-Aware Software Model Checking of Message-Passing Systems -- Oblivious Assignment with m Slots -- BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom filters -- DQMP: A Decentralized Protocol to Enforce Global Quotas in Cloud Environments -- Brief Announcement: KARYON: Towards Safety Kernels for Cooperative Vehicular Systems -- Brief Announcement: Arbitrators in the Security Infrastructure -- Optimization in a Self-stabilizing Service Discovery Framework for Large Scale Systems -- Scalable Byzantine Agreement with a Random Beacon -- On Finding Better Friends in Social Networks -- Brief Announcement: Detecting Users’ Connectivity on Online Social Networks -- Brief Announcement: Discovering and Assessing Fine-Grained Metrics in Robot Networks Protocols -- All-to-All Gradecast Using Coding with Byzantine Failures -- Fault-Tolerant Exploration of an Unknown Dangerous Graph by Scattered Agents -- A Theory of Fault Recovery for Component-Based Models. | |
520 | _aThis book constitutes the refereed proceedings of the 14th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2012, held in Toronto, Canada, in October 2012. The 21 full papers and 10 brief announcements presented in this volume were carefully reviewed and selected from 75 submissions. The conference provides a wide spectrum of topics, covered in the following tracks: self-stabilization, ad-hoc and sensor networks, fault-tolerance and dependable systems, safety and security, cloud computing, formal methods, social networks, peer-to-peer, self-organizing and autonomic systems. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aData protection. | |
650 | 0 | _aComputer software. | |
650 | 0 | _aLogic design. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aSoftware Engineering. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
650 | 2 | 4 | _aLogics and Meanings of Programs. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
650 | 2 | 4 | _aSystems and Data Security. |
700 | 1 |
_aRicha, Andréa W. _eeditor. |
|
700 | 1 |
_aScheideler, Christian. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642335358 |
786 | _dSpringer | ||
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7596 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-33536-5 |
942 |
_2EBK10505 _cEBK |
||
999 |
_c39799 _d39799 |