Stabilization, Safety, and Security of Distributed Systems

13th International Symposium, SSS 2011, Grenoble, France, October 10-12, 2011. Proceedings

Editors:

ISBN: 978-3-642-24549-7 (Print) 978-3-642-24550-3 (Online)

Table of contents (41 chapters)

previous Page of 3
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-3

    Silence Is Golden: Self-stabilizing Protocols Communication-Efficient after Convergence

  3. No Access

    Book Chapter

    Pages 4-4

    Computing in Time-Varying Networks

  4. No Access

    Book Chapter

    Pages 5-18

    The K-Observer Problem in Computer Networks

  5. No Access

    Book Chapter

    Pages 19-31

    Pragmatic Self-stabilization of Atomic Memory in Message-Passing Systems

  6. No Access

    Book Chapter

    Pages 32-46

    An Algorithm for Implementing BFT Registers in Distributed Systems with Bounded Churn

  7. No Access

    Book Chapter

    Pages 47-61

    Computing Time Complexity of Population Protocols with Cover Times - The ZebraNet Example

  8. No Access

    Book Chapter

    Pages 62-76

    Building Self-stabilizing Overlay Networks with the Transitive Closure Framework

  9. No Access

    Book Chapter

    Pages 77-91

    Active Stabilization

  10. No Access

    Book Chapter

    Pages 92-107

    Robot Networks with Homonyms: The Case of Patterns Formation

  11. No Access

    Book Chapter

    Pages 108-119

    A Non-topological Proof for the Impossibility of k-Set Agreement

  12. No Access

    Book Chapter

    Pages 120-134

    Formal Verification of Consensus Algorithms Tolerating Malicious Faults

  13. No Access

    Book Chapter

    Pages 135-147

    The Computational Power of Simple Protocols for Self-awareness on Graphs

  14. No Access

    Book Chapter

    Pages 148-162

    Self-stabilizing Labeling and Ranking in Ordered Trees

  15. No Access

    Book Chapter

    Pages 163-177

    Fault-Tolerant Algorithms for Tick-Generation in Asynchronous Logic: Robust Pulse Generation

  16. No Access

    Book Chapter

    Pages 178-192

    The South Zone: Distributed Algorithms for Alliances

  17. No Access

    Book Chapter

    Pages 193-207

    Social Market: Combining Explicit and Implicit Social Networks

  18. No Access

    Book Chapter

    Pages 208-222

    TrumanBox: Improving Dynamic Malware Analysis by Emulating the Internet

  19. No Access

    Book Chapter

    Pages 223-237

    Rendezvous Tunnel for Anonymous Publishing: Clean Slate and Tor Based Designs

  20. No Access

    Book Chapter

    Pages 238-252

    Snake: Control Flow Distributed Software Transactional Memory

  21. No Access

    Book Chapter

    Pages 253-267

    POLISH: Proactive Co-operative LInk Self-Healing for Wireless Sensor Networks

previous Page of 3