Baddi Youssef and Ech-Chrif El Kettani Mohammed Dafir. OSM-GKM Optimal Shared Multicast-based solution for group key management in mobile IPv6.
Driss Ait Omar, Mohamed EL AMRANI, Mohamed Baslam and Mohamed Fakir. A Game-Theoretic Approach for the Internet Content Distribution Chain.
Gadi Taubenfeld. Weak Failures: Definitions, Algorithms and Impossibility Results.
Gokarna Sharma, Costas Busch and Supratik Mukhopadhyay. Complete Visibility for Oblivious Robots in O(N) Time.
Dianne Foreback, Mikhail Nesterenko and Sebastien Tixeuil. Churn Possibilities and Impossibilities.
Hamid Garmani, M’hamed Outanoute, Mohamed Baslam and Mustapha Jourhmane. New Competition-Based Approach for Caching Popular Content in ICN.
Antonio Fernandez Anta, Chryssis Georgiou, Kishori Konwar and Nicolas Nicolaou. Formalizing and Implementing Distributed Ledger Objects.
Meryam Zeryouh, Mohamed El Marraki and Mohamed Essalih. A Measure for Quantifying the Topological Structure of Some Networks.
Sathya Peri, Ajay Singh and Archit Somani. Efficient means of Achieving Composability using Object based Semantics in Transactional Memory Systems.
Chryssis Georgiou, Theophanis Hadjistasi, Nicolas Nicolaou and Alexander Schwarzmann. Unleashing and Speeding Up Readers in Atomic Object Implementations.
Khadija Letrache, Omar El Beggar and Mohammed Ramdani. Comparative analysis of our association rules based approach and a genetic approach for OLAP partitioning.
Prasad Jayanti, Siddhartha Jayanti and Anup Joshi. Optimal Recoverable Mutual Exclusion using only FASAS.
Iosif Salem and Elad Michael Schiller. Practically-Self-Stabilizing Vector Clocks in the Absence of Execution Fairness.
Vitaly Aksenov, Petr Kuznetsov and Anatoly Shalyto. On Helping and Stacks.
Masashi Tsuchida, Fukuhito Ooshita and Michiko Inoue. Gathering of Mobile Agents in Asynchronous Byzantine Environments with Authenticated Whiteboards.
Rachid Guerraoui and Jingjing Wang. On the Unfairness of Blockchain.
Michel Raynal and Jiannong Cao. Anonymity in Distributed Read/Write Systems: a Short Introduction.
Ahmed Khoumsi and Mohammed Erradi. Automata-Based Bottom-Up Design of Conflict-Free Security Policies Specified as Policy Expressions.
Carole Delporte-Gallet, Hugues Fauconnier, Sergio Rajsbaum and Nayuta Yanagisawa. An anonymous wait-free weak-set object implementation.
Marcio Diaz and Tayssir Touili. Model Checking Dynamic Pushdown Networks with Locks and Priorities.
Sylvain Conchon, Giorgio Delzanno and Angelo Ferrando. Declarative Parameterized Verification of Topology-Sensitive Distributed Protocols.
Ahmed Bouajjani, Constantin Enea, Madhavan Mukund and Rajarshi Roy. On Verifying TSO Robustness for Event-Driven Asynchronous Programs
Anass Rachdi, Abdeslam En-Nouaary and Mohamed Dahchour. BPMN Process Analysis: A formal Validation and Verification Eclipse Plugin for BPMN Process Models.
Sébastien Vaucher, Valerio Schiavoni and Pascal Felber. Stress-SGX: Load and Stress your Enclaves for Fun and Profit.
Muktikanta Sa. Maintenance of Strongly Connected Component in Shared-memory Graph.
Michiko Inoue and Sebastien Tixeuil. Tight Bounds for Universal and Cautious Self-stabilizing 1-Maximal Matching.
Ayidh Alharbi and Tahar M Kechadi. Application of Noisy Attacks on Image Steganography.
Radia Belkeziz and Zahi Jarir. IoT Context-Driven Architecture: Characterization of the Behavioral Aspect.
Rachid Guerraoui, Anne-Marie Kermarrec, Olivier Ruas and Francois Taiani. Fingerprinting Big Data.
Kaoutar Sefrioui Boujemaa, Ismail Berrada and Khalid Fardousse. Arabic Text Recognition in Highway Traffic Panels.
Manal Zettam, Jalal Laassiri and Nourdddine Enneya. A MapReduce-based Adjoint Method to Predict the Levenson Self Report Psychopathy Scale Value.
Sliman Rajaa, Abdellah Boulouz and Mohamed Bensalah. Optimization of RPL Objective Function based on Combined Metrics.
Youness Madani, Mohammed Erritali and Jamaa Bengourram. A Hybrid Multilingual Sentiment Classification using Fuzzy Logic and Semantic Similarity.
Salah-Eddine Ramah, Karim Bouhbouh, Afaf Bouhoute and Ismail Berrada. Driving Maneuver Recognition Using Phone Sensors.
Mohamed Amine Belhamra and El Mamoun Souidi. Network coding and Applications.
Nadir Sahllal and El Mamoun Souidi. Steganography on QR Codes.
Chirag Juyal, Sandeep Kulkarni, Sweta Kumari, Sathya Peri and Archit Somani. Innovative Approach to Achieve Compositionality Efficiently using Multi-Version Object Based Transactional Systems.
Hafsa Benaddi and Khalil Ibrahimi. Study of the intrusion detection system with KNN method for KDD99 data set.
March 09, 2019
Abstract submission deadline
March 16, 2019
Paper submission deadline
April 27, 2019
May 11, 2019
Camera ready copy due
Revised selected papers will be published as a post-proceedings in Springer's LNCS "Lecture Notes in Computer Science"
Partners & Sponsors (Pending)