Accepted papers

Long papers:

Fisheye Consistency: Keeping Data in Synch in a Georeplicated World
Roy Friedman, Michel Raynal and Francois Taiani.

Profiling Transactional Applications
Vincent Gramoli, Rachid Guerraoui and Anne-Marie Kermarrec.

Disaster-Tolerant Storage with SDN
Vincent Gramoli, Guillaume Jourjon and Olivier Mehani.

BaPu: Efficient and Practical Bunching of Access Point Uplinks
Tao Jin, Triet D. Vo-Huu, Erik-Oliver Blass and Guevara Noubir.

EPiC: Efficient Privacy-Preserving Counting for MapReduce
Triet D. Vo-Huu, Erik-Oliver Blass and Guevara Noubir.

Virtual and Consistent Hyperbolic-Tree: A new structure for distributed database management
Telesphore Tiendrebeogo and Damien Magoni.

Verifying Concurrent Data Structures Using Data-Expansion
Tong Che.

Source Routing in Time-Varing Lossy Networks
Dacfey Dzung, Rachid Guerraoui, David Kozhaya and Yvonne-Anne Pignolet.

Memory efficient Self-Stabilizing distance-k Independent Dominating Set Construction
Colette Johnen.

Concurrency in Snap-Stabilizing Local Resource Allocation
Karine Altisen, Stéphane Devismes and Anaïs Durand.

A Thrifty Universal Construction
Cheng Wang and Rachid Guerraoui.

Improving Cognitive Radio Wireless Network Performances using clustering schemes and coalitional games
Imane Daha Belghiti, Ismail Berrada and Mohamed El Kamili.

Web Services Trust Assessment based on Probabilistic Databases
Zohra Saoud, Noura Faci, Zakaria Maamar and Djamal Benslimane.

On the Complexity of Linearizability
Jad Hamza.

Tracking causal dependencies in Web services orchestrations defined in ORC
Matthieu Perrin, Claude Jard and Achour Mostefaoui.

Peer-to-peer full-text keyword search of the Web
Sonia Gaied and Habib Youssef.

Optimizing Diffusion Time of the Content Through the Social Networks: Stochastic Learning Game
Soufiana Mekouar, Sihame El-Hammani, Khalil Ibrahimi and El-Houssine Bouyakhf.

Gracefully Degrading Consensus and k-Set Agreement in Directed Dynamic Networks
Martin Biely, Peter Robinson, Ulrich Schmid, Manfred Schwarz and Kyrill Winkler.

Packet Scheduling over a Wireless Channel: AQT-based Constrained Jamming
Antonio Fernandez Anta, Chryssis Georgiou and Elli Zavou.

Efficient State-based CRDTs by Delta-Mutation
Paulo Sérgio Almeida, Ali Shoker and Carlos Baquero.

An Anti Chain-based Approach to Recursive Program Verification
Lukas Holik and Roland Meyer.

Optimal Torus Exploration by Oblivious Robots
Stéphane Devismes, Anissa Lamani, Franck Petit and Sebastien Tixeuil.

Model Checking Dynamic Distributed Systems
Cyriac Aiswarya.

Homonym Population Protocols, or Providing a Small Space of Computation Using a Few Identifiers
Olivier Bournez, Johanne Cohen and Mikaël Rabie.

On the Verification Problem for communicating Register Automata
Parosh Aziz Abdulla, Mohamed Faouzi Atig, Ahmet Kara and Othmane Rezine.

Precise and Sound Automatic Fence Insertion Procedure under PSO
Parosh Aziz Abdulla, Mohamed Faouzi Atig, Magnus Lång and Tuan Phong Ngo.

Distributed Privacy-preserving Data Aggregation via Anonymization
Yahya Benkaouz, Mohammed Erradi and Bernd Freisleben.

A Fully Distributed Learning Algorithm for Power Allocation in HETNETS
Hajar Elhammouti, Loubna Echabbi and Rachid Elazzouzi.

Aspect-based Realization of non-functional Concerns in Business Processes
Anis Charfi and Haolin Zhi.

Short papers:

Knowledgeable chunking
Bertil Chapuis and Benoît Garbinato.

Performance evaluation for ad hoc routing protocols in realistic physical layer
Hassan Faouzi, Hicham Mouncif and Mohamed Lamsaadi.

Modeling and implementation approach to evaluate the intrusion detection system
Mohammed Saber, Sara Chadli, Mohamed Emharraf and Ilhame El Farissi.

Understanding Cloud Storage Services Usage: A Practical Case Study
Daniela Oliveira, Paulo Carvalho and Solange Rito Lima.

Coalitional Game Theory for Cooperative Transmission in VANET: Internet Access via Fixed and Mobile Gateways
Abdelfettah Mabrouk, Kobbane Abdellatif, Essaid Sabir and Mohammed El Koutbi.

Enhancing Readers-Writers Exclusion with Upgrade/Downgrade
Michael Diamond, Prasad Jayanti and Jake Leichtling.

Towards a formal semantics and analysis of BPMN gateways
Outman El Hichami, Mohamed Naoum, Mohammed Al Achhab, Ismail Berrada and Badr Eddine El Mohajir.

Context-based query expansion method for short queries using Latent Semantic Analyses
Btihal El Ghali, Abderrahim El Qadi, Mohamed Ouadou and Driss Aboutajdine.

A User Centered Design Approach for Transactional Service Adaptation in Context Aware Environment
Widad Ettazi, Mahmoud Nassar and Hatim Hafiddi.

Self-Stabilizing PIF Algorithm for Educated Unique Process Selection
Oday Jubran and Oliver Theel.

Towards an Optimal Pricing for Mobile Virtual Network Operators
Mohammed Raiss El Fenni, Mohamed El Kamili, Sidi Ahmed Ezzahidi, Ismail Berrada and El Houssine Bouyakhf.

Trust Based Energy Preserving Routing Protocol in Multi-hop WSN
Saima Zaidi, Waleej Haider, Nouman M Durrani and Mohammad Asad Abbasi.

Dates [No Extensions]

January 9, 2015

Abstract submission deadline

January 18, 2015

Paper submission deadline

March 16, 2015

Acceptance notification

April 13, 2015

Camera ready copy due

Proceedings

SpringerLNCS

The proceedings of the conference will be published in Springer’s Lecture Notes in Computer Science

Sponsors

SponsorsNETYS2