Program
WEDNESDAY June 19th | |
08:00 – 09:00 | Registration |
09:00 – 09:30 | NETYS Opening Session |
09:30 – 10:30 | Keynote Talk 1: (Chair: Mohammed Faouzi Atig) Suresh Jagannathan, Automated Reasoning for Weak Consistency |
10:30 – 11:00 | Coffee Break |
11:00 – 12:15 | Session 1: Verification I (Chair: Paul Attie) |
12:15 – 14:00 | Lunch |
14:00 – 15:00 | Keynote Talk 2: (Chair: Alexander A. Schwarzmann) Marc Shapiro, Living on the edge, safely or: Life without consensus |
15:00 – 16:00 | Session 2: Distribution I (Chair: Michel Raynal) |
16:00 – 16:30 | Coffee Break |
16:30 – 17:30 | Session 3: Security 1 (Chair: Ismail Berrada) |
17:30 – 17:50 | Invited Talk: Rachid Guerraoui, How to write a bad research paper |
THURSDAY June 20th | |
08:00 – 09:00 | Registration |
09:00 – 10:00 | Keynote talk 3: (Chair: Ahmed Bouajjani) Parosh Aziz Abdullah, On Program Verification under the Release-Acquire Semantics |
10:00 – 10:30 | Coffee Break |
10:30 – 12:00 | Session 4: Concurrency (Chair: Mohamed Faouzi Atig) |
12:00 – 14:00 | Lunch |
14:00 – 15:00 | Keynote Talk 4 (Chair:Cezara Dragoi) Dariusz Kowalski, On the complexity of fault-tolerant consensus |
15:00 – 16:00 | Session 5: Distribution II (Chair: Dariusz Kowalski) |
16:00 – 16:30 | Coffee Break |
16:30 – 17:30 | Session 6: Verification II (Chair: Youssef Iraki) |
20:00 | Gala Dinner |
FRIDAY June 21th | |
09:00 – 10:00 | Keynote talk 5: (Chair: Roland Meyer) Somesh Jha, Towards Semantic Adversarial Examples |
10:00 – 10:30 | Coffee Break |
10:30 – 12:00 | Session 7: Distribution III (Chair: Achour Mostefaoui) |
12:00 – 14:00 | Lunch |
14:00 – 15:50 | Keynote Talk 6: (Chair: Constantin Enea) Paul Attie, How to structure your concurrent program and its verification |
15:00 – 16:00 | Session 8: Security II (Chair : Yahya Benkaouz) |
16:00– 16:30 | Coffee Break |
16:30 – 17:45 | Session 9: Networks (Chair : Abdellah Boulouz) |
17:45 – 18:00 | Closing Session |
Details:
- - Rachid Zennou, Ranadeep Biswas, Ahmed Bouajjani, Constantin Enea and Mohammed Erradi. Checking Causal Consistency of Distributed Databases.
- - Peter Chini, Roland Meyer and Prakash Saivasan. Liveness in Broadcast Networks.
- - (Short Paper) Achraf Lyazidi and Salma Mouline. Formal Verification of UML State Machine Diagrams using Petri Nets.
- - Chryssis Georgiou, Robert Gustafsson, Andreas Lindhé and Elad Michael Schiller. Self-stabilization overhead: a case study on coded atomic storage
- - Chryssis Georgiou and Elad Michael Schiller. Self-Stabilizing Snapshot Objects on Top of Asynchronous Fail-Prone Message-Passing Systems
- - Zouhair Chiba, Noreddine Abghour, Khalid Moussaid, Amina El Omri and Mohamed Rida. An Efficient network IDS for Cloud Environments Based on a Combination of Deep Learning and an Optimized Self-Adaptive Heuristic Search Algorithm
- - Maryem Ait El Hadj, Ahmed Khoumsi, Yahya Benkaouz and Mohammed Erradi. Efficient Security Policy Management using Suspicious Rules through Access Log Analysis
- - Ved Chaudhary, Chirag Juyal, Sandeep Kulkarni, Sweta Kumari and Sathya Peri. Achieving Starvation-Freedom in Multi-Version Transactional Memory Systems
- - Emmanuel Godard, Damien Imbs, Michel Raynal and Gadi Taubenfeld. Mutex-based Desanonymization of an Anonymous Read/Write Memory
- - Sathya Peri, Muktikanta Sa and Nandini Singhal. A Pragmatic Non-blocking Concurrent Directed Acyclic Graph
- - Antoine Durand, Emmanuelle Anceaume and Ludinard Romaric. StakeCube: Combining Sharding and Proof-of-Stake to build Fork-free Secure Permissionless Distributed Ledgers
- - Yackolley Amoussou-Guenou, Antonella Del Pozzo, Maria Potop-Butucaru and Sara Tucci-Piergiovanni. Dissecting Tendermint
- - Yu-Fang Chen, Hsiao-Chen Chung, Wen-Chi Hung, Ming-Hsien Tsai, Bow-Yaw Wang and Farn Wang. Synthesize Models for Quantitative Analysis using Automata Learning
- - Thibaut Balabonski, Pierre Courtieu, Robin Pelle, Lionel Rieg, Sebastien Tixeuil and Xavier Urbain. Continuous vs. Discrete Asynchronous Moves: a Certified Approach for Mobile Robots on Graphs
- - Samuel Irving, Sui Chen, Lu Peng, Costas Busch, Maurice Herlihy, Faen Zhang and Chris J Michael. CUDA-DTM: Distributed Transactional Memory for GPU Clusters
- - Carole Delporte-Gallet, Hugues Fauconnier, Yan Jurski, François Laroussinie and Arnaud Sangnier. Towards synthesis of distribued algorithms with SMT solvers
- - Prasad Jayanti and Anup Joshi. Recoverable Mutual Exclusion with Abortability
- - Mohamed Amine Rguibi and Moussa Najem. A Vaccination Game for Mitigation Active Worms Propagation in P2P Networks
- - (Short Paper) Vidal Attias and Quentin Bramas. How to Choose its Parents in the Tangle
- - (Short Paper) Meryem Cherkaoui Semmouni, Abderrahmane Nitaj and Mostafa Belkasmi. Bitcoin Security with Post Quantum Cryptography
- - Oana Balmau, Rachid Guerraoui, Anne-Marie Kermarrec, Alexandre Maurer, Matej Pavlovic and Willy Zwaenepoel. The Fake News Vaccine
- - Quentin Bramas, Toshimitsu Masuzawa and Sebastien Tixeuil. Distributed Online Data Aggregation in Dynamic Graphs
- - (Short Paper) Jabrane Kachaoui and Abdessamad Belangour. A Multi-Criteria Group Decision Making Method for Big Data Storage Selection
Dates
Extended deadlines
March 09, 2019
Abstract submission deadline
March 16, 2019
Paper submission deadline
April 27, 2019
Acceptance notification
May 24, 2019
Camera ready copy due