Program

Detailed Final Program (PDF)

 

Wednesday May 1rst

17:00 – 20:00 Registration (in the lobby of Kenzi-Farah Hotel)

Thursday May 2nd

08:00 – 08:30 Registration (near the conference room)
08:30 – 08:45 Workshops Opening Session
08:45 – 10:15 Tutorial I -The Distributed Foundations of Data Management in the Cloud“, Amr El Abbadi, UCSB, USA
10:15 – 10:45 Break
10:45 – 12:45 Workshops
RAWSN WVNT PoliCE FIMPC
12:45 – 14:00 Lunch
14:00 – 15:30 Tutorial II -Modern Trends in High-Performance Computing“, Mootaz Elnnozahy, KAUST, KSA FIMPC
15:30 – 16:00 Break
16:00 – 18:00 Workshops
RAWSN WVNT PoliCE FIMPC

Friday May 3rd

08:30 – 09:00 Conference Opening Session
09:00 – 09:45 Invited talk I : “P2P, DSM, and Other Products of the Complexity Factory“, Willy Zwaenepoel, EPFL, Switzerland
09:45 – 10:30 Session I (Chair R. Guerraoui)
10:30 – 11:00 Break around the posters
11:00 – 12:30 Session II (Chair M. Raynal)
12:30 – 14:00 Lunch
14:00 – 14:45 Invited talk II : “Programming in the Big Data Era“, Mira Mezini, TUD, Germany
14:45 – 15:30 Short papers I (Chair R. Guerraoui)
15:30 – 16:00 Break around the posters
16:00 – 18:00 Short papers II (Chair A.M. Kermarrec)
20:30 GALA DINER

Saturday May 4th

09:00 – 09:45 Invited talk III : “Future Africa: technology“, Jonathan Ledgard.
09:45 – 10:30 Session III (Chair A.M. Kermarrec)
10:30 – 11:00 Break around the posters
11:00 – 12:30 Session IV (Chair G.V. Bochmann)
12:30 – 14:00 Lunch
14:00 – 15:30 Session V (Chair H. Fauconnier)
15:30 – 16:00 Break
16:00 – 17:00 Session VI (Chair B. Garbinato)
Closing Session

 

Details:

Workshops :

  • - RAWSN : RFID and Adaptive Wireless Sensor Networks
  • - WVNT: Vehicular Networks and Telematics
  • - PoliCY: Security Policies in Cloud Environment
  • - FIMCP: Formal and Informal Methods for Correctness and Performance
    -> Thursday May 2nd (10:45 – 12:30): Talks by T. Henzinger, K. Larsen, O. Maler, R. Grosu
    -> Thursday May 2nd (15:45 – 18:00): Talks by N. Bjorner, D. Nickovic, A. Legay

arrowup

Session I: (Chair R. Guerraoui)

  • - Armando Castaneda and Michel Raynal. On the Consensus Number of Non-Adaptive Perfect Renaming
  • - Sergio Arévalo, Ernesto Jiménez and Jian Tang. Set Agreement and the Loneliness Failure Detector in Crash-Recovery Systems

arrowup
Session II: (Chair M. Raynal)

  • - Carole Delporte-Gallet, Hugues Fauconnier, Eli Gafni and Sergio Rajsbaum. Black art: obstruction-free k-set agreement with $|MWMR~registers| < ~|proccesses|$
  • - Shlomi Dolev, Omri Liba and Elad Michael Schiller. Self-Stabilizing Byzantine Resilient Topology Discovery and Message Delivery
  • - Antoine Boutet, Davide Frey, Anne-Marie Kermarrec and Heverson Ribeiro. FreeRec: an Anonymous and Distributed Personalization Architecture

arrowup
Session III: (Chair A.M. Kermarrec)

  • - Ercan Ucan and Timothy Roscoe. Establishing efficient routes between personal clouds
  • - Benoit Garbinato, Adrian Holzer, Francois Vessaz and Arielle Moro. Developing, Deploying and Evaluating Protocols with ManetLab

arrowup
Session IV : (chair G.V. Bochmann)

  • - Mohamed Riduan Abid and Saad Biaz. Airtime Ping-Pong Effect in IEEE 802.11s Wireless Mesh Networks
  • - Mohammed Gabli, El Miloud Jaara and El Bekkaye Mermri. Planning UMTS base station location using genetic algorithm with a dynamic trade-off parameter
  • - Benlcouiri Younes, Benabdellah Mohammed, Ismail Moulay Chrif Ismaili and Azizi Abdelmalek. Video Encryption based on the Permutation of the ( Z/pZ ) Fields
  • - Víctor M. López Millán, Vicent Cholvi, Luis López and Antonio Fernández Anta. Improving Resource Location with Locally Precomputed Partial Random Walks

arrowup
Session V : (chair H. Fauconnier)

  • - Gregor V. Bochmann and Shah Asaduzzaman. Distributed B-Tree with Weak Consistency
  • - David Bermbach and Jörn Kuhlenkamp. Consistency in Distributed Storage Systems: An Overview of Models, Metrics and Measurement Approaches
  • - Yvonne-Anne Pignolet, Stefan Schmid and Gilles Tredan. Request Complexity of VNet Topology Extraction: Dictionary-Based Attacks
  • - Bogdan Chlebus, Vicent Cholvi and Dariusz Kowalski. Stability of Adversarial Routing with Feedback

arrowup
Session VI : (chair B. Garbinato)

  • - Yahya Benkaouz and Mohammed Erradi. A Distributed Protocol for Privacy Preserving Aggregation
  • - Diego Didona, Pascal Felber, Derin Harmanci, Paolo Romano and Joerg Schenker. Identifying the Optimal Level of Parallelism in Transactional Memory Systems

arrowup
Short papers I: (Chair R. Guerraoui)

  • - Antoine Boutet, Kostas Konstantinos and Anne-Marie Kermarrec. FStream: a decentralized and social music streamer
  • - Ali Shoker and Jean-Paul Bahsoun. BFT Selection
  • - Istvan Fehervari, Anita Sobe and Wilfried Elmenreich. Biologically Sound Neural Networks for Embedded Systems Using OpenCL
  • - Ahmed Zakaria Manouare, Abdelilah Ghammaz, Abdelaziz El Idrissi and Saida Ibnyaich. Modeling of Human head Interaction with Planar Antenna for Multi Standard Cellular Phones
  • - Youssef Nahraoui, Elhoucein Aassif, Rachid Latif and Gérard Maze. Modeling the cut-off frequency of acoustic signal with a fuzzy logic system

arrowup
Short papers II : (chair A-M Kermarrec)

  • - Erwan Le Merrer, Nicolas Le Scouarnec and Gilles Straub. Bitbox: a practical and decentralized approach to backup and sharing
  • - Ezzouak Siham, El Amrani Mohammed and Azizi Abdelmalek. Improving Miller’s algorithm using the NAF and The window NAF
  • - Sihem Loukil, Slim Kallel and Mohamed Jmaiel. Runtime Adaptation of Component based Systems
  • - Echchaachoui Adel, Choukri Ali, Habbani Ahmed and Elkoutbi Mohamed. Impact of Multipath Routing Performance of Video Traffic
  • - El Wardani Dadi and El Mostafa Daoudi. Large scale 3D shape retrieval based on multi-core architectures
  • - Ahmed El Ouadrhiri, Mohamed El Kamili, Mohammed Raiss El Fenni and Lahcen Omari. New forwarding Strategy for PROPHET Routing in DTNs
  • - Lahby Mohamed, Cherkaoui Leghris and Abdellah Adib. New Dynamic Network Selection Access Based on Group MADM For Heterogeneous Networks
  • - Erritali Mohamed, El Ouahidi Bouabid and Bourget Daniel. Secured Geographic Routing Protocol For Vehicular Ad Hoc Networks
  • - Ismail Bennis, Zytoune Ouadoudi and Driss Aboutajdine. Enhanced AntNet protocol for wireless multimedia sensor networks
  • - Sabri Yassine and Najib El Kamoun. Forest Fire Detection And Localization With Wireless Sensor Networks
  • - Sara Bakkali, Hafssa Benaboud and Mouad Benmamoun. A new method to ensure End-to-End Quality of Service in Inter-domain environement

arrowup

Posters :

  • - Sabri Yassine and Najib El Kamoun. A localization protocol in wireless sensor networks based on Dv-Hop.
  • - Abderrahim Maizate and Najib El Kamoun. Passive Clustering Algorithm Based on Distance and Residual Energy for Wireless Sensor Network.
  • - Hicham Zougagh, Toumanari Ahmed, Rachid Latif and Noureddine Idboufker. Avoiding Attacks in Mobile Ad Hoc Networks.
  • - Mohamed Chakraoui and Abderrafiaa El Kalay. Databases tuning: index usage.
  • - Sara Koulali, Mostafa Azizi and Mohammed Amine Koulali. Performance Analysis of some Routing Protocols for Delay Tolerant Networks.
  • - Matthias Leinweber, Lars Baumgaertner, Bastian Hoßbach, Christian Strack, Bernhard Seeger and Bernd Freisleben. Performance Evaluation of Complex Event Processing in Cloud Monitoring.
  • - Ben Bouazza Naoufal, Lemoudden Mouad, El Ouahidi Bouabid and Bourget Daniel. An UML Syslog Extension Model for Cloud Logs.
  • - Ahmed Loutfi, Essaid Sabir, Abdellatif Kobbane and Mohammed El Koutbi. A Cross-layer Model for Service Differentiation in Wireless Sensors Networks.
  • - Fatima Lakrami and Najib Elkamoun. A Mobility Sensitive Approach for OLSR Routing Protocol.
  • - Houda Zarhouni, Said ElHajji, Zhor Lhadi. Classification and Evaluation of Routing Algorithms for VoIP in Wireless Mesh Networks.

arrowup

Dates

January 15, 2013

Abstract submission deadline

January 28, 2013 (23:59 Hawaii time)

Submission deadline

March 21, 2013

Acceptance notification

April 21, 2013

Camera ready copy due

Proceedings
Proceedings

The proceedings of the conference will be published in Springer’s Lecture Notes in Computer Science

Sponsors
Sponsors