Program

TUESDAY May 08th
18:00 – 20:00 Registration
WEDNESDAY May 09th
08:00 – 09:00 Registration
09:00 – 09:30 NETYS Opening Session
09:30 – 10:20 Keynote Talk 1:
Anne-Marie Kermarrec , Recommenders: from the lab to the wild
10:20 – 10:50 Session 1: Graph (Chair: Ahmed Bouajjani)
10:50 – 11:20 Coffee Break
11:20 – 12:10 Keynote Talk 2:
Ranjit Jhala, Pretend Synchrony: Synchronous Verification of Asynchronous Programs.
12:10 – 13:10 Session 2: Verification (Chair: Rupak Majumdar)
13:10 – 15:30 Lunch
15:30 – 16:20 Keynote Talk 3:
Bryan Ford , Clubs, Coins, and Crowds: Fairness and Decentralization in Blockchains and Cryptocurrencies
16:20 – 17:10 Session 3: Distribution 1
17:10 – 17:40 Coffee Break / Poster Session
17:40 – 18:30 Keynote Talk 4:
Rupak Majumdar, « Effective Random Testing for Concurrent and Distributed Programs »
THURSDAY May 10th
08:00 – 09:00 Registration
09:00 – 09:50 Keynote talk 5
Maurice Herlihy, Blockchains and the Future of Distributed Computing.
09:50 – 10:50 Session 4: Concurency 1 (Chair: Maurice Herlihy)
10:50 – 11:20 Coffee Break / Poster Session
11:20 – 12:10 Keynote Talk 6
Liuba Shrira, Optimistic and pessimistic synchronization for data structures for in-memory stores.
12:10 – 12:50 Session 5: Security (Chair: Yahya Benkaouz)
12:50 – 15:00 Lunch
15:00 – 15:50 Keynote Talk 7:
Marta Kwiatkowska, Safety Verification of Deep Neural Networks.
15:50 – 16:40 Session 6: Self-Stabilization (Chair: Michel Raynal)
16:40 – 17:10 Coffee Break / Poster Session
17:10 – 18:00 Keynote Talk 8:
Nikolaj Bjorner, Scaling Z3 in Azure
18:00 – 19:00 Session 7: Distribution 2 (Chair: Liuba Shrira)
20:30 Gala Dinner
FRIDAY May 11th
09:00 – 09:50 Keynote talk 9:
Tom Reps, Program Analyses using Newton’s Method.
09:50 – 10:50 Session 8: Concurency 2 (Chair:Sergio Rajsbaum)
10:50 – 11:20 Coffee Break
11:20 – 12:10 Keynote Talk 10:
Aruna Seneviratne, Authentication Mechanisms for Resource-Constrained IoT Devices.
12:10 – 12:40 Session 9: Middleware (Chair:Ismail Berrada)
12:40 – 15:00 Lunch
15:00 – 15:50 Keynote Talk 11:
Renata Teixeira, Diagnosis of Internet Quality of Experience in Home Networks.
15:50 – 16:50 Session 10: Networking
16:50– 17:20 Coffee Break
17:20 – 18:10 Keynote Talk 12:
Christophe Diot, Networks at work in the Aerospace Industry.
18:10 – 18:25 Closing Session

Details:

Session 1: Graph

  • - Meryam Zeryouh, Mohamed El Marraki and Mohamed Essalih, « A Measure for Quantifying the Topological Structure of Some Networks »
  • - Muktikanta Sa, « Maintenance of Strongly Connected Component in Shared-memory Graph » (short paper)

Session 2: Verification

  • - Sylvain Conchon, Giorgio Delzanno and Angelo Ferrando, « Declarative Parameterized Verification of Topology-Sensitive Distributed Protocols »
  • - Ahmed Bouajjani, Constantin Enea, Madhavan Mukund and Rajarshi Roy, « On Verifying TSO Robustness for Event-Driven Asynchronous Programs »
  • - Marcio Diaz and Tayssir Touili, « Model Checking Dynamic Pushdown Networks with Locks and Priorities »

Session 3: Distribution 1

  • - Antonio Fernandez Anta, Chryssis Georgiou, Kishori Konwar and Nicolas Nicolaou, « Formalizing and Implementing Distributed Ledger Objects »
  • - Rachid Guerraoui and Jingjing Wang, « On the Unfairness of Blockchain »
  • - Anass Rachdi, Abdeslam En-Nouaary and Mohamed Dahchour, « BPMN Process Analysis: A formal Validation and Verification Eclipse Plugin for BPMN Process Models » (short paper)

Session 4: Concurency 1

  • - Vitaly Aksenov, Petr Kuznetsov and Anatoly Shalyto, « On Helping and Stacks »
  • - Michel Raynal and Jiannong Cao, « Anonymity in Distributed Read/Write – Systems: a Short Introduction »
  • - Carole Delporte-Gallet, Hugues Fauconnier, Sergio Rajsbaum and Nayuta Yanagisawa, « An anonymous wait-free weak-set object implementation »

Session 5: Security

  • - Sébastien Vaucher, Valerio Schiavoni and Pascal Felber, « Stress-SGX: Load and Stress your Enclaves for Fun and Profit » (short paper)
  • - Ayidh Alharbi and Tahar M Kechadi, « Application of Noisy Attacks on Image Steganography. » (short paper)
  • - Ahmed Khoumsi and Mohammed Erradi, « Automata-Based Bottom-Up Design of Conflict-Free Security Policies Specified as Policy Expressions »

Session 6: Self-Stabilization

  • - Dianne Foreback, Mikhail Nesterenko and Sebastien Tixeuil, « Churn Possibilities and Impossibilities »
  • - Iosif Salem and Elad Michael Schiller, « Practically-Self-Stabilizing Vector Clocks in the Absence of Execution Fairness »
  • - Michiko Inoue and Sebastien Tixeuil, « Tight Bounds for Universal and Cautious Self-stabilizing 1-Maximal Matching » (short paper)

Session 7: Distribution 2

  • - Gadi Taubenfeld, « Weak Failures: Definitions, Algorithms and Impossibility Results »
  • - Gokarna Sharma, Costas Busch and Supratik Mukhopadhyay, « Complete Visibility for Oblivious Robots in O(N) Time »
  • - Masashi Tsuchida, Fukuhito Ooshita and Michiko Inoue, « Gathering of Mobile Agents in Asynchronous Byzantine Environments with Authenticated Whiteboards »

Session 8: Concurency 2

  • - Sathya Peri, Ajay Singh and Archit Somani, « Efficient means of Achieving Composability using Object based Semantics in Transactional Memory Systems »
  • - Chryssis Georgiou, Theophanis Hadjistasi, Nicolas Nicolaou and Alexander Schwarzmann, « Unleashing and Speeding Up Readers in Atomic Object Implementations »
  • - Prasad Jayanti, Siddhartha Jayanti and Anup Joshi, « Optimal Recoverable Mutual Exclusion using only FASAS »

Session 9: Middleware

  • - Khadija Letrache, Omar El Beggar and Mohammed Ramdani, « Comparative analysis of our association rules based approach and a genetic approach for OLAP partitioning »
  • - Radia Belkeziz and Zahi Jarir, « IoT Context-Driven Architecture: Characterization of the Behavioral Aspect » (short paper)

Session 10: Networking

  • - Baddi Youssef and Ech-Chrif El Kettani Mohammed Dafir, « OSM-GKM Optimal Shared Multicast-based solution for group key management in mobile IPv6″
  • - Driss Ait Omar, Mohamed EL AMRANI, Mohamed Baslam and Mohamed Fakir, « A Game-Theoretic Approach for the Internet Content Distribution Chain »
  • - Hamid Garmani, M’hamed Outanoute, Mohamed Baslam and Mustapha Jourhmane, « New Competition-Based Approach for Caching Popular Content in ICN »

Poster Session:

  • - Rachid Guerraoui, Anne-Marie Kermarrec, Olivier Ruas and Francois Taiani. Fingerprinting Big Data.
  • - Kaoutar Sefrioui Boujemaa, Ismail Berrada and Khalid Fardousse. Arabic Text Recognition in Highway Traffic Panels.
  • - Manal Zettam, Jalal Laassiri and Nourdddine Enneya. A MapReduce-based Adjoint Method to Predict the Levenson Self Report Psychopathy Scale Value.
  • - Sliman Rajaa, Abdellah Boulouz and Mohamed Bensalah. Optimization of RPL Objective Function based on Combined Metrics.
  • - Youness Madani, Mohammed Erritali and Jamaa Bengourram. A Hybrid Multilingual Sentiment Classification using Fuzzy Logic and Semantic Similarity.
  • - Salah-Eddine Ramah, Karim Bouhbouh, Afaf Bouhoute and Ismail Berrada. Driving Maneuver Recognition Using Phone Sensors.
  • - Mohamed Amine Belhamra and El Mamoun Souidi. Network coding and Applications.
  • - Nadir Sahllal and El Mamoun Souidi. Steganography on QR Codes.
  • - Chirag Juyal, Sandeep Kulkarni, Sweta Kumari, Sathya Peri and Archit Somani. Innovative Approach to Achieve Compositionality Efficiently using Multi-Version Object Based Transactional Systems.
  • - Hafsa Benaddi and Khalil Ibrahimi. Study of the intrusion detection system with KNN method for KDD99 data set.
Dates (New)

February 04, 2018

Abstract submission deadline

February 11, 2018

Paper submission deadline

March 26, 2018

Acceptance notification

April 04, 2018

Camera ready copy due

Proceedings

SpringerLNCS

Revised selected papers will be published as a post-proceedings in Springer's LNCS "Lecture Notes in Computer Science"

Partners & Sponsors

SponsorsNETYS28