Program
WEDNESDAY June 19th | |
08:00 – 09:00 | Registration |
09:00 – 09:30 | NETYS Opening Session |
09:30 – 10:30 | Keynote Talk 1: (Chair: Mohammed Faouzi Atig) Suresh Jagannathan, Automated Reasoning for Weak Consistency |
10:30 – 11:00 | Coffee Break |
11:00 – 12:15 | Session 1: Verification I (Chair: Paul Attie) |
12:15 – 14:00 | Lunch |
14:00 – 15:00 | Keynote Talk 2: (Chair: Alexander A. Schwarzmann) Marc Shapiro, Living on the edge, safely or: Life without consensus |
15:00 – 16:00 | Session 2: Distribution I (Chair: Michel Raynal) |
16:00 – 16:30 | Coffee Break |
16:30 – 17:30 | Session 3: Security 1 (Chair: Ismail Berrada) |
17:30 – 17:50 | Invited Talk: Rachid Guerraoui, How to write a bad research paper |
THURSDAY June 20th | |
08:00 – 09:00 | Registration |
09:00 – 10:00 | Keynote talk 3: (Chair: Ahmed Bouajjani) Parosh Aziz Abdullah, On Program Verification under the Release-Acquire Semantics |
10:00 – 10:30 | Coffee Break |
10:30 – 12:00 | Session 4: Concurrency (Chair: Mohamed Faouzi Atig) |
12:00 – 14:00 | Lunch |
14:00 – 15:00 | Keynote Talk 4 (Chair:Cezara Dragoi) Dariusz Kowalski, On the complexity of fault-tolerant consensus |
15:00 – 16:00 | Session 5: Distribution II (Chair: Dariusz Kowalski) |
16:00 – 16:30 | Coffee Break |
16:30 – 17:30 | Session 6: Verification II (Chair: Youssef Iraki) |
20:00 | Gala Dinner |
FRIDAY June 21th | |
09:00 – 10:00 | Keynote talk 5: (Chair: Roland Meyer) Somesh Jha, Towards Semantic Adversarial Examples |
10:00 – 10:30 | Coffee Break |
10:30 – 12:00 | Session 7: Distribution III (Chair: Achour Mostefaoui) |
12:00 – 14:00 | Lunch |
14:00 – 15:50 | Keynote Talk 6: (Chair: Constantin Enea) Paul Attie, How to structure your concurrent program and its verification |
15:00 – 16:00 | Session 8: Security II (Chair : Yahya Benkaouz) |
16:00– 16:30 | Coffee Break |
16:30 – 17:45 | Session 9: Networks (Chair : Abdellah Boulouz) |
17:45 – 18:00 | Closing Session |
Details:
- – Rachid Zennou, Ranadeep Biswas, Ahmed Bouajjani, Constantin Enea and Mohammed Erradi. Checking Causal Consistency of Distributed Databases.
- – Peter Chini, Roland Meyer and Prakash Saivasan. Liveness in Broadcast Networks.
- – (Short Paper) Achraf Lyazidi and Salma Mouline. Formal Verification of UML State Machine Diagrams using Petri Nets.
- – Chryssis Georgiou, Robert Gustafsson, Andreas Lindhé and Elad Michael Schiller. Self-stabilization overhead: a case study on coded atomic storage
- – Chryssis Georgiou and Elad Michael Schiller. Self-Stabilizing Snapshot Objects on Top of Asynchronous Fail-Prone Message-Passing Systems
- – Zouhair Chiba, Noreddine Abghour, Khalid Moussaid, Amina El Omri and Mohamed Rida. An Efficient network IDS for Cloud Environments Based on a Combination of Deep Learning and an Optimized Self-Adaptive Heuristic Search Algorithm
- – Maryem Ait El Hadj, Ahmed Khoumsi, Yahya Benkaouz and Mohammed Erradi. Efficient Security Policy Management using Suspicious Rules through Access Log Analysis
- – Ved Chaudhary, Chirag Juyal, Sandeep Kulkarni, Sweta Kumari and Sathya Peri. Achieving Starvation-Freedom in Multi-Version Transactional Memory Systems
- – Emmanuel Godard, Damien Imbs, Michel Raynal and Gadi Taubenfeld. Mutex-based Desanonymization of an Anonymous Read/Write Memory
- – Sathya Peri, Muktikanta Sa and Nandini Singhal. A Pragmatic Non-blocking Concurrent Directed Acyclic Graph
- – Antoine Durand, Emmanuelle Anceaume and Ludinard Romaric. StakeCube: Combining Sharding and Proof-of-Stake to build Fork-free Secure Permissionless Distributed Ledgers
- – Yackolley Amoussou-Guenou, Antonella Del Pozzo, Maria Potop-Butucaru and Sara Tucci-Piergiovanni. Dissecting Tendermint
- – Yu-Fang Chen, Hsiao-Chen Chung, Wen-Chi Hung, Ming-Hsien Tsai, Bow-Yaw Wang and Farn Wang. Synthesize Models for Quantitative Analysis using Automata Learning
- – Thibaut Balabonski, Pierre Courtieu, Robin Pelle, Lionel Rieg, Sebastien Tixeuil and Xavier Urbain. Continuous vs. Discrete Asynchronous Moves: a Certified Approach for Mobile Robots on Graphs
- – Samuel Irving, Sui Chen, Lu Peng, Costas Busch, Maurice Herlihy, Faen Zhang and Chris J Michael. CUDA-DTM: Distributed Transactional Memory for GPU Clusters
- – Carole Delporte-Gallet, Hugues Fauconnier, Yan Jurski, François Laroussinie and Arnaud Sangnier. Towards synthesis of distribued algorithms with SMT solvers
- – Prasad Jayanti and Anup Joshi. Recoverable Mutual Exclusion with Abortability
- – Mohamed Amine Rguibi and Moussa Najem. A Vaccination Game for Mitigation Active Worms Propagation in P2P Networks
- – (Short Paper) Vidal Attias and Quentin Bramas. How to Choose its Parents in the Tangle
- – (Short Paper) Meryem Cherkaoui Semmouni, Abderrahmane Nitaj and Mostafa Belkasmi. Bitcoin Security with Post Quantum Cryptography
- – Oana Balmau, Rachid Guerraoui, Anne-Marie Kermarrec, Alexandre Maurer, Matej Pavlovic and Willy Zwaenepoel. The Fake News Vaccine
- – Quentin Bramas, Toshimitsu Masuzawa and Sebastien Tixeuil. Distributed Online Data Aggregation in Dynamic Graphs
- – (Short Paper) Jabrane Kachaoui and Abdessamad Belangour. A Multi-Criteria Group Decision Making Method for Big Data Storage Selection
Dates
All deadlines are at 23:59 AoE
March 5th, 2022, March 19th, 2022
Abstract submission deadline
March 12th, 2022, March 26th, 2022
Paper submission deadline
May 4th, 2022, May 7th, 2022
Accept/Reject notification
May 10th, 2022, May 14th, 2022
Camera ready copy due
May 17th-19th, 2022
Conference