000 | 07189nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-540-49823-0 | ||
003 | DE-He213 | ||
005 | 20240730190756.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2006 gw | s |||| 0|eng d | ||
020 |
_a9783540498230 _9978-3-540-49823-0 |
||
024 | 7 |
_a10.1007/978-3-540-49823-0 _2doi |
|
050 | 4 | _aQ334-342 | |
050 | 4 | _aTA347.A78 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aStabilization, Safety, and Security of Distributed Systems _h[electronic resource] : _b8th International Symposium, SSS 2006, Dallas, TX, USA, November 17-19, 2006, Proceedings / _cedited by Ajoy K. Datta, Maria Gradinariu. |
250 | _a1st ed. 2006. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2006. |
|
300 |
_aXVIII, 590 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aTheoretical Computer Science and General Issues, _x2512-2029 ; _v4280 |
|
505 | 0 | _aInvited Talks -- Stabilization Enabling Technology -- A General Characterization of Indulgence -- Regular Papers -- Coverage, Connectivity, and Fault Tolerance Measures of Wireless Sensor Networks -- A Case Study on Prototyping Power Management Protocols for Sensor Networks -- Unconscious Eventual Consistency with Gossips -- All k-Bounded Policies Are Equivalent for Self-stabilization -- A 1-Strong Self-stabilizing Transformer -- Optimal Message-Driven Implementation of Omega with Mute Processes -- Incremental Synthesis of Fault-Tolerant Real-Time Programs -- Toward a Time-Optimal Odd Phase Clock Unison in Trees -- Recovery Oriented Programming -- Evaluation of a Tracking Architecture in Wireless Sensor Networks -- Self-protection for Distributed Component-Based Applications -- From Self- to Snap- Stabilization -- Self-stabilizing Philosophers with Generic Conflicts -- Selfish Stabilization -- Reliability and Availability Analysis of Self-stabilizing Systems -- Circle Formation of Weak Mobile Robots -- Self-stabilizing Device Drivers -- Secure Communication for RFIDs Proactive Information Security Within Computational Security -- Fault Masking in Tri-redundant Systems -- Logarithmic Keying of Communication Networks -- Safe Peer-to-Peer Self-downloading -- Best Paper: Stabilizing Clock Synchronization for Wireless Sensor Networks -- Self-stabilizing Byzantine Digital Clock Synchronization -- Distributed Edge Coloration for Bipartite Networks -- A Dependable Intrusion Detection Architecture Based on Agreement Services -- Stabilizing Health Monitoring for Wireless Sensor Networks -- A Byzantine-Fault Tolerant Self-stabilizing Protocol for Distributed Clock Synchronization Systems -- A Memory Efficient Self-stabilizing Algorithm for Maximal k-Packing -- Bounding the Impact of Unbounded Attacks in Stabilization -- On Bootstrapping Topology Knowledge in Anonymous Networks -- Self-adaptive Disk Arrays -- Using Eventually Consistent Compasses to Gather Oblivious Mobile Robots with Limited Visibility -- Self-stabilizing Asynchronous Phase Synchronization in General Graphs -- Composition of Fault-Containing Protocols Based on Recovery Waiting Fault-Containing Composition Framework -- Energy-Efficient and Non-interactive Self-certification in MANETs -- Self-adaptive Worms and Countermeasures -- Brief Announcement -- Brief Announcement: Self-healing Algorithms for Reconfigurable Networks -- Brief Announcement: Distributed Synthesis of Fault-Tolerance -- Brief Announcement: Exploration and Mitigation of Deafness Problems in Directional Antennas Based Wireless Ad-Hoc Networks -- Brief Announcement: A Synthetic Public Key Management Scheme for Large-Scale MANET -- Brief Announcement: Termination Detection in an Asynchronous Distributed System with Crash-Recovery Failures -- Brief Announcement: Self-stabilizing Spanning Tree Algorithm for Large Scale Systems -- Brief Announcement: Chasing the Weakest System Model for Implementing and Consensus -- Brief Announcement: Wait-Free Dining for Eventual Weak Exclusion -- Brief Announcement: An Efficient and Self-stabilizing Link Formation Algorithm -- Brief Announcement: Analyzing the Interactions of Self-propagating Codes in Multi-hop Networks -- Brief Announcement: Towards Modular Verification of Stabilisation in Self-adaptive Embedded Systems -- Brief Announcement: An Adaptive Randomised Searching Protocol in Peer-to-Peer Systems Based on Probabilistic Weak Quorum System. | |
520 | _aThis symposium has been the main forum for presentation of research results in the area of self-* for 17 years. It started as The Workshop on Self-Stabilizing Systems (WSS), and met in 1989 in Austin, 1995 in Las Vegas, 1997 in Santa Barbara, 1999 in Austin, and 2001 in Lisbon. It was then renamed The S- posium on Self-Stabilizing Systems (SSS), and has since met in 2003 in San Francisco, and in 2005 in Barcelona, Spain. This year,we extended the scope of the symposium to cover all safety and - curity related aspects of self-* systems. The title of the symposium was changed to the International Symposium on Stabilization, Safety, and Security of D- tributed Systems (SSS) to re?ect this expansion. The decision by Mohamed Gouda, the General Chair, to expand the scope of the symposium was timely and successful. From 33 papers submitted for SSS 2005, the number of submissions increased to 155. Reviewing this surge of s- missions to select the ?nal set of papers for the symposium was a monumental taskfor the ProgramCommittee. The 61 ProgramCommittee membersdevoted countless hours reading and evaluating the papers. But even this e?ort was not enough; we recruited 143 external reviewers, whose work was also very subst- tial. | ||
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputers, Special purpose. _946653 |
|
650 | 0 |
_aComputer science. _99832 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9143833 |
|
650 | 1 | 4 |
_aArtificial Intelligence. _93407 |
650 | 2 | 4 |
_aComputer Communication Networks. _9143834 |
650 | 2 | 4 |
_aSpecial Purpose and Application-Based Systems. _946654 |
650 | 2 | 4 |
_aTheory of Computation. _9143835 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aIT Operations. _931703 |
700 | 1 |
_aDatta, Ajoy K. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9143836 |
|
700 | 1 |
_aGradinariu, Maria. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9143837 |
|
710 | 2 |
_aSpringerLink (Online service) _9143838 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540490180 |
776 | 0 | 8 |
_iPrinted edition: _z9783540832744 |
830 | 0 |
_aTheoretical Computer Science and General Issues, _x2512-2029 ; _v4280 _9143839 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-540-49823-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c93439 _d93439 |