default search action
37th ICDCS 2017: Atlanta, GA, USA
- Kisung Lee, Ling Liu:
37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-8, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-1792-2
Research Track
Research 1: Distributed Fault Tolerance and Dependability
- Amy Babay, Emily Wagner, Michael Dinitz, Yair Amir:
Timely, Reliable, and Cost-Effective Internet Transport Service Using Dissemination Graphs. 1-12 - Yu Zhao, Huazhe Wang, Xin Lin, Tingting Yu, Chen Qian:
Pronto: Efficient Test Packet Generation for Dynamic Network Data Planes. 13-22 - Raluca Halalai, Pascal Felber, Anne-Marie Kermarrec, François Taïani:
Agar: A Caching System for Erasure-Coded Data. 23-33 - Odorico Machado Mendizabal, Fernando Luís Dotti, Fernando Pedone:
High Performance Recovery for Parallel State Machine Replication. 34-44 - Jun Li, Baochun Li:
On Data Parallelism of Erasure Coding in Distributed Storage Systems. 45-56 - Ying Liu, Xi Guan, Vladimir Vlassov, Seif Haridi:
MeteorShower: Minimizing Request Latency for Majority Quorum-Based Data Consistency Algorithms in Multiple Data Centers. 57-67
Research 2: Distributed Operating Systems and Middleware
- Dejun Teng, Lei Guo, Rubao Lee, Feng Chen, Siyuan Ma, Yanfeng Zhang, Xiaodong Zhang:
LSbM-tree: Re-Enabling Buffer Caching in Data Management for Mixed Reads and Writes. 68-79 - Pooya Salehi, Kaiwen Zhang, Hans-Arno Jacobsen:
Incremental Topology Transformation for Publish/Subscribe Systems Using Integer Programming. 80-91 - Chien-An Lai, Josh Kimball, Tao Zhu, Qingyang Wang, Calton Pu:
milliScope: A Fine-Grained Monitoring Framework for Performance Debugging of n-Tier Web Services. 92-102 - Shen Li, Md. Tanvir Al Amin, Raghu K. Ganti, Mudhakar Srivatsa, Shanhao Hu, Yiran Zhao, Tarek F. Abdelzaher:
Stark: Optimizing In-Memory Computing for Dynamic Dataset Collections. 103-114 - Pierre Sutra, Etienne Rivière, Cristian Cotes, Marc Sánchez Artigas, Pedro García López, Emmanuel Bernard, William Burns, Galder Zamarreno:
CRESON: Callable and Replicated Shared Objects over NoSQL. 115-128 - Linquan Zhang, Shangqi Lai, Chuan Wu, Zongpeng Li, Chuanxiong Guo:
Virtualized Network Coding Functions on the Internet. 129-139
Research 3: Security and Privacy in Distributed Systems I
- Adriano Di Luzio, Alessandro Mei, Julinda Stefa:
Consensus Robustness and Transaction De-Anonymization in the Ripple Currency Exchange System. 140-150 - Bikash Chandra Singh, Barbara Carminati, Elena Ferrari:
Learning Privacy Habits of PDS Owners. 151-161 - Xuefeng Liu, Jiaqi Wen, Shaojie Tang, Jiannong Cao, Jiaxing Shen:
City-Hunter: Hunting Smartphones in Urban Areas. 162-171 - Shangqing Zhao, Zhuo Lu, Cliff Wang:
When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography. 172-182 - Si Chen, Kui Ren, Sixu Piao, Cong Wang, Qian Wang, Jian Weng, Lu Su, Aziz Mohaisen:
You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones. 183-195 - Sheng Liu, Michael K. Reiter, Vyas Sekar:
Flow Reconnaissance via Timing Attacks on SDN Switches. 196-206
Research 4: Cloud Computing and Data Center Systems
- Qingyang Wang, Chien-An Lai, Yasuhiko Kanemasa, Shungeng Zhang, Calton Pu:
A Study of Long-Tail Latency in n-Tier Systems: RPC vs. Asynchronous Invocations. 207-217 - Iyswarya Narayanan, Bikash Sharma, Di Wang, Sriram Govindan, Laura Caulfield, Anand Sivasubramaniam, Aman Kansal, Jie Liu, Badriddine Khessib, Kushagra Vaid:
Rain or Shine? - Making Sense of Cloudy Reliability Data. 218-229 - Iyswarya Narayanan, Aman Kansal, Anand Sivasubramaniam:
Right-Sizing Geo-distributed Data Centers for Availability and Latency. 230-240 - Sung-Han Lin, Ranjan Pal, Marco Paolieri, Leana Golubchik:
Performance Driven Resource Sharing Markets for the Small Cloud. 241-251 - Mukil Kesavan, Ada Gavrilovska, Karsten Schwan:
Fault-Scalable Virtualized Infrastructure Management. 252-263 - Quanlu Zhang, Zhenhua Li, Zhi Yang, Shenglong Li, Shouyang Li, Yangze Guo, Yafei Dai:
DeltaCFS: Boosting Delta Sync for Cloud Storage Services by Learning from NFS. 264-275
Research 5: Edge and Fog Computing
- Utsav Drolia, Katherine Guo, Jiaqi Tan, Rajeev Gandhi, Priya Narasimhan:
Cachier: Edge-Caching for Recognition Applications. 276-286 - Xintong Song, Yaodong Huang, Qian Zhou, Fan Ye, Yuanyuan Yang, Xiaoming Li:
Content Centric Peer Data Sharing in Pervasive Edge Computing Environments. 287-297 - Youngbin Im, Jinyoung Han, Ji Hoon Lee, Yoon Kwon, Carlee Joe-Wong, Ted Taekyoung Kwon, Sangtae Ha:
FLARE: Coordinated Rate Adaptation for HTTP Adaptive Streaming in Cellular Networks. 298-307 - Xiaoli Wang, Aakanksha Chowdhery, Mung Chiang:
Networked Drone Cameras for Sports Streaming. 308-318 - Jiaqi Zheng, Guihai Chen, Stefan Schmid, Haipeng Dai, Jie Wu:
Chronus: Consistent Data Plane Updates in Timed SDNs. 319-327 - Surat Teerapittayanon, Bradley McDanel, H. T. Kung:
Distributed Deep Neural Networks Over the Cloud, the Edge and End Devices. 328-339
Research 6: Distributed Green Computing and Energy Management
- Kuangyu Zheng, Xiaorui Wang:
Dynamic Control of Flow Completion Time for Power Efficiency of Data Center Networks. 340-350 - Jia Zhao, Jiangchuan Liu, Haiyang Wang:
On Energy-Efficient Congestion Control for Multipath TCP. 351-360 - Guangchao Yuan, Chung-Wei Hang, Michael N. Huhns, Munindar P. Singh:
A Mechanism for Cooperative Demand-Side Management. 361-371 - Ning Liu, Zhe Li, Jielong Xu, Zhiyuan Xu, Sheng Lin, Qinru Qiu, Jian Tang, Yanzhi Wang:
A Hierarchical Framework of Cloud Resource Allocation and Power Management Using Deep Reinforcement Learning. 372-382 - Landu Jiang, Yu Hua, Chen Ma, Xue Liu:
SunChase: Energy-Efficient Route Planning for Solar-Powered EVs. 383-393
Research 7: Internet of Things, Smart Cities, and Cyber-Physical Systems
- He Huang, Yu-e Sun, Shigang Chen, Hongli Xu, Yian Zhou:
Persistent Traffic Measurement Through Vehicle-to-Infrastructure Communications. 394-403 - Yuxiao Hou, Yanwen Wang, Yuanqing Zheng:
TagBreathe: Monitor Breathing with Commodity RFID Systems. 404-413 - Saiyu Qi, Yuanqing Zheng, Xiaofeng Chen, Jianfeng Ma, Yong Qi:
Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain. 414-424 - Gonglong Chen, Wei Dong, Zhiwei Zhao, Tao Gu:
Towards Accurate Corruption Estimation in ZigBee Under Cross-Technology Interference. 425-435 - Mohammad Arif Ul Alam, Nirmalya Roy:
Unseen Activity Recognitions: A Hierarchical Active Transfer Learning Approach. 436-446 - Han Ding, Chen Qian, Jinsong Han, Ge Wang, Wei Xi, Kun Zhao, Jizhong Zhao:
RFIPad: Enabling Cost-Efficient and Device-Free In-air Handwriting Using Passive Tags. 447-457
Research 8: Mobile and Wireless Computing Systems I
- Xiang Zhang, Guoliang Xue, Ruozhou Yu, Dejun Yang, Jian Tang:
Robust Incentive Tree Design for Mobile Crowdsensing. 458-468 - Shanhe Yi, Zhengrui Qin, Nancy J. Carter, Qun Li:
WearLock: Unlocking Your Phone via Acoustics Using Smartwatch. 469-479 - Huber Flores, Xiang Su, Vassilis Kostakos, Jukka Riekki, Eemil Lagerspetz, Sasu Tarkoma, Pan Hui, Yong Li, Jukka Manner:
Modeling Mobile Code Acceleration in the Cloud. 480-491 - Xing Gao, Dachuan Liu, Daiping Liu, Haining Wang, Angelos Stavrou:
E-Android: A New Energy Profiling Tool for Smartphones. 492-502 - Ahmed Saeed, Khaled A. Harras, Ellen W. Zegura, Mostafa H. Ammar:
Local and Low-Cost White Space Detection. 503-516 - Weiman Sun, Shengling Wang:
General Analysis of Incentive Mechanisms for Peer-to-Peer Transmissions: A Quantum Game Perspective. 517-526
Research 9: Distributed Big Data Systems
- Dipti Shankar, Xiaoyi Lu, Dhabaleswar K. Panda:
High-Performance and Resilient Key-Value Store with Online Erasure Coding for Big Data Workloads. 527-537 - Wenxue Cheng, Fengyuan Ren, Wanchun Jiang, Tong Zhang:
Modeling and Analyzing Latency in the Memcached system. 538-548 - Chen Chen, Wei Wang, Bo Li:
Speculative Slot Reservation: Enforcing Service Isolation for Dependent Data-Parallel Computations. 549-559 - Shuhao Liu, Hao Wang, Baochun Li:
Optimizing Shuffle in Wide-Area Data Analytics. 560-571 - Zhiming Hu, Baochun Li, Zheng Qin, Rick Siow Mong Goh:
Job Scheduling without Prior Information in Big Data Processing Systems. 572-582 - Sikder Huq, M. Zubair Shafiq, Sukumar Ghosh, Amir R. Khakpour, Harkeerat Bedi:
Distributed Load Balancing in Key-Value Networked Caches. 583-593
Research 10: Distributed Algorithms and Theory I
- Dong Han, Ye Yan, Tao Shu, Liuqing Yang, Shuguang Cui:
Cognitive Context-Aware Distributed Storage Optimization in Mobile Cloud Computing: A Stable Matching Based Approach. 594-604 - Yaodong Huang, Xintong Song, Fan Ye, Yuanyuan Yang, Xiaoming Li:
Fair Caching Algorithms for Peer Data Sharing in Pervasive Edge Computing Environments. 605-614 - Ai-Chun Pang, Wei-Ho Chung, Te-Chuan Chiu, Junshan Zhang:
Latency-Driven Cooperative Task Computing in Multi-user Fog-Radio Access Networks. 615-624 - Zichuan Xu, Weifa Liang, Meitian Huang, Mike Jia, Song Guo, Alex Galis:
Approximation and Online Algorithms for NFV-Enabled Multicasting in SDNs. 625-634 - Zhuojun Duan, Wei Li, Zhipeng Cai:
Distributed Auctions for Task Assignment and Scheduling in Mobile Crowdsensing Systems. 635-644 - Hengky Susanto, Honggang Zhang, Shing-Yip Ho, Benyuan Liu:
Effective Mobile Data Trading in Secondary Ad-hoc Market with Heterogeneous and Dynamic Environment. 645-655
Research 11: Security and privacy in Distributed Systems II
- Daniele Midi, Antonino Rullo, Anand Mudgerikar, Elisa Bertino:
Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things. 656-666 - Nan Li, Fuchun Guo, Yi Mu, Willy Susilo, Surya Nepal:
Fuzzy Extractors for Biometric Identification. 667-677 - Chen Wang, Chuyu Wang, Yingying Chen, Lei Xie, Sanglu Lu:
Smartphone Privacy Leakage of Social Relationships and Demographics from Surrounding Access Points. 678-688 - Gang Li, Fan Yang, Guoxing Chen, Qiang Zhai, Xinfeng Li, Jin Teng, Junda Zhu, Dong Xuan, Biao Chen, Wei Zhao:
EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance. 689-698 - Xiang Li, J. David Smith, My T. Thai:
Adaptive Reconnaissance Attacks with Near-Optimal Parallel Batching. 699-709 - You Zhou, Yian Zhou, Shigang Chen, Samuel S. Wu:
Achieving Strong Privacy in Online Survey. 710-719
Research 12: Cloud Computing and Distributed Data Analytics
- Jian-Jhih Kuo, Shan-Hsiang Shen, Ming-Hong Yang, De-Nian Yang, Ming-Jer Tsai, Wen-Tsuen Chen:
Service Overlay Forest Embedding for Software-Defined Cloud Networks. 720-730 - Qixia Zhang, Yikai Xiao, Fangming Liu, John C. S. Lui, Jian Guo, Tao Wang:
Joint Optimization of Chain Placement and Request Scheduling for Network Function Virtualization. 731-741 - Eman Ramadan, Arvind Narayanan, Zhi-Li Zhang, Runhui Li, Gong Zhang:
BIG Cache Abstraction for Cache Networks. 742-752 - Jyotikrishna Dass, V. N. S. Prithvi Sakuru, Vivek Sarin, Rabi N. Mahapatra:
Distributed QR Decomposition Framework for Training Support Vector Machines. 753-763 - Qiang-Sheng Hua, Ming Ai, Hai Jin, Dongxiao Yu, Xuanhua Shi:
Distributively Computing Random Walk Betweenness Centrality in Linear Time. 764-774 - Kambiz Ghoorchian, Sarunas Girdzijauskas, Fatemeh Rahimian:
DeGPar: Large Scale Topic Detection Using Node-Cut Partitioning on Dense Weighted Graphs. 775-785
Research 13: Distributed Algorithms and Theory II
- Shaojie Tang, Yaqin Zhou, Kai Han, Zhao Zhang, Jing Yuan, Weili Wu:
Networked Stochastic Multi-armed Bandits with Combinatorial Strategies. 786-793 - Marjorie Bournat, Swan Dubois, Franck Petit:
Computability of Perpetual Exploration in Highly Dynamic Rings. 794-804 - Sikder Huq, Sukumar Ghosh:
Locally Self-Adjusting Skip Graphs. 805-815 - Huanyang Zheng, Jie Wu:
Online to Offline Business: Urban Taxi Dispatching with Passenger-Driver Matching Stability. 816-825 - Yongzheng Jia, Wei Xu, Xue Liu:
An Optimization Framework for Online Ride-Sharing Markets. 826-835 - Muhammad Shahzad, Alex X. Liu:
Fast and Accurate Tracking of Population Dynamics in RFID Systems. 836-846
Research 14: Mobile and Wireless Computing Systems II
- Wei Gong, Jiangchuan Liu:
Robust Indoor Wireless Localization Using Sparse Recovery. 847-856 - Ehsan Aryafar, Alireza Keshavarz-Haddad, Carlee Joe-Wong, Mung Chiang:
Max-Min Fair Resource Allocation in HetNets: Distributed Algorithms and Hybrid Architecture. 857-869 - Xiaofeng Gao, Rui Yang, Fan Wu, Guihai Chen, Jinguang Zhou:
Optimization of Full-View Barrier Coverage with Rotatable Camera Sensors. 870-879 - Bing Feng, Jianqing Liu, Chi Zhang, Yuguang Fang:
Communication through Symbol Silence: Towards Free Control Messages in Indoor WLANs. 880-888 - Jun Zhao:
Secure Connectivity of Wireless Sensor Networks Under Key Predistribution with on/off Channels. 889-899 - Liqiong Chang, Jie Xiong, Yu Wang, Xiaojiang Chen, Junhao Hu, Dingyi Fang:
iUpdater: Low Cost RSS Fingerprints Updating for Device-Free Localization. 900-910
Research 15: Social Networks and Crowdsourcing
- Iouliana Litou, Vana Kalogeraki, Dimitrios Gunopulos:
Influence Maximization in a Many Cascades World. 911-921 - Xiaomei Zhang, Yibo Wu, Lifu Huang, Heng Ji, Guohong Cao:
Expertise-Aware Truth Analysis and Task Allocation in Mobile Crowdsourcing. 922-932 - Hongwei Wang, Song Guo, Jiannong Cao, Minyi Guo:
MELODY: A Long-Term Dynamic Quality-Aware Incentive Mechanism for Crowdsourcing. 933-943 - Suhendry Effendy, Roland H. C. Yap:
The Strong Link Graph for Enhancing Sybil Defenses. 944-954 - Zhenzhe Zheng, Zhaoxiong Yang, Fan Wu, Guihai Chen:
Mechanism Design for Mobile Crowdsensing with Execution Uncertainty. 955-965 - Daniel Yue Zhang, Chao Zheng, Dong Wang, Douglas Thain, Xin Mu, Greg Madey, Chao Huang:
Towards Scalable and Dynamic Social Sensing Using A Distributed Computing Framework. 966-976
Industry and Experimentation Track
Industry 1: Cloud Data Centers and Performance
- Prashanth Thinakaran, Jashwant Raj Gunasekaran, Bikash Sharma, Mahmut Taylan Kandemir, Chita R. Das:
Phoenix: A Constraint-Aware Scheduler for Heterogeneous Datacenters. 977-987 - Juan F. Pérez, Robert Birke, Mathias Björkqvist, Lydia Y. Chen:
Dual Scaling VMs and Queries: Cost-Effective Latency Curtailment. 988-998 - Daniel Migault, Marcos A. Simplício Jr., Bruno M. Barros, Makan Pourzandi, Thiago R. M. Almeida, Ewerton R. Andrade, Tereza Cristina M. B. Carvalho:
A Framework for Enabling Security Services Collaboration Across Multiple Domains. 999-1010 - Debessay Fesehaye, Lenin Singaravelu, Chien-Chia Chen, Xiaobo Huang, Amitabha Banerjee, Ruijin Zhou, Rajesh Somasundaran:
Group Clustering Using Inter-Group Dissimilarities. 1011-1021 - Lipeng Wan, Matthew Wolf, Feiyi Wang, Jong Youl Choi, George Ostrouchov, Scott Klasky:
Comprehensive Measurement and Analysis of the User-Perceived I/O Performance in a Production Leadership-Class Storage System. 1022-1031
Industry 2: Mobile Computing and Internet of Things
- Mudhakar Srivatsa, Raghu K. Ganti, Prasant Mohapatra:
On the Limits of Subsampling of Location Traces. 1032-1041 - Pranita Dewan, Raghu K. Ganti, Mudhakar Srivatsa:
SOM-TC: Self-Organizing Map for Hierarchical Trajectory Clustering. 1042-1052 - Matús Harvan, Samuel Kimoto, Thomas Locher, Yvonne-Anne Pignolet, Johannes Schneider:
Processing Encrypted and Compressed Time Series Data. 1053-1062 - Amardeep Mehta, Rami Baddour, Fredrik Svensson, Harald Gustafsson, Erik Elmroth:
Calvin Constrained - A Framework for IoT Applications in Heterogeneous Environments. 1063-1073
Applications and Experiences Track
Application 1: Security, Privacy, Trust in Distributed Systems
- Shahriar Badsha, Xun Yi, Ibrahim Khalil, Elisa Bertino:
Privacy Preserving User-Based Recommender System. 1074-1083 - Ye Yan, Dong Han, Tao Shu:
Privacy Preserving Optimization of Participatory Sensing in Mobile Cloud Computing. 1084-1093 - Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. 1094-1104 - Chaowen Guan, Aziz Mohaisen, Zhi Sun, Lu Su, Kui Ren, Yaling Yang:
When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access. 1105-1115 - Weipeng Lin, Ke Wang, Zhilin Zhang, Hong Chen:
Revisiting Security Risks of Asymmetric Scalar Product Preserving Encryption and Its Variants. 1116-1125 - An Wang, Aziz Mohaisen, Songqing Chen:
An Adversary-Centric Behavior Modeling of DDoS Attacks. 1126-1136
Application 2: Social Networks and Crowdsourcing
- Qin Hu, Shengling Wang, Liran Ma, Rongfang Bie, Xiuzhen Cheng:
Anti-Malicious Crowdsourcing Using the Zero-Determinant Strategy. 1137-1146 - Jingya Zhou, Jianxi Fan:
JPR: Exploring Joint Partitioning and Replication for Traffic Minimization in Online Social Networks. 1147-1156 - Huajie Shao, Shiguang Wang, Shen Li, Shuochao Yao, Yiran Zhao, Md. Tanvir Al Amin, Tarek F. Abdelzaher, Lance M. Kaplan:
Optimizing Source Selection in Social Sensing in the Presence of Influence Graphs. 1157-1167 - Chenxi Qiu, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, James Caverlee:
Dynamic Contract Design for Heterogenous Workers in Crowdsourcing for Quality Control. 1168-1177 - Ming Ma, Zhi Wang, Kun Yi, Jiangchuan Liu, Lifeng Sun:
Joint Request Balancing and Content Aggregation in Crowdsourced CDN. 1178-1188 - Ali Li, Rui Wang, Lei Xu:
Shrink: A Breast Cancer Risk Assessment Model Based on Medical Social Network. 1189-1196
Application 3: Internet of Things, Smart Cities, and Cyber-Physical Systems
- Ankur Sarker, Zhuozhao Li, William Kolodzey, Haiying Shen:
Opportunistic Energy Sharing Between Power Grid and Electric Vehicles: A Game Theory-Based Pricing Policy. 1197-1207 - Tuan Dao, Karim Khalil, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy, Lance M. Kaplan:
Energy Efficient Object Detection in Camera Sensor Networks. 1208-1218 - Di Wu, Dmitri I. Arkhipov, Thomas Przepiorka, Qiang Liu, Julie A. McCann, Amelia C. Regan:
DeepOpp: Context-Aware Mobile Access to Social Media Content on Underground Metro Systems. 1219-1229 - Xuyu Wang, Chao Yang, Shiwen Mao:
PhaseBeat: Exploiting CSI Phase Data for Vital Sign Monitoring with Commodity WiFi Devices. 1230-1239 - Aibek Musaev, De Wang, Jiateng Xie, Calton Pu:
REX: Rapid Ensemble Classification System for Landslide Detection Using Social Media. 1240-1249 - Qing Han, Phu Nguyen, Ronald T. Eguchi, Kuo-Lin Hsu, Nalini Venkatasubramanian:
Toward An Integrated Approach to Localizing Failures in Community Water Networks. 1250-1260
Application 4: Mobile, Wireless, and Edge Computing
- Yongbo Li, Yurong Chen, Tian Lan, Guru Venkataramani:
MobiQoR: Pushing the Envelope of Mobile Edge Computing Via Quality-of-Result Optimization. 1261-1270 - Zhongxing Ming, Mingwei Xu, Ning Wang, Bingjie Gao, Qi Li:
Truthful Auctions for User Data Allowance Trading in Mobile Networks. 1271-1280 - Lin Wang, Lei Jiao, Jun Li, Max Mühlhäuser:
Online Resource Allocation for Arbitrary User Mobility in Distributed Edge Clouds. 1281-1290 - Pengzhan Zhou, Cong Wang, Yuanyuan Yang:
Leveraging Target k-Coverage in Wireless Rechargeable Sensor Networks. 1291-1300 - Yanqi Jin, Fangming Liu, Xiaomeng Yi, Minghua Chen:
Reducing Cellular Signaling Traffic for Heartbeat Messages via Energy-Efficient D2D Forwarding. 1301-1311 - Chin-Jung Liu, Li Xiao:
k-Protected Routing Protocol in Multi-hop Cognitive Radio Networks. 1312-1321
Application 5: Cloud Computing and Data Center Systems
- Tao Wang, Hong Xu, Fangming Liu:
Multi-resource Load Balancing for Virtual Network Functions. 1322-1332 - Nosayba El-Sayed, Hongyu Zhu, Bianca Schroeder:
Learning from Failure Across Multiple Clusters: A Trace-Driven Approach to Understanding, Predicting, and Mitigating Job Terminations. 1333-1344 - Xin Chen, Liting Hu, Douglas M. Blough, Michael A. Kozuch, Matthew Wolf:
RBAY: A Scalable and Extensible Information Plane for Federating Distributed Datacenter Resources. 1345-1355 - Sen Liu, Jiawei Huang, Yutao Zhou, Jianxin Wang, Tian He:
Task-aware TCP in Data Center Networks. 1356-1366 - Tao Zhu, Jack Li, Josh Kimball, Junhee Park, Chien-An Lai, Calton Pu, Qingyang Wang:
Limitations of Load Balancing Mechanisms for N-Tier Systems in the Presence of Millibottlenecks. 1367-1377 - Xiulin Li, Li Pan, Jiwei Huang, Shijun Liu, Yuliang Shi, Li-zhen Cui, Calton Pu:
Performance Analysis of Cloud Computing Centers Serving Parallelizable Rendering Jobs Using M/M/c/r Queuing Systems. 1378-1388
Application 6: Big Data Systems and Distributed Data Management and Analytics
- Shayan Shams, Richard Platania, Kisung Lee, Seung-Jong Park:
Evaluation of Deep Learning Frameworks Over Different HPC Architectures. 1389-1396 - Amelie Chi Zhou, Shadi Ibrahim, Bingsheng He:
On Achieving Efficient Data Transfer for Graph Processing in Geo-Distributed Datacenters. 1397-1407 - Elliott Wen, Winston K. G. Seah, Bryan C. K. Ng, Xue Liu, Jiannong Cao, Xuefeng Liu:
GBooster: Towards Acceleration of GPU-Intensive Mobile Applications. 1408-1418 - Atoshum Cahsai, Nikos Ntarmos, Christos Anagnostopoulos, Peter Triantafillou:
Scaling k-Nearest Neighbours Queries (The Right Way). 1419-1430 - Shuang Qiu, Qiong Luo:
Parallelizing Big De Bruijn Graph Construction on Heterogeneous Processors. 1431-1441 - Xinyang Zhang, Shouling Ji, Hui Wang, Ting Wang:
Private, Yet Practical, Multiparty Deep Learning. 1442-1452
Application 7: Distributed Middleware Systems
- Lars Kroll, Alexandru A. Ormenisan, Jim Dowling:
Fast and Flexible Networking for Message-Oriented Middleware. 1453-1464 - Chih-Hsun Chou, Laxmi N. Bhuyan, Shaolei Ren:
TailCut: Power Reduction under Quality and Latency Constraints in Distributed Search Systems. 1465-1475 - Yongshu Bai, Yifan Zhang:
StoArranger: Enabling Efficient Usage of Cloud Storage Services on Mobile Devices. 1476-1487 - Yacine Taleb, Shadi Ibrahim, Gabriel Antoniu, Toni Cortes:
Characterizing Performance and Energy-Efficiency of the RAMCloud Storage System. 1488-1498 - Karim Eldefrawy, Sky Faber, Tyler Kaczmarek:
Proactively Secure Cloud-Enabled Storage. 1499-1509 - Pengfei Zuo, Yu Hua, Xue Liu, Dan Feng, Wen Xia, Shunde Cao, Jie Wu, Yuanyuan Sun, Yuncheng Guo:
BEES: Bandwidth- and Energy- Efficient Image Sharing for Real-Time Situation Awareness. 1510-1520
Application 8: Distributed Systems and Optimizations
- Giuliano Losa, Antonio Barbalace, Yuzhong Wen, Ho-Ren Chuang, Binoy Ravindran:
Transparent Fault-Tolerance Using Intra-Machine Full-Software-Stack Replication on Commodity Multicore Hardware. 1521-1531 - Roland Kotto Kombi, Nicolas Lumineau, Philippe Lamarre:
A Preventive Auto-Parallelization Approach for Elastic Stream Processing. 1532-1542 - Bara Abusalah, Derek Schatzlein, Julian James Stephen, Masoud Saeida Ardekani, Patrick Eugster:
Dependable Cloud Resources with Guardian. 1543-1554 - Yuchao Zhang, Yusen Li, Ke Xu, Dan Wang, Minghui Li, Xuan Cao, Qingqing Liang:
A Communication-Aware Container Re-Distribution Approach for High Performance VNFs. 1555-1564 - Qiushi Wang, Ming Ming Tan, Xueyan Tang, Wentong Cai:
Minimizing Cost in IaaS Clouds Via Scheduled Instance Reservation. 1565-1574 - Ailidani Ailijiang, Aleksey Charapko, Murat Demirbas, Bekir O. Turkkan, Tevfik Kosar:
Efficient Distributed Coordination at WAN-Scale. 1575-1585
Application 9: Distributed Systems and Applications
- Ha Thi Thu Doan, Kazuhiro Ogata, François Bonnet:
Specifying a Distributed Snapshot Algorithm as a Meta-Program and Model Checking it at Meta-Level. 1586-1596 - César Cañas, Kaiwen Zhang, Bettina Kemme, Jörg Kienzle, Hans-Arno Jacobsen:
Self-Evolving Subscriptions for Content-Based Publish/Subscribe Systems. 1597-1607 - Volker Turau, Gerry Siegemund:
Scalable Routing for Topic-Based Publish/Subscribe Systems Under Fluctuations. 1608-1617 - Fengrui Shi, Zhijin Qin, Julie A. McCann:
OPPay: Design and Implementation of a Payment System for Opportunistic Data Services. 1618-1628 - Zhifeng He, Shiwen Mao:
Optimal Resource Allocation for Multi-user Video Streaming over mmWave Networks. 1629-1638 - Jason Woodring, Matthew Sell, Munehiro Fukuda, Hazeline U. Asuncion, Eric P. Salathe:
A Multi-agent Parallel Approach to Analyzing Large Climate Data Sets. 1639-1648
Application 10: Distributed Systems and Services
- Congfeng Jiang, Yumei Wang, Dongyang Ou, Bing Luo, Weisong Shi:
Energy Proportional Servers: Where Are We in 2016? 1649-1660 - Muhui Jiang, Xiapu Luo, TungNgai Miu, Shengtuo Hu, Weixiong Rao:
Are HTTP/2 Servers Ready Yet? 1661-1671 - Ertem Esiner, Anwitaman Datta:
Data Integrity for Collaborative Applications over Hosted Services. 1672-1682 - Weixiang Jiang, Fangming Liu, Guoming Tang, Kui Wu, Hai Jin:
Virtual Machine Power Accounting with Shapley Value. 1683-1693 - Ji Li, Cong Wang, Yuanyuan Yang:
A General Purpose Testbed for Mobile Data Gathering in Wireless Sensor Networks and a Case Study. 1694-1703 - Yu Wang, Shiwen Mao, Theodore S. Rappaport:
On Directional Neighbor Discovery in mmWave Networks. 1704-1713
Vision/Blue Sky Thinking Track
Vision 1: Internet of Things, Smart Cities and Cyber-Physical Systems
- Masaru Kitsuregawa:
Observable-by-Design. 1714-1716 - Eve M. Schooler, David Zage, Jeff Sedayao, Hassnaa Moustafa, Andrew Brown, Moreno Ambrosin:
An Architectural Vision for a Data-Centric IoT: Rethinking Things, Trust and Clouds. 1717-1728 - Teruo Higashino, Hirozumi Yamaguchi, Akihito Hiromori, Akira Uchiyama, Keiichi Yasumoto:
Edge Computing and IoT Based Research for Building Safe Smart Cities Resistant to Disasters. 1729-1737 - Munindar P. Singh, Amit K. Chopra:
The Internet of Things and Multiagent Systems: Decentralized Intelligence in Distributed Computing. 1738-1747 - Charles Consel, Milan Kabác:
Internet of Things: From Small- to Large-Scale Orchestration. 1748-1755 - Jie Cao, Lanyu Xu, Raef Abdallah, Weisong Shi:
EdgeOS_H: A Home Operating System for Internet of Everything. 1756-1764
Vision 2: Future Networking and Cyberinfrastructure
- Mostafa H. Ammar, Ellen W. Zegura, Yimeng Zhao:
A Vision for Zero-Hop Networking (ZeN). 1765-1770 - Amy Babay, Claudiu Danilov, John Lane, Michal Miskin-Amir, Daniel Obenshain, John L. Schultz, Jonathan Robert Stanton, Thomas Tantillo, Yair Amir:
Structured Overlay Networks for a New Generation of Internet Services. 1771-1779 - Thiago Garrett, Schahram Dustdar, Luis C. E. Bona, Elias P. Duarte Jr.:
Ensuring Network Neutrality for Future Distributed Systems. 1780-1786 - Jie Wu:
Uncovering the Useful Structures of Complex Networks in Socially-Rich and Dynamic Environments. 1787-1795 - Tristan Braud, Farshid Hassani Bijarbooneh, Dimitris Chatzopoulos, Pan Hui:
Future Networking Challenges: The Case of Mobile Augmented Reality. 1796-1807 - Ian T. Foster, Ben Blaiszik, Kyle Chard, Ryan Chard:
Software Defined Cyberinfrastructure. 1808-1814
Vision 3: Next Generation Cloud and Edge Services
- Moustafa AbdelBaky, Mengsong Zou, Ali Reza Zamani, Eduard Gibert Renart, Javier Diaz Montes, Manish Parashar:
Computing in the Continuum: Combining Pervasive Devices and Services to Support Data-Driven Applications. 1815-1824 - Tarek F. Abdelzaher, Md. Tanvir Al Amin, Amotz Bar-Noy, William Dron, Ramesh Govindan, Reginald L. Hobbs, Shaohan Hu, Jung-Eun Kim, Jongdeog Lee, Kelvin Marcus, Shuochao Yao, Yiran Zhao:
Decision-Driven Execution: A Distributed Resource Management Paradigm for the Age of IoT. 1825-1835 - Georgios I. Goumas, Konstantinos Nikas, Ewnetu Bayuh Lakew, Christos Kotselidis, Andrew Attwood, Erik Elmroth, Michail Flouris, Nikos Foutris, John Goodacre, Davide Grohmann, Vasileios Karakostas, Panagiotis Koutsourakis, Martin L. Kersten, Mikel Luján, Einar Rustad, John Thomson, Luis Tomás, Atle Vesterkjaer, Jim Webber, Ying Zhang, Nectarios Koziris:
ACTiCLOUD: Enabling the Next Generation of Cloud Applications. 1836-1845 - Huaimin Wang, Peichang Shi, Yiming Zhang:
JointCloud: A Cross-Cloud Cooperation Architecture for Integrated Internet Service Customization. 1846-1855 - Arun Iyengar:
Supporting Data Analytics Applications Which Utilize Cognitive Services. 1856-1864 - Sangeetha Seshadri, Paul Muench, Lawrence Chiu:
Trillion Operations Key-Value Storage Engine: Revisiting the Mission Critical Analytics Storage Software Stack. 1865-1872
Vision 4: Security and Trust in Future Systems
- Karl Aberer:
How Computer Science Risks to Lose Its Innocence, and Should Attempt to Take Responsibility. 1873-1875 - Elisa Bertino, Seraphin B. Calo, Maroun Touma, Dinesh C. Verma, Christopher Williams, Brian Rivera:
A Cognitive Policy Framework for Next-Generation Distributed Federated Systems: Concepts and Research Directions. 1876-1886 - Margaret L. Loper, Brian Paul Swenson:
Machine to Machine Trust in Smart Cities. 1887-1889 - Hermann Härtig, Michael Roitzsch, Carsten Weinhold, Adam Lackorzynski:
Lateral Thinking for Trustworthy Apps. 1890-1899 - Jiawei Zhang, Charu C. Aggarwal, Philip S. Yu:
Rumor Initiator Detection in Infected Signed Networks. 1900-1909 - Zhongjie Ba, Kui Ren:
Addressing Smartphone-Based Multi-factor Authentication via Hardware-Rooted Technologies. 1910-1914
Vision 5: Future Distributed Systems
- Anja Feldmann, Manfred Hauswirth, Volker Markl:
Enabling Wide Area Data Analytics with Collaborative Distributed Processing Pipelines (CDPPs). 1915-1918 - Calton Pu, Joshua Kimball, Chien-An Lai, Tao Zhu, Jack Li, Junhee Park, Qingyang Wang, Deepal Jayasinghe, PengCheng Xiong, Simon Malkowski, Qinyi Wu, Gueyoung Jung, Younggyun Koh, Galen S. Swint:
The Millibottleneck Theory of Performance Bugs, and Its Experimental Verification. 1919-1926 - Scott Klasky, Eric Suchyta, Mark Ainsworth, Qing Liu, Ben Whitney, Matthew Wolf, Jong Youl Choi, Ian T. Foster, Mark Kim, Jeremy Logan, Kshitij Mehta, Todd S. Munson, George Ostrouchov, Manish Parashar, Norbert Podhorszki, David Pugmire, Lipeng Wan:
Exacution: Enhancing Scientific Data Management for Exascale. 1927-1937 - Mohammadreza Najafi, Kaiwen Zhang, Mohammad Sadoghi, Hans-Arno Jacobsen:
Hardware Acceleration Landscape for Distributed Real-Time Analytics: Virtues and Limitations. 1938-1948 - Marco Lippi, Marco Mamei, Stefano Mariani, Franco Zambonelli:
Coordinating Distributed Speaking Objects. 1949-1960 - Fábio M. Costa, Karl A. Morris, Fabio Kon, Peter J. Clarke:
Model-Driven Domain-Specific Middleware. 1961-1971
Vision 6: Innovation in Big Data Systems
- Zonyin Shae, Jeffrey J. P. Tsai:
On the Design of a Blockchain Platform for Clinical Trial and Precision Medicine. 1972-1980 - Hai Jin, Pengcheng Yao, Xiaofei Liao, Long Zheng, Xianliang Li:
Towards Dataflow-Based Graph Accelerator. 1981-1992 - Dimitrios Georgakopoulos, Ali Yavari, Prem Prakash Jayaraman, Rajiv Ranjan:
Towards a RISC Framework for Efficient Contextualisation in the IoT. 1993-1996 - Michael Cochez, Dominik Hüser, Stefan Decker:
The Future of the Semantic Web: Prototypes on a Global Distributed Filesystem. 1997-2006 - Steffen Staab:
On Broad Big Data. 2007-2010
Short Papers
Short Paper 1: Distributed Operating Systems, Middleware, and Algorithms
- Yoann Desmouceaux, Pierre Pfister, Jerome Tollet, Mark Townsley, Thomas H. Clausen:
SRLB: The Power of Choices in Load Balancing with Segment Routing. 2011-2016 - Guanhua Yan:
Improving Efficiency of Link Clustering on Multi-core Machines. 2017-2024 - Shijing Li, Tian Lan, Moo-Ryong Ra, Rajesh Krishna Panta:
S3: Joint Scheduling and Source Selection for Background Traffic in Erasure-Coded Storage. 2025-2030 - Dong Lin, David Shui Wing Hui, Weijie Wu, Tingwei Liu, Yating Yang, Yi Wang, John C. S. Lui, Gong Zhang, Yingtao Li:
On the Feasibility of Inter-Domain Routing via a Small Broker Set. 2031-2038 - Kaiwen Zhang, Vinod Muthusamy, Mohammad Sadoghi, Hans-Arno Jacobsen:
Subscription Covering for Relevance-Based Filtering in Content-Based Publish/Subscribe Systems. 2039-2044 - Maxim Filatov, Verena Kantere, Iluju Kiringa:
Workflow Optimization in PAW. 2045-2052 - Xijun Li, Jianguo Yao, Xue Liu, Haibing Guan:
A First Look at Information Entropy-Based Data Pricing. 2053-2060 - Aleksey Charapko, Ailidani Ailijiang, Murat Demirbas, Sandeep S. Kulkarni:
Retrospective Lightweight Distributed Snapshots Using Loosely Synchronized Clocks. 2061-2066 - Chuan Xu, Janna Burman, Joffroy Beauquier:
Power-Aware Population Protocols. 2067-2074 - Julien Gascon-Samson, Jörg Kienzle, Bettina Kemme:
MultiPub: Latency and Cost-Aware Global-Scale Cloud Publish/Subscribe. 2075-2082 - Alexander Malkis, Steffen Borgwardt:
Reachability in Binary Multithreaded Programs Is Polynomial. 2083-2088 - Ting Qu, Deke Guo, Xiaomin Zhu, Jie Wu, Xiaolei Zhou, Zhong Liu:
An Event-Level Abstraction for Achieving Efficiency and Fairness in Network Update. 2089-2096
Short Paper 2: Cloud and Data Center Systems and Networks
- Hui Chen, Qingyang Wang, Balaji Palanisamy, Pengcheng Xiong:
DCM: Dynamic Concurrency Management for Scaling n-Tier Applications in Cloud. 2097-2104 - Wenxin Li, Xiaobo Zhou, Keqiu Li, Heng Qi, Deke Guo:
More Peak, Less Differentiation: Towards A Pricing-aware Online Control Framework for Inter-Datacenter Transfers. 2105-2110 - Joseph Mate, Khuzaima Daudjee, Shahin Kamali:
Robust Multi-tenant Server Consolidation in the Cloud for Data Analytics Workloads. 2111-2118 - Shaojun Zou, Jiawei Huang, Yutao Zhou, Jianxin Wang, Tian He:
Flow-Aware Adaptive Pacing to Mitigate TCP Incast in Data Center Networks. 2119-2124 - Vicent Sanz Marco, Zheng Wang, Barry Porter:
Real-Time Power Cycling in Video on Demand Data Centres Using Online Bayesian Prediction. 2125-2130 - Shorouq Alansari, Federica Paci, Vladimiro Sassone:
A Distributed Access Control System for Cloud Federations. 2131-2136 - Shripad Nadgowda, Sahil Suneja, Nilton Bila, Canturk Isci:
Voyager: Complete Container State Migration. 2137-2142 - Jie Deng, Gareth Tyson, Félix Cuadrado, Steve Uhlig:
Keddah: Capturing Hadoop Network Behaviour. 2143-2150 - Zijun Zhang, Zongpeng Li, Chuan Wu, Chuanhe Huang:
A Scalable and Distributed Approach for NFV Service Chain Cost Minimization. 2151-2156 - Samuel Benz, Fernando Pedone:
Elastic Paxos: A Dynamic Atomic Multicast Protocol. 2157-2164 - Wen Wang, Wenbo He, Jinshu Su:
Boosting The Benefits of Hybrid SDN. 2165-2170 - Fuliang Li, Jiannong Cao, Xingwei Wang, Yinchu Sun, Tian Pan, Xuefeng Liu:
Adopting SDN Switch Buffer: Benefits Analysis and Mechanism Design. 2171-2176
Short Paper 3: Internet of Things, Smart Cities, and Cyber-Physical Systems
- Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma:
IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. 2177-2184 - Xiaofei Cao, Sanjay Madria, Takahiro Hara:
Efficient Z-Order Encoding Based Multi-Modal Data Compression in WSNs. 2185-2192 - Yonghang Jiang, Zhenjiang Li, Jianping Wang:
PTrack: Enhancing the Applicability of Pedestrian Tracking with Wearables. 2193-2199 - Jack Kirton, Matthew Bradbury, Arshad Jhumka:
Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks. 2200-2205 - Liuwang Kang, Haiying Shen, Ankur Sarker:
Velocity Optimization of Pure Electric Vehicles with Traffic Dynamics Consideration. 2206-2211 - Neil Zhenqiang Gong, Altay Ozen, Yu Wu, Xiaoyu Cao, Richard Shin, Dawn Song, Hongxia Jin, Xuan Bao:
PIANO: Proximity-Based User Authentication on Voice-Powered Internet-of-Things Devices. 2212-2219 - Jia Liu, Shigang Chen, Bin Xiao, Yanyan Wang, Lijun Chen:
Category Information Collection in RFID Systems. 2220-2225 - Ali Yavari, Arezou Soltani Panah, Dimitrios Georgakopoulos, Prem Prakash Jayaraman, Ron G. van Schyndel:
Scalable Role-Based Data Disclosure Control for the Internet of Things. 2226-2233 - Vaibhav Arora, Faisal Nawab, Divyakant Agrawal, Amr El Abbadi:
Multi-representation Based Data Processing Architecture for IoT Applications. 2234-2239 - Greg Jackson, Zhijin Qin, Julie A. McCann:
Long Term Sensing via Battery Health Adaptation. 2240-2245 - Jingxuan Wang, Wenting Tu, Lucas Chi Kwong Hui, Siu-Ming Yiu, Eric Ke Wang:
Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning Techniques. 2246-2251 - Lu Zhou, Qingrong Chen, Zutian Luo, Haojin Zhu, Cailian Chen:
Speed-Based Location Tracking in Usage-Based Automotive Insurance. 2252-2257
Short Paper 4: Mobile, Wireless, Edge, and Crowd Computing
- Tong Li, Chathura M. Sarathchandra Magurawalage, Kezhi Wang, Ke Xu, Kun Yang, Haiyang Wang:
On Efficient Offloading Control in Cloud Radio Access Network with Mobile Edge Computing. 2258-2263 - Ting He, Ertugrul N. Ciftcioglu, Shiqiang Wang, Kevin S. Chan:
Location Privacy in Mobile Edge Clouds. 2264-2269 - Haotian Wang, Shilei Tian, Xiaofeng Gao, Lidong Wu, Guihai Chen:
Approximation Designs for Cooperative Relay Deployment in Wireless Networks. 2270-2275 - Lei Zhang, Feng Wang, Jiangchuan Liu:
Dispersing Social Content in Mobile Crowd through Opportunistic Contacts. 2276-2281 - Ji Wang, Xiaomin Zhu, Weidong Bao, Guanlin Wu:
A Lightweight Recommendation Framework for Mobile User's Link Selection in Dense Network. 2282-2287 - Marco Brocanelli, Xiaorui Wang:
Making Smartphone Smart on Demand for Longer Battery Life. 2288-2293 - Mauro Conti, Giulio Lovisotto, Ivan Martinovic, Gene Tsudik:
FADEWICH: Fast Deauthentication Over the Wireless Channel. 2294-2301 - Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Yih-Chun Hu:
Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control For Near-Field Wireless Charging. 2302-2307 - Raziel Carvajal Gómez, Inti Y. Gonzalez-Herrera, Yérom-David Bromberg, Laurent Réveillère, Etienne Rivière:
Density and Mobility-Driven Evaluation of Broadcast Algorithms for MANETs. 2308-2313 - Wenjie Hu, Guohong Cao:
Energy-Aware CPU Frequency Scaling for Mobile Video Streaming. 2314-2321 - Nova Ahmed, Md Mahfuzur Rahman Siddiquee, Refaya Karim, Mohsina Zaman, Sayed Mahmudul Alam, Syed Fahim Ashram:
Crazy Crowd Sourcing to Mitigate Resource Scarcity. 2322-2326 - Tongqing Zhou, Zhiping Cai, Bin Xiao, Yueyue Chen, Ming Xu:
Detecting Rogue AP with the Crowd Wisdom. 2327-2332
Short Paper 5: Distributed Big Data Systems and Analytics
- Aibek Musaev, Calton Pu:
Towards Multilingual Automated Classification Systems. 2333-2337 - Robertus Nugroho, Weiliang Zhao, Jian Yang, Cécile Paris, Surya Nepal:
The Joint Effects of Tweet Content Similarity and Tweet Interactions for Topic Derivation. 2338-2343 - Chao Li, Balaji Palanisamy:
Timed-Release of Self-Emerging Data Using Distributed Hash Tables. 2344-2351 - Muhammad Usman Nisar, Sahar Voghoei, Lakshmish Ramaswamy:
Caching for Pattern Matching Queries in Time Evolving Graphs: Challenges and Approaches. 2352-2357 - Dongsheng Li, Chengfei Zhang, Jinyan Wang, Zhaoning Zhang, Yiming Zhang:
GraphA: Adaptive Partitioning for Natural Graphs. 2358-2365 - Na Wang, Dongxiao Yu, Hai Jin, Chen Qian, Xia Xie, Qiang-Sheng Hua:
Parallel Algorithm for Core Maintenance in Dynamic Graphs. 2366-2371 - Wei Ai, Kenli Li, Cen Chen, Jiwu Peng, Keqin Li:
DHCRF: A Distributed Conditional Random Field Algorithm on a Heterogeneous CPU-GPU Cluster for Big Data. 2372-2379 - Tormod Erevik Lea, Leander Jehl, Hein Meling:
Towards New Abstractions for Implementing Quorum-Based Systems. 2380-2385 - Zaiyang Tang, Peng Li, Song Guo, Xiaofei Liao, Hai Jin, Daqing Zhang:
Selective Traffic Offloading on the Fly: A Machine Learning Approach. 2386-2392 - Mincheng Chen, Jingling Yuan, Lin Li, Dongling Liu, Tao Li:
A Fast Heuristic Attribute Reduction Algorithm Using Spark. 2393-2398 - Radek Tomsu, Samuel Marchal, N. Asokan:
Profiling Users by Modeling Web Transactions. 2399-2404 - Yifeng Luo, Jia Shi, Shuigeng Zhou:
JeCache: Just-Enough Data Caching with Just-in-Time Prefetching for Big Data Applications. 2405-2410
Short Paper 6: Security, Privacy, Trust, and Fault Tolerance in Distributed Systems
- Muntadher Fadhil Sallal, Gareth Owenson, Mo Adda:
Proximity Awareness Approach to Enhance Propagation Delay on the Bitcoin Peer-to-Peer Network. 2411-2416 - Derek Wang, Sheng Wen, Yang Xiang, Wanlei Zhou, Jun Zhang, Surya Nepal:
Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks. 2417-2422 - Dachuan Liu, Xing Gao, Haining Wang:
Location Privacy Breach: Apps Are Watching You in Background. 2423-2429 - Feng Shen, Justin Del Vecchio, Aziz Mohaisen, Steven Y. Ko, Lukasz Ziarek:
Android Malware Detection Using Complex-Flows. 2430-2437 - Aziz Mohaisen, Zhongshu Gu, Kui Ren:
Privacy Implications of DNSSEC Look-Aside Validation. 2438-2443 - Sudip Saha, Anil Vullikanti, Mahantesh Halappanavar:
FlipNet: Modeling Covert and Persistent Attacks on Networked Resources. 2444-2451 - Chao Yang, Jialong Zhang, Guofei Gu:
Understanding the Market-Level and Network-Level Behaviors of the Android Malware Ecosystem. 2452-2457 - Hai Nguyen, Vinod Ganapathy:
EnGarde: Mutually-Trusted Inspection of SGX Enclaves. 2458-2465 - Yifei Zhu, Silvery Fu, Jiangchuan Liu, Yong Cui:
Truthful Online Auction for Cloud Instance Subletting. 2466-2471 - Giuseppe Antonio Di Luna, Paola Flocchini, Taisuke Izumi, Tomoko Izumi, Nicola Santoro, Giovanni Viglietta:
On the Power of Weaker Pairwise Interaction: Fault-Tolerant Simulation of Population Protocols. 2472-2477 - Xuejiao Kang, David F. Gleich, Ahmed H. Sameh, Ananth Grama:
Distributed Fault Tolerant Linear System Solvers Based on Erasure Coding. 2478-2485 - Yanzhi Dou, He Li, Kexiong Curtis Zeng, Jinshan Liu, Yaling Yang, Bo Gao, Kui Ren:
Preserving Incumbent Users' Privacy in Exclusion-Zone-Based Spectrum Access Systems. 2486-2493
Demonstration Track
Demo 1: Distributed Applications Cluster
- Aibek Musaev, Qixuan Hou, Yang Yang, Calton Pu:
LITMUS: Towards Multilingual Reporting of Landslides. 2494-2496 - Iouliana Litou, Vana Kalogeraki:
Pythia: A System for Online Topic Discovery of Social Media Posts. 2497-2500 - Xiaoyu Ge, Ameya Daphalapurkar, Manali Shimpi, Darpun Kohli, Konstantinos Pelechrinis, Panos K. Chrysanthis, Demetrios Zeinalipour-Yazti:
Data-Driven Serendipity Navigation in Urban Places. 2501-2504 - Qing Han, Phu Nguyen, Ronald T. Eguchi, Kuo-Lin Hsu, Nalini Venkatasubramanian:
Toward an Integrated Approach to Localizing Failures in Community Water Networks (DEMO). 2505-2506
Demo 2: Security and Privacy Cluster
- Sagar Sharma, Keke Chen:
PrivateGraph: A Cloud-Centric System for Spectral Analysis of Large Encrypted Graphs. 2507-2510 - Markus Miettinen, Samuel Marchal, Ibbad Hafeez, Tommaso Frassetto, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma:
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT. 2511-2514 - RhongHo Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang:
Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n. 2515-2520 - Chao Li, Balaji Palanisamy, Aravind Kalaivanan, Sriram Raghunathan:
ReverseCloak: A Reversible Multi-level Location Privacy Protection System. 2521-2524
Demo 3: Clouds and Virtualization Cluster
- Mahmoud Ismail, Ermias Gebremeskel, Theofilos Kakantousis, Gautier Berthou, Jim Dowling:
Hopsworks: Improving User Experience and Development on Hadoop with Scalable, Strongly Consistent Metadata. 2525-2528 - Ioannis Giannakopoulos, Konstantinos Papazafeiropoulos, Katerina Doka, Nectarios Koziris:
Isolation in Docker through Layer Encryption. 2529-2532 - Alexandru A. Ormenisan, Jim Dowling:
Dela - Sharing Large Datasets between Hadoop Clusters. 2533-2536 - Corey E. Baker, Allen Starke, Tanisha G. Hill-Jarrett, Janise McNair:
In Vivo Evaluation of the Secure Opportunistic Schemes Middleware Using a Delay Tolerant Social Network. 2537-2542
Demo 4: Distributed Systems and Networking Cluster
- Bertil Chapuis, Benoît Garbinato:
Scaling and Load Testing Location-Based Publish and Subscribe. 2543-2546 - Yong-Yang Cheng, Shuai Zhao, Bo Cheng, Shou-lu Hou, Xiulei Zhang, Junliang Chen:
A Distributed Event-Centric Collaborative Workflows Development System for IoT Application. 2547-2550 - Himanshu Jethawa, Sanjay Madria:
Incentive Mechanism for Data-Centric Message Delivery in Delay Tolerant Networks. 2551-2554 - Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Yih-Chun Hu:
Performance of Cognitive Wireless Charger for Near-Field Wireless Charging. 2555-2556
Poster Track
Poster 1: Distributed Applications Cluster
- Yang Wang, Wuji Chen, Wei Zheng, He Huang, Wen Zhang, Hengchang Liu:
Toward Vehicle Sensing: An Integrated Application with Sparse Video Vameras and Intelligent Taxicabs. 2557-2558 - Beibei Miao, Yu Chen, Xuebo Jin, Bo Wang, Xianping Qu, Shimin Tao, Dong Wang, Zhi Zang:
Segmentation of Time Series Based on Kinetic Characteristics for Storage Consumption Prediction. 2559-2560 - Sachini Jayasekara, Shanika Karunasekera, Aaron Harwood:
A Multi-stage Hierarchical Window Model with Application to Real-Time Graph Analysis. 2561-2564 - Peng Xu, Jinyang Li, Xiaoshan Sun, Wei Zheng, Hengchang Liu:
Dynamic Pricing at Electric Vehicle Charging Stations for Queueing Delay Reduction. 2565-2566 - Changjiang Cai, Haipei Sun, Boxiang Dong, Bo Zhang, Ting Wang, Hui Wang:
Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints. 2567-2568 - Yue Zhang, Yao Liu:
Buffer-Based Reinforcement Learning for Adaptive Streaming. 2569-2570 - Mohammad Alhowaidi, Byrav Ramamurthy, Brian Bockelman, David Swanson:
The Case for Using Content-Centric Networking for Distributing High-Energy Physics Software. 2571-2572 - Shanhe Yi, Zijiang Hao, Qingyang Zhang, Quan Zhang, Weisong Shi, Qun Li:
LAVEA: Latency-Aware Video Analytics on Edge Computing Platform. 2573-2574 - Jingling Yuan, Yao Xiang, Xian Zhong, Mincheng Chen, Tao Li:
Complete Tolerance Relation Based Filling Algorithm Using Spark. 2575-2576
Poster 2: Security and Privacy Cluster
- Amin Fallahi, Xi Liu, Yuzhe Richard Tang, Shuang Wang, Rui Zhang:
Towards Secure Public Directory for Privacy-Preserving Data Sharing. 2577-2578 - Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku, Jie Wu:
Anonymous Routing to Maximize Delivery Rates in DTNs. 2579-2580 - Henner Heck, Olga Kieselmann, Arno Wacker:
Evaluating Connection Resilience for the Overlay Network Kademlia. 2581-2584 - Antonino Rullo, Edoardo Serra, Elisa Bertino, Jorge Lobo:
Shortfall-Based Optimal Security Provisioning for Internet of Things. 2585-2586 - Balaji Palanisamy, Chao Li, Prashant Krishnamurthy:
Group Differential Privacy-Preserving Disclosure of Multi-level Association Graphs. 2587-2588 - Stefan Gries, Marc Hesenius, Volker Gruhn:
Tracking Information Flow in Cyber-Physical Systems. 2589-2590 - Qiuxiang Dong, Dijiang Huang:
Privacy-Preserving Matchmaking in Geosocial Networks with Untrusted Servers. 2591-2592 - Jeffrey Spaulding, Shambhu J. Upadhyaya, Aziz Mohaisen:
You've Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques. 2593-2596 - Adam Bowers, Dan Lin, Anna Cinzia Squicciarini, Ali R. Hurson:
Real-Time Detection of Illegal File Transfers in the Cloud. 2597-2600 - Daniel Vasconcelos Correa da Silva, Antônio Augusto de Aragão Rocha:
Eyes of the Swarm: Streamers' Detection in BT. 2601-2603
Poster 3: Clouds and Virtualization Cluster
- Alexandre Dambreville, Joanna Tomasik, Johanne Cohen, Fabien Dufoulon:
Load Prediction for Energy-Aware Scheduling for Cloud Computing Platforms. 2604-2607 - Debabrota Basu, Xiayang Wang, Yang Hong, Haibo Chen, Stéphane Bressan:
Learn-as-You-Go with Megh: Efficient Live Migration of Virtual Machines. 2608-2609 - Seontae Kim, Nguyen Pham, Woongki Baek, Young-ri Choi:
Machine-Learning Based Performance Estimation for Distributed Parallel Applications in Virtualized Heterogeneous Clusters. 2610-2611 - Antonis Papaioannou, Kostas Magoutis:
Incremental Elasticity for NoSQL Data Stores. 2612-2613 - Stathis Maroulis, Nikos Zacheilas, Vana Kalogeraki:
A Framework for Efficient Energy Scheduling of Spark Workloads. 2614-2615 - Malayam Parambath Gilesh, S. D. Madhu Kumar, Lillykutty Jacob, Umesh Bellur:
Towards a Complete Virtual Data Center Embedding Algorithm Using Hybrid Strategy. 2616-2617 - Benjamin Bengfort, Pete Keleher:
Federating Consistency for Partition-Prone Networks. 2618-2619 - Chandra Prakash, Prashanth, Purushottam Kulkarni, Umesh Bellur:
Mitigating Nesting-Agnostic Hypervisor Policies in Derivative Clouds. 2620-2621 - Amir Sinaeepourfard, Jordi Garcia, Xavier Masip-Bruin, Eva Marín-Tordera:
A Novel Architecture for Efficient Fog to Cloud Data Management in Smart Cities. 2622-2623 - Sheng Zhang, Yu Liang, Zhuzhong Qian, Mingjun Xiao, Jie Wu, Fanyu Kong, Sanglu Lu:
Networklet: Concept and Deployment. 2624-2625 - Kristina Spirovska, Diego Didona, Willy Zwaenepoel:
Optimistic Causal Consistency for Geo-Replicated Key-Value Stores. 2626-2629 - Xudong Zhao, Jiwei Huang, Lei Liu, Shijun Liu, Calton Pu, Lizhen Cui:
Automated Performance Evaluation for Multi-tier Cloud Service Systems Subject to Mixed Workloads. 2630-2631 - Md. Sadek Ferdous, Andrea Margheri, Federica Paci, Mu Yang, Vladimiro Sassone:
Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations. 2632-2633
Poster 4: Distributed Systems and Networking Cluster
- Bing Jiao, Xiaomin Zhu, Xiaojun Ruan, Xiao Qin, Shu Yin:
DuoFS: An Attempt at Energy-Saving and Retaining Reliability of Storage Systems. 2634-2635 - Kohei Watabe, Toru Mano, Kimihiro Mizutani, Osamu Akashi, Kenji Nakagawa, Takeru Inoue:
A Proposal of an Efficient Traffic Matrix Estimation Under Packet Drops. 2636-2637 - Eman Bin Khunayn, Shanika Karunasekera, Hairuo Xie, Kotagiri Ramamohanarao:
Straggler Mitigation for Distributed Behavioral Simulation. 2638-2641 - Ahmed Abdel Moamen, Dezhong Wang, Nadeem Jamali:
Supporting Resource Control for Actor Systems in Akka. 2642-2645 - Saif Ansary, Antonio Barbalace, Ho-Ren Chuang, Thomas Lazor, Binoy Ravindran:
A Distributed Operating System Network Stack and Device Driver for Multicores. 2646-2649 - Peiyan Yuan, Honghai Wu, Xiaoyan Zhao, Zhengnan Dong:
Cache Potentiality of MONs: A Prime. 2650-2653 - Marcel Flores, Alexander Wenzel, Aleksandar Kuzmanovic:
Oak: User-Targeted Web Performance. 2654-2655 - Marco Canini, Iosif Salem, Liron Schiff, Elad Michael Schiller, Stefan Schmid:
A Self-Organizing Distributed and In-Band SDN Control Plane. 2656-2657
Tutorials
- Paul C. Castro, Vatche Ishakian, Vinod Muthusamy, Aleksander Slominski:
Serverless Programming (Function as a Service). 2658-2659 - Sanjay Kumar Madria:
Sensor Cloud: A Cloud of Sensor Networks. 2660-2661
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.