Stop the war!
Остановите войну!
for scientists:
default search action
37th ICDCS 2017: Atlanta, GA, USA
- Kisung Lee, Ling Liu:
37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5-8, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-1792-2
Research Track
Research 1: Distributed Fault Tolerance and Dependability
- Amy Babay, Emily Wagner, Michael Dinitz, Yair Amir:
Timely, Reliable, and Cost-Effective Internet Transport Service Using Dissemination Graphs. 1-12 - Yu Zhao, Huazhe Wang, Xin Lin, Tingting Yu, Chen Qian:
Pronto: Efficient Test Packet Generation for Dynamic Network Data Planes. 13-22 - Raluca Halalai, Pascal Felber, Anne-Marie Kermarrec, François Taïani:
Agar: A Caching System for Erasure-Coded Data. 23-33 - Odorico Machado Mendizabal, Fernando Luís Dotti, Fernando Pedone:
High Performance Recovery for Parallel State Machine Replication. 34-44 - Jun Li, Baochun Li:
On Data Parallelism of Erasure Coding in Distributed Storage Systems. 45-56 - Ying Liu, Xi Guan, Vladimir Vlassov, Seif Haridi:
MeteorShower: Minimizing Request Latency for Majority Quorum-Based Data Consistency Algorithms in Multiple Data Centers. 57-67
Research 2: Distributed Operating Systems and Middleware
- Dejun Teng, Lei Guo, Rubao Lee, Feng Chen, Siyuan Ma, Yanfeng Zhang, Xiaodong Zhang:
LSbM-tree: Re-Enabling Buffer Caching in Data Management for Mixed Reads and Writes. 68-79 - Pooya Salehi, Kaiwen Zhang, Hans-Arno Jacobsen:
Incremental Topology Transformation for Publish/Subscribe Systems Using Integer Programming. 80-91 - Chien-An Lai, Josh Kimball, Tao Zhu, Qingyang Wang, Calton Pu:
milliScope: A Fine-Grained Monitoring Framework for Performance Debugging of n-Tier Web Services. 92-102 - Shen Li, Md. Tanvir Al Amin, Raghu K. Ganti, Mudhakar Srivatsa, Shanhao Hu, Yiran Zhao, Tarek F. Abdelzaher:
Stark: Optimizing In-Memory Computing for Dynamic Dataset Collections. 103-114 - Pierre Sutra, Etienne Rivière, Cristian Cotes, Marc Sánchez Artigas, Pedro García López, Emmanuel Bernard, William Burns, Galder Zamarreno:
CRESON: Callable and Replicated Shared Objects over NoSQL. 115-128 - Linquan Zhang, Shangqi Lai, Chuan Wu, Zongpeng Li, Chuanxiong Guo:
Virtualized Network Coding Functions on the Internet. 129-139
Research 3: Security and Privacy in Distributed Systems I
- Adriano Di Luzio, Alessandro Mei, Julinda Stefa:
Consensus Robustness and Transaction De-Anonymization in the Ripple Currency Exchange System. 140-150 - Bikash Chandra Singh, Barbara Carminati, Elena Ferrari:
Learning Privacy Habits of PDS Owners. 151-161 - Xuefeng Liu, Jiaqi Wen, Shaojie Tang, Jiannong Cao, Jiaxing Shen:
City-Hunter: Hunting Smartphones in Urban Areas. 162-171 - Shangqing Zhao, Zhuo Lu, Cliff Wang:
When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography. 172-182 - Si Chen, Kui Ren, Sixu Piao, Cong Wang, Qian Wang, Jian Weng, Lu Su, Aziz Mohaisen:
You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones. 183-195 - Sheng Liu, Michael K. Reiter, Vyas Sekar:
Flow Reconnaissance via Timing Attacks on SDN Switches. 196-206
Research 4: Cloud Computing and Data Center Systems
- Qingyang Wang, Chien-An Lai, Yasuhiko Kanemasa, Shungeng Zhang, Calton Pu:
A Study of Long-Tail Latency in n-Tier Systems: RPC vs. Asynchronous Invocations. 207-217 - Iyswarya Narayanan, Bikash Sharma, Di Wang, Sriram Govindan, Laura Caulfield, Anand Sivasubramaniam, Aman Kansal, Jie Liu, Badriddine Khessib, Kushagra Vaid:
Rain or Shine? - Making Sense of Cloudy Reliability Data. 218-229 - Iyswarya Narayanan, Aman Kansal, Anand Sivasubramaniam:
Right-Sizing Geo-distributed Data Centers for Availability and Latency. 230-240 - Sung-Han Lin, Ranjan Pal, Marco Paolieri, Leana Golubchik:
Performance Driven Resource Sharing Markets for the Small Cloud. 241-251 - Mukil Kesavan, Ada Gavrilovska, Karsten Schwan:
Fault-Scalable Virtualized Infrastructure Management. 252-263 - Quanlu Zhang, Zhenhua Li, Zhi Yang, Shenglong Li, Shouyang Li, Yangze Guo, Yafei Dai:
DeltaCFS: Boosting Delta Sync for Cloud Storage Services by Learning from NFS. 264-275
Research 5: Edge and Fog Computing
- Utsav Drolia, Katherine Guo, Jiaqi Tan, Rajeev Gandhi, Priya Narasimhan:
Cachier: Edge-Caching for Recognition Applications. 276-286 - Xintong Song, Yaodong Huang, Qian Zhou, Fan Ye, Yuanyuan Yang, Xiaoming Li:
Content Centric Peer Data Sharing in Pervasive Edge Computing Environments. 287-297 - Youngbin Im, Jinyoung Han, Ji Hoon Lee, Yoon Kwon, Carlee Joe-Wong, Ted Taekyoung Kwon, Sangtae Ha:
FLARE: Coordinated Rate Adaptation for HTTP Adaptive Streaming in Cellular Networks. 298-307 - Xiaoli Wang, Aakanksha Chowdhery, Mung Chiang:
Networked Drone Cameras for Sports Streaming. 308-318 - Jiaqi Zheng, Guihai Chen, Stefan Schmid, Haipeng Dai, Jie Wu:
Chronus: Consistent Data Plane Updates in Timed SDNs. 319-327 - Surat Teerapittayanon, Bradley McDanel, H. T. Kung:
Distributed Deep Neural Networks Over the Cloud, the Edge and End Devices. 328-339
Research 6: Distributed Green Computing and Energy Management
- Kuangyu Zheng, Xiaorui Wang:
Dynamic Control of Flow Completion Time for Power Efficiency of Data Center Networks. 340-350 - Jia Zhao, Jiangchuan Liu, Haiyang Wang:
On Energy-Efficient Congestion Control for Multipath TCP. 351-360 - Guangchao Yuan, Chung-Wei Hang, Michael N. Huhns, Munindar P. Singh:
A Mechanism for Cooperative Demand-Side Management. 361-371 - Ning Liu, Zhe Li, Jielong Xu, Zhiyuan Xu, Sheng Lin, Qinru Qiu, Jian Tang, Yanzhi Wang:
A Hierarchical Framework of Cloud Resource Allocation and Power Management Using Deep Reinforcement Learning. 372-382 - Landu Jiang, Yu Hua, Chen Ma, Xue Liu:
SunChase: Energy-Efficient Route Planning for Solar-Powered EVs. 383-393
Research 7: Internet of Things, Smart Cities, and Cyber-Physical Systems
- He Huang, Yu-e Sun, Shigang Chen, Hongli Xu, Yian Zhou:
Persistent Traffic Measurement Through Vehicle-to-Infrastructure Communications. 394-403 - Yuxiao Hou, Yanwen Wang, Yuanqing Zheng:
TagBreathe: Monitor Breathing with Commodity RFID Systems. 404-413 - Saiyu Qi, Yuanqing Zheng, Xiaofeng Chen, Jianfeng Ma, Yong Qi:
Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain. 414-424 - Gonglong Chen, Wei Dong, Zhiwei Zhao, Tao Gu:
Towards Accurate Corruption Estimation in ZigBee Under Cross-Technology Interference. 425-435 - Mohammad Arif Ul Alam, Nirmalya Roy:
Unseen Activity Recognitions: A Hierarchical Active Transfer Learning Approach. 436-446 - Han Ding, Chen Qian, Jinsong Han, Ge Wang, Wei Xi, Kun Zhao, Jizhong Zhao:
RFIPad: Enabling Cost-Efficient and Device-Free In-air Handwriting Using Passive Tags. 447-457
Research 8: Mobile and Wireless Computing Systems I
- Xiang Zhang, Guoliang Xue, Ruozhou Yu, Dejun Yang, Jian Tang:
Robust Incentive Tree Design for Mobile Crowdsensing. 458-468 - Shanhe Yi, Zhengrui Qin, Nancy J. Carter, Qun Li:
WearLock: Unlocking Your Phone via Acoustics Using Smartwatch. 469-479 - Huber Flores, Xiang Su, Vassilis Kostakos, Jukka Riekki, Eemil Lagerspetz, Sasu Tarkoma, Pan Hui, Yong Li, Jukka Manner:
Modeling Mobile Code Acceleration in the Cloud. 480-491 - Xing Gao, Dachuan Liu, Daiping Liu, Haining Wang, Angelos Stavrou:
E-Android: A New Energy Profiling Tool for Smartphones. 492-502 - Ahmed Saeed, Khaled A. Harras, Ellen W. Zegura, Mostafa H. Ammar:
Local and Low-Cost White Space Detection. 503-516 - Weiman Sun, Shengling Wang:
General Analysis of Incentive Mechanisms for Peer-to-Peer Transmissions: A Quantum Game Perspective. 517-526
Research 9: Distributed Big Data Systems
- Dipti Shankar, Xiaoyi Lu, Dhabaleswar K. Panda:
High-Performance and Resilient Key-Value Store with Online Erasure Coding for Big Data Workloads. 527-537 - Wenxue Cheng, Fengyuan Ren, Wanchun Jiang, Tong Zhang:
Modeling and Analyzing Latency in the Memcached system. 538-548 - Chen Chen, Wei Wang, Bo Li:
Speculative Slot Reservation: Enforcing Service Isolation for Dependent Data-Parallel Computations. 549-559 - Shuhao Liu, Hao Wang, Baochun Li:
Optimizing Shuffle in Wide-Area Data Analytics. 560-571 - Zhiming Hu, Baochun Li, Zheng Qin, Rick Siow Mong Goh:
Job Scheduling without Prior Information in Big Data Processing Systems. 572-582 - Sikder Huq, M. Zubair Shafiq, Sukumar Ghosh, Amir R. Khakpour, Harkeerat Bedi:
Distributed Load Balancing in Key-Value Networked Caches. 583-593
Research 10: Distributed Algorithms and Theory I
- Dong Han, Ye Yan, Tao Shu, Liuqing Yang, Shuguang Cui:
Cognitive Context-Aware Distributed Storage Optimization in Mobile Cloud Computing: A Stable Matching Based Approach. 594-604 - Yaodong Huang, Xintong Song, Fan Ye, Yuanyuan Yang, Xiaoming Li:
Fair Caching Algorithms for Peer Data Sharing in Pervasive Edge Computing Environments. 605-614 - Ai-Chun Pang, Wei-Ho Chung, Te-Chuan Chiu, Junshan Zhang:
Latency-Driven Cooperative Task Computing in Multi-user Fog-Radio Access Networks. 615-624 - Zichuan Xu, Weifa Liang, Meitian Huang, Mike Jia, Song Guo, Alex Galis:
Approximation and Online Algorithms for NFV-Enabled Multicasting in SDNs. 625-634 - Zhuojun Duan, Wei Li, Zhipeng Cai:
Distributed Auctions for Task Assignment and Scheduling in Mobile Crowdsensing Systems. 635-644 - Hengky Susanto, Honggang Zhang, Shing-Yip Ho, Benyuan Liu:
Effective Mobile Data Trading in Secondary Ad-hoc Market with Heterogeneous and Dynamic Environment. 645-655
Research 11: Security and privacy in Distributed Systems II
- Daniele Midi, Antonino Rullo, Anand Mudgerikar, Elisa Bertino:
Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things. 656-666 - Nan Li, Fuchun Guo, Yi Mu, Willy Susilo, Surya Nepal:
Fuzzy Extractors for Biometric Identification. 667-677 - Chen Wang, Chuyu Wang, Yingying Chen, Lei Xie, Sanglu Lu:
Smartphone Privacy Leakage of Social Relationships and Demographics from Surrounding Access Points. 678-688 - Gang Li, Fan Yang, Guoxing Chen, Qiang Zhai, Xinfeng Li, Jin Teng, Junda Zhu, Dong Xuan, Biao Chen, Wei Zhao:
EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance. 689-698 - Xiang Li, J. David Smith, My T. Thai:
Adaptive Reconnaissance Attacks with Near-Optimal Parallel Batching. 699-709 - You Zhou, Yian Zhou, Shigang Chen, Samuel S. Wu:
Achieving Strong Privacy in Online Survey. 710-719
Research 12: Cloud Computing and Distributed Data Analytics
- Jian-Jhih Kuo, Shan-Hsiang Shen, Ming-Hong Yang, De-Nian Yang, Ming-Jer Tsai, Wen-Tsuen Chen:
Service Overlay Forest Embedding for Software-Defined Cloud Networks. 720-730 - Qixia Zhang, Yikai Xiao, Fangming Liu, John C. S. Lui, Jian Guo, Tao Wang:
Joint Optimization of Chain Placement and Request Scheduling for Network Function Virtualization. 731-741 - Eman Ramadan, Arvind Narayanan, Zhi-Li Zhang, Runhui Li, Gong Zhang:
BIG Cache Abstraction for Cache Networks. 742-752 - Jyotikrishna Dass, V. N. S. Prithvi Sakuru, Vivek Sarin, Rabi N. Mahapatra:
Distributed QR Decomposition Framework for Training Support Vector Machines. 753-763 - Qiang-Sheng Hua, Ming Ai, Hai Jin, Dongxiao Yu, Xuanhua Shi:
Distributively Computing Random Walk Betweenness Centrality in Linear Time. 764-774 - Kambiz Ghoorchian, Sarunas Girdzijauskas, Fatemeh Rahimian:
DeGPar: Large Scale Topic Detection Using Node-Cut Partitioning on Dense Weighted Graphs. 775-785
Research 13: Distributed Algorithms and Theory II
- Shaojie Tang, Yaqin Zhou, Kai Han, Zhao Zhang, Jing Yuan, Weili Wu:
Networked Stochastic Multi-armed Bandits with Combinatorial Strategies. 786-793 - Marjorie Bournat, Swan Dubois, Franck Petit:
Computability of Perpetual Exploration in Highly Dynamic Rings. 794-804 - Sikder Huq, Sukumar Ghosh:
Locally Self-Adjusting Skip Graphs. 805-815 - Huanyang Zheng, Jie Wu:
Online to Offline Business: Urban Taxi Dispatching with Passenger-Driver Matching Stability. 816-825 - Yongzheng Jia, Wei Xu, Xue Liu:
An Optimization Framework for Online Ride-Sharing Markets. 826-835 - Muhammad Shahzad, Alex X. Liu:
Fast and Accurate Tracking of Population Dynamics in RFID Systems. 836-846
Research 14: Mobile and Wireless Computing Systems II
- Wei Gong, Jiangchuan Liu:
Robust Indoor Wireless Localization Using Sparse Recovery. 847-856 - Ehsan Aryafar, Alireza Keshavarz-Haddad, Carlee Joe-Wong, Mung Chiang:
Max-Min Fair Resource Allocation in HetNets: Distributed Algorithms and Hybrid Architecture. 857-869 - Xiaofeng Gao, Rui Yang, Fan Wu, Guihai Chen, Jinguang Zhou:
Optimization of Full-View Barrier Coverage with Rotatable Camera Sensors. 870-879 - Bing Feng, Jianqing Liu, Chi Zhang, Yuguang Fang:
Communication through Symbol Silence: Towards Free Control Messages in Indoor WLANs. 880-888 - Jun Zhao:
Secure Connectivity of Wireless Sensor Networks Under Key Predistribution with on/off Channels. 889-899 - Liqiong Chang, Jie Xiong, Yu Wang, Xiaojiang Chen, Junhao Hu, Dingyi Fang:
iUpdater: Low Cost RSS Fingerprints Updating for Device-Free Localization. 900-910
Research 15: Social Networks and Crowdsourcing
- Iouliana Litou, Vana Kalogeraki, Dimitrios Gunopulos:
Influence Maximization in a Many Cascades World. 911-921 - Xiaomei Zhang, Yibo Wu, Lifu Huang, Heng Ji, Guohong Cao:
Expertise-Aware Truth Analysis and Task Allocation in Mobile Crowdsourcing. 922-932 - Hongwei Wang, Song Guo, Jiannong Cao, Minyi Guo:
MELODY: A Long-Term Dynamic Quality-Aware Incentive Mechanism for Crowdsourcing. 933-943 - Suhendry Effendy, Roland H. C. Yap:
The Strong Link Graph for Enhancing Sybil Defenses. 944-954 - Zhenzhe Zheng, Zhaoxiong Yang, Fan Wu, Guihai Chen:
Mechanism Design for Mobile Crowdsensing with Execution Uncertainty. 955-965 - Daniel Yue Zhang, Chao Zheng, Dong Wang, Douglas Thain, Xin Mu, Greg Madey, Chao Huang:
Towards Scalable and Dynamic Social Sensing Using A Distributed Computing Framework. 966-976
Industry and Experimentation Track
Industry 1: Cloud Data Centers and Performance
- Prashanth Thinakaran, Jashwant Raj Gunasekaran, Bikash Sharma, Mahmut Taylan Kandemir, Chita R. Das:
Phoenix: A Constraint-Aware Scheduler for Heterogeneous Datacenters. 977-987 - Juan F. Pérez, Robert Birke, Mathias Björkqvist, Lydia Y. Chen:
Dual Scaling VMs and Queries: Cost-Effective Latency Curtailment. 988-998 - Daniel Migault, Marcos A. Simplício Jr., Bruno M. Barros, Makan Pourzandi, Thiago R. M. Almeida, Ewerton R. Andrade, Tereza Cristina M. B. Carvalho:
A Framework for Enabling Security Services Collaboration Across Multiple Domains. 999-1010 - Debessay Fesehaye, Lenin Singaravelu, Chien-Chia Chen, Xiaobo Huang, Amitabha Banerjee, Ruijin Zhou, Rajesh Somasundaran:
Group Clustering Using Inter-Group Dissimilarities. 1011-1021 - Lipeng Wan, Matthew Wolf, Feiyi Wang, Jong Youl Choi, George Ostrouchov, Scott Klasky:
Comprehensive Measurement and Analysis of the User-Perceived I/O Performance in a Production Leadership-Class Storage System. 1022-1031
Industry 2: Mobile Computing and Internet of Things
- Mudhakar Srivatsa, Raghu K. Ganti, Prasant Mohapatra:
On the Limits of Subsampling of Location Traces. 1032-1041 - Pranita Dewan, Raghu K. Ganti, Mudhakar Srivatsa:
SOM-TC: Self-Organizing Map for Hierarchical Trajectory Clustering. 1042-1052 - Matús Harvan, Samuel Kimoto, Thomas Locher, Yvonne-Anne Pignolet, Johannes Schneider:
Processing Encrypted and Compressed Time Series Data. 1053-1062 - Amardeep Mehta, Rami Baddour, Fredrik Svensson, Harald Gustafsson, Erik Elmroth:
Calvin Constrained - A Framework for IoT Applications in Heterogeneous Environments. 1063-1073
Applications and Experiences Track
Application 1: Security, Privacy, Trust in Distributed Systems
- Shahriar Badsha, Xun Yi, Ibrahim Khalil, Elisa Bertino:
Privacy Preserving User-Based Recommender System. 1074-1083 - Ye Yan, Dong Han, Tao Shu:
Privacy Preserving Optimization of Participatory Sensing in Mobile Cloud Computing. 1084-1093 - Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. 1094-1104 - Chaowen Guan, Aziz Mohaisen, Zhi Sun, Lu Su, Kui Ren, Yaling Yang:
When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access. 1105-1115 - Weipeng Lin, Ke Wang, Zhilin Zhang, Hong Chen:
Revisiting Security Risks of Asymmetric Scalar Product Preserving Encryption and Its Variants. 1116-1125 - An Wang, Aziz Mohaisen, Songqing Chen:
An Adversary-Centric Behavior Modeling of DDoS Attacks. 1126-1136
Application 2: Social Networks and Crowdsourcing
- Qin Hu, Shengling Wang, Liran Ma, Rongfang Bie, Xiuzhen Cheng:
Anti-Malicious Crowdsourcing Using the Zero-Determinant Strategy. 1137-1146 - Jingya Zhou, Jianxi Fan:
JPR: Exploring Joint Partitioning and Replication for Traffic Minimization in Online Social Networks. 1147-1156 - Huajie Shao, Shiguang Wang, Shen Li, Shuochao Yao, Yiran Zhao, Md. Tanvir Al Amin, Tarek F. Abdelzaher, Lance M. Kaplan:
Optimizing Source Selection in Social Sensing in the Presence of Influence Graphs. 1157-1167 - Chenxi Qiu, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, James Caverlee:
Dynamic Contract Design for Heterogenous Workers in Crowdsourcing for Quality Control. 1168-1177 - Ming Ma, Zhi Wang, Kun Yi, Jiangchuan Liu, Lifeng Sun:
Joint Request Balancing and Content Aggregation in Crowdsourced CDN. 1178-1188 - Ali Li, Rui Wang, Lei Xu:
Shrink: A Breast Cancer Risk Assessment Model Based on Medical Social Network. 1189-1196
Application 3: Internet of Things, Smart Cities, and Cyber-Physical Systems
- Ankur Sarker, Zhuozhao Li, William Kolodzey, Haiying Shen:
Opportunistic Energy Sharing Between Power Grid and Electric Vehicles: A Game Theory-Based Pricing Policy. 1197-1207 - Tuan Dao, Karim Khalil, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy, Lance M. Kaplan:
Energy Efficient Object Detection in Camera Sensor Networks. 1208-1218 - Di Wu, Dmitri I. Arkhipov, Thomas Przepiorka, Qiang Liu, Julie A. McCann, Amelia C. Regan:
DeepOpp: Context-Aware Mobile Access to Social Media Content on Underground Metro Systems. 1219-1229