


default search action
40th ICDCS 2020: Singapore
- 40th IEEE International Conference on Distributed Computing Systems, ICDCS 2020, Singapore, November 29 - December 1, 2020. IEEE 2020, ISBN 978-1-7281-7002-2

Session 1A: Security and Privacy I
- Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma

, Surya Nepal
, Robert H. Deng
, Kui Ren:
Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing. 1-11 - Ahmad Akhtar

, Basit Shafiq, Jaideep Vaidya, Ayesha Afzal, Shafay Shamail, Omer F. Rana
:
Blockchain Based Auditable Access Control for Distributed Business Processes. 12-22 - Kui Ren, Yu Guo, Jiaqi Li, Xiaohua Jia, Cong Wang, Yajin Zhou, Sheng Wang, Ning Cao, Feifei Li:

HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data Outsourcing Services. 23-33 - Ruide Zhang, Ning Zhang, Assad Moini, Wenjing Lou, Y. Thomas Hou

:
PrivacyScope: Automatic Analysis of Private Data Leakage in TEE-Protected Applications. 34-44
Session 1B: Cloud Computing I
- Yan Li, Bo An, Junming Ma, Donggang Cao, Yasha Wang, Hong Mei:

SpotTune: Leveraging Transient Resources for Cost-efficient Hyper-parameter Tuning in the Public Cloud. 45-55 - Maria Casimiro, Diego Didona, Paolo Romano, Luís E. T. Rodrigues, Willy Zwaenepoel, David Garlan:

Lynceus: Cost-efficient Tuning and Provisioning of Data Analytic Jobs. 56-66 - Sean Choi, Muhammad Shahbaz, Balaji Prabhakar, Mendel Rosenblum:

λ-NIC: Interactive Serverless Compute on Programmable SmartNICs. 67-77 - Lei Xie, Jidong Zhai, Baodong Wu, Yuanbo Wang, Xingcheng Zhang, Peng Sun, Shengen Yan:

Elan: Towards Generic and Efficient Elastic Training for Deep Learning. 78-88
Session 1C: IoT I
- Jian Kang, Dan Lin:

DASH: A Universal Intersection Traffic Management System for Autonomous Vehicles. 89-99 - Chaojie Gu, Linshan Jiang, Rui Tan, Mo Li

, Jun Huang
:
Attack-Aware Data Timestamping in Low-Power Synchronization-Free LoRaWAN. 100-110 - Li Yan, Shohaib Mahmud, Haiying Shen, Natasha Zhang Foutz, Joshua Anton:

MobiRescue: Reinforcement Learning based Rescue Team Dispatching in a Flooding Disaster. 111-121 - Anand Mudgerikar, Elisa Bertino:

Jarvis: Moving Towards a Smarter Internet of Things. 122-134
Session 1D: Algorithms and Theory I
- Vipul Gupta

, Dominic Carrano, Yaoqing Yang, Vaishaal Shankar, Thomas A. Courtade, Kannan Ramchandran:
Serverless Straggler Mitigation using Error-Correcting Codes. 135-145 - Giuseppe Antonio Di Luna, Emmanuelle Anceaume, Silvia Bonomi

, Leonardo Querzoni
:
Synchronous Byzantine Lattice Agreement in O(log(f) Rounds. 146-156 - John Augustine, Seth Gilbert

, Fabian Kuhn, Peter Robinson, Suman Sourav
:
Latency, Capacity, and Distributed Minimum Spanning Tree†. 157-167 - Ryota Eguchi, Naoki Kitamura, Taisuke Izumi:

Fast Neighborhood Rendezvous. 168-178
Session 2A: Blockchain I
- Jun Zhao, Jing Tang

, Zengxiang Li, Huaxiong Wang, Kwok-Yan Lam, Kaiping Xue
:
An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving a Neat Bound. 179-189 - Nicolae Berendea, Hugues Mercier, Emanuel Onica

, Etienne Rivière:
Fair and Efficient Gossip in Hyperledger Fabric. 190-200 - Yuefeng Du

, Huayi Duan
, Anxin Zhou
, Cong Wang, Man Ho Au, Qian Wang
:
Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage. 201-211
Session 2B: Edge Computing I
- Borui Li, Wei Dong:

EdgeProg: Edge-centric Programming for IoT Applications. 212-222 - Phu Lai

, Qiang He, Guangming Cui, Feifei Chen, Mohamed Abdelrazek, John C. Grundy
, John G. Hosking, Yun Yang:
Quality of Experience-Aware User Allocation in Edge Computing Systems: A Potential Game. 223-233 - Qiang Liu, Tao Han, Ephraim Moges:

EdgeSlice: Slicing Wireless Edge Computing Network with Decentralized Deep Reinforcement Learning. 234-244
Session 2C: Mobile and Wireless Computing I
- Quan Chen, Zhipeng Cai

, Lianglun Cheng, Hong Gao:
Low Latency Broadcast Scheduling for Battery-Free Wireless Networks Without Predetermined Structures. 245-255 - Li Li, Xiaorui Wang, Feng Qin:

EnergyDx: Diagnosing Energy Anomaly in Mobile Apps by Identifying the Manifestation Point. 256-266 - Zhimeng Yin, Wenchao Jiang, Ruofeng Liu

, Song Min Kim, Tian He:
SafetyNet: Interference Protection via Transparent PHY Layer Coding. 267-277
Session 2D: Machine Learning I
- Rongfei Zeng, Shixun Zhang, Jiaqi Wang, Xiaowen Chu:

FMore: An Incentive Scheme of Multi-dimensional Auction for Federated Learning in MEC. 278-288 - Sen Lin, Guang Yang, Junshan Zhang:

A Collaborative Learning Framework via Federated Meta-Learning. 289-299 - Pengchao Han, Shiqiang Wang, Kin K. Leung:

Adaptive Gradient Sparsification for Efficient Federated Learning: An Online Learning Approach. 300-310
Session 3A: Security and Privacy II
- Ehsan Arabnezhad, Massimo La Morgia

, Alessandro Mei
, Eugenio Nerio Nemmi, Julinda Stefa:
A Light in the Dark Web: Linking Dark Web Aliases to Real Internet Identities. 311-321 - Shangyu Xie, Han Wang, Yuan Hong

, My Thai:
Privacy Preserving Distributed Energy Trading. 322-332 - Weiqi Cui, Tao Chen, Eric Chan-Tin:

More Realistic Website Fingerprinting Using Deep Learning. 333-343 - Sujaya Maiyya, Danny Hyun Bum Cho, Divyakant Agrawal, Amr El Abbadi:

Fides: Managing Data on Untrusted Infrastructure. 344-354
Session 3B: Cloud Computing II
- Gyuyeong Kim, Wonjun Lee:

Protocol-Independent Service Queue Isolation for Multi-Queue Data Centers. 355-365 - Qing Li, Nanyang Huang, Yong Jiang, Richard O. Sinnott, Mingwei Xu:

Scale the Data Plane of Software-Defined Networks: a Lazy Rule Placement Approach. 366-376 - Xin He, Jiaqi Zheng, Haipeng Dai

, Yuhu Sun, Wanchun Dou, Guihai Chen
:
Chronus+: Minimizing Switch Buffer Size during Network Updates in Timed SDNs. 377-387 - Anirudh Ganji, Anand Singh, Muhammad Shahzad:

Characterizing the Impact of TCP Coexistence in Data Center Networks. 388-398
Session 3C: IoT II
- Zhijun Li, Yongrui Chen:

BlueFi: Physical-layer Cross-Technology Communication from Bluetooth to WiFi. 399-409 - Qiaofeng Qin, Konstantinos Poularakis, Leandros Tassiulas:

A Learning Approach with Programmable Data Plane towards IoT Security. 410-420 - Zichuan Xu, Yugen Qin, Pan Zhou, John C. S. Lui, Weifa Liang

, Qiufen Xia, Wenzheng Xu, Guowei Wu:
To Cache or Not to Cache: Stable Service Caching in Mobile Edge-Clouds of a Service Market. 421-431 - Liuwang Kang, Haiying Shen:

Abnormal Message Detection for CAN Bus Based on Message Transmission Behaviors. 432-441
Session 3D: Big Data I
- Bin Tang, Jiannong Cao, Runze Cui, Baoliu Ye, Ye Li, Sanglu Lu:

Coded Computing at Full Speed. 442-452 - Hema Venkata Krishna Giri Narra, Zhifeng Lin, Ganesh Ananthanarayanan, Salman Avestimehr, Murali Annavaram:

Collage Inference: Using Coded Redundancy for Lowering Latency Variation in Distributed Image Classification Systems. 453-463 - Ülkü Meteriz, Necip Fazil Yildiran, Joongheon Kim

, David Mohaisen:
Understanding the Potential Risks of Sharing Elevation Information on Fitness Applications. 464-473 - Pengzhan Zhou, Cong Wang, Yuanyuan Yang, Xin Wei:

E-Sharing: Data-driven Online Optimization of Parking Location Placement for Dockless Electric Bike Sharing. 474-484
Session 4A: Blockchain II
- Marianna Belotti, Stefano Moretti, Maria Potop-Butucaru, Stefano Secci:

Game Theoretical Analysis of Cross-Chain Swaps. 485-495 - Xiaobing Guo, Qingxiao Guo, Min Liu, Yunhao Wang, Yilong Ma, Bo Yang:

A Certificateless Consortium Blockchain for IoTs. 496-506 - Christos Profentzas, Magnus Almgren

, Olaf Landsiedel:
TinyEVM: Off-Chain Smart Contracts on Low-Power IoT Devices. 507-518
Session 4B: Edge Computing II
- Sumit Maheshwari, Prasad Prakash Netalkar, Dipankar Raychaudhuri:

DISCO: Distributed Control Plane Architecture for Resource Sharing in Heterogeneous Mobile Edge Cloud Scenarios. 519-529 - Zheng Song

, Eli Tilevich:
Win with What You Have: QoS-Consistent Edge Services with Unreliable and Dynamic Resources. 530-540 - Yiming Zeng, Yaodong Huang, Ji Liu, Yuanyuan Yang:

Privacy-Preserving Distributed Edge Caching for Mobile Data Offloading in 5G Networks. 541-551
Session 4C: Mobile and Wireless Computing II
- Qian Zhang, Yetong Cao, Huijie Chen, Fan Li, Song Yang, Yu Wang, Zheng Yang, Yunhao Liu:

airFinger: Micro Finger Gesture Recognition via NIR Light Sensing for Smart Devices. 552-562 - Hisham Alhulayyil

, Kittipat Apicharttrisorn
, Jiasi Chen
, Karthikeyan Sundaresan, Samet Oymak, Srikanth V. Krishnamurthy
:
WOLT: Auto-Configuration of Integrated Enterprise PLC-WiFi Networks. 563-573 - Po-Yu Chen, Laksh Bhatia, Roman Kolcun, David E. Boyle, Julie A. McCann:

Contact-Aware Opportunistic Data Forwarding in Disconnected LoRaWAN Mobile Networks. 574-583
Session 4D: Machine Learning II
- Yangming Zhao, Jingyuan Fan, Lu Su, Tongyu Song, Sheng Wang, Chunming Qiao:

SNAP: A Communication Efficient Distributed Machine Learning Framework for Edge Computing. 584-594 - Hanlin Lu, Ting He, Shiqiang Wang, Changchang Liu, Mehrdad Mahdavi, Vijaykrishnan Narayanan

, Kevin S. Chan, Stephen Pasteris:
Communication-efficient k-Means for Edge-based Machine Learning. 595-605 - Yibo Jin, Lei Jiao

, Zhuzhong Qian, Sheng Zhang, Sanglu Lu, Xiaoliang Wang:
Resource-Efficient and Convergence-Preserving Online Participant Selection in Federated Learning. 606-616
Session 5A: Fault Tolerance and Dependability
- Oskar Lundström, Michel Raynal, Elad Michael Schiller:

Self-Stabilizing Set-Constrained Delivery Broadcast (extended abstract). 617-627 - Shujie Han, Patrick P. C. Lee

, Zhirong Shen, Cheng He, Yi Liu, Tao Huang:
Toward Adaptive Disk Failure Prediction via Stream Mining. 628-638 - Bharath Balasubramanian, Pamela Zave, Richard D. Schlichting, Mohammad Salehe, Shankaranarayanan Puzhavakath Narayanan, Seyed Hossein Mortazavi, Eyal de Lara, Matti A. Hiltunen, Kaustubh Joshi, Gueyoung Jung:

MUSIC: Multi-Site Critical Sections over Geo-Distributed State. 639-651
Session 5B: Cloud Computing III
- Yichen Jia

, Feng Chen:
Kill Two Birds with One Stone: Auto-tuning RocksDB for High Bandwidth and Low Latency. 652-664 - Blake Caldwell

, Sepideh Goodarzy, Sangtae Ha
, Richard Han
, Eric Keller, Eric Rozner, Youngbin Im:
FluidMem: Full, Flexible, and Fast Memory Disaggregation for the Cloud. 665-677 - Shady Issa, Miguel Viegas, Pedro Raminhas, Nuno Machado, Miguel Matos, Paolo Romano:

Exploiting Symbolic Execution to Accelerate Deterministic Databases. 678-688
Session 5C: Mobile and Wireless Computing III
- Jiacheng Shang

, Jie Wu:
Protecting Real-time Video Chat against Fake Facial Videos Generated by Face Reenactment. 689-699 - Chi Lin, Tingting Xu, Jie Xiong

, Fenglong Ma, Lei Wang, Guowei Wu:
WiWrite: An Accurate Device-Free Handwriting Recognition System with COTS WiFi. 700-709 - Spyridon Mastorakis, Tianxiang Li, Lixia Zhang:

DAPES: Named Data for Off-the-Grid File Sharing with Peer-to-Peer Interactions. 710-720
Session 5D: Algorithms and Theory II
- Lewis Tseng, Qinzi Zhang, Saptaparni Kumar, Yifan Zhang:

Exact Consensus under Global Asymmetric Byzantine Links. 721-731 - Ajay D. Kshemkalyani

, Anisur Rahaman Molla, Gokarna Sharma:
Efficient Dispersion of Mobile Robots on Dynamic Graphs. 732-742 - Kishori M. Konwar, Saptaparni Kumar, Lewis Tseng:

Semi-Fast Byzantine-tolerant Shared Register without Reliable Broadcast. 743-753
Session 6A: Blockchain III
- Suyash Gupta

, Sajjad Rahnama, Mohammad Sadoghi
:
Permissioned Blockchain Through the Looking Glass: Architectural and Implementation Lessons Learned. 754-764 - Yongrae Jo, Jeonghyun Ma, Chanik Park:

Toward Trustworthy Blockchain-as-a-Service with Auditing. 765-775 - Aggelos Kiayias, Saad Quader, Alexander Russell

:
Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders. 776-786
Session 6B: Edge Computing III
- Lingdong Wang, Liyao Xiang, Jiayu Xu, Jiaju Chen, Xing Zhao, Dixi Yao

, Xinbing Wang, Baochun Li:
Context-Aware Deep Model Compression for Edge Cloud Computing. 787-797 - Zhaofeng Zhang, Yue Chen, Junshan Zhang:

Distributionally Robust Edge Learning with Dirichlet Process Prior. 798-808 - Xianglin Wei, Li Li, Chaogang Tang

, Milos Doroslovacki, Suresh Subramaniam
:
Classification of Channel Access Attacks in Wireless Networks: A Deep Learning Approach. 809-819
Session 6C: Big Data II
- Mahmoud Ismail, Salman Niazi, Mauritz Sundell, Mikael Ronström, Seif Haridi, Jim Dowling:

Distributed Hierarchical File Systems strike back in the Cloud. 820-830 - Yang Liu, Huanle Xu, Wing Cheong Lau:

Accordia: Adaptive Cloud Configuration Optimization for Recurring Data-Intensive Applications. 831-841 - Lijie Xu, Xingtong Ye, Kai Kang, Tian Guo

, Wensheng Dou, Wei Wang, Jun Wei:
DistStream: An Order-Aware Distributed Framework for Online-Offline Stream Clustering Algorithms. 842-852
Session 6D: Operating Systems and Middleware I
- Han Zhao, Weihao Cui, Quan Chen, Jingwen Leng, Kai Yu, Deze Zeng, Chao Li, Minyi Guo:

CODA: Improving Resource Utilization by Slimming and Co-locating DNN and CPU Jobs. 853-863 - Sang-Hoon Kim, Ho-Ren Chuang, Robert Lyerly, Pierre Olivier, Changwoo Min, Binoy Ravindran:

DeX: Scaling Applications Beyond Machine Boundaries. 864-876 - Karolos Antoniadis, Rachid Guerraoui

, Vasileios Trigonakis:
Thread-Placement Learning. 877-887
Session 7A: Security and Privacy III
- Hisham Alasmary

, Ahmed Abusnaina, Rhongho Jang, Mohammed Abuhamad
, Afsah Anwar, DaeHun Nyang, David Mohaisen:
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers. 888-898 - Liyao Xiang, Lingdong Wang, Shufan Wang, Baochun Li:

Achieving Consensus in Privacy-Preserving Decentralized Learning. 899-909 - Yuan Lu, Qiang Tang

, Guiling Wang
:
Dragoon: Private Decentralized HITs Made Practical. 910-920
Session 7B: Cloud Computing IV
- Daping Li, Jiguang Wan, Jun Wang, Jian Zhou, Kai Lu

, Peng Xu, Fei Wu, Changsheng Xie:
Disperse Access Considered Energy Inefficiency in Intel Optane DC Persistent Memory Servers. 921-931 - Jingling Liu, Jiawei Huang, Ning Jiang, Weihe Li, Jianxin Wang:

Achieving High Utilization for Approximate Fair Queueing in Data Center. 932-942 - Shijian Li, Robert J. Walls, Tian Guo

:
Characterizing and Modeling Distributed Training with Transient Cloud GPU Servers. 943-953
Session 7C: Mobile and Wireless Computing IV
- Teemu Pulkkinen, Jukka K. Nurminen

, Petteri Nurmi
:
Understanding WiFi Cross-Technology Interference Detection in the Real World. 954-964 - Zhen Xiao

, Tao Chen
, Yang Liu
, Zhenjiang Li:
Mobile Phones Know Your Keystrokes through the Sounds from Finger's Tapping on the Screen. 965-975 - Miaomiao Liu, Xianzhong Ding

, Wan Du:
Continuous, Real-Time Object Detection on Mobile Devices without Offloading. 976-986
Session 7D: Green Computing and In-Memory Computing
- Dan Huang, Zhenlu Qin

, Qing Liu
, Norbert Podhorszki, Scott Klasky:
A Comprehensive Study of In-Memory Computing on Large HPC Systems. 987-997 - Guoming Tang, Kui Wu, Deke Guo, Yi Wang, Huan Wang:

Alleviating Low-Battery Anxiety of Mobile Users via Low-Power Video Streaming. 998-1008 - Jie Zhou, Zichen Xu, Wenli Zheng

, Yuhao Wang:
CAPMAN: Cooling and Active Power Management in big.LITTLE Battery Supported Devices. 1009-1019
Session 8A: Blockchain IV
- Xiaohai Dai, Jiang Xiao, Wenhui Yang, Chaofan Wang, Jian Chang, Rui Han, Hai Jin:

LVQ: A Lightweight Verifiable Query Approach for Transaction History in Bitcoin. 1020-1030 - Binbing Hou, Feng Chen:

A Study on Nine Years of Bitcoin Transactions: Understanding Real-world Behaviors of Bitcoin Miners and Users. 1031-1043 - Daniël Reijsbergen, Tien Tuan Anh Dinh:

On Exploiting Transaction Concurrency To Speed Up Blockchains. 1044-1054
Session 8B: Edge Computing IV
- Hyuk-Jin Jeong, Hyeon-Jae Lee, Kwang Yong Shin, Yong Hwan Yoo, Soo-Mook Moon:

PerDNN: Offloading Deep Neural Network Computations to Pervasive Edge Servers. 1055-1066 - Parisa Rahimzadeh, Jinsung Lee, Youngbin Im, Siun-Chuon Mau, Eric C. Lee, Bradford O. Smith, Fatemah Al-Duoli, Carlee Joe-Wong, Sangtae Ha

:
SPARCLE: Stream Processing Applications over Dispersed Computing Networks. 1067-1078 - Zichuan Xu, Shengnan Wang, Shipei Liu, Haipeng Dai

, Qiufen Xia, Weifa Liang
, Guowei Wu:
Learning for Exception: Dynamic Service Caching in 5G-Enabled MECs with Bursty User Demands. 1079-1089
Session 8C: Operating Systems and Middleware II
- Nikolaos Sapountzis, Ruimin Sun

, Xuetao Wei, Yier Jin
, Jedidiah R. Crandall
, Daniela Oliveira:
MITOS: Optimal Decisioning for the Indirect Flow Propagation Dilemma in Dynamic Information Flow Tracking Systems. 1090-1100 - Yunhao Bai, Zejiang Wang

, Xiaorui Wang, Junmin Wang:
AutoE2E: End-to-End Real-time Middleware for Autonomous Driving Control. 1101-1111 - Fei Li, Youyou Lu, Zhe Yang, Jiwu Shu:

SineKV: Decoupled Secondary Indexing for LSM-based Key-Value Stores. 1112-1122
Session 8D: Crowdsourcing and Crowdsensing
- Ellen Mitsopoulou, Iouliana Litou, Vana Kalogeraki

:
Multi-Objective Online Task Allocation in Spatial Crowdsourcing Systems. 1123-1133 - Tuo Shi

, Zhipeng Cai
, Jianzhong Li, Hong Gao:
CROSS: A Crowdsourcing based Sub-Servers Selection Framework in D2D Enhanced MEC Architecture. 1134-1144 - Mingjun Xiao, Jing Wang, Hui Zhao, Guoju Gao:

Unknown Worker Recruitment in Mobile Crowdsensing Using CMAB and Auction. 1145-1155 - Yaliang Li, Houping Xiao, Zhan Qin

, Chenglin Miao, Lu Su, Jing Gao, Kui Ren, Bolin Ding:
Towards Differentially Private Truth Discovery for Crowd Sensing Systems. 1156-1166
Posters
- Muntadher Sallal

, Steve Schneider
, Matthew Casey, François Dupressoir, Helen Treharne
, Constantin Catalin Dragan
, Luke Riley, Phil Wright:
Augmenting an Internet Voting System with Selene Verifiability using Permissioned Distributed Ledger. 1167-1168 - Hao Wu, Wei Liu, Yifan Gong, Jiangming Jin:

Safe Process Quitting for GPU Multi-Process Service (MPS). 1169-1170 - Shubhi Asthana, Aly Megahed, Ilyas Iyoob:

A Cloud-Migration Feasibility Advisor. 1171-1172 - Meiyan Lu, Lejian Liao, Feng Zhang, Dandan Song:

Exploration of TransE in a Distributed Environment. 1173-1174 - Ying Wan

, Haoyu Song
, Hao Che, Yang Xu
, Yi Wang, Chuwen Zhang, Zhijun Wang, Tian Pan
, Hao Li
, Hong Jiang, Chengchen Hu, Zhikang Chen, Bin Liu:
FastUp: Compute a Better TCAM Update Scheme in Less Time for SDN Switches. 1175-1176 - Zizhong Wang, Haixia Wang, Airan Shao, Dongsheng Wang:

An Adaptive Erasure-Coded Storage Scheme with an Efficient Code-Switching Algorithm. 1177-1178 - Bo Sun

, Yuxuan Jiang, Danny H. K. Tsang:
When Burstable Instances Meet Mobile Computing: Performance Modeling and Economic Analysis. 1179-1180 - Jacob Nelson, Roberto Palmieri:

On the Performance Impact of NUMA on One-sided RDMA Interactions. 1181-1182 - Qihua Zhou, Song Guo, Peng Li, Yanfei Sun, Li Li, Minyi Guo, Kun Wang:

Petrel: Community-aware Synchronous Parallel for Heterogeneous Parameter Server. 1183-1184 - Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang:

Robust P2P Primitives Using SGX Enclaves. 1185-1186 - Yin Li

, Chunhui Duan, Xuan Ding, Cihang Liu:
TagMic: Listening Through RFID Signals. 1187-1188 - Timothy Castiglia, Colin Goldberg, Stacy Patterson:

A Hierarchical Model for Fast Distributed Consensus in Dynamic Networks. 1189-1190 - Zhuozhao Li

, Tanmoy Sen, Haiying Shen, Mooi Choo Chuah:
Impact of Memory DoS Attacks on Cloud Applications and Real-Time Detection Schemes. 1191-1192 - Li Yan, Haiying Shen, Liuwang Kang, Juanjuan Zhao, Chengzhong Xu

:
MobiCharger: Optimal Scheduling for Cooperative EV-to-EV Dynamic Wireless Charging. 1193-1194 - Jiaping Yu, Haiwen Chen, Kui Wu, Zhiping Cai, Jinhua Cui:

A Distributed Storage System for Robust, Privacy-Preserving Surveillance Cameras. 1195-1196 - Jashwant Raj Gunasekaran, Prashanth Thinakaran, Nachiappan Chidambaram Nachiappan, Ram Srivatsa Kannan, Mahmut Taylan Kandemir, Chita R. Das:

Characterizing Bottlenecks in Scheduling Microservices on Serverless Platforms. 1197-1198 - Youfu Li, Matteo Interlandi, Fotis Psallidas, Wei Wang

, Carlo Zaniolo:
SEIZE User Desired Moments: Runtime Inspection for Parallel Dataflow Systems. 1199-1200 - Xinyu Lei, Tian Xie, Guan-Hua Tu

, Alex X. Liu:
An Inter-blockchain Escrow Approach for Fast Bitcoin Payment. 1201-1202 - Chen Chen

, Tongliang Deng, Jian Zhang, Yanliang Zou, Xiaomin Zhu, Shu Yin:
FILT: Optimizing KV-Embedded File Systems through Flat Indexing. 1203-1204 - Masoomeh Javidi Kishi, Roberto Palmieri:

On Reading Fresher Snapshots in Parallel Snapshot Isolation. 1205-1206 - Zhenheng Tang, Shaohuai Shi, Xiaowen Chu:

Communication-Efficient Decentralized Learning with Sparsification and Adaptive Peer Selection. 1207-1208 - Yue Fu, Man Ho Au, Rong Du, Haibo Hu, Dagang Li:

Cloud Password Shield: A Secure Cloud-based Firewall against DDoS on Authentication Servers. 1209-1210 - Vlasis Koutsos, Dimitrios Papadopoulos, Dimitris Chatzopoulos

, Sasu Tarkoma, Pan Hui:
Agora: A Privacy-aware Data Marketplace. 1211-1212 - Sheng Zhang, Yu Liang, Zhuzhong Qian, Mingjun Xiao, Jidong Ge, Jie Wu, Sanglu Lu:

Overlapped Mobile Charging for Sensor Networks. 1213-1214
Demos
- Ahmed Abd Elrahman, Mohamed ElHelw, Radwa El Shawi, Sherif Sakr:

D-SmartML: A Distributed Automated Machine Learning Framework. 1215-1218 - Yue Li, Han Liu, Zhiqiang Yang, Qian Ren, Lei Wang, Bangdao Chen:

SafePay on Ethereum: A Framework For Detecting Unfair Payments in Smart Contracts. 1219-1222 - Xuanzhe Li, Samuel Gomena, Logan Ballard, Juntao Li, Ehsan Aryafar, Carlee Joe-Wong:

A Community Platform for Research on Pricing and Distributed Machine Learning. 1223-1226 - Mao V. Ngo, Tie Luo

, Hakima Chaouchi, Tony Q. S. Quek
:
Contextual-Bandit Anomaly Detection for IoT Data in Distributed Hierarchical Edge Computing. 1227-1230 - Yao Chen

, Xin Long, Jiong He, Yuhang Chen, Hongshi Tan, Zhenxiang Zhang, Marianne Winslett, Deming Chen:
HaoCL: Harnessing Large-scale Heterogeneous Processors Made Easy. 1231-1234 - Ayesha Afzal, Muhammad Adeel Zahid, Ahmad Akhtar

, Basit Shafiq, Shafay Shamail, Abeer Elahraf, Jaideep Vaidya, Nabil R. Adam:
BP-Com: A Service Mapping Tool for Rapid Development of Business Processes. 1235-1238 - Yusaku Hayamizu, Kazuhisa Matsuzono, Hitoshi Asaeda:

Real-Time Video Streaming using CeforeSim: Simulator to the Real World. 1239-1242
The Second International Workshop on Blockchain and Mobile Applications (BlockApp)
- Swaroopa Reddy B, G. V. V. Sharma:

UL-blockDAG : Unsupervised Learning based Consensus Protocol for Blockchain. 1243-1248 - Peter Hillmann

, Marcus Knüpfer, Erik Heiland, Andreas Karcher:
Selective Deletion in a Blockchain. 1249-1256 - Alberto Garoffolo

, Dmytro Kaidalov, Roman Oliynykov
:
Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains. 1257-1262 - Zhipeng Gao, Hongli Li, Kaile Xiao, Qian Wang:

Cross-chain Oracle Based Data Migration Mechanism in Heterogeneous Blockchains. 1263-1268 - Sangwon Hong

, Yoongdoo Noh, Jeyoung Hwang, Chanik Park:
FabAsset: Unique Digital Asset Management System for Hyperledger Fabric. 1269-1274 - Mengya Li, Yang Qin, Bing Liu, Xiaowen Chu:

A Multi-node Collaborative Storage Strategy via Clustering in Blockchain Network. 1275-1280 - Canhui Wang

, Xiaowen Chu:
Performance Characterization and Bottleneck Analysis of Hyperledger Fabric. 1281-1286 - Jerin Sunny, Sriram Sankaran, Vishal Saraswat

:
Towards a Lightweight Blockchain Platform for Critical Infrastructure Protection. 1287-1292
The Second International Workshop on Network Meets Intelligent Computations (NMIC)
- Minghui Dai, Zhou Su, Jiliang Li

, Jian Zhou:
An Energy-Efficient Edge Offloading Scheme for UAV-Assisted Internet of Things. 1293-1297 - Cheng-Wei Ching

, Yu-Chun Liu, Chung-Kai Yang, Jian-Jhih Kuo
, Feng-Ting Su:
Optimal Device Selection for Federated Learning over Mobile Edge Networks. 1298-1303 - Ryoichi Shinkuma, Yoshinobu Yamada, Takehiro Sato, Eiji Oki:

Flow control in SDN-Edge-Cloud cooperation system with machine learning. 1304-1309 - Hiroki Ikeuchi, Jiawen Ge, Yoichi Matsuo

, Keishiro Watanabe:
A Framework for Automatic Failure Recovery in ICT Systems by Deep Reinforcement Learning. 1310-1315 - Ekaterina Khramtsova, Christian A. Hammerschmidt, Sofiane Lagraa, Radu State

:
Federated Learning For Cyber Security: SOC Collaboration For Malicious URL Detection. 1316-1321 - Bosen Zeng, Yong Zhong, Xianhua Niu:

A Data-Driven Performance Prediction Approach for Cellular Network Parameter Setting via Factorization Machine. 1322-1327 - Seunghyung Lee, Seokho Son, Jungsu Han, JongWon Kim:

Refining Micro Services Placement over Multiple Kubernetes-orchestrated Clusters employing Resource Monitoring. 1328-1332 - Michiko Harayama, Noboru Miyagawa:

Stabilizer of SMPC Throughput using Neural Networks. 1333-1337
The Second International Workshop on BigData Processing Systems (BDPS)
- Yunhao Sun, Guanyu Li, Bo Ning:

Automatic Rule Updating based on Machine Learning in Complex Event Processing. 1338-1343 - Aaron Harwood, Maria Rodriguez Read

, Gayashan Niroshana Amarasinghe
:
Dragon: A Lightweight, High Performance Distributed Stream Processing Engine. 1344-1351 - Rui Liang, Shengyong Xu:

Three-Dimensional Reconstruction and Phenotype Nondestructive Measurement Technology for Rape Roots. 1352-1357 - Deji Zhao, Bo Ning, Chao Yang:

Application research on application performance management system in big data of power grid. 1358-1363 - Yuanhu Yang, Jing Hu, Yusi Yang:

Research on Data Protection Algorithm Based on Social Network. 1364-1369 - Yao He, Xin Bi, Xiangguo Zhao, Chao Zhang, Zhixun Liu, Yuliang Ma:

Efficient Learning of Big ECG Data for Ventricular Fibrillation Warning. 1370-1375
EAI: Workshop on Efficient Artificial Intelligence for Edge Computing
- Zhiwen Fang, Zhou Yue, Weiyuan Liu, Feng Yang:

Image Denoising for Efficient Anomaly Detection in Videos. 1376-1382 - Tarek Elgamal, Shu Shi, Varun Gupta, Rittwik Jana, Klara Nahrstedt:

SiEVE: Semantically Encoded Video Analytics on Edge and Cloud. 1383-1388 - Kuldeep Sharma, Nirmala Ramakrishnan, Alok Prakash, Siew Kei Lam, Thambipillai Srikanthan:

Evaluating the Merits of Ranking in Structured Network Pruning. 1389-1396 - Nandish Chattopadhyay, Ritabrata Maiti, Anupam Chattopadhyay:

Deploy-able Privacy Preserving Collaborative ML. 1397-1402 - Tian Huang

, Tao Luo
, Joey Tianyi Zhou:
Adaptive Precision Training for Resource Constrained Devices. 1403-1408 - Tao Luo

, Wei Zhang, Bingsheng He, Cheng Liu, Douglas L. Maskell:
Energy Efficient In-memory Integer Multiplication Based on Racetrack Memory. 1409-1414 - Ting Xu

, Ming Zhao:
A LoRaWAN-MAC Protocol Based on WSN Residual Energy to Adjust Duty Cycle. 1415-1420

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














