


default search action
38th SRDS 2019: Lyon, France
- 38th Symposium on Reliable Distributed Systems, SRDS 2019, Lyon, France, October 1-4, 2019. IEEE 2019, ISBN 978-1-7281-4222-7

- Jérémie Decouchant

, Antoine Boutet, Jiangshan Yu
, Paulo Jorge Esteves Veríssimo:
P3LS: Plausible Deniability for Practical Privacy-Preserving Live Streaming. 1-10 - Kun Yang, Hanqing Zhao, Chao Zhang, Jianwei Zhuge, Haixin Duan

:
Fuzzing IPC with Knowledge Inference. 11-20 - Stefan Contiu, Sébastien Vaucher

, Rafael Pires
, Marcelo Pasin
, Pascal Felber
, Laurent Réveillère:
Anonymous and Confidential File Sharing over Untrusted Clouds. 21-31 - Kashyap Thimmaraju, Liron Schiff, Stefan Schmid

:
Preacher: Network Policy Checker for Adversarial Environments. 32-41 - Robert Flosbach, Justyna Joanna Chromik, Anne Remke:

Architecture and Prototype Implementation for Process-Aware Intrusion Detection in Electrical Grids. 42-51 - Andrei Mogage

, Rafael Pires
, Vlad Craciun
, Emanuel Onica
, Pascal Felber
:
Supply Chain Malware Targets SGX: Take Care of what you Sign. 52-60 - Rogério Pontes

, Francisco Maia
, Ricardo Vilaça
, Nuno Machado:
d'Artagnan: A Trusted NoSQL Database on Untrusted Clouds. 61-70 - Habib Saissi, Marco Serafini, Neeraj Suri

:
Gyro: A Modular Scale-Out Layer for Single-Server DBMSs. 71-82 - Jiewen Hai, Cheng Wang, Xusheng Chen, Tsz On Li, Heming Cui, Sen Wang:

Fulva: Efficient Live Migration for In-Memory Key-Value Stores with Zero Downtime. 83-92 - Thanasis Priovolos, Stathis Maroulis, Vana Kalogeraki

:
ESCAPe: Elastic Caching For Big Data Systems. 93-102 - Bernardo Ferreira

, Bernardo Portela
, Tiago Oliveira
, Guilherme Borges
, Henrique João L. Domingos
, João Leitão
:
BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage. 103-112 - Marcello Artioli, Daniela Loreti

, Anna Ciampolini:
Fault Tolerant High Performance Solver for Linear Equation Systems. 113-122 - Jingjing Zhang, Yingyao Rong, Jiannong Cao, Chunming Rong

, Jing Bian, Weigang Wu:
DBFT: A Byzantine Fault Tolerant Protocol with Graceful Performance Degradation. 123-132 - Lachlan J. Gunn, Jian Liu, Bruno Vavala, N. Asokan

:
Making Speculative BFT Resilient with Trusted Monotonic Counters. 133-142 - Masoud Gholami Estahbanati, Florian Schintke:

Multilevel Checkpoint/Restart for Large Computational Jobs on Distributed Computing Resources. 143-152 - Michael Eischer, Markus Büttner, Tobias Distler:

Deterministic Fuzzy Checkpoints. 153-162 - Subhajit Sidhanta, Ricardo J. Dias, Rodrigo Rodrigues

:
A More Consistent Understanding of Consistency. 163-172 - Klaus-Tycho Foerster

, Andrzej Kamisinski, Yvonne-Anne Pignolet, Stefan Schmid
, Gilles Trédan:
Improved Fast Rerouting Using Postprocessing. 173-182 - Christian Berger, Hans P. Reiser

, João Sousa, Alysson Bessani:
Resilient Wide-Area Byzantine Consensus Using Adaptive Weighted Replication. 183-192 - Raziel Carvajal-Gomez, Yehia Elkhatib

, Laurent Réveillère, Etienne Rivière, Yérom-David Bromberg:
Emergent Overlays for Adaptive MANET Broadcast. 193-202 - Marius Poke, Colin W. Glass:

A Dual Digraph Approach for Leaderless Atomic Broadcast. 203-220 - Alex Auvolat, François Taïani

:
Merkle Search Trees: Efficient State-Based CRDTs in Open Networks. 221-230 - André Rosa, Pedro Ákos Costa, João Leitão

:
Revisiting Broadcast Algorithms for Wireless Edge Networks. 231-240 - Luca Liechti, Paulo Gouveia, João Neves, Peter G. Kropf

, Miguel Matos, Valerio Schiavoni
:
THUNDERSTORM: A Tool to Evaluate Dynamic Network Topologies on Distributed Systems. 241-250 - Martin Byrenheid, Stefanie Roos, Thorsten Strufe:

Attack-Resistant Spanning Tree Construction in Route-Restricted Overlay Networks. 251-260 - Phani Kishore Gadepalli, Gregor Peach, Ludmila Cherkasova, Rob Aitken, Gabriel Parmer:

Challenges and Opportunities for Efficient Serverless Computing at the Edge. 261-266 - Julien Ponge, Mark C. Little:

Scalability and Resilience in Practice: Current Trends and Opportunities. 267 - Kahina Lazri, Antoine Blin, Julien Sopena, Gilles Muller:

Toward an in-Kernel High Performance Key-Value Store Implementation. 268 - Uttam Thakore, Rohit Ranchal, Yi-Hsiu Wei, HariGovind V. Ramasamy:

Combining Learning and Model-Based Reasoning to Reduce Uncertainties in Cloud Security and Compliance Auditing. 269-274 - Liuqing Ye, Dan Feng, Yuchong Hu, Xueliang Wei:

A Generic Construction for All Parameters in Minimum Storage Regenerating Codes. 275-284 - Zhi Qiao

, Shuwen Liang, Hsing-Bung Chen, Song Fu, Bradley W. Settlemyer:
Exploring Declustered Software RAID for Enhanced Reliability and Recovery Performance in HPC Storage Systems. 285-294 - Takayuki Fukatani, Hieu Hanh Le

, Haruo Yokota
:
Lightweight Dynamic Redundancy Control for Server-Based Storage. 295-304 - Signe Rüsch, Kai Bleeke, Rüdiger Kapitza:

Bloxy: Providing Transparent and Generic BFT-Based Ordering Services for Blockchains. 305-314 - Arnaud L'Hutereau, Dorian Burihabwa, Pascal Felber

, Hugues Mercier, Valerio Schiavoni
:
Blockchain-Based Metadata Protection for Archival Systems. 315-323 - Marcus Brandenburger, Christian Cachin, Rüdiger Kapitza, Alessandro Sorniotti:

Trusted Computing Meets Blockchain: Rollback Attacks and a Solution for Hyperledger Fabric. 324-333 - Michel Raynal:

The Notion of Universality in Crash-Prone Asynchronous Message-Passing Systems: A Tutorial. 334-350 - Anshul Ahuja, Geetesh Gupta, Subhajit Sidhanta:

Edge Applications: Just Right Consistency. 351-353 - António Casimiro

, Emelie Ekenstedt
, Elad Michael Schiller:
Self-Stabilizing Manoeuvre Negotiation: The Case of Virtual Traffic Lights. 354-356 - Umit Demirbaga

, Ayman Noor, Zhenyu Wen, Philip James
, Karan Mitra, Rajiv Ranjan:
SmartMonit: Real-Time Big Data Monitoring System. 357-359 - Tasos Bakogiannis, Ioannis Mytilinis, Katerina Doka, Georgios I. Goumas:

Building Ad-Hoc Clouds with CloudAgora. 360-362 - Thanasis Priovolos, Stathis Maroulis, Vana Kalogeraki

:
A Framework for Managing an Elastic Redis Cache. 363-365 - Gewu Bu, Thanh Son Lam Nguyen, Maria Potop-Butucaru, Kim Loan Thai:

HyperPubSub: Blockchain Based Publish/Subscribe. 366-368 - Ege Ciklabakkal, Ataberk Donmez

, Mert Erdemir, Emre Süren
, Mert Kaan Yilmaz, Pelin Angin:
ARTEMIS: An Intrusion Detection System for MQTT Attacks in Internet of Things. 369-371 - Léonard Lys

, Arthur Micoulet, Maria Potop-Butucaru:
Atomic Swapping Bitcoins and Ethers. 372-374 - Xiaofei Cao, Sanjay Madria:

A Testbed for Data Routing in Low-Power WSNs using DV-Hop Based Trajectory Encoding Algorithm. 375-377 - Isabelly Rocha, Gabriel Vinha, Andrey Brito, Pascal Felber

, Marcelo Pasin
, Valerio Schiavoni
:
ABEONA: An Architecture for Energy-Aware Task Migrations from the Edge to the Cloud. 378-380 - Adriano Serckumecka

, Ibéria Medeiros, Alysson Bessani:
Low-Cost Serverless SIEM in the Cloud. 381-382 - Alex Auvolat:

Making Federated Networks More Distributed. 383-384

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














