IEEE International Conference on Distributed Computing Systems, ICDCS 2016


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Accurate Spatial Calibration of RFID Antennas via Spinning Tags

Chunhui Duan, Lei Yang, Yunhao Liu

Accurate Spatial Calibration of RFID Antennas via Spinning Tags

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cognitive Technologies for Smarter Cities

Martin G. Kienzle

Cognitive Technologies for Smarter Cities

Details
Discussion Comments: 0
Verification: Author has not verified information

Cure: Strong Semantics Meets High Availability and Low Latency

Deepthi Devaki Akkoorath, Alejandro Z. Tomsic, Manuel Bravo, Zhongmiao Li, Tyler Crain, Annette Bieniusa, Nuno M. Preguiça, Marc Shapiro

Cure: Strong Semantics Meets High Availability and Low Latency

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Service Placement for Detecting and Localizing Failures Using End-to-End Observations

Ting He, Novella Bartolini, Hana Khamfroush, InJung Kim, Liang Ma, Tom La Porta

Service Placement for Detecting and Localizing Failures Using End-to-End Observations

Details
Discussion Comments: 0
Verification: Authors have not verified information

Interactive Wireless Charging for Energy Balance

Sotiris E. Nikoletseas, Theofanis P. Raptis, Christoforos L. Raptopoulos

Interactive Wireless Charging for Energy Balance

Details
Discussion Comments: 0
Verification: Authors have not verified information

Bandwidth-Greedy Hashing for Massive-Scale Concurrent Flows

Tian Pan, Bin Liu, Xiaoyu Guo, Yang Li, Haoyu Song

Bandwidth-Greedy Hashing for Massive-Scale Concurrent Flows

Details
Discussion Comments: 0
Verification: Authors have not verified information

Characterizing the Computational Power of Anonymous Mobile Robots

Mattia D'Emidio, Daniele Frigioni, Alfredo Navarra

Characterizing the Computational Power of Anonymous Mobile Robots

Details
Discussion Comments: 0
Verification: Authors have not verified information

Enabling Privacy-Preserving Incentives for Mobile Crowd Sensing Systems

Haiming Jin, Lu Su, Bolin Ding, Klara Nahrstedt, Nikita Borisov

Enabling Privacy-Preserving Incentives for Mobile Crowd Sensing Systems

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Amnesia: A Bilateral Generative Password Manager

Luren Wang, Yue Li, Kun Sun

Amnesia: A Bilateral Generative Password Manager

Details
Discussion Comments: 0
Verification: Authors have not verified information

Measurement, Modeling, and Analysis of TCP in High-Speed Mobility Scenarios

Qingfang Liu, Ke Xu, Haiyang Wang, Meng Shen, Li Li, Qingyang Xiao

Measurement, Modeling, and Analysis of TCP in High-Speed Mobility Scenarios

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exploiting Causality to Engineer Elastic Distributed Software

K. R. Jayaram

Exploiting Causality to Engineer Elastic Distributed Software

Details
Discussion Comments: 0
Verification: Author has not verified information

Live Exploration of Dynamic Rings

Giuseppe Antonio Di Luna, Stefan Dobrev, Paola Flocchini, Nicola Santoro

Live Exploration of Dynamic Rings

Details
Discussion Comments: 0
Verification: Authors have not verified information

BotMeter: Charting DGA-Botnet Landscapes in Large Networks

Ting Wang, Xin Hu, Jiyong Jang, Shouling Ji, Marc Ph. Stoecklin, Teryl Taylor

BotMeter: Charting DGA-Botnet Landscapes in Large Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

UDS: A Unified Approach to Deterministic Multithreading

Franz J. Hauck, Jörg Domaschka

UDS: A Unified Approach to Deterministic Multithreading

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

RichNote: Adaptive Selection and Delivery of Rich Media Notifications to Mobile Users

Md. Yusuf Sarwar Uddin, Vinay Setty, Ye Zhao, Roman Vitenberg, Nalini Venkatasubramanian

RichNote: Adaptive Selection and Delivery of Rich Media Notifications to Mobile Users

Details
Discussion Comments: 0
Verification: Authors have not verified information

CACA: Link-Based Channel Allocation Exploiting Capture Effect for Channel Reuse in Wireless Sensor Networks

Jung Hyun Jun, Solchan Yeon, Titir Kundu, Dharma P. Agrawal, Jaehoon Jeong

CACA: Link-Based Channel Allocation Exploiting Capture Effect for Channel Reuse in Wireless Sensor Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Geometric Windowing Algorithm in Network Data-Plane Verification

Richard Chen, Toru Mano, Takeru Inoue, Kimihiro Mizutani, Hisashi Nagata, Osamu Akashi

A Geometric Windowing Algorithm in Network Data-Plane Verification

Details
Discussion Comments: 0
Verification: Authors have not verified information

A De-compositional Approach to Regular Expression Matching for Network Security Applications

Eric Norige, Alex X. Liu

A De-compositional Approach to Regular Expression Matching for Network Security Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributed Online Data Aggregation in Dynamic Graphs

Quentin Bramas, Toshimitsu Masuzawa, Sébastien Tixeuil

Distributed Online Data Aggregation in Dynamic Graphs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Tuning the Aggressive TCP Behavior for Highly Concurrent HTTP Connections in Data Center

Jiawei Huang, Jianxin Wang, Tao Zhang, Jianer Chen, Yi Pan

Tuning the Aggressive TCP Behavior for Highly Concurrent HTTP Connections in Data Center

Details
Discussion Comments: 0
Verification: Authors have not verified information

Flexible Instance: Meeting Deadlines of Delay Tolerant Jobs in the Cloud with Dynamic Pricing

Xiaomeng Yi, Fangming Liu, Zongpeng Li, Hai Jin

Flexible Instance: Meeting Deadlines of Delay Tolerant Jobs in the Cloud with Dynamic Pricing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal Marching of Autonomous Networked Robots

Buri Ban, Miao Jin, Hongyi Wu

Optimal Marching of Autonomous Networked Robots

Details
Discussion Comments: 0
Verification: Authors have not verified information

An Efficient Lock-Free Logarithmic Search Data Structure Based on Multi-dimensional List

Deli Zhang, Damian Dechev

An Efficient Lock-Free Logarithmic Search Data Structure Based on Multi-dimensional List

Details
Discussion Comments: 0
Verification: Authors have not verified information

Energy Minimization for Quality-Constrained Video with Multipath TCP over Heterogeneous Wireless Networks

Jiyan Wu, Bo Cheng, Ming Wang

Energy Minimization for Quality-Constrained Video with Multipath TCP over Heterogeneous Wireless Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

On Source Dependency Models for Reliable Social Sensing: Algorithms and Fundamental Error Bounds

Shuochao Yao, Shaohan Hu, Shen Li, Yiran Zhao, Lu Su, Lance M. Kaplan, Aylin Yener, Tarek F. Abdelzaher

On Source Dependency Models for Reliable Social Sensing: Algorithms and Fundamental Error Bounds

Details
Discussion Comments: 0
Verification: Authors have not verified information

Gremlin: Systematic Resilience Testing of Microservices

Victor Heorhiadi, Shriram Rajagopalan, Hani Jamjoom, Michael K. Reiter, Vyas Sekar

Gremlin: Systematic Resilience Testing of Microservices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Privacy-Preserving Data Classification and Similarity Evaluation for Distributed Systems

Qi Jia, Linke Guo, Zhanpeng Jin, Yuguang Fang

Privacy-Preserving Data Classification and Similarity Evaluation for Distributed Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reflecting on the Past, Preparing for the Future: From Peer-to-Peer to Edge-Centric Computing

Alberto Montresor

Reflecting on the Past, Preparing for the Future: From Peer-to-Peer to Edge-Centric Computing

Details
Discussion Comments: 0
Verification: Author has not verified information

RuleTris: Minimizing Rule Update Latency for TCAM-Based SDN Switches

Xitao Wen, Bo Yang, Yan Chen, Li Erran Li, Kai Bu, Peng Zheng, Yang Yang, Chengchen Hu

RuleTris: Minimizing Rule Update Latency for TCAM-Based SDN Switches

Details
Discussion Comments: 0
Verification: Authors have not verified information

WiLocator: WiFi-Sensing Based Real-Time Bus Tracking and Arrival Time Prediction in Urban Environments

Wenping Liu, Jiangchuan Liu, Hongbo Jiang, Bicheng Xu, Hongzhi Lin, Guoyin Jiang, Jing Xing

WiLocator: WiFi-Sensing Based Real-Time Bus Tracking and Arrival Time Prediction in Urban Environments

Details
Discussion Comments: 0
Verification: Authors have not verified information

Datacomp: Locally Independent Adaptive Compression for Real-World Systems

Peter A. H. Peterson, Peter L. Reiher

Datacomp: Locally Independent Adaptive Compression for Real-World Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

D-DEMOS: A Distributed, End-to-End Verifiable, Internet Voting System

Nikos Chondros, Bingsheng Zhang, Thomas Zacharias, Panos Diamantopoulos, Stathis Maneas, Christos Patsonakis, Alex Delis, Aggelos Kiayias, Mema Roussopoulos

D-DEMOS: A Distributed, End-to-End Verifiable, Internet Voting System

Details
Discussion Comments: 0
Verification: Authors have not verified information

Backlog-Aware SRPT Flow Scheduling in Data Center Networks

Tong Zhang, Fengyuan Ren, Ran Shu

Backlog-Aware SRPT Flow Scheduling in Data Center Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributed Encoding for Multiple-Inherited Locators to Accommodate Billions of Objects in the Internet

Xiaozhe Shao, Feng Wang, Lixin Gao, Kenji Fujikawa, Hiroaki Harai

Distributed Encoding for Multiple-Inherited Locators to Accommodate Billions of Objects in the Internet

Details
Discussion Comments: 0
Verification: Authors have not verified information

CACE: Exploiting Behavioral Interactions for Improved Activity Recognition in Multi-inhabitant Smart Homes

Mohammad Arif Ul Alam, Nirmalya Roy, Archan Misra, Joseph Taylor

CACE: Exploiting Behavioral Interactions for Improved Activity Recognition in Multi-inhabitant Smart Homes

Details
Discussion Comments: 0
Verification: Authors have not verified information

GrapH: Heterogeneity-Aware Graph Computation with Adaptive Partitioning

Christian Mayer, Muhammad Adnan Tariq, Chen Li, Kurt Rothermel

GrapH: Heterogeneity-Aware Graph Computation with Adaptive Partitioning

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Same Speed Timer in Population Protocols

Yuichi Sudo, Toshimitsu Masuzawa, Ajoy Kumar Datta, Lawrence L. Larmore

The Same Speed Timer in Population Protocols

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the Efficiency of Decentralized Search in Expert Networks

Liang Ma, Mudhakar Srivatsa, Derya Cansever, Xifeng Yan, Sue Kase, Michelle Vanni

On the Efficiency of Decentralized Search in Expert Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Memory Efficient One-Sided Communucation Library "ACP" in Globary Memory on Raspberry Pi 2

Yoshiyuki Morie, Hiroaki Honda, Takeshi Nanri, Taizo Kobayashi, Hidetomo Shibamura, Ryutaro Susukita, Yuichiro Ajima

Memory Efficient One-Sided Communucation Library "ACP" in Globary Memory on Raspberry Pi 2

Details
Discussion Comments: 0
Verification: Authors have not verified information

Directional Beam Alignment for Millimeter Wave Cellular Systems

Jie Zhao, Xin Wang, Harish Viswanathan

Directional Beam Alignment for Millimeter Wave Cellular Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Approximate Agreement under Mobile Byzantine Faults

Silvia Bonomi, Antonella Del Pozzo, Maria Potop-Butucaru, Sébastien Tixeuil

Approximate Agreement under Mobile Byzantine Faults

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fast Total Ordering for Modern Data Centers

Amy Babay, Yair Amir

Fast Total Ordering for Modern Data Centers

Details
Discussion Comments: 0
Verification: Authors have not verified information

CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data

Nolen Scaife, Henry Carter, Patrick Traynor, Kevin R. B. Butler

CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets

Samuel Marchal, Kalle Saari, Nidhi Singh, N. Asokan

Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Distributed Auctioneer for Resource Allocation in Decentralized Systems

Amin M. Khan, Xavier Vilaça, Luís E. T. Rodrigues, Felix Freitag

A Distributed Auctioneer for Resource Allocation in Decentralized Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Milk Carton: A Face Recognition-Based FTR System Using Opportunistic Clustered Computing

Edgar Marko Trono, Manato Fujimoto, Hirohiko Suwa, Yutaka Arakawa, Keiichi Yasumoto

Milk Carton: A Face Recognition-Based FTR System Using Opportunistic Clustered Computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hybrid Content-Based Routing Using Network and Application Layer Filtering

Sukanya Bhowmik, Muhammad Adnan Tariq, Lobna Hegazy, Kurt Rothermel

Hybrid Content-Based Routing Using Network and Application Layer Filtering

Details
Discussion Comments: 0
Verification: Authors have not verified information

An NFV Orchestration Framework for Interference-Free Policy Enforcement

Xin Li, Chen Qian

An NFV Orchestration Framework for Interference-Free Policy Enforcement

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Performance Analysis of Incentive Mechanisms for Cooperative Computing

Carlee Joe-Wong, Youngbin Im, Kyuyong Shin, Sangtae Ha

A Performance Analysis of Incentive Mechanisms for Cooperative Computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

CRONets: Cloud-Routed Overlay Networks

Chris X. Cai, Franck Le, Xin Sun, Geoffrey G. Xie, Hani Jamjoom, Roy H. Campbell

CRONets: Cloud-Routed Overlay Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Parity-Based Data Outsourcing Model for Query Authentication and Correction

Shixin Tian, Ying Cai, Zhenbi Hu

A Parity-Based Data Outsourcing Model for Query Authentication and Correction

Details
Discussion Comments: 0
Verification: Authors have not verified information

An SDN-Based Multipath GridFTP for High-Speed Data Transfer

Che Huang, Chawanat Nakasan, Kohei Ichikawa, Hajimu Iida

An SDN-Based Multipath GridFTP for High-Speed Data Transfer

Details
Discussion Comments: 0
Verification: Authors have not verified information

Practical Intrusion-Tolerant Networks

Daniel Obenshain, Thomas Tantillo, Amy Babay, John L. Schultz, Andrew Newell, Md. Endadul Hoque, Yair Amir, Cristina Nita-Rotaru

Practical Intrusion-Tolerant Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

RUSH: A RobUst ScHeduler to Manage Uncertain Completion-Times in Shared Clouds

Zhe Huang, Bharath Balasubramanian, Michael Wang, Tian Lan, Mung Chiang, Danny H. K. Tsang

RUSH: A RobUst ScHeduler to Manage Uncertain Completion-Times in Shared Clouds

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mayflower: Improving Distributed Filesystem Performance Through SDN/Filesystem Co-Design

Sajjad Rizvi, Xi Li, Bernard Wong, Fiodar Kazhamiaka, Benjamin Cassell

Mayflower: Improving Distributed Filesystem Performance Through SDN/Filesystem Co-Design

Details
Discussion Comments: 0
Verification: Authors have not verified information

Quality-Aware and Fine-Grained Incentive Mechanisms for Mobile Crowdsensing

Jing Wang, Jian Tang, Dejun Yang, Erica Wang, Guoliang Xue

Quality-Aware and Fine-Grained Incentive Mechanisms for Mobile Crowdsensing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dslash: Managing Data in Overloaded Batch Streaming Systems

Robert Birke, Mathias Björkqvist, Evangelia Kalyvianaki, Lydia Y. Chen

Dslash: Managing Data in Overloaded Batch Streaming Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game

Na Ruan, Lei Gao, Haojin Zhu, Weijia Jia, Xiang Li, Qi Hu

Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game

Details
Discussion Comments: 0
Verification: Authors have not verified information

Software-Based Networks: Leveraging High-Performance NFV Platforms to Meet Future Communication Challenges

K. K. Ramakrishnan

Software-Based Networks: Leveraging High-Performance NFV Platforms to Meet Future Communication Challenges

Details
Discussion Comments: 0
Verification: Author has not verified information

Decentralized Context Sharing in Vehicular Delay Tolerant Networks with Compressive Sensing

Kun Xie, Wang Luo, Xin Wang, Dongliang Xie, Jiannong Cao, Jigang Wen, Gaogang Xie

Decentralized Context Sharing in Vehicular Delay Tolerant Networks with Compressive Sensing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers

Guoxin Liu, Haiying Shen

Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Spectrum Matching

Yanjiao Chen, Linshan Jiang, Haofan Cai, Jin Zhang, Baochun Li

Spectrum Matching

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient Resource Allocation and Consolidation with Selfish Agents: An Adaptive Auction Approach

Richard T. B. Ma

Efficient Resource Allocation and Consolidation with Selfish Agents: An Adaptive Auction Approach

Details
Discussion Comments: 0
Verification: Author has not verified information

PAG: Private and Accountable Gossip

Jeremie Decouchant, Sonia Ben Mokhtar, Albin Petit, Vivien Quéma

PAG: Private and Accountable Gossip

Details
Discussion Comments: 0
Verification: Authors have not verified information

Resource-Aware Photo Crowdsourcing Through Disruption Tolerant Networks

Yibo Wu, Yi Wang, Wenjie Hu, Xiaomei Zhang, Guohong Cao

Resource-Aware Photo Crowdsourcing Through Disruption Tolerant Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Riptide: Jump-Starting Back-Office Connections in Cloud Systems

Marcel Flores, Amir R. Khakpour, Harkeerat Bedi

Riptide: Jump-Starting Back-Office Connections in Cloud Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

RITM: Revocation in the Middle

Pawel Szalachowski, Laurent Chuat, Taeho Lee, Adrian Perrig

RITM: Revocation in the Middle

Details
Discussion Comments: 0
Verification: Authors have not verified information

DL-Store: A Distributed Hybrid OLTP and OLAP Data Processing Engine

Kaiwen Zhang, Mohammad Sadoghi, Hans-Arno Jacobsen

DL-Store: A Distributed Hybrid OLTP and OLAP Data Processing Engine

Details
Discussion Comments: 0
Verification: Authors have not verified information

Nearly Optimal Distributed Algorithm for Computing Betweenness Centrality

Qiang-Sheng Hua, Haoqiang Fan, Ming Ai, Lixiang Qian, Yangyang Li, Xuanhua Shi, Hai Jin

Nearly Optimal Distributed Algorithm for Computing Betweenness Centrality

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cruisers: A Public Automotive Sensing Platform for Smart Cities

Yin Chen, Jin Nakazawa, Takuro Yonezawa, Takafumi Kawesaki, Hideyuki Tokuda

Cruisers: A Public Automotive Sensing Platform for Smart Cities

Details
Discussion Comments: 0
Verification: Authors have not verified information

Middleware for Proximity Distributed Real-Time Processing of IoT Data Flows

Yugo Nakamura, Hirohiko Suwa, Yutaka Arakawa, Hirozumi Yamaguchi, Keiichi Yasumoto

Middleware for Proximity Distributed Real-Time Processing of IoT Data Flows

Details
Discussion Comments: 0
Verification: Authors have not verified information

Strategic Security Resource Allocation for Internet of Things

Antonino Rullo, Daniele Midi, Edoardo Serra, Elisa Bertino

Strategic Security Resource Allocation for Internet of Things

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sprout: A Functional Caching Approach to Minimize Service Latency in Erasure-Coded Storage

Vaneet Aggarwal, Yih-Farn Robin Chen, Tian Lan, Yu Xiang

Sprout: A Functional Caching Approach to Minimize Service Latency in Erasure-Coded Storage

Details
Discussion Comments: 0
Verification: Authors have not verified information

Real-Time Client-Side Phishing Prevention Add-On

Giovanni Armano, Samuel Marchal, N. Asokan

Real-Time Client-Side Phishing Prevention Add-On

Details
Discussion Comments: 0
Verification: Authors have not verified information

Social Graph Publishing with Privacy Guarantees

Faraz Ahmed, Alex X. Liu, Rong Jin

Social Graph Publishing with Privacy Guarantees

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient Top-k Result Diversification for Mobile Sensor Data

Masahiro Yokoyama, Takahiro Hara

Efficient Top-k Result Diversification for Mobile Sensor Data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Virtual Machine Level Temperature Profiling and Prediction in Cloud Datacenters

Zhaohui Wu, Xiang Li, Peter Garraghan, Xiaohong Jiang, Kejiang Ye, Albert Y. Zomaya

Virtual Machine Level Temperature Profiling and Prediction in Cloud Datacenters

Details
Discussion Comments: 0
Verification: Authors have not verified information

Deadline-Sensitive User Recruitment for Probabilistically Collaborative Mobile Crowdsensing

Mingjun Xiao, Jie Wu, He Huang, Liusheng Huang, Chang Hu

Deadline-Sensitive User Recruitment for Probabilistically Collaborative Mobile Crowdsensing

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Realistic and Optimized V2V Communication System for Taxicabs

Yang Wang, Erkun Yang, Wei Zheng, Liusheng Huang, Hengchang Liu, Binxin Liang

A Realistic and Optimized V2V Communication System for Taxicabs

Details
Discussion Comments: 0
Verification: Authors have not verified information

An Endpoint Communication Profiling Tool for Distributed Computing Frameworks

Andrea Rosà, Lydia Y. Chen, Walter Binder

An Endpoint Communication Profiling Tool for Distributed Computing Frameworks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Look at Basics of Distributed Computing

Michel Raynal

A Look at Basics of Distributed Computing

Details
Discussion Comments: 0
Verification: Author has not verified information

Randomized Load Balancing in Finite Regimes

Antonie S. Godtschalk, Florin Ciucu

Randomized Load Balancing in Finite Regimes

Details
Discussion Comments: 0
Verification: Authors have not verified information

Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor

Qian Wang, Shengshan Hu, Jingjun Wang, Kui Ren

Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor

Details
Discussion Comments: 0
Verification: Authors have not verified information

Practical Concurrent Wireless Charging Scheduling for Sensor Networks

Peng Guo, Xuefeng Liu, Tingfang Tang, Shaojie Tang, Jiannong Cao

Practical Concurrent Wireless Charging Scheduling for Sensor Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient Free-Rider Detection Using Symmetric Overlays

João Bruno Rodrigues Roque e Silva, Xavier Vilaça, Hugo Miranda, Luís E. T. Rodrigues

Efficient Free-Rider Detection Using Symmetric Overlays

Details
Discussion Comments: 0
Verification: Authors have not verified information

Overlay Design for Topic-Based Publish/Subscribe under Node Degree Constraints

Chen Chen, Yoav Tock, Hans-Arno Jacobsen

Overlay Design for Topic-Based Publish/Subscribe under Node Degree Constraints

Details
Discussion Comments: 0
Verification: Authors have not verified information

OmniFlow: Coupling Load Balancing with Flow Control in Datacenter Networks

Kaiyuan Wen, Zhuzhong Qian, Sheng Zhang, Sanglu Lu

OmniFlow: Coupling Load Balancing with Flow Control in Datacenter Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Publish/Subscribe for Mobile Applications Using Shared Dictionary Compression

Christoph Doblander, Kaiwen Zhang, Hans-Arno Jacobsen

Publish/Subscribe for Mobile Applications Using Shared Dictionary Compression

Details
Discussion Comments: 0
Verification: Authors have not verified information

SpotLight: An Information Service for the Cloud

Xue Ouyang, David E. Irwin, Prashant J. Shenoy

SpotLight: An Information Service for the Cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

An Analysis of Onion-Based Anonymous Routing for Delay Tolerant Networks

Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku, Jie Wu, Faisal S. Alanazi

An Analysis of Onion-Based Anonymous Routing for Delay Tolerant Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks

Douglas McGeehan, Dan Lin, Sanjay Madria

ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Federation of Private IaaS Cloud Providers through the Barter of Resources

Francisco Vilar Brasileiro, Eduardo De Lucena Falcão

Federation of Private IaaS Cloud Providers through the Barter of Resources

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

FSQCN: Fast and Simple Quantized Congestion Notification in Data Center Ethernet

Chang Ruan, Jianxin Wang, Wanchun Jiang

FSQCN: Fast and Simple Quantized Congestion Notification in Data Center Ethernet

Details
Discussion Comments: 0
Verification: Authors have not verified information

On MinMax-Memory Claims for Scientific Workflows in the In-memory Cloud Computing

Yang Wang, Cheng-Zhong Xu, Shuibing He, Xian-He Sun

On MinMax-Memory Claims for Scientific Workflows in the In-memory Cloud Computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

DMZtore: A dispersed Data Storage System with Decentralized Multi-factor Access Control (Demo)

Ertem Esiner, Shun Hanli Hanley, Anwitaman Datta

DMZtore: A dispersed Data Storage System with Decentralized Multi-factor Access Control (Demo)

Details
Discussion Comments: 0
Verification: Authors have not verified information

Routing and Scheduling of Social Influence Diffusion in Online Social Networks

Hui-Ju Hung, De-Nian Yang, Wang-Chien Lee

Routing and Scheduling of Social Influence Diffusion in Online Social Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Internet is for Porn: Measurement and Analysis of Online Adult Traffic

Faraz Ahmed, M. Zubair Shafiq, Alex X. Liu

The Internet is for Porn: Measurement and Analysis of Online Adult Traffic

Details
Discussion Comments: 0
Verification: Authors have not verified information

HIDE: AP-Assisted Broadcast Traffic Management to Save Smartphone Energy

Ge Peng, Gang Zhou, David T. Nguyen, Xin Qi, Shan Lin

HIDE: AP-Assisted Broadcast Traffic Management to Save Smartphone Energy

Details
Discussion Comments: 0
Verification: Authors have not verified information

RF-ISee: Identify and Distinguish Multiple RFID Tagged Objects in Augmented Reality Systems

Jianqiang Sun, Lei Xie, Qingliang Cai, Chuyu Wang, Jie Wu, Sanglu Lu

RF-ISee: Identify and Distinguish Multiple RFID Tagged Objects in Augmented Reality Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

INSPECTOR: Data Provenance Using Intel Processor Trace (PT)

Jörg Thalheim, Pramod Bhatotia, Christof Fetzer

INSPECTOR: Data Provenance Using Intel Processor Trace (PT)

Details
Discussion Comments: 0
Verification: Authors have not verified information

Preserving Incumbent Users' Privacy in Server-Driven Dynamic Spectrum Access Systems

Yanzhi Dou, He Li, Kexiong Curtis Zeng, Jinshan Liu, Yaling Yang, Bo Gao, Kui Ren

Preserving Incumbent Users' Privacy in Server-Driven Dynamic Spectrum Access Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information