Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICDCS
ICDCS 2013
Generate Citations
2013 IEEE 33rd International Conference on Distributed Computing Systems (ICDCS)
July 8 2013 to July 11 2013
Philadelphia, PA, USA
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-x
Message from General Chair
Freely available from IEEE.
pp. xi-xi
Message from Program Chair
Freely available from IEEE.
pp. xii-xii
Organizing Committee
Freely available from IEEE.
pp. xiii-xiv
Program Committee
Freely available from IEEE.
pp. xv-xx
External Reviewers
Freely available from IEEE.
pp. xxi-xxiv
Volley: Violation Likelihood Based State Monitoring for Datacenters
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Shicong Meng
,
Arun K. Iyengar
,
Isabelle M. Rouvellou
,
Ling Liu
Diagnosing Data Center Behavior Flow by Flow
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-20
by
Ahsan Arefin
,
Vishal K. Singh
,
Guofei Jiang
,
Yueping Zhang
,
Cristian Lumezanu
FChain: Toward Black-Box Online Fault Localization for Cloud Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-30
by
Hiep Nguyen
,
Zhiming Shen
,
Yongmin Tan
,
Xiaohui Gu
Detecting Transient Bottlenecks in n-Tier Applications through Fine-Grained Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-40
by
Qingyang Wang
,
Yasuhiko Kanemasa
,
Jack Li
,
Deepal Jayasinghe
,
Toshihiro Shimizu
,
Masazumi Matsubara
,
Motoyuki Kawaba
,
Calton Pu
Cache Privacy in Named-Data Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-51
by
Gergely Acs
,
Mauro Conti
,
Paolo Gasti
,
Cesar Ghali
,
Gene Tsudik
Cache Topology Aware Mapping of Stream Processing Applications onto CMPs
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-61
by
Fang Zheng
,
Chitra Venkatramani
,
Rohit Wagle
,
Karsten Schwan
Coordinating In-Network Caching in Content-Centric Networks: Model and Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-72
by
Yanhua Li
,
Haiyong Xie
,
Yonggang Wen
,
Zhi-Li Zhang
Proteus: Power Proportional Memory Cache Cluster in Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-82
by
Shen Li
,
Shiguang Wang
,
Fan Yang
,
Shaohan Hu
,
Fatemeh Saremi
,
Tarek Abdelzaher
Dynamic Energy Estimation of Query Plans in Database Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-92
by
Zichen Xu
,
Yi-Cheng Tu
,
Xiaorui Wang
Content-Based Scheduling of Virtual Machines (VMs) in the Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-101
by
Sobir Bazarbayev
,
Matti Hiltunen
,
Kaustubh Joshi
,
William H. Sanders
,
Richard Schlichting
HybridMR: A Hierarchical MapReduce Scheduler for Hybrid Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-111
by
Bikash Sharma
,
Timothy Wood
,
Chita R. Das
AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-123
by
Zhaoyan Xu
,
Jialong Zhang
,
Guofei Gu
,
Zhiqiang Lin
Storing Shared Data on the Cloud via Security-Mediator
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-133
by
Boyang Wang
,
Sherman S. M. Chow
,
Ming Li
,
Hui Li
Watchmen: Scalable Cheat-Resistant Support for Distributed Multi-player Online Games
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-144
by
Amir Yahyavi
,
Kevin Huguenin
,
Julien Gascon-Samson
,
Jorg Kienzle
,
Bettina Kemme
pVOCL: Power-Aware Dynamic Placement and Migration in Virtualized GPU Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-154
by
Palden Lama
,
Yan Li
,
Ashwin M. Aji
,
Pavan Balaji
,
James Dinan
,
Shucai Xiao
,
Yunquan Zhang
,
Wu-chun Feng
,
Rajeev Thakur
,
Xiaobo Zhou
Mobility-Assisted Energy-Aware User Contact Detection in Mobile Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-164
by
Wenjie Hu
,
Guohong Cao
,
Srikanth V. Krishanamurthy
,
Prasant Mohapatra
Energy-Aware Web Browsing in 3G Based Smartphones
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-175
by
Bo Zhao
,
Qiang Zheng
,
Guohong Cao
,
Sateesh Addepalli
Datacenters as Controllable Load Resources in the Electricity Market
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-185
by
Rui Wang
,
Nagarajan Kandasamy
,
Chika Nwankpa
,
David R. Kaeli
A Scalable Conflict-Free Replicated Set Data Type
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-195
by
Andrei Deftu
,
Jan Griebsch
No Hot Spot Non-blocking Skip List
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-205
by
Tyler Crain
,
Vincent Gramoli
,
Michel Raynal
Mindicators: A Scalable Approach to Quiescence
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-215
by
Yujie Liu
,
Victor Luchangco
,
Michael Spear
Non-blocking Patricia Tries with Replace Operations
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-225
by
Niloufar Shafiei
MoLoc: On Distinguishing Fingerprint Twins
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-235
by
Wei Sun
,
Junliang Liu
,
Chenshu Wu
,
Zheng Yang
,
Xinglin Zhang
,
Yunhao Liu
Pilot: Passive Device-Free Indoor Localization Using Channel State Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-245
by
Jiang Xiao
,
Kaishun Wu
,
Youwen Yi
,
Lu Wang
,
Lionel M. Ni
Harnessing Mobile Multiple Access Efficiency with Location Input
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-255
by
Wan Du
,
Mo Li
Location Privacy Preserving Dynamic Spectrum Auction in Cognitive Radio Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 256-265
by
Sheng Liu
,
Haojin Zhu
,
Rong Du
,
Cailian Chen
,
Xinping Guan
Achieving High-Throughput State Machine Replication in Multi-core Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-275
by
Nuno Santos
,
Andre Schiper
Order-Preserving Renaming in Synchronous Systems with Byzantine Faults
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-285
by
Oksana Denysyuk
,
Luis Rodrigues
Hybrid Replication: State-Machine-Based and Deferred-Update Replication Schemes Combined
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-296
by
Tadeusz Kobus
,
Maciej Kokocinski
,
Pawel T. Wojciechowski
RBFT: Redundant Byzantine Fault Tolerance
Full-text access may be available. Sign in or learn about subscription options.
pp. 297-306
by
Pierre-Louis Aublin
,
Sonia Ben Mokhtar
,
Vivien Quema
Characterizing Information Diffusion in Online Social Networks with Linear Diffusive Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 307-316
by
Feng Wang
,
Haiyan Wang
,
Kuai Xu
,
Jianhong Wu
,
Xiaohua Jia
Maximizing the Spread of Positive Influence in Online Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-326
by
Huiyuan Zhang
,
Thang N. Dinh
,
My T. Thai
Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-336
by
Lan Zhang
,
Xiang-Yang Li
,
Yunhao Liu
Gathering of Mobile Robots Tolerating Multiple Crash Faults
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-346
by
Zohir Bouzid
,
Shantanu Das
,
Sebastien Tixeuil
Ring Exploration by Oblivious Agents with Local Vision
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-356
by
Ajoy K. Datta
,
Anissa Lamani
,
Lawrence L. Larmore
,
Franck Petit
Zigzag: Local-Information-Based Self-Optimizing Routing in Virtual Grid Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 357-368
by
Shusuke Takatsu
,
Fukuhito Ooshita
,
Hirotsugu Kakugawa
,
Toshimitsu Masuzawa
Distributed Ranked Data Dissemination in Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 369-379
by
Kaiwen Zhang
,
Mohammad Sadoghi
,
Vinod Muthusamy
,
Hans-Arno Jacobsen
Optimistic Atomic Multicast
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-389
by
Carlos Eduardo Bezerra
,
Fernando Pedone
,
Benoit Garbinato
,
Claudio Geyer
ImageElves: Rapid and Reliable System Updates in the Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 390-399
by
Deepak Jeswani
,
Akshat Verma
,
Praveen Jayachandran
,
Kamal Bhattacharya
Dynamic Cloud Resource Reservation via Cloud Brokerage
Full-text access may be available. Sign in or learn about subscription options.
pp. 400-409
by
Wei Wang
,
Di Niu
,
Baochun Li
,
Ben Liang
Present or Future: Optimal Pricing for Spot Instances
Full-text access may be available. Sign in or learn about subscription options.
pp. 410-419
by
Peijian Wang
,
Yong Qi
,
Dou Hui
,
Lei Rao
,
Xue Liu
SmartDPSS: Cost-Minimizing Multi-source Power Supply for Datacenters with Arbitrary Demand
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-429
by
Wei Deng
,
Fangming Liu
,
Hai Jin
,
Chuan Wu
Longer Is Better: Exploiting Path Diversity in Data Center Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 430-439
by
Fung Po Tso
,
Gregg Hamilton
,
Rene Weber
,
Colin S. Perkins
,
Dimitrios P. Pezaros
Signal-Aware Green Wireless Relay Network Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 440-449
by
Chenfei Gao
,
Jian Tang
,
Xiang Sheng
,
Weiyi Zhang
,
Chonggang Wang
Ease the Queue Oscillation: Analysis and Enhancement of DCTCP
Full-text access may be available. Sign in or learn about subscription options.
pp. 450-459
by
Wen Chen
,
Peng Cheng
,
Fengyuan Ren
,
Ran Shu
,
Chuang Lin
Ripple: Improved Architecture and Programming Model for Bulk Synchronous Parallel Style of Analytics
Full-text access may be available. Sign in or learn about subscription options.
pp. 460-469
by
Mike Spreitzer
,
Malgorzata Steinder
,
Ian Whalley
Efficient Geo-distributed Data Processing with Rout
Full-text access may be available. Sign in or learn about subscription options.
pp. 470-480
by
Chamikara Jayalath
,
Patrick Eugster
Towards an Efficient Online Causal-Event-Pattern-Matching Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 481-490
by
Sukanta Pramanik
,
David Taylor
,
Bernard Wong
S3: Characterizing Sociality for User-Friendly Steady Load Balancing in Enterprise WLANs
Full-text access may be available. Sign in or learn about subscription options.
pp. 491-499
by
Chaoqun Yue
,
Guangtao Xue
,
Hongzi Zhu
,
Jiadi Yu
,
Minglu Li
On Server Provisioning for Distributed Interactive Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 500-509
by
Hanying Zheng
,
Xueyan Tang
Harmony: Dynamic Heterogeneity-Aware Resource Provisioning in the Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 510-519
by
Qi Zhang
,
Mohamed Faten Zhani
,
Raouf Boutaba
,
Joseph L. Hellerstein
RAC: A Freerider-Resilient, Scalable, Anonymous Communication Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 520-529
by
Sonia Ben Mokhtar
,
Gautier Berthou
,
Amadou Diarra
,
Vivien Quema
,
Ali Shoker
Recursive Fact-Finding: A Streaming Approach to Truth Estimation in Crowdsourcing Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 530-539
by
Dong Wang
,
Tarek Abdelzaher
,
Lance Kaplan
,
Charu C. Aggarwal
Least Cost Rumor Blocking in Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 540-549
by
Lidan Fan
,
Zaixin Lu
,
Weili Wu
,
Bhavani Thuraisingham
,
Huan Ma
,
Yuanjun Bi
Identifying and Addressing Protocol Manipulation Attacks in "Secure" BGP
Full-text access may be available. Sign in or learn about subscription options.
pp. 550-559
by
Yang Song
,
Arun Venkataramani
,
Lixin Gao
A Formal Framework for Network Security Design Synthesis
Full-text access may be available. Sign in or learn about subscription options.
pp. 560-570
by
Mohammad Ashiqur Rahman
,
Ehab Al-Shaer
Peer Pressure: Exerting Malicious Influence on Routers at a Distance
Full-text access may be available. Sign in or learn about subscription options.
pp. 571-580
by
Max Schuchard
,
Christopher Thompson
,
Nicholas Hopper
,
Yongdae Kim
Efficient Identification of Additive Link Metrics via Network Tomography
Full-text access may be available. Sign in or learn about subscription options.
pp. 581-590
by
Liang Ma
,
Ting He
,
Kin K. Leung
,
Don Towsley
,
Ananthram Swami
On the k-Atomicity-Verification Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 591-600
by
Wojciech Golab
,
Jeremy Hurwitz
,
Xiaozhou Li
Safety of Deferred Update in Transactional Memory
Full-text access may be available. Sign in or learn about subscription options.
pp. 601-610
by
Hagit Attiya
,
Sandeep Hans
,
Petr Kuznetsov
,
Srivatsan Ravi
Parallel Consensus is Harder than Set Agreement in Message Passing
Full-text access may be available. Sign in or learn about subscription options.
pp. 611-620
by
Zohir Bouzid
,
Corentin Travers
Author Index
Freely available from IEEE.
pp. 621-623
Publisher's Information
Freely available from IEEE.
pp. 624-624
Showing 72 out of 72