Default Cover Image

2013 IEEE 33rd International Conference on Distributed Computing Systems (ICDCS)

July 8 2013 to July 11 2013

Philadelphia, PA, USA

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-x
Message from General ChairFreely available from IEEE.pp. xi-xi
Message from Program ChairFreely available from IEEE.pp. xii-xii
Organizing CommitteeFreely available from IEEE.pp. xiii-xiv
Program CommitteeFreely available from IEEE.pp. xv-xx
External ReviewersFreely available from IEEE.pp. xxi-xxiv
Volley: Violation Likelihood Based State Monitoring for DatacentersFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Diagnosing Data Center Behavior Flow by FlowFull-text access may be available. Sign in or learn about subscription options.pp. 11-20
FChain: Toward Black-Box Online Fault Localization for Cloud SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 21-30
Cache Privacy in Named-Data NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 41-51
Cache Topology Aware Mapping of Stream Processing Applications onto CMPsFull-text access may be available. Sign in or learn about subscription options.pp. 52-61
Coordinating In-Network Caching in Content-Centric Networks: Model and AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 62-72
Proteus: Power Proportional Memory Cache Cluster in Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 73-82
Dynamic Energy Estimation of Query Plans in Database SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 83-92
Content-Based Scheduling of Virtual Machines (VMs) in the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 93-101
HybridMR: A Hierarchical MapReduce Scheduler for Hybrid Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 102-111
Storing Shared Data on the Cloud via Security-MediatorFull-text access may be available. Sign in or learn about subscription options.pp. 124-133
Mobility-Assisted Energy-Aware User Contact Detection in Mobile Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 155-164
Energy-Aware Web Browsing in 3G Based SmartphonesFull-text access may be available. Sign in or learn about subscription options.pp. 165-175
Datacenters as Controllable Load Resources in the Electricity MarketFull-text access may be available. Sign in or learn about subscription options.pp. 176-185
A Scalable Conflict-Free Replicated Set Data TypeFull-text access may be available. Sign in or learn about subscription options.pp. 186-195
No Hot Spot Non-blocking Skip ListFull-text access may be available. Sign in or learn about subscription options.pp. 196-205
Mindicators: A Scalable Approach to QuiescenceFull-text access may be available. Sign in or learn about subscription options.pp. 206-215
Non-blocking Patricia Tries with Replace OperationsFull-text access may be available. Sign in or learn about subscription options.pp. 216-225
MoLoc: On Distinguishing Fingerprint TwinsFull-text access may be available. Sign in or learn about subscription options.pp. 226-235
Pilot: Passive Device-Free Indoor Localization Using Channel State InformationFull-text access may be available. Sign in or learn about subscription options.pp. 236-245
Harnessing Mobile Multiple Access Efficiency with Location InputFull-text access may be available. Sign in or learn about subscription options.pp. 246-255
Location Privacy Preserving Dynamic Spectrum Auction in Cognitive Radio NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 256-265
Achieving High-Throughput State Machine Replication in Multi-core SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 266-275
Order-Preserving Renaming in Synchronous Systems with Byzantine FaultsFull-text access may be available. Sign in or learn about subscription options.pp. 276-285
Hybrid Replication: State-Machine-Based and Deferred-Update Replication Schemes CombinedFull-text access may be available. Sign in or learn about subscription options.pp. 286-296
RBFT: Redundant Byzantine Fault ToleranceFull-text access may be available. Sign in or learn about subscription options.pp. 297-306
Characterizing Information Diffusion in Online Social Networks with Linear Diffusive ModelFull-text access may be available. Sign in or learn about subscription options.pp. 307-316
Maximizing the Spread of Positive Influence in Online Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 317-326
Message in a Sealed Bottle: Privacy Preserving Friending in Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 327-336
Gathering of Mobile Robots Tolerating Multiple Crash FaultsFull-text access may be available. Sign in or learn about subscription options.pp. 337-346
Ring Exploration by Oblivious Agents with Local VisionFull-text access may be available. Sign in or learn about subscription options.pp. 347-356
Zigzag: Local-Information-Based Self-Optimizing Routing in Virtual Grid NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 357-368
Distributed Ranked Data Dissemination in Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 369-379
Optimistic Atomic MulticastFull-text access may be available. Sign in or learn about subscription options.pp. 380-389
ImageElves: Rapid and Reliable System Updates in the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 390-399
Dynamic Cloud Resource Reservation via Cloud BrokerageFull-text access may be available. Sign in or learn about subscription options.pp. 400-409
Present or Future: Optimal Pricing for Spot InstancesFull-text access may be available. Sign in or learn about subscription options.pp. 410-419
SmartDPSS: Cost-Minimizing Multi-source Power Supply for Datacenters with Arbitrary DemandFull-text access may be available. Sign in or learn about subscription options.pp. 420-429
Longer Is Better: Exploiting Path Diversity in Data Center NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 430-439
Signal-Aware Green Wireless Relay Network DesignFull-text access may be available. Sign in or learn about subscription options.pp. 440-449
Ease the Queue Oscillation: Analysis and Enhancement of DCTCPFull-text access may be available. Sign in or learn about subscription options.pp. 450-459
Ripple: Improved Architecture and Programming Model for Bulk Synchronous Parallel Style of AnalyticsFull-text access may be available. Sign in or learn about subscription options.pp. 460-469
Efficient Geo-distributed Data Processing with RoutFull-text access may be available. Sign in or learn about subscription options.pp. 470-480
Towards an Efficient Online Causal-Event-Pattern-Matching FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 481-490
S3: Characterizing Sociality for User-Friendly Steady Load Balancing in Enterprise WLANsFull-text access may be available. Sign in or learn about subscription options.pp. 491-499
On Server Provisioning for Distributed Interactive ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 500-509
Harmony: Dynamic Heterogeneity-Aware Resource Provisioning in the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 510-519
RAC: A Freerider-Resilient, Scalable, Anonymous Communication ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 520-529
Recursive Fact-Finding: A Streaming Approach to Truth Estimation in Crowdsourcing ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 530-539
Least Cost Rumor Blocking in Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 540-549
Identifying and Addressing Protocol Manipulation Attacks in "Secure" BGPFull-text access may be available. Sign in or learn about subscription options.pp. 550-559
A Formal Framework for Network Security Design SynthesisFull-text access may be available. Sign in or learn about subscription options.pp. 560-570
Peer Pressure: Exerting Malicious Influence on Routers at a DistanceFull-text access may be available. Sign in or learn about subscription options.pp. 571-580
Efficient Identification of Additive Link Metrics via Network TomographyFull-text access may be available. Sign in or learn about subscription options.pp. 581-590
On the k-Atomicity-Verification ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 591-600
Safety of Deferred Update in Transactional MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 601-610
Parallel Consensus is Harder than Set Agreement in Message PassingFull-text access may be available. Sign in or learn about subscription options.pp. 611-620
Author IndexFreely available from IEEE.pp. 621-623
Publisher's InformationFreely available from IEEE.pp. 624-624
Showing 72 out of 72