Default Cover Image

2015 IEEE 35th International Conference on Distributed Computing Systems (ICDCS)

June 29 2015 to July 2 2015

Columbus, OH, USA

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-xiv
Message from the General ChairFreely available from IEEE.pp. xv-xv
Message from the Program ChairFreely available from IEEE.pp. xvi-xvi
Organizing CommitteeFreely available from IEEE.pp. xvii-xvii
Technical Program CommitteeFreely available from IEEE.pp. xviii-xxiii
Crowd Map: Accurate Reconstruction of Indoor Floor Plans from Crowdsourced Sensor-Rich VideosFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 11-20
Urban Traffic Monitoring with the Help of Bus RidersFull-text access may be available. Sign in or learn about subscription options.pp. 21-30
Privacy-Preserving Compressive Sensing for Crowdsensing Based Trajectory RecoveryFull-text access may be available. Sign in or learn about subscription options.pp. 31-40
Optimizing Roadside Advertisement Dissemination in Vehicular Cyber-Physical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 41-50
Community-Based Bus System as Routing Backbone for Vehicular Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 73-82
Asynchronous Adaptive Task AllocationFull-text access may be available. Sign in or learn about subscription options.pp. 83-92
Cost-Effective Low-Delay Cloud Video ConferencingFull-text access may be available. Sign in or learn about subscription options.pp. 103-112
eTrain: Making Wasted Energy Useful by Utilizing Heartbeats for Mobile Data TransmissionsFull-text access may be available. Sign in or learn about subscription options.pp. 113-122
Improve Charging Capability for Wireless Rechargeable Sensor Networks Using Resonant RepeatersFull-text access may be available. Sign in or learn about subscription options.pp. 133-142
eBay in the Clouds: False-Name-Proof Auctions for Cloud Resource AllocationFull-text access may be available. Sign in or learn about subscription options.pp. 153-162
T-Chain: A General Incentive Scheme for Cooperative ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 163-174
Data Center Sprinting: Enabling Computational Sprinting at the Data Center LevelFull-text access may be available. Sign in or learn about subscription options.pp. 175-184
Phase Detection with Hidden Markov Models for DVFS on Many-Core ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 185-195
Low Radiation Efficient Wireless Energy Transfer in Wireless Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 196-204
Optimizing Inter-server Communication for Online Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 215-224
Efficient Customized Privacy Preserving Friend Discovery in Mobile Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 225-234
Combating Friend Spam Using Social RejectionsFull-text access may be available. Sign in or learn about subscription options.pp. 235-244
Prebaked µVMs: Scalable, Instant VM Startup for IaaS CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 245-255
ECO-DNS: Expected Consistency Optimization for DNSFull-text access may be available. Sign in or learn about subscription options.pp. 256-267
An Online Method for Minimizing Network Monitoring OverheadFull-text access may be available. Sign in or learn about subscription options.pp. 268-277
Thread Migration in a Replicated-Kernel OSFull-text access may be available. Sign in or learn about subscription options.pp. 278-287
Towards Understanding the Advertiser's Perspective of Smartphone User PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 288-297
Advertiser and Publisher-centric Privacy Aware Online Behavioral AdvertisingFull-text access may be available. Sign in or learn about subscription options.pp. 298-307
POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 308-317
Privacy-Preserving Machine Learning Algorithms for Big Data SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 318-327
Fault-Tolerant and Elastic Streaming MapReduce with Decentralized CoordinationFull-text access may be available. Sign in or learn about subscription options.pp. 328-338
Task-Cloning Algorithms in a MapReduce Cluster with Competitive Performance BoundsFull-text access may be available. Sign in or learn about subscription options.pp. 339-348
Towards Energy Efficiency in Heterogeneous Hadoop Clusters by Adaptive Task AssignmentFull-text access may be available. Sign in or learn about subscription options.pp. 359-368
Experimental Study for Multi-layer Parameter Configuration of WSN LinksFull-text access may be available. Sign in or learn about subscription options.pp. 369-378
PTZ Camera Scheduling for Selected Area Coverage in Visual Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 379-388
On Multipath Link Characterization and Adaptation for Device-Free Human DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 389-398
Elastic Stream Processing with Latency GuaranteesFull-text access may be available. Sign in or learn about subscription options.pp. 399-410
DRS: Dynamic Resource Scheduling for Real-Time Analytics over Fast StreamsFull-text access may be available. Sign in or learn about subscription options.pp. 411-420
An Application-Aware Scheduling Policy for Real-Time TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 421-430
UStore: A Low Cost Cold and Archival Data Storage System for Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 431-441
Aurora: Adaptive Block Replication in Distributed File SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 442-451
Fast Compaction Algorithms for NoSQL DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 452-461
Weighted Overlay Design for Topic-Based Publish/Subscribe Systems on Geo-Distributed Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 474-485
Discrete Load Balancing in Heterogeneous Networks with a Focus on Second-Order DiffusionFull-text access may be available. Sign in or learn about subscription options.pp. 497-506
Weighted Restless Bandit and Its ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 507-516
Deterministic Symmetry Breaking in Ring NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 517-526
DISCO: A Distributed Localization Scheme for Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 527-536
Rain Bar: Robust Application-Driven Visual Communication Using Color BarcodesFull-text access may be available. Sign in or learn about subscription options.pp. 537-546
ABCCC: An Advanced Cube Based Network for Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 547-556
Congestion Avoidance with Incremental Filter Aggregation in Content-Based Routing NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 557-568
Rewiring 2 Links Is Enough: Accelerating Failure Recovery in Production Data Center NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 569-578
Synthesizing Self-Stabilizing Protocols under Average Recovery Time ConstraintsFull-text access may be available. Sign in or learn about subscription options.pp. 579-588
Space-Optimal Time-Efficient Silent Self-Stabilizing Constructions of Constrained Spanning TreesFull-text access may be available. Sign in or learn about subscription options.pp. 589-598
Replica Placement for Availability in the Worst CaseFull-text access may be available. Sign in or learn about subscription options.pp. 599-608
Privacy Preserving String Matching for Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 609-618
Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 619-629
Systematic Mining of Associated Server Herds for Malware Campaign DiscoveryFull-text access may be available. Sign in or learn about subscription options.pp. 630-641
MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial VehiclesFull-text access may be available. Sign in or learn about subscription options.pp. 642-652
Shuttle: Intrusion Recovery for PaaSFull-text access may be available. Sign in or learn about subscription options.pp. 653-663
Accelerating Apache Hive with MPI for Data Warehouse SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 664-673
RStore: A Direct-Access DRAM-based Data StoreFull-text access may be available. Sign in or learn about subscription options.pp. 674-685
Cache Serializability: Reducing Inconsistency in Edge TransactionsFull-text access may be available. Sign in or learn about subscription options.pp. 686-695
Multi-path Based Avoidance Routing in Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 706-715
Tele Adjusting: Using Path Coding and Opportunistic Forwarding for Remote Control in WSNsFull-text access may be available. Sign in or learn about subscription options.pp. 716-725
Towards Redundancy-Aware Data Utility Maximization in Crowdsourced Sensing with SmartphonesFull-text access may be available. Sign in or learn about subscription options.pp. 726-727
Improving the Energy Benefit for 802.3az Using Dynamic Coalescing TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 728-729
Policy-Aware Virtual Machine Management in Data Center NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 730-731
Leveraging Fog to Extend Cloud Gaming for Thin-Client MMOG with High Quality of ExperienceFull-text access may be available. Sign in or learn about subscription options.pp. 734-735
EcoFlow: An Economical and Deadline-Driven Inter-datacenter Video Flow Scheduling SystemFull-text access may be available. Sign in or learn about subscription options.pp. 736-737
Harnessing the Power of Multiple Cloud Service Providers: An Economical and SLA-Guaranteed Cloud Storage ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 738-739
Approximate Holistic Aggregation in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 740-741
Planning Battery Swapping Stations for Urban Electrical TaxisFull-text access may be available. Sign in or learn about subscription options.pp. 742-743
Foreseer: Workload-Aware Data Storage for MapReduceFull-text access may be available. Sign in or learn about subscription options.pp. 746-747
Operational Transformation for Real-Time Synchronization of Cloud StorageFull-text access may be available. Sign in or learn about subscription options.pp. 748-749
A Route Scheduling Algorithm for the Sweep Coverage ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 750-751
WhiFind: A Matrix Completion Approach for Indoor White Space IdentificationFull-text access may be available. Sign in or learn about subscription options.pp. 752-753
mQual: A Mobile Peer-to-Peer Network Framework Supporting Quality of ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 754-755
An Efficient Anonymous Authentication Protocol for RFID Systems Using Dynamic TokensFull-text access may be available. Sign in or learn about subscription options.pp. 756-757
On Privacy Preserving Partial Image SharingFull-text access may be available. Sign in or learn about subscription options.pp. 758-759
Inspecting Coding Dependency in Layered Video Coding for Efficient Unequal Error ProtectionFull-text access may be available. Sign in or learn about subscription options.pp. 760-761
Fast Total Ordering for Modern Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 762-763
On Preserving Data Integrity of Transactional Applications on Multicore ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 764-765
On Exploiting Locality for Generalized ConsensusFull-text access may be available. Sign in or learn about subscription options.pp. 766-767
Less Transmissions, More Throughput: Bringing Carpool to Public WLANsFull-text access may be available. Sign in or learn about subscription options.pp. 768-769
Showing 100 out of 120