Default Cover Image

2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS)

June 27 2016 to June 30 2016

Nara, Japan

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-xiii
Message from the ICDCS 2016 General Co-ChairsFreely available from IEEE.pp. xiv-xiv
Organizing CommitteeFreely available from IEEE.pp. xvi-xvi
Technical Program CommitteesFreely available from IEEE.pp. xvii-xxiv
KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. xxv-xxvi
A Look at Basics of Distributed ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Cognitive Technologies for Smarter CitiesFull-text access may be available. Sign in or learn about subscription options.pp. 12-21
Reflecting on the Past, Preparing for the Future: From Peer-to-Peer to Edge-Centric ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 22-23
Software-Based Networks: Leveraging High-Performance NFV Platforms to Meet Future Communication ChallengesFull-text access may be available. Sign in or learn about subscription options.pp. 24-24
INSPECTOR: Data Provenance Using Intel Processor Trace (PT)Full-text access may be available. Sign in or learn about subscription options.pp. 25-34
PAG: Private and Accountable GossipFull-text access may be available. Sign in or learn about subscription options.pp. 35-44
Practical Intrusion-Tolerant NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 45-56
Gremlin: Systematic Resilience Testing of MicroservicesFull-text access may be available. Sign in or learn about subscription options.pp. 57-66
CRONets: Cloud-Routed Overlay NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 67-77
Riptide: Jump-Starting Back-Office Connections in Cloud SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 78-87
The Internet is for Porn: Measurement and Analysis of Online Adult TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 88-97
Tuning the Aggressive TCP Behavior for Highly Concurrent HTTP Connections in Data CenterFull-text access may be available. Sign in or learn about subscription options.pp. 98-107
A Performance Analysis of Incentive Mechanisms for Cooperative ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 108-117
GrapH: Heterogeneity-Aware Graph Computation with Adaptive PartitioningFull-text access may be available. Sign in or learn about subscription options.pp. 118-128
Minimum-Cost Cloud Storage Service Across Multiple Cloud ProvidersFull-text access may be available. Sign in or learn about subscription options.pp. 129-138
A Realistic and Optimized V2V Communication System for TaxicabsFull-text access may be available. Sign in or learn about subscription options.pp. 139-148
Optimal Marching of Autonomous Networked RobotsFull-text access may be available. Sign in or learn about subscription options.pp. 149-158
RuleTris: Minimizing Rule Update Latency for TCAM-Based SDN SwitchesFull-text access may be available. Sign in or learn about subscription options.pp. 179-188
RITM: Revocation in the MiddleFull-text access may be available. Sign in or learn about subscription options.pp. 189-200
A Distributed Auctioneer for Resource Allocation in Decentralized SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 201-210
Datacomp: Locally Independent Adaptive Compression for Real-World SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 211-220
Hybrid Content-Based Routing Using Network and Application Layer FilteringFull-text access may be available. Sign in or learn about subscription options.pp. 221-231
Exploiting Causality to Engineer Elastic Distributed SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 232-241
The Same Speed Timer in Population ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 252-261
Interactive Wireless Charging for Energy BalanceFull-text access may be available. Sign in or learn about subscription options.pp. 262-270
Nearly Optimal Distributed Algorithm for Computing Betweenness CentralityFull-text access may be available. Sign in or learn about subscription options.pp. 271-280
An Efficient Lock-Free Logarithmic Search Data Structure Based on Multi-dimensional ListFull-text access may be available. Sign in or learn about subscription options.pp. 281-292
Characterizing the Computational Power of Anonymous Mobile RobotsFull-text access may be available. Sign in or learn about subscription options.pp. 293-302
CryptoLock (and Drop It): Stopping Ransomware Attacks on User DataFull-text access may be available. Sign in or learn about subscription options.pp. 303-312
Amnesia: A Bilateral Generative Password ManagerFull-text access may be available. Sign in or learn about subscription options.pp. 313-322
Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their TargetsFull-text access may be available. Sign in or learn about subscription options.pp. 323-333
BotMeter: Charting DGA-Botnet Landscapes in Large NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 334-343
Enabling Privacy-Preserving Incentives for Mobile Crowd Sensing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 344-353
Quality-Aware and Fine-Grained Incentive Mechanisms for Mobile CrowdsensingFull-text access may be available. Sign in or learn about subscription options.pp. 354-363
Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary GameFull-text access may be available. Sign in or learn about subscription options.pp. 364-373
Resource-Aware Photo Crowdsourcing Through Disruption Tolerant NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 374-383
Mayflower: Improving Distributed Filesystem Performance Through SDN/Filesystem Co-DesignFull-text access may be available. Sign in or learn about subscription options.pp. 384-394
A Parity-Based Data Outsourcing Model for Query Authentication and CorrectionFull-text access may be available. Sign in or learn about subscription options.pp. 395-404
Flexible Instance: Meeting Deadlines of Delay Tolerant Jobs in the Cloud with Dynamic PricingFull-text access may be available. Sign in or learn about subscription options.pp. 415-424
SpotLight: An Information Service for the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 425-436
Routing and Scheduling of Social Influence Diffusion in Online Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 437-446
Social Graph Publishing with Privacy GuaranteesFull-text access may be available. Sign in or learn about subscription options.pp. 447-456
ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 457-466
Efficient Top-k Result Diversification for Mobile Sensor DataFull-text access may be available. Sign in or learn about subscription options.pp. 477-486
Energy Minimization for Quality-Constrained Video with Multipath TCP over Heterogeneous Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 487-496
Efficient Resource Allocation and Consolidation with Selfish Agents: An Adaptive Auction ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 497-508
HIDE: AP-Assisted Broadcast Traffic Management to Save Smartphone EnergyFull-text access may be available. Sign in or learn about subscription options.pp. 509-518
Accurate Spatial Calibration of RFID Antennas via Spinning TagsFull-text access may be available. Sign in or learn about subscription options.pp. 519-528
Overlay Design for Topic-Based Publish/Subscribe under Node Degree ConstraintsFull-text access may be available. Sign in or learn about subscription options.pp. 549-559
Service Placement for Detecting and Localizing Failures Using End-to-End ObservationsFull-text access may be available. Sign in or learn about subscription options.pp. 560-569
Live Exploration of Dynamic RingsFull-text access may be available. Sign in or learn about subscription options.pp. 570-579
Randomized Load Balancing in Finite RegimesFull-text access may be available. Sign in or learn about subscription options.pp. 580-589
Spectrum MatchingFull-text access may be available. Sign in or learn about subscription options.pp. 590-599
An Analysis of Onion-Based Anonymous Routing for Delay Tolerant NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 609-618
Directional Beam Alignment for Millimeter Wave Cellular SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 619-628
Measurement, Modeling, and Analysis of TCP in High-Speed Mobility ScenariosFull-text access may be available. Sign in or learn about subscription options.pp. 629-638
Backlog-Aware SRPT Flow Scheduling in Data Center NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 639-648
An NFV Orchestration Framework for Interference-Free Policy EnforcementFull-text access may be available. Sign in or learn about subscription options.pp. 649-658
Bandwidth-Greedy Hashing for Massive-Scale Concurrent FlowsFull-text access may be available. Sign in or learn about subscription options.pp. 659-668
Fast Total Ordering for Modern Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 669-679
A De-compositional Approach to Regular Expression Matching for Network Security ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 680-689
Privacy-Preserving Data Classification and Similarity Evaluation for Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 690-699
Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature ExtractorFull-text access may be available. Sign in or learn about subscription options.pp. 700-710
Deadline-Sensitive User Recruitment for Probabilistically Collaborative Mobile CrowdsensingFull-text access may be available. Sign in or learn about subscription options.pp. 721-722
RF-ISee: Identify and Distinguish Multiple RFID Tagged Objects in Augmented Reality SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 723-724
OmniFlow: Coupling Load Balancing with Flow Control in Datacenter NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 725-726
Approximate Agreement under Mobile Byzantine FaultsFull-text access may be available. Sign in or learn about subscription options.pp. 727-728
Preserving Incumbent Users' Privacy in Server-Driven Dynamic Spectrum Access SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 729-730
On MinMax-Memory Claims for Scientific Workflows in the In-memory Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 731-732
On the Efficiency of Decentralized Search in Expert NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 733-734
Virtual Machine Level Temperature Profiling and Prediction in Cloud DatacentersFull-text access may be available. Sign in or learn about subscription options.pp. 735-736
Strategic Security Resource Allocation for Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 737-738
FSQCN: Fast and Simple Quantized Congestion Notification in Data Center EthernetFull-text access may be available. Sign in or learn about subscription options.pp. 739-740
Practical Concurrent Wireless Charging Scheduling for Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 741-742
A Geometric Windowing Algorithm in Network Data-Plane VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 743-744
Dslash: Managing Data in Overloaded Batch Streaming SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 745-746
Distributed Online Data Aggregation in Dynamic GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 747-748
Efficient Free-Rider Detection Using Symmetric OverlaysFull-text access may be available. Sign in or learn about subscription options.pp. 749-750
Sprout: A Functional Caching Approach to Minimize Service Latency in Erasure-Coded StorageFull-text access may be available. Sign in or learn about subscription options.pp. 753-754
UDS: A Unified Approach to Deterministic MultithreadingFull-text access may be available. Sign in or learn about subscription options.pp. 755-756
DMZtore: A dispersed Data Storage System with Decentralized Multi-factor Access Control (Demo)Full-text access may be available. Sign in or learn about subscription options.pp. 757-758
Showing 100 out of 112