default search action
39th SRDS 2020: Shanghai, China
- International Symposium on Reliable Distributed Systems, SRDS 2020, Shanghai, China, September 21-24, 2020. IEEE 2020, ISBN 978-1-7281-7626-0
Session 1: Fault-Tolerance and Coordination
- Junya Nakamura, Masahiro Shibata, Yuichi Sudo, Yonghwan Kim:
Self-Stabilizing Construction of a Minimal Weakly ST-Reachable Directed Acyclic Graph. 1-10 - Duong N. Nguyen, Sandeep S. Kulkarni:
Benefits of Stabilization versus Rollback in Self-Stabilizing Graph-Based Applications on Eventually Consistent Key-Value Stores. 11-20 - Orestis Alpos, Christian Cachin:
Consensus Beyond Thresholds: Generalized Byzantine Quorums Made Live. 21-30
Session 2: Blockchain
- Christina Müller, Marcus Brandenburger, Christian Cachin, Pascal Felber, Christian Göttel, Valerio Schiavoni:
TZ4Fabric: Executing Smart Contracts with ARM TrustZone : (Practical Experience Report). 31-40 - Chao Li, Balaji Palanisamy, Runhua Xu, Jian Wang, Jiqiang Liu:
NF-Crowd: Nearly-free Blockchain-based Crowdsourcing. 41-50 - Qingqi Pei, Enyuan Zhou, Yang Xiao, Deyu Zhang, Dongxiao Zhao:
An Efficient Query Scheme for Hybrid Storage Blockchains Based on Merkle Semantic Trie. 51-60 - Yue Li, Han Liu, Zhiqiang Yang, Bin Wang, Qian Ren, Lei Wang, Bangdao Chen:
Protect Your Smart Contract Against Unfair Payment. 61-70
Session 3: Learning I
- El-Mahdi El-Mhamdi, Rachid Guerraoui, Sébastien Rouault:
Fast and Robust Distributed Learning in High Dimension. 71-80 - Chenhao Ying, Haiming Jin, Xudong Wang, Yuan Luo:
Double Insurance: Incentivized Federated Learning with Differential Privacy in Mobile Crowdsensing. 81-90 - Yansong Gao, Minki Kim, Sharif Abuadbba, Yeonjae Kim, Chandra Thapa, Kyuyeon Kim, Seyit Ahmet Çamtepe, Hyoungshick Kim, Surya Nepal:
End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things. 91-100
Session 4: Formal Methods
- Joel Wanner, Laurent Chuat, Adrian Perrig:
A Formally Verified Protocol for Log Replication with Byzantine Fault Tolerance. 101-112 - Xavier Défago, Adam Heriban, Sébastien Tixeuil, Koichi Wada:
Using Model Checking to Formally Verify Rendezvous Algorithms for Robots with Lights in Euclidean Space. 113-122 - Vidhya Tekken Valapil, Sandeep S. Kulkarni, Eric Torng, Gabe Appleton:
Efficient Two-Layered Monitor for Partially Synchronous Distributed Systems. 123-132
Session 5: Replication
- Tarcisio Ceolin Junior, Fernando Luís Dotti, Fernando Pedone:
Parallel State Machine Replication from Generalized Consensus. 133-142 - Xue Jiang, Hengfeng Wei, Yu Huang:
A Generic Specification Framework for Weakly Consistent Replicated Data Types. 143-154 - Loïck Bonniot, Christoph Neumann, François Taïani:
PnyxDB: a Lightweight Leaderless Democratic Byzantine Fault Tolerant Replicated Datastore. 155-164 - Gerhard Habiger, Franz J. Hauck, Hans P. Reiser, Johannes Köstler:
Self-optimising Application-agnostic Multithreading for Replicated State Machines. 165-174
Session 6: Security and Privacy I
- Martin Byrenheid, Thorsten Strufe, Stefanie Roos:
Secure Embedding of Rooted Spanning Trees for Scalable Routing in Topology-Restricted Networks. 175-184 - Yangfan Jiang, Yipeng Zhou, Di Wu, Chao Li, Yan Wang:
On the Detection of Shilling Attacks in Federated Collaborative Filtering. 185-194 - Bo Zhang, Hongyu Zhang, Pablo Moscato, Aozhong Zhang:
Anomaly Detection via Mining Numerical Workflow Relations from Logs. 195-204 - Xiaoxia Liu, Daojing He, Yun Gao, Sencun Zhu, Sammy Chan:
TLP-IDS: A Two-layer Intrusion Detection System for Integrated Electronic Systems. 205-214
Session 7: Distributed Storage
- Meng Yan, Jiajia Xu, Trent G. Marbach, Haitao Li, Gang Wang, Xiaoguang Liu:
Audinet: A Decentralized Auditing System for Cloud Storage. 215-224 - Yingxun Fu, Xun Liu, Jiwu Shu, Zhirong Shen, Shiye Zhang, Jun Wu, Jianyong Duan, Li Ma:
Device and Placement Aware Framework to optimize Single Failure Recoveries and Reads for Erasure Coded Storage System with Heterogeneous Storage Devices. 225-235 - Xin Xie, Chentao Wu, Gen Yang, Zongxin Ye, Xubin He, Jie Li, Minyi Guo, Guangtao Xue, Yuanyuan Dong, Yafei Zhao:
AZ-Recovery: An Efficient Crossing-AZ Recovery Scheme for Erasure Coded Cloud Storage Systems. 236-245 - Si Wu, Zhirong Shen, Patrick P. C. Lee:
Enabling I/O-Efficient Redundancy Transitioning in Erasure-Coded KV Stores via Elastic Reed-Solomon Codes. 246-255
Session 8: Emerging Technologies
- Carlos Segarra, Ricard Delgado-Gonzalo, Valerio Schiavoni:
MQT-TZ: Hardening IoT Brokers Using ARM TrustZone : (Practical Experience Report). 256-265 - Daniela Loreti, Marcello Artioli, Anna Ciampolini:
Solving Linear Systems on High Performance Hardware with Resilience to Multiple Hard Faults. 266-275 - Travis LeCompte, Fang Qi, Lu Peng:
Robust Cache-Aware Quantum Processor Layout. 276-287 - Jacob Nelson, Roberto Palmieri:
Performance Evaluation of the Impact of NUMA on One-sided RDMA Interactions. 288-298
Session 9: Learning II + Security and Privacy II
- Karim Boubouh, Amine Boussetta, Yahya Benkaouz, Rachid Guerraoui:
Robust P2P Personalized Learning. 299-308 - Yilei Zhang, Peiyun Zhang, Yonglong Luo, Liya Ji:
Towards Efficient, Credible and Privacy-Preserving Service QoS Prediction in Unreliable Mobile Edge Environments. 309-318 - Sisi Duan, Chao Liu, Xin Wang, Yusen Wu, Shuai Xu, Yelena Yesha, Haibin Zhang:
Intrusion-Tolerant and Confidentiality-Preserving Publish/Subscribe Messaging. 319-328
Session 10: Demo/Posters
- Ko Natori, Takafumi Kikuchi, Kenji Kono:
Poster: No More Slow Messages: Programmable Packet Handling in Hard IRQ. 329-331 - Sanaz Taheri Boshrooyeh, Ali Utkan Sahin, Yahya Hassanzadeh-Nazarabadi, Öznur Özkasap:
Demo: A Proof-of-Concept Implementation of Guard Secure Routing Protocol. 332-334 - Yahya Hassanzadeh-Nazarabadi, Nazir Nayal, Shadi Sameh Hamdan, Ali Utkan Sahin, Öznur Özkasap, Alptekin Küpçü:
Demo: Skip Graph Middleware Implementation. 335-337
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.