Abstract is missing.
- Boosting Privately: Federated Extreme Gradient Boosting for Mobile CrowdsensingYang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert H. Deng, Kui Ren 0001. 1-11 [doi]
- Blockchain Based Auditable Access Control for Distributed Business ProcessesAhmad Akhtar, Basit Shafiq, Jaideep Vaidya, Ayesha Afzal, Shafay Shamail, Omer Rana. 12-22 [doi]
- HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data Outsourcing ServicesKui Ren 0001, Yu Guo 0003, Jiaqi Li, Xiaohua Jia, Cong Wang 0001, Yajin Zhou, Sheng Wang, Ning Cao 0001, Feifei Li 0001. 23-33 [doi]
- PrivacyScope: Automatic Analysis of Private Data Leakage in TEE-Protected ApplicationsRuide Zhang, Ning Zhang, Assad Moini, Wenjing Lou, Y. Thomas Hou. 34-44 [doi]
- SpotTune: Leveraging Transient Resources for Cost-efficient Hyper-parameter Tuning in the Public CloudYan Li, Bo An 0003, Junming Ma, Donggang Cao, Yasha Wang, Hong Mei. 45-55 [doi]
- Lynceus: Cost-efficient Tuning and Provisioning of Data Analytic JobsMaria Casimiro, Diego Didona, Paolo Romano 0002, Luís E. T. Rodrigues, Willy Zwaenepoel, David Garlan. 56-66 [doi]
- λ-NIC: Interactive Serverless Compute on Programmable SmartNICsSean Choi, Muhammad Shahbaz 0001, Balaji Prabhakar, Mendel Rosenblum. 67-77 [doi]
- Elan: Towards Generic and Efficient Elastic Training for Deep LearningLei Xie, Jidong Zhai, Baodong Wu, Yuanbo Wang, Xingcheng Zhang, Peng Sun 0006, Shengen Yan. 78-88 [doi]
- DASH: A Universal Intersection Traffic Management System for Autonomous VehiclesJian Kang, Dan Lin 0001. 89-99 [doi]
- Attack-Aware Data Timestamping in Low-Power Synchronization-Free LoRaWANChaojie Gu, Linshan Jiang, Rui Tan, Mo Li, Jun Huang. 100-110 [doi]
- MobiRescue: Reinforcement Learning based Rescue Team Dispatching in a Flooding DisasterLi Yan 0004, Shohaib Mahmud, Haiying Shen, Natasha Zhang Foutz, Joshua Anton. 111-121 [doi]
- Jarvis: Moving Towards a Smarter Internet of ThingsAnand Mudgerikar, Elisa Bertino. 122-134 [doi]
- Serverless Straggler Mitigation using Error-Correcting CodesVipul Gupta, Dominic Carrano, Yaoqing Yang, Vaishaal Shankar, Thomas A. Courtade, Kannan Ramchandran. 135-145 [doi]
- Synchronous Byzantine Lattice Agreement in O(log(f) RoundsGiuseppe Antonio Di Luna, Emmanuelle Anceaume, Silvia Bonomi, Leonardo Querzoni. 146-156 [doi]
- Latency, Capacity, and Distributed Minimum Spanning Tree†John Augustine, Seth Gilbert, Fabian Kuhn, Peter Robinson 0002, Suman Sourav. 157-167 [doi]
- Fast Neighborhood RendezvousRyota Eguchi, Naoki Kitamura, Taisuke Izumi. 168-178 [doi]
- An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving a Neat BoundJun Zhao, Jing Tang, Zengxiang Li, Huaxiong Wang, Kwok-Yan Lam, Kaiping Xue. 179-189 [doi]
- Fair and Efficient Gossip in Hyperledger FabricNicolae Berendea, Hugues Mercier, Emanuel Onica, Etienne Rivière. 190-200 [doi]
- Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized StorageYuefeng Du 0001, Huayi Duan, Anxin Zhou, Cong Wang 0001, Man Ho Au, Qian Wang. 201-211 [doi]
- EdgeProg: Edge-centric Programming for IoT ApplicationsBorui Li, Wei Dong 0001. 212-222 [doi]
- Quality of Experience-Aware User Allocation in Edge Computing Systems: A Potential GamePhu Lai, Qiang He 0001, Guangming Cui, Feifei Chen 0001, Mohamed Abdelrazek 0001, John C. Grundy, John G. Hosking, Yun Yang 0001. 223-233 [doi]
- EdgeSlice: Slicing Wireless Edge Computing Network with Decentralized Deep Reinforcement LearningQiang Liu 0013, Tao Han 0002, Ephraim Moges. 234-244 [doi]
- Low Latency Broadcast Scheduling for Battery-Free Wireless Networks Without Predetermined StructuresQuan Chen 0003, Zhipeng Cai 0001, Lianglun Cheng, Hong Gao 0001. 245-255 [doi]
- EnergyDx: Diagnosing Energy Anomaly in Mobile Apps by Identifying the Manifestation PointLi Li, Xiaorui Wang, Feng Qin. 256-266 [doi]
- SafetyNet: Interference Protection via Transparent PHY Layer CodingZhimeng Yin, Wenchao Jiang, Ruofeng Liu, Song Min Kim, Tian He 0001. 267-277 [doi]
- FMore: An Incentive Scheme of Multi-dimensional Auction for Federated Learning in MECRongfei Zeng, Shixun Zhang, Jiaqi Wang, Xiaowen Chu. 278-288 [doi]
- A Collaborative Learning Framework via Federated Meta-LearningSen Lin, Guang Yang, Junshan Zhang. 289-299 [doi]
- Adaptive Gradient Sparsification for Efficient Federated Learning: An Online Learning ApproachPengchao Han, Shiqiang Wang, Kin K. Leung. 300-310 [doi]
- A Light in the Dark Web: Linking Dark Web Aliases to Real Internet IdentitiesEhsan Arabnezhad, Massimo La Morgia, Alessandro Mei, Eugenio Nerio Nemmi, Julinda Stefa. 311-321 [doi]
- Privacy Preserving Distributed Energy TradingShangyu Xie, Han Wang, Yuan Hong, My Thai. 322-332 [doi]
- More Realistic Website Fingerprinting Using Deep LearningWeiqi Cui, Tao Chen, Eric Chan-Tin. 333-343 [doi]
- Fides: Managing Data on Untrusted InfrastructureSujaya Maiyya, Danny Hyun Bum Cho, Divyakant Agrawal, Amr El Abbadi. 344-354 [doi]
- Protocol-Independent Service Queue Isolation for Multi-Queue Data CentersGyuyeong Kim, Wonjun Lee. 355-365 [doi]
- Scale the Data Plane of Software-Defined Networks: a Lazy Rule Placement ApproachQing Li 0006, Nanyang Huang, Yong Jiang, Richard O. Sinnott, Mingwei Xu. 366-376 [doi]
- +: Minimizing Switch Buffer Size during Network Updates in Timed SDNsXin He, Jiaqi Zheng, Haipeng Dai, Yuhu Sun, Wanchun Dou, Guihai Chen. 377-387 [doi]
- Characterizing the Impact of TCP Coexistence in Data Center NetworksAnirudh Ganji, Anand Singh, Muhammad Shahzad. 388-398 [doi]
- BlueFi: Physical-layer Cross-Technology Communication from Bluetooth to WiFiZhijun Li 0001, Yongrui Chen. 399-409 [doi]
- A Learning Approach with Programmable Data Plane towards IoT SecurityQiaofeng Qin, Konstantinos Poularakis, Leandros Tassiulas. 410-420 [doi]
- To Cache or Not to Cache: Stable Service Caching in Mobile Edge-Clouds of a Service MarketZichuan Xu, Yugen Qin, Pan Zhou, John C. S. Lui, Weifa Liang, Qiufen Xia, Wenzheng Xu, Guowei Wu. 421-431 [doi]
- Abnormal Message Detection for CAN Bus Based on Message Transmission BehaviorsLiuwang Kang, Haiying Shen. 432-441 [doi]
- Coded Computing at Full SpeedBin Tang, Jiannong Cao 0001, Runze Cui, Baoliu Ye, Ye Li 0004, Sanglu Lu. 442-452 [doi]
- Collage Inference: Using Coded Redundancy for Lowering Latency Variation in Distributed Image Classification SystemsHema Venkata Krishna Giri Narra, Zhifeng Lin, Ganesh Ananthanarayanan, Salman Avestimehr, Murali Annavaram. 453-463 [doi]
- Understanding the Potential Risks of Sharing Elevation Information on Fitness ApplicationsÜlkü Meteriz, Necip Faziotal Yiotaldiotaran, Joongheon Kim, David A. Mohaisen. 464-473 [doi]
- E-Sharing: Data-driven Online Optimization of Parking Location Placement for Dockless Electric Bike SharingPengzhan Zhou, Cong Wang, Yuanyuan Yang, Xin Wei. 474-484 [doi]
- Game Theoretical Analysis of Cross-Chain SwapsMarianna Belotti, Stefano Moretti, Maria Potop-Butucaru, Stefano Secci. 485-495 [doi]
- A Certificateless Consortium Blockchain for IoTsXiaobing Guo, Qingxiao Guo, Min Liu, Yunhao Wang, Yilong Ma, Bo Yang. 496-506 [doi]
- TinyEVM: Off-Chain Smart Contracts on Low-Power IoT DevicesChristos Profentzas, Magnus Almgren, Olaf Landsiedel. 507-518 [doi]
- DISCO: Distributed Control Plane Architecture for Resource Sharing in Heterogeneous Mobile Edge Cloud ScenariosSumit Maheshwari, Prasad Prakash Netalkar, Dipankar Raychaudhuri. 519-529 [doi]
- Win with What You Have: QoS-Consistent Edge Services with Unreliable and Dynamic ResourcesZheng Song, Eli Tilevich. 530-540 [doi]
- Privacy-Preserving Distributed Edge Caching for Mobile Data Offloading in 5G NetworksYiming Zeng, Yaodong Huang, Ji Liu, Yuanyuan Yang. 541-551 [doi]
- airFinger: Micro Finger Gesture Recognition via NIR Light Sensing for Smart DevicesQian Zhang, Yetong Cao, Huijie Chen, Fan Li, Song Yang 0002, Yu Wang 0003, Zheng Yang, Yunhao Liu. 552-562 [doi]
- WOLT: Auto-Configuration of Integrated Enterprise PLC-WiFi NetworksHisham Alhulayyil, Kittipat Apicharttrisorn, Jiasi Chen, Karthikeyan Sundaresan, Samet Oymak, Srikanth V. Krishnamurthy. 563-573 [doi]
- Contact-Aware Opportunistic Data Forwarding in Disconnected LoRaWAN Mobile NetworksPo-Yu Chen 0001, Laksh Bhatia, Roman Kolcun, David E. Boyle, Julie A. McCann. 574-583 [doi]
- SNAP: A Communication Efficient Distributed Machine Learning Framework for Edge ComputingYangming Zhao, Jingyuan Fan, Lu Su, Tongyu Song, Sheng Wang 0006, Chunming Qiao. 584-594 [doi]
- Communication-efficient k-Means for Edge-based Machine LearningHanlin Lu, Ting He 0001, Shiqiang Wang, Changchang Liu, Mehrdad Mahdavi, Vijaykrishnan Narayanan, Kevin S. Chan, Stephen Pasteris. 595-605 [doi]
- Resource-Efficient and Convergence-Preserving Online Participant Selection in Federated LearningYibo Jin 0001, Lei Jiao, Zhuzhong Qian, Sheng Zhang 0001, Sanglu Lu, Xiaoliang Wang 0001. 606-616 [doi]
- Self-Stabilizing Set-Constrained Delivery Broadcast (extended abstract)Oskar Lundström, Michel Raynal, Elad Michael Schiller. 617-627 [doi]
- Toward Adaptive Disk Failure Prediction via Stream MiningShujie Han, Patrick P. C. Lee, Zhirong Shen, Cheng He, Yi Liu, Tao Huang. 628-638 [doi]
- MUSIC: Multi-Site Critical Sections over Geo-Distributed StateBharath Balasubramanian, Pamela Zave, Richard D. Schlichting, Mohammad Salehe, Shankaranarayanan Puzhavakath Narayanan, Seyed Hossein Mortazavi, Eyal de Lara, Matti A. Hiltunen, Kaustubh Joshi, Gueyoung Jung. 639-651 [doi]
- Kill Two Birds with One Stone: Auto-tuning RocksDB for High Bandwidth and Low LatencyYichen Jia, Feng Chen 0005. 652-664 [doi]
- FluidMem: Full, Flexible, and Fast Memory Disaggregation for the CloudBlake Caldwell, Sepideh Goodarzy, Sangtae Ha, Richard Han, Eric Keller, Eric Rozner, Youngbin Im. 665-677 [doi]
- Exploiting Symbolic Execution to Accelerate Deterministic DatabasesShady Issa, Miguel Viegas, Pedro Raminhas, Nuno Machado, Miguel Matos, Paolo Romano 0002. 678-688 [doi]
- Protecting Real-time Video Chat against Fake Facial Videos Generated by Face ReenactmentJiacheng Shang, Jie Wu. 689-699 [doi]
- WiWrite: An Accurate Device-Free Handwriting Recognition System with COTS WiFiChi Lin, Tingting Xu, Jie Xiong, Fenglong Ma, Lei Wang 0005, Guowei Wu. 700-709 [doi]
- DAPES: Named Data for Off-the-Grid File Sharing with Peer-to-Peer InteractionsSpyridon Mastorakis, Tianxiang Li, Lixia Zhang 0001. 710-720 [doi]
- Exact Consensus under Global Asymmetric Byzantine LinksLewis Tseng, Qinzi Zhang, Saptaparni Kumar, Yifan Zhang. 721-731 [doi]
- Efficient Dispersion of Mobile Robots on Dynamic GraphsAjay D. Kshemkalyani, Anisur Rahaman Molla, Gokarna Sharma. 732-742 [doi]
- Semi-Fast Byzantine-tolerant Shared Register without Reliable BroadcastKishori M. Konwar, Saptaparni Kumar, Lewis Tseng. 743-753 [doi]
- Permissioned Blockchain Through the Looking Glass: Architectural and Implementation Lessons LearnedSuyash Gupta, Sajjad Rahnama, Mohammad Sadoghi. 754-764 [doi]
- Toward Trustworthy Blockchain-as-a-Service with AuditingYongrae Jo, Jeonghyun Ma, Chanik Park. 765-775 [doi]
- Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot LeadersAggelos Kiayias, Saad Quader, Alexander Russell. 776-786 [doi]
- Context-Aware Deep Model Compression for Edge Cloud ComputingLingdong Wang, Liyao Xiang, Jiayu Xu, Jiaju Chen, Xing Zhao, Dixi Yao, Xinbing Wang, Baochun Li. 787-797 [doi]
- Distributionally Robust Edge Learning with Dirichlet Process PriorZhaofeng Zhang, Yue Chen, Junshan Zhang. 798-808 [doi]
- Classification of Channel Access Attacks in Wireless Networks: A Deep Learning ApproachXianglin Wei, Li Li 0087, Chaogang Tang, Milos Doroslovacki, Suresh Subramaniam. 809-819 [doi]
- Distributed Hierarchical File Systems strike back in the CloudMahmoud Ismail, Salman Niazi, Mauritz Sundell, Mikael Ronström, Seif Haridi, Jim Dowling. 820-830 [doi]
- Accordia: Adaptive Cloud Configuration Optimization for Recurring Data-Intensive ApplicationsYang Liu, Huanle Xu, Wing Cheong Lau. 831-841 [doi]
- DistStream: An Order-Aware Distributed Framework for Online-Offline Stream Clustering AlgorithmsLijie Xu, Xingtong Ye, Kai Kang, Tian Guo 0001, Wensheng Dou, Wei Wang 0049, Jun Wei 0001. 842-852 [doi]
- CODA: Improving Resource Utilization by Slimming and Co-locating DNN and CPU JobsHan Zhao 0005, Weihao Cui, Quan Chen, Jingwen Leng, Kai Yu, Deze Zeng, Chao Li 0009, Minyi Guo. 853-863 [doi]
- DeX: Scaling Applications Beyond Machine BoundariesSang-Hoon Kim, Ho-Ren Chuang, Robert Lyerly, Pierre Olivier, Changwoo Min, Binoy Ravindran. 864-876 [doi]
- Thread-Placement LearningKarolos Antoniadis, Rachid Guerraoui, Vasileios Trigonakis. 877-887 [doi]
- Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware ClassifiersHisham Alasmary, Ahmed Abusnaina, RhongHo Jang, Mohammed Abuhamad, Afsah Anwar, DaeHun Nyang, David A. Mohaisen. 888-898 [doi]
- Achieving Consensus in Privacy-Preserving Decentralized LearningLiyao Xiang, Lingdong Wang, Shufan Wang, Baochun Li. 899-909 [doi]
- Dragoon: Private Decentralized HITs Made PracticalYuan Lu 0001, Qiang Tang 0005, Guiling Wang. 910-920 [doi]
- Disperse Access Considered Energy Inefficiency in Intel Optane DC Persistent Memory ServersDaping Li, Jiguang Wan, Jun Wang, Jian Zhou, Kai Lu, Peng Xu, Fei Wu 0005, Changsheng Xie. 921-931 [doi]
- Achieving High Utilization for Approximate Fair Queueing in Data CenterJingling Liu, Jiawei Huang, Ning Jiang, Weihe Li, Jianxin Wang 0001. 932-942 [doi]
- Characterizing and Modeling Distributed Training with Transient Cloud GPU ServersShijian Li, Robert J. Walls, Tian Guo 0001. 943-953 [doi]
- Understanding WiFi Cross-Technology Interference Detection in the Real WorldTeemu Pulkkinen, Jukka K. Nurminen, Petteri Nurmi. 954-964 [doi]
- Mobile Phones Know Your Keystrokes through the Sounds from Finger's Tapping on the ScreenZhen Xiao, Tao Chen, Yang Liu 0101, Zhenjiang Li. 965-975 [doi]
- Continuous, Real-Time Object Detection on Mobile Devices without OffloadingMiaomiao Liu, Xianzhong Ding, Wan Du. 976-986 [doi]
- A Comprehensive Study of In-Memory Computing on Large HPC SystemsDan Huang, Zhenlu Qin, Qing Liu, Norbert Podhorszki, Scott Klasky. 987-997 [doi]
- Alleviating Low-Battery Anxiety of Mobile Users via Low-Power Video StreamingGuoming Tang, Kui Wu, Deke Guo, Yi Wang, Huan Wang. 998-1008 [doi]
- CAPMAN: Cooling and Active Power Management in big.LITTLE Battery Supported DevicesJie Zhou, Zichen Xu, Wenli Zheng, Yuhao Wang. 1009-1019 [doi]
- LVQ: A Lightweight Verifiable Query Approach for Transaction History in BitcoinXiaohai Dai, Jiang Xiao, Wenhui Yang, Chaofan Wang, Jian Chang, Rui Han, Hai Jin 0001. 1020-1030 [doi]
- A Study on Nine Years of Bitcoin Transactions: Understanding Real-world Behaviors of Bitcoin Miners and UsersBinbing Hou, Feng Chen 0005. 1031-1043 [doi]
- On Exploiting Transaction Concurrency To Speed Up BlockchainsDaniël Reijsbergen, Tien Tuan Anh Dinh. 1044-1054 [doi]
- PerDNN: Offloading Deep Neural Network Computations to Pervasive Edge ServersHyuk-Jin Jeong, Hyeon-Jae Lee, Kwang Yong Shin, Yong Hwan Yoo, Soo-Mook Moon. 1055-1066 [doi]
- SPARCLE: Stream Processing Applications over Dispersed Computing NetworksParisa Rahimzadeh, Jinsung Lee, Youngbin Im, Siun-Chuon Mau, Eric C. Lee, Bradford O. Smith, Fatemah Al-Duoli, Carlee Joe-Wong, Sangtae Ha. 1067-1078 [doi]
- Learning for Exception: Dynamic Service Caching in 5G-Enabled MECs with Bursty User DemandsZichuan Xu, Shengnan Wang, Shipei Liu, Haipeng Dai, Qiufen Xia, Weifa Liang, Guowei Wu. 1079-1089 [doi]
- MITOS: Optimal Decisioning for the Indirect Flow Propagation Dilemma in Dynamic Information Flow Tracking SystemsNikolaos Sapountzis, Ruimin Sun, Xuetao Wei, Yier Jin, Jedidiah R. Crandall, Daniela A. S. de Oliveira. 1090-1100 [doi]
- AutoE2E: End-to-End Real-time Middleware for Autonomous Driving ControlYunhao Bai, Zejiang Wang, Xiaorui Wang, Junmin Wang. 1101-1111 [doi]
- SineKV: Decoupled Secondary Indexing for LSM-based Key-Value StoresFei Li, Youyou Lu, Zhe Yang, Jiwu Shu. 1112-1122 [doi]
- Multi-Objective Online Task Allocation in Spatial Crowdsourcing SystemsEllen Mitsopoulou, Iouliana Litou, Vana Kalogeraki. 1123-1133 [doi]
- CROSS: A Crowdsourcing based Sub-Servers Selection Framework in D2D Enhanced MEC ArchitectureTuo Shi, Zhipeng Cai 0001, Jianzhong Li 0001, Hong Gao 0001. 1134-1144 [doi]
- Unknown Worker Recruitment in Mobile Crowdsensing Using CMAB and AuctionMingjun Xiao, Jing Wang, Hui Zhao, Guoju Gao. 1145-1155 [doi]
- Towards Differentially Private Truth Discovery for Crowd Sensing SystemsYaliang Li, Houping Xiao, Zhan Qin, Chenglin Miao, Lu Su, Jing Gao, Kui Ren 0001, Bolin Ding. 1156-1166 [doi]
- Augmenting an Internet Voting System with Selene Verifiability using Permissioned Distributed LedgerMuntadher Sallal, Steve Schneider, Matthew Casey, François Dupressoir, Helen Treharne, Constantin Catalin Dragan, Luke Riley, Phil Wright. 1167-1168 [doi]
- Safe Process Quitting for GPU Multi-Process Service (MPS)Hao Wu, Wei Liu, Yifan Gong, Jiangming Jin. 1169-1170 [doi]
- A Cloud-Migration Feasibility AdvisorShubhi Asthana, Aly Megahed, Ilyas Iyoob. 1171-1172 [doi]
- Exploration of TransE in a Distributed EnvironmentMeiyan Lu, Lejian Liao, Feng Zhang, Dandan Song. 1173-1174 [doi]
- FastUp: Compute a Better TCAM Update Scheme in Less Time for SDN SwitchesYing Wan, Haoyu Song 0001, Hao Che, Yang Xu, Yi Wang, Chuwen Zhang, Zhijun Wang, Tian Pan 0001, Hao Li, Hong Jiang, Chengchen Hu, Zhikang Chen, Bin Liu. 1175-1176 [doi]
- An Adaptive Erasure-Coded Storage Scheme with an Efficient Code-Switching AlgorithmZizhong Wang, Haixia Wang, Airan Shao, Dongsheng Wang 0002. 1177-1178 [doi]
- When Burstable Instances Meet Mobile Computing: Performance Modeling and Economic AnalysisBo Sun 0004, Yuxuan Jiang 0001, Danny H. K. Tsang. 1179-1180 [doi]
- On the Performance Impact of NUMA on One-sided RDMA InteractionsJacob Nelson, Roberto Palmieri. 1181-1182 [doi]
- Petrel: Community-aware Synchronous Parallel for Heterogeneous Parameter ServerQihua Zhou, Song Guo 0001, Peng Li 0017, Yanfei Sun, Li Li 0012, Minyi Guo, Kun Wang 0005. 1183-1184 [doi]
- Robust P2P Primitives Using SGX EnclavesYaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang. 1185-1186 [doi]
- TagMic: Listening Through RFID SignalsYin Li, Chunhui Duan, Xuan Ding, Cihang Liu. 1187-1188 [doi]
- A Hierarchical Model for Fast Distributed Consensus in Dynamic NetworksTimothy Castiglia, Colin Goldberg, Stacy Patterson. 1189-1190 [doi]
- Impact of Memory DoS Attacks on Cloud Applications and Real-Time Detection SchemesZhuozhao Li, Tanmoy Sen, Haiying Shen, Mooi Choo Chuah. 1191-1192 [doi]
- MobiCharger: Optimal Scheduling for Cooperative EV-to-EV Dynamic Wireless ChargingLi Yan 0004, Haiying Shen, Liuwang Kang, Juanjuan Zhao, Chengzhong Xu 0001. 1193-1194 [doi]
- A Distributed Storage System for Robust, Privacy-Preserving Surveillance CamerasJiaping Yu, Haiwen Chen, Kui Wu 0001, Zhiping Cai, Jinhua Cui. 1195-1196 [doi]
- Characterizing Bottlenecks in Scheduling Microservices on Serverless PlatformsJashwant Raj Gunasekaran, Prashanth Thinakaran, Nachiappan Chidambaram Nachiappan, Ram Srivatsa Kannan, Mahmut Taylan Kandemir, Chita R. Das. 1197-1198 [doi]
- SEIZE User Desired Moments: Runtime Inspection for Parallel Dataflow SystemsYoufu Li, Matteo Interlandi, Fotis Psallidas, Wei Wang 0010, Carlo Zaniolo. 1199-1200 [doi]
- An Inter-blockchain Escrow Approach for Fast Bitcoin PaymentXinyu Lei, Tian Xie, Guan-Hua Tu, Alex X. Liu. 1201-1202 [doi]
- FILT: Optimizing KV-Embedded File Systems through Flat IndexingChen Chen, Tongliang Deng, Jian Zhang, Yanliang Zou, Xiaomin Zhu, Shu Yin. 1203-1204 [doi]
- On Reading Fresher Snapshots in Parallel Snapshot IsolationMasoomeh Javidi Kishi, Roberto Palmieri. 1205-1206 [doi]
- Communication-Efficient Decentralized Learning with Sparsification and Adaptive Peer SelectionZhenheng Tang, Shaohuai Shi, Xiaowen Chu. 1207-1208 [doi]
- Cloud Password Shield: A Secure Cloud-based Firewall against DDoS on Authentication ServersYue Fu, Man Ho Au, Rong Du, Haibo Hu 0001, Dagang Li. 1209-1210 [doi]
- Agora: A Privacy-aware Data MarketplaceVlasis Koutsos, Dimitrios Papadopoulos, Dimitris Chatzopoulos, Sasu Tarkoma, Pan Hui 0001. 1211-1212 [doi]
- Overlapped Mobile Charging for Sensor NetworksSheng Zhang 0001, Yu Liang 0001, Zhuzhong Qian, Mingjun Xiao, JiDong Ge, Jie Wu 0001, Sanglu Lu. 1213-1214 [doi]
- D-SmartML: A Distributed Automated Machine Learning FrameworkAhmed Abd Elrahman, Mohamed ElHelw, Radwa El Shawi, Sherif Sakr. 1215-1218 [doi]
- SafePay on Ethereum: A Framework For Detecting Unfair Payments in Smart ContractsYue Li, Han Liu 0010, Zhiqiang Yang, Qian Ren, Lei Wang, Bangdao Chen. 1219-1222 [doi]
- A Community Platform for Research on Pricing and Distributed Machine LearningXuanzhe Li, Samuel Gomena, Logan Ballard, Juntao Li, Ehsan Aryafar, Carlee Joe-Wong. 1223-1226 [doi]
- Contextual-Bandit Anomaly Detection for IoT Data in Distributed Hierarchical Edge ComputingMao V. Ngo, Tie Luo, Hakima Chaouchi, Tony Q. S. Quek. 1227-1230 [doi]
- HaoCL: Harnessing Large-scale Heterogeneous Processors Made EasyYao Chen, Xin Long, Jiong He, Yuhang Chen, Hongshi Tan, Zhenxiang Zhang, Marianne Winslett, Deming Chen. 1231-1234 [doi]
- BP-Com: A Service Mapping Tool for Rapid Development of Business ProcessesAyesha Afzal, Muhammad Adeel Zahid, Ahmad Akhtar, Basit Shafiq, Shafay Shamail, Abeer Elahraf, Jaideep Vaidya, Nabil R. Adam. 1235-1238 [doi]
- Real-Time Video Streaming using CeforeSim: Simulator to the Real WorldYusaku Hayamizu, Kazuhisa Matsuzono, Hitoshi Asaeda. 1239-1242 [doi]
- UL-blockDAG : Unsupervised Learning based Consensus Protocol for BlockchainSwaroopa Reddy B, Sharma G. V. V. 1243-1248 [doi]
- Selective Deletion in a BlockchainPeter Hillmann, Marcus Knüpfer, Erik Heiland, Andreas Karcher. 1249-1256 [doi]
- Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized SidechainsAlberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov. 1257-1262 [doi]
- Cross-chain Oracle Based Data Migration Mechanism in Heterogeneous BlockchainsZhipeng Gao, Hongli Li, Kaile Xiao, Qian Wang. 1263-1268 [doi]
- FabAsset: Unique Digital Asset Management System for Hyperledger FabricSangwon Hong, Yoongdoo Noh, Jeyoung Hwang, Chanik Park. 1269-1274 [doi]
- A Multi-node Collaborative Storage Strategy via Clustering in Blockchain NetworkMengya Li, Yang Qin, Bing Liu, Xiaowen Chu. 1275-1280 [doi]
- Performance Characterization and Bottleneck Analysis of Hyperledger FabricCanhui Wang, Xiaowen Chu. 1281-1286 [doi]
- Towards a Lightweight Blockchain Platform for Critical Infrastructure ProtectionJerin Sunny, Sriram Sankaran, Vishal Saraswat. 1287-1292 [doi]
- An Energy-Efficient Edge Offloading Scheme for UAV-Assisted Internet of ThingsMinghui Dai, Zhou Su, Jiliang Li, Jian Zhou. 1293-1297 [doi]
- Optimal Device Selection for Federated Learning over Mobile Edge NetworksCheng-Wei Ching, Yu-Chun Liu, Chung Kai Yang, Jian-Jhih Kuo, Feng-Ting Su. 1298-1303 [doi]
- Flow control in SDN-Edge-Cloud cooperation system with machine learningRyoichi Shinkuma, Yoshinobu Yamada, Takehiro Sato, Eiji Oki. 1304-1309 [doi]
- A Framework for Automatic Failure Recovery in ICT Systems by Deep Reinforcement LearningHiroki Ikeuchi, Jiawen Ge, Yoichi Matsuo, Keishiro Watanabe. 1310-1315 [doi]
- Federated Learning For Cyber Security: SOC Collaboration For Malicious URL DetectionEkaterina Khramtsova, Christian A. Hammerschmidt, Sofiane Lagraa, Radu State. 1316-1321 [doi]
- A Data-Driven Performance Prediction Approach for Cellular Network Parameter Setting via Factorization MachineBosen Zeng, Yong Zhong, Xianhua Niu. 1322-1327 [doi]
- Refining Micro Services Placement over Multiple Kubernetes-orchestrated Clusters employing Resource MonitoringSeunghyung Lee, Seokho Son, Jungsu Han, JongWon Kim. 1328-1332 [doi]
- Stabilizer of SMPC Throughput using Neural NetworksMichiko Harayama, Noboru Miyagawa. 1333-1337 [doi]
- Automatic Rule Updating based on Machine Learning in Complex Event ProcessingYunhao Sun, Guanyu Li, Bo Ning 0002. 1338-1343 [doi]
- Dragon: A Lightweight, High Performance Distributed Stream Processing EngineAaron Harwood, Maria Rodriguez Read, Gayashan Niroshana Amarasinghe. 1344-1351 [doi]
- Three-Dimensional Reconstruction and Phenotype Nondestructive Measurement Technology for Rape RootsRui Liang, Shengyong Xu. 1352-1357 [doi]
- Application research on application performance management system in big data of power gridDeji Zhao, Bo Ning 0002, Chao Yang. 1358-1363 [doi]
- Research on Data Protection Algorithm Based on Social NetworkYuanhu Yang, Jing Hu, Yusi Yang. 1364-1369 [doi]
- Efficient Learning of Big ECG Data for Ventricular Fibrillation WarningYao He, Xin Bi, Xiangguo Zhao, Chao Zhang, Zhixun Liu, Yuliang Ma. 1370-1375 [doi]
- Image Denoising for Efficient Anomaly Detection in VideosZhiwen Fang, Zhou Yue, Weiyuan Liu, Feng Yang. 1376-1382 [doi]
- SiEVE: Semantically Encoded Video Analytics on Edge and CloudTarek Elgamal, Shu Shi, Varun Gupta, Rittwik Jana, Klara Nahrstedt. 1383-1388 [doi]
- Evaluating the Merits of Ranking in Structured Network PruningKuldeep Sharma, Nirmala Ramakrishnan, Alok Prakash, Siew Kei Lam, Thambipillai Srikanthan. 1389-1396 [doi]
- Deploy-able Privacy Preserving Collaborative MLNandish Chattopadhyay, Ritabrata Maiti, Anupam Chattopadhyay. 1397-1402 [doi]
- Adaptive Precision Training for Resource Constrained DevicesTian Huang, Tao Luo, Joey Tianyi Zhou. 1403-1408 [doi]
- Energy Efficient In-memory Integer Multiplication Based on Racetrack MemoryTao Luo, Wei Zhang, Bingsheng He, Cheng Liu, Douglas L. Maskell. 1409-1414 [doi]
- A LoRaWAN-MAC Protocol Based on WSN Residual Energy to Adjust Duty CycleTing Xu, Ming Zhao. 1415-1420 [doi]