Abstract is missing.
- Communication-Efficient Federated Learning with Adaptive Parameter FreezingChen Chen, Hong Xu, Wei Wang 0030, Baochun Li, Bo Li 0001, Li Chen, Gong Zhang. 1-11 [doi]
- Poster: Off-path VoIP Interception AttacksTianxiang Dai, Haya Shulman, Michael Waidner. 1-2 [doi]
- Towards Efficient Inference: Adaptively Cooperate in Heterogeneous IoT Edge ClusterXiang Yang, Qi Qi 0001, Jingyu Wang 0001, Song Guo 0001, Jianxin Liao. 12-23 [doi]
- SHARE: Shaping Data Distribution at Edge for Communication-Efficient Hierarchical Federated LearningYongheng Deng, Feng Lyu 0001, Ju Ren, Yongmin Zhang, Yuezhi Zhou, Yaoxue Zhang, Yuanyuan Yang. 24-34 [doi]
- Incentive-Driven Long-term Optimization for Edge Learning by Hierarchical Reinforcement MechanismYi Liu, Leijie Wu, Yufeng Zhan, Song Guo 0001, Zicong Hong. 35-45 [doi]
- On the Power of False Negative Awareness in Indicator-based Caching SystemsItamar Cohen, Gil Einziger, Gabriel Scalosub. 46-56 [doi]
- The Vertical Cuckoo Filters: A Family of Insertion-friendly Sketches for Online ApplicationsPengtao Fu, Lailong Luo, Shangsen Li, Deke Guo, Geyao Cheng, Yun Zhou. 57-67 [doi]
- An Efficient and Balanced Graph Partition Algorithm for the Subgraph-Centric Programming Model on Large-scale Power-law GraphsShuai Zhang, Zite Jiang, Xingzhong Hou, Zhen Guan, Mengting Yuan, Haihang You. 68-78 [doi]
- Pluto: High-Performance IoT-Aware Stream ProcessingTaegeon Um, Gyewon Lee, Byung-Gon Chun. 79-91 [doi]
- Gengar: An RDMA-based Distributed Hybrid Memory PoolZhuohui Duan, Haikun Liu, Haodi Lu, Xiaofei Liao, Hai Jin 0001, Yu Zhang 0027, Bingsheng He. 92-103 [doi]
- Re-architecting Distributed Block Storage System for Improving Random Write PerformanceMyoungwon Oh, Jiwoong Park, Sung Kyu Park, Adel Choi, Jongyoul Lee, Jin Hyeok Choi, Heon Y. Yeom. 104-114 [doi]
- Gear: Enable Efficient Container Storage and Deployment with a New Image FormatHao Fan, Shengwei Bian, Song Wu, Song Jiang, Shadi Ibrahim, Hai Jin 0001. 115-125 [doi]
- Dyconits: Scaling Minecraft-like Services through Dynamically Managed InconsistencyJesse Donkervliet, Jim Cuijpers, Alexandru Iosup. 126-137 [doi]
- Gillis: Serving Large Neural Networks in Serverless Functions with Automatic Model PartitioningMinchen Yu, Zhifeng Jiang, Hok Chun Ng, Wei Wang 0030, Ruichuan Chen, Bo Li. 138-148 [doi]
- GeoCol: A Geo-distributed Cloud Storage System with Low Cost and Latency using Reinforcement LearningHaoyu Wang, Haiying Shen, Zijian Li, Shuhao Tian. 149-159 [doi]
- GreenHetero: Adaptive Power Allocation for Heterogeneous Green DatacentersHaoran Cai, Qiang Cao, Hong Jiang 0001, Qiang Wang. 160-170 [doi]
- Haechi: A Token-based QoS Mechanism for One-sided I/Os in RDMA based Storage SystemQingyue Liu, Peter J. Varman. 171-182 [doi]
- A Truthful Procurement Auction for Incentivizing Heterogeneous Clients in Federated LearningRuiting Zhou, Jinlong Pang, Zhibo Wang, John C. S. Lui, Zongpeng Li. 183-193 [doi]
- Defuse: A Dependency-Guided Function Scheduler to Mitigate Cold Starts on FaaS PlatformsJiacheng Shen, Tianyi Yang, Yuxin Su, Yangfan Zhou, Michael R. Lyu. 194-204 [doi]
- Strengthened Fault Tolerance in Byzantine Fault Tolerant ReplicationZhuolun Xiang, Dahlia Malkhi, Kartik Nayak, Ling Ren 0001. 205-215 [doi]
- Behind Block Explorers: Public Blockchain Measurement and Security ImplicationHwanjo Heo, Seungwon Shin. 216-226 [doi]
- EPA-Route: Routing Payment Channel Network with High Success Rate and Low Payment FeesHan Xue, Qun Huang 0001, Yungang Bao. 227-237 [doi]
- Root Cause Analyses for the Deteriorating Bitcoin Network SynchronizationMuhammad Saad, Songqing Chen, David A. Mohaisen. 239-249 [doi]
- FASTBLOCK: Accelerating Blockchains via Hardware Transactional MemoryYue Li, Han Liu 0010, Yuanliang Chen, Jianbo Gao, Zhenhao Wu, Zhi Guan, Zhong Chen 0001. 250-260 [doi]
- LDSP: Shopping with Cryptocurrency Privately and Quickly under LeadershipLucien K. L. Ng, Sherman S. M. Chow, Donald P. H. Wong, Anna P. Y. Woo. 261-271 [doi]
- Online Routing and Scheduling for Time-Sensitive NetworksYudong Huang, Shuo Wang, Tao Huang 0005, Binwei Wu, Yunxiang Wu, Yunjie Liu 0001. 272-281 [doi]
- MSS: Lightweight network authentication for resource constrained devices via Mergeable Stateful SignaturesAbdulrahman Bin Rabiah, Yugarshi Shashwat, Fatemah Alharbi, Silas Richelson, Nael B. Abu-Ghazaleh. 282-292 [doi]
- Dimmer: Self-Adaptive Network-Wide Flooding with Reinforcement LearningValentin Poirot, Olaf Landsiedel. 293-303 [doi]
- BiCord: Bidirectional Coordination among Coexisting Wireless DevicesZihao Yu, Pengyu Li, Carlo Alberto Boano, Yuan He 0004, Meng Jin 0002, Xiuzhen Guo, Xiaolong Zheng 0002. 304-314 [doi]
- MAD for FANETs: Movement Assisted Delivery for Flying Ad-hoc NetworksNovella Bartolini, Andrea Coletta, Andrea Gennaro, Gaia Maselli, Matteo Prata. 315-325 [doi]
- An Efficient Message Dissemination Scheme for Cooperative Drivings via Multi-Agent Hierarchical Attention Reinforcement LearningBingyi Liu, Weizhen Han, Enshu Wang, Xin Ma, Shengwu Xiong, Chunming Qiao, Jianping Wang 0001. 326-336 [doi]
- When Delta Sync Meets Message-Locked Encryption: a Feature-based Delta Sync Scheme for Encrypted Cloud StorageSuzhen Wu, Zhanhong Tu, Zuocheng Wang, Zhirong Shen, Bo Mao. 337-347 [doi]
- A Two-Stage Heavy Hitter Detection System Based on CPU Spikes at Cloud-Scale GatewaysJianyuan Lu, Tian Pan 0001, Shan He, Mao Miao, Guangzhe Zhou, Yining Qi, Biao Lyu, Shunmin Zhu. 348-358 [doi]
- A Multi-Tenant Framework for Cloud Container ServicesChao Zheng, Qinghui Zhuang, Fei Guo. 359-369 [doi]
- Everyone in SDN Contributes: Fault Localization via Well-Designed RulesZhijun Hu, Libing Wu, Jianxin Li, Chao Ma 0008, Xiaochuan Shi. 370-380 [doi]
- FlashFlow: A Secure Speed Test for TorMatthew Traudt, Rob Jansen, Aaron Johnson 0001. 381-391 [doi]
- Leaderless ConsensusKarolos Antoniadis, Antoine Desjardins, Vincent Gramoli, Rachid Guerraoui, Igor Zablotchi. 392-402 [doi]
- Polygraph: Accountable Byzantine AgreementPierre Civit, Seth Gilbert, Vincent Gramoli. 403-413 [doi]
- Cutting the Request Completion Time in Key-value Stores with Distributed Adaptive SchedulerWanchun Jiang, Haoyang Li, Yulong Yan, Fa Ji, Ming Jiang, Jianxin Wang 0001, Tong Zhang. 414-424 [doi]
- Bankrupting Sybil Despite ChurnDiksha Gupta, Jared Saia, Maxwell Young. 425-437 [doi]
- Upper and Lower Bounds for Deterministic Approximate ObjectsDanny Hendler, Adnane Khattabi, Alessia Milani, Corentin Travers. 438-448 [doi]
- Time and Communication Complexity of Leader Election in Anonymous NetworksDariusz R. Kowalski, Miguel A. Mosteiro. 449-460 [doi]
- ProgrammabilityMedic: Predictable Path Programmability Recovery under Multiple Controller Failures in SD-WANsSongshi Dou, Zehua Guo 0001, Yuanqing Xia. 461-471 [doi]
- FreeLauncher: Lossless Failure Recovery of Parameter Servers with Ultralight ReplicationYangyang Zhang, Jianxin Li, Yiming Zhang, Lijie Wang, Ling Liu. 472-482 [doi]
- StripeMerge: Efficient Wide-Stripe Generation for Large-Scale Erasure-Coded StorageQiaori Yao, Yuchong Hu, Liangfeng Cheng, Patrick P. C. Lee, Dan Feng 0001, Weichun Wang, Wei Chen. 483-493 [doi]
- Efficiently Recovering Stateful System Components of Multi-server MicrokernelsWentai Li, Jinyu Gu 0001, Nian Liu, Binyu Zang. 494-505 [doi]
- Practical Byzantine Reliable Broadcast on Partially Connected NetworksSilvia Bonomi, Jérémie Decouchant, Giovanni Farina, Vincent Rahli, Sébastien Tixeuil. 506-516 [doi]
- GDDR: GNN-based Data-Driven RoutingOliver Hope, Eiko Yoneki. 517-527 [doi]
- Sync-Switch: Hybrid Parameter Synchronization for Distributed Deep LearningShijian Li, Oren Mangoubi, Lijie Xu, Tian Guo 0001. 528-538 [doi]
- Distributed Online Service Coordination Using Deep Reinforcement LearningStefan Schneider 0008, Haydar Qarawlus, Holger Karl. 539-549 [doi]
- Accelerating Distributed K-FAC with Smart Parallelism of Computing and Communication TasksShaohuai Shi, Lin Zhang, Bo Li. 550-560 [doi]
- GRACE: A Compressed Communication Framework for Distributed Machine LearningHang Xu, Chen-Yu Ho 0001, Ahmed M. Abdelmoniem, Aritra Dutta, El Houcine Bergou, Konstantinos Karatsenidis, Marco Canini, Panos Kalnis. 561-572 [doi]
- Complexity-aware Adaptive Training and Inference for Edge-Cloud Distributed AI SystemsYinghan Long, Indranil Chakraborty, Gopalakrishnan Srinivasan, Kaushik Roy 0001. 573-583 [doi]
- A Game-Theoretic Analysis of Cross-Chain Atomic Swaps with HTLCsJiahua Xu, Damien Ackerer, Alevtina Dubovitskaya. 584-594 [doi]
- Dissecting the Performance of Chained-BFTFangyu Gai, Ali Farahbakhsh, Jianyu Niu, Chen Feng 0001, Ivan Beschastnikh, Hao Duan. 595-606 [doi]
- Blockumulus: A Scalable Framework for Smart Contracts on the CloudNikolay Ivanov, Qiben Yan, Qingyang Wang. 607-617 [doi]
- Occam: A Secure and Adaptive Scaling Scheme for Permissionless BlockchainJie Xu, Yingying Cheng, Cong Wang, Xiaohua Jia. 618-628 [doi]
- MVCom: Scheduling Most Valuable Committees for the Large-Scale Sharded BlockchainHuawei Huang, Zhenyi Huang, Xiaowen Peng, Zibin Zheng, Song Guo 0001. 629-639 [doi]
- On the Synchronization Power of Token Smart ContractsOrestis Alpos, Christian Cachin, Giorgia Azzurra Marson, Luca Zanolini. 640-651 [doi]
- Recognizing 3D Orientation of a Two-RFID-Tag Labeled Object in Multipath Environments Using Deep Transfer LearningZhongqin Wang, Min Xu, Fu Xiao. 652-662 [doi]
- Joint Order Dispatch and Repositioning for Urban Vehicle Sharing Systems via Robust OptimizationYiran Zhao, Guiyun Fan, Haiming Jin, Wenze Ma, Baoxiang He, Xinbing Wang. 663-673 [doi]
- MandiPass: Secure and Usable User Authentication via Earphone IMUJianwei Liu, Wenfan Song, Leming Shen, Jinsong Han, Xian Xu, Kui Ren 0001. 674-684 [doi]
- Cooperative Charging as Service: Scheduling for Mobile Wireless Rechargeable Sensor NetworksJia Xu 0003, Suyi Hu, Sixu Wu, Kaijun Zhou, Haipeng Dai, Lijie Xu. 685-695 [doi]
- MinSum Movement of Barrier and Target Coverage using Sink-based Mobile Sensors on the PlaneLongkun Guo, Wenjie Zou, Chenchen wu, Dachuan Xu, Ding-Zhu Du. 696-706 [doi]
- Heterogeneous Spatio-Temporal Graph Convolution Network for Traffic Forecasting with Missing ValuesWeida Zhong, Qiuling Suo, Xiaowei Jia, Aidong Zhang, Lu Su. 707-717 [doi]
- CAD3: Edge-facilitated Real-time Collaborative Abnormal Driving Distributed DetectionAhmad Alhilal, Tristan Braud, Xiang Su, Luay Al Asadi, Pan Hui 0001. 718-728 [doi]
- Enabling Low Latency Edge Intelligence based on Multi-exit DNNs in the WildZhaowu Huang, Fang Dong 0001, Dian Shen, Junxue Zhang, Huitian Wang, Guangxing Cai, Qiang He. 729-739 [doi]
- Proactive Deployment of Chain-based VNF Backup at the Edge using Online Bandit LearningChen Wang, Qin Hu, Dongxiao Yu, Xiuzhen Cheng. 740-750 [doi]
- Privacy-Preserving Neural Network Inference Framework via Homomorphic Encryption and SGXHuizi Xiao, Qingyang Zhang, Qingqi Pei, Weisong Shi. 751-761 [doi]
- Statistical Tail-Latency Bounded QoS Provisioning for Parallel and Distributed Data CentersXi Zhang, Qixuan Zhu. 762-772 [doi]
- ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol ImplementationsImtiaz Karim, Syed Rafiul Hussain, Elisa Bertino. 773-785 [doi]
- A Suspicion-Free Black-box Adversarial Attack for Deep Driving Maneuver Classification ModelsAnkur Sarker, Haiying Shen, Tanmoy Sen. 786-796 [doi]
- Gradient-Leakage Resilient Federated LearningWenqi Wei, Ling Liu 0001, Yanzhao Wu, Gong Su, Arun Iyengar. 797-807 [doi]
- Practical Location Privacy Attacks and Defense on Point-of-interest AggregatesWei Tong, Chang Xia, Jingyu Hua, Qun Li, Sheng Zhong. 808-818 [doi]
- On Private Data Collection of Hyperledger FabricShan Wang, Ming Yang 0001, Yue Zhang, Yan Luo, Tingjian Ge, Xinwen Fu, Wei Zhao. 819-829 [doi]
- Federated Model Search via Reinforcement LearningDixi Yao, Lingdong Wang, Jiayu Xu, Liyao Xiang, Shuo Shao, Yingqi Chen, Yanjun Tong. 830-840 [doi]
- Harmony: A Scheduling Framework Optimized for Multiple Distributed Machine Learning JobsWoo-Yeon Lee, Yunseong Lee, Won Wook Song, Youngseok Yang, Jooyeon Kim, Byung-Gon Chun. 841-851 [doi]
- BaFFLe: Backdoor Detection via Feedback-based Federated LearningSébastien Andreina, Giorgia Azzurra Marson, Helen Möllering, Ghassan Karame. 852-863 [doi]
- QMA: A Resource-efficient, Q-learning-based Multiple Access Scheme for the IIoTFlorian Meyer, Volker Turau. 864-874 [doi]
- Preserving Privacy in Personalized Models for Distributed Mobile ServicesAkanksha Atrey, Prashant J. Shenoy, David D. Jensen. 875-886 [doi]
- FastUp: Fast TCAM Update for SDN Switches in Datacenter NetworksYing Wan, Haoyu Song 0001, Hao Che, Yang Xu 0010, Yi Wang 0004, Chuwen Zhang, Zhijun Wang, Tian Pan 0001, Hao Li 0011, Hong Jiang, Chengchen Hu, Bin Liu 0001. 887-897 [doi]
- INT-probe: Lightweight In-band Network-Wide Telemetry with Stationary ProbesTian Pan 0001, Xingchen Lin, Haoyu Song 0001, Enge Song, Zizheng Bian, Hao Li 0011, Jiao Zhang 0002, Fuliang Li, Tao Huang 0005, Chenhao Jia, Bin Liu 0001. 898-909 [doi]
- SRUF: Low-Latency Path Routing with SRv6 Underlay Federation in Wide Area NetworkBangbang Ren, Deke Guo, Guoming Tang, Weijun Wang, Lailong Luo, Xiaoming Fu 0001. 910-920 [doi]
- Mitigating Port Starvation for Shallow-buffered Switches in Datacenter NetworksWenjun Lyu, Jiawei Huang, Jingling Liu, Zhaoyi Li, Shaojun Zou, Weihe Li, Jianxin Wang 0001, Desheng Zhang. 921-931 [doi]
- GTCP: Hybrid Congestion Control for Cross-Datacenter NetworksShaojun Zou, Jiawei Huang, Jingling Liu, Tao Zhang 0019, Ning Jiang, Jianxin Wang 0001. 932-942 [doi]
- TCP BBR in Cloud Networks: Challenges, Analysis, and SolutionsPhuong Ha, Minh Vu, Tuan Anh Le, Lisong Xu. 943-953 [doi]
- Game of CoinsAlexander Spiegelman, Idit Keidat, Moshe Tennenholtz. 954-964 [doi]
- Infinite Balanced Allocation via Finite CapacitiesPetra Berenbrink, Tom Friedetzky, Christopher Hahn, Lukas Hintze, Dominik Kaaser, Peter Kling, Lars Nagel 0001. 965-975 [doi]
- Expansion and Flooding in Dynamic Random Networks with Node ChurnLuca Becchetti, Andrea E. F. Clementi, Francesco Pasquale, Luca Trevisan, Isabella Ziccardi. 976-986 [doi]
- Black Hole Search in Dynamic RingsGiuseppe Antonio Di Luna, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro. 987-997 [doi]
- Exploiting Locality in Scalable Ordered MapsMatthew Rodriguez, Ahmed Hassan, Michael F. Spear. 998-1008 [doi]
- Deterministic Contention Resolution without Collision Detection: Throughput vs EnergyGianluca De Marco, Dariusz R. Kowalski, Grzegorz Stachowiak. 1009-1019 [doi]
- Evidence in Hand: Passive Vibration Response-based Continuous User AuthenticationHangcheng Cao, Hongbo Jiang 0001, Daibo Liu, Jie Xiong 0001. 1020-1030 [doi]
- PupilMeter: Modeling User Preference with Time-Series Features of Pupillary ResponseHongbo Jiang 0001, Xiangyu Shen, Daibo Liu. 1031-1041 [doi]
- Hand-Key: Leveraging Multiple Hand Biometrics for Attack-Resilient User Authentication Using COTS RFIDJianwei Liu, Xiang Zou, Feng Lin 0004, Jinsong Han, Xian Xu, Kui Ren 0001. 1042-1052 [doi]
- RF-Prism: Versatile RFID-based Sensing through Phase DisentanglingSongzhen Yang, Meng Jin 0002, Yuan He 0004, Yunhao Liu. 1053-1063 [doi]
- Online Learning Algorithms for Offloading Augmented Reality Requests with Uncertain Demands in MECsZichuan Xu, Dongqi Liu, Weifa Liang, Wenzheng Xu, Haipeng Dai, Qiufen Xia, Pan Zhou. 1064-1074 [doi]
- A Practical Side-Channel Based Intrusion Detection System for Additive Manufacturing SystemsSizhuang Liang, Xirui Peng, H. Jerry Qi, Saman A. Zonouz, Raheem Beyah. 1075-1087 [doi]
- Demo: Software-defined Virtual Networking Across Multiple Edge and Cloud Providers with EdgeVPN.ioRenato Figueiredo, Kensworth Subratie. 1088-1090 [doi]
- Demo: Application Monitoring as a Network ServiceMona Elsaadawy, Laetitia Fesselier, Bettina Kemme. 1091-1094 [doi]
- Demo: Disaggregated DataplanesHeena Nagda, Rakesh Nagda, Nik Sultana, Boon Thau Loo. 1095-1097 [doi]
- Demo: Proof-of-Work Network Simulator for Blockchain and Cryptocurrency ResearchSimeon Wuthier, Sang-Yoon Chang. 1098-1101 [doi]
- Demo: Cloak: A Framework For Development of Confidential Blockchain Smart ContractsQian Ren, Han Liu 0010, Yue Li, Hong Lei. 1102-1105 [doi]
- Demo: BubbleNet: Towards developing an IoT-based Physically Distant Classroom For Personal BubblesBrandon Purvis, Dheryta Jaisinghani, Sarah M. Diesburg, Haroon Rashid Lone. 1106-1109 [doi]
- Demo: Automatically Retrainable Self Improving Model for the Automated Classification of Software Incidents into Multiple ClassesBadal Agrawal, Mohit Mishra. 1110-1113 [doi]
- Demo: Resource Allocation for Wafer-Scale Deep Learning AcceleratorHuihong Peng, Longkun Guo, Long Sun, Xiaoyan Zhang. 1114-1115 [doi]
- Demo: Discover, Provision, and Orchestration of Machine Learning Inference Services in Heterogeneous EdgeRoberto Morabito, Mung Chiang. 1116-1119 [doi]
- Demo: A FSM Approach to Web CollaborationCristian Gadea, Bogdan Ionescu, Dan Ionescu. 1120-1121 [doi]
- Poster: Fragmentation Attacks on DNS over TCPTianxiang Dai, Haya Shulman, Michael Waidner. 1124-1125 [doi]
- Poster: A Tunable Model for Graph Generation Using LSTM and Conditional VAEShohei Nakazawa, Yoshiki Sato, Kenji Nakagawa, Sho Tsugawa, Kohei Watabe. 1126-1127 [doi]
- Poster: Function Delivery Network: Extending Serverless to Heterogeneous ComputingAnshul Jindal, Mohak Chadha, Michael Gerndt, Julian Frielinghaus, Vladimir Podolskiy, Pengfei Chen. 1128-1129 [doi]
- Poster: Adaptive Video Offloading in Mobile Edge ComputingWeibin Ma, Lena Mashayekhy. 1130-1131 [doi]
- Poster: Quadratic-Time Algorithms for Optimal Min-Max Barrier Coverage with Mobile Sensors on the PlanePei-yao, Longkun Guo, Jiguo Yu. 1132-1133 [doi]
- Poster: An Efficient Permissioned Blockchain with Provable Reputation MechanismHongyin Chen, Zhaohua Chen, Yukun Cheng, Xiaotie Deng, Wenhan Huang, Jichen Li, Hongyi Ling, Mengqian Zhang. 1134-1135 [doi]
- Poster: Learning Index on Content-based Pub/SubCheng Lin, Qinpei Zhao, Weixiong Rao. 1136-1137 [doi]
- Poster: Approximate Caching for Mobile Image RecognitionJames Mariani, Yongqi Han, Li Xiao. 1138-1139 [doi]
- Poster: Multi-agent Combinatorial Bandits with Moving ArmsZhiming Huang 0002, Bingshan Hu, Jianping Pan 0001. 1140-1141 [doi]
- Poster: WallGuard - A Deep Learning Approach for Avoiding Regrettable Posts in Social MediaHaya Shulman, Hervais Simo. 1142-1143 [doi]
- Poster: Privacy Preserving Divisible Double Auction with A Hybridized TEE-Blockchain SystemBingyu Liu, Yuanzhou Yang, Rujia Wang, Yuan Hong. 1144-1145 [doi]
- A Refined Dijkstra's Algorithm with Stable Route Generation for Topology-Varying Satellite NetworksZhengjie Luo, Tian Pan 0001, Enge Song, Houtian Wang, Wenhao Xue, Tao Huang 0005, Yunjie Liu 0001. 1146-1147 [doi]