Abstract is missing.
- Supporting Real-time Networkwide T-Queries in High-speed NetworksYuanda Wang, Haibo Wang 0004, Chaoyi Ma, Shigang Chen. 1-11 [doi]
- ADA: Arithmetic Operations with Adaptive TCAM Population in Programmable SwitchesMojtaba MalekpourShahraki, Brent E. Stephens, Balajee Vamanan. 1-11 [doi]
- Byzantine-Resilient Counting in NetworksSoumyottam Chatterjee, Gopal Pandurangan, Peter Robinson 0002. 12-22 [doi]
- Distributed Runtime Verification of Metric Temporal Properties for Cross-Chain ProtocolsRitam Ganguly, Yingjie Xue, Aaron Jonckheere, Parker Ljung, Benjamin Schornstein, Borzoo Bonakdarpour, Maurice Herlihy. 23-33 [doi]
- Crime and Punishment in Distributed Byzantine Decision TasksPierre Civit, Seth Gilbert, Vincent Gramoli, Rachid Guerraoui, Jovan Komatovic, Zarko Milosevic 0001, Adi Seredinschi. 34-44 [doi]
- Segmented Entanglement Establishment for Throughput Maximization in Quantum NetworksGongming Zhao, Jingzhou Wang, Yangming Zhao, Hongli Xu, Chunming Qiao. 45-55 [doi]
- Joint Caching and Routing in Cache Networks with Arbitrary TopologyTian Xie, Sanchal Thakkar, Ting He 0001, Patrick D. McDaniel, Quinn Burke 0002. 56-66 [doi]
- Deterministic Self-Adjusting Tree Networks Using Rotor WalksChen Avin, Marcin Bienkowski, Iosif Salem, Robert Sama, Stefan Schmid 0001, Pawel Schmidt. 67-77 [doi]
- On the Optimality of the Greedy Garbage Collection Strategy for SSDsErnst Althaus, Petra Berenbrink, André Brinkmann, Rebecca Steiner. 78-88 [doi]
- Distributed Reconstruction of Noisy Pooled DataMax Hahn-Klimroth, Dominik Kaaser. 89-99 [doi]
- Scube: Efficient Summarization for Skewed Graph StreamsMing Chen, Renxiang Zhou, Hanhua Chen, Hai Jin 0001. 100-110 [doi]
- EndGraph: An Efficient Distributed Graph Preprocessing SystemTianfeng Liu, Dan Li. 111-121 [doi]
- Cymo: A Storage Model with Query-Aware Indexing for Spatio-Temporal Big DataYang Guo, Zili Shao. 122-132 [doi]
- Jenga: Orchestrating Smart Contracts in Sharding-Based Blockchain for Efficient ProcessingMingzhe Li, You Li 0004, Jin Zhang, Wei Wang. 133-143 [doi]
- Amanuensis: provenance, privacy, and permission in TEE-enabled blockchain data systemsTaylor Hardin, David Kotz. 144-156 [doi]
- Leopard: Towards High Throughput-Preserving BFT for Large-scale SystemsKexin Hu, Kaiwen Guo, Qiang Tang 0005, Zhenfeng Zhang, Hao Cheng, Zhiyang Zhao. 157-167 [doi]
- FileInsurer: A Scalable and Reliable Protocol for Decentralized File Storage in BlockchainHongyin Chen, Yuxuan Lu, Yukun Cheng. 168-179 [doi]
- Funding Public Goods with Expert Advice in Blockchain SystemJichen Li, Yukun Cheng, Wenhan Huang, Mengqian Zhang, Jiarui Fan, Xiaotie Deng, Jan Xie. 180-190 [doi]
- The Security Investigation of Ban Score and Misbehavior Tracking in Bitcoin NetworkWenjun Fan, Simeon Wuthier, Hsiang-Jen Hong, Xiaobo Zhou 0002, Yan Bai, Sang-Yoon Chang. 191-201 [doi]
- Self-Sovereign Digital Agents for a Grassroots Digital SocietyOuri Poupko, Ehud Shapiro, Nimrod Talmon. 202-212 [doi]
- ITF: A Blockchain System with Incentivized Transaction ForwardingJiarui Zhang, Yaodong Huang. 213-223 [doi]
- : A Traceable and Privacy-Preserving Data Exchange Scheme based on Non-Fungible Token and Zero-KnowledgeRui Song, Shang Gao 0006, Yubo Song, Bin Xiao 0001. 224-234 [doi]
- Themis: An Equal, Unpredictable, and Scalable Consensus for Consortium BlockchainLinpeng Jia, Keyuan Wang, Xin Wang, Lei Yu, Zhongcheng Li, Yi Sun. 235-245 [doi]
- Efficient Asynchronous Byzantine Agreement without Private SetupsYingzi Gao, Yuan Lu 0001, Zhenliang Lu, Qiang Tang 0005, Jing Xu 0002, Zhenfeng Zhang. 246-257 [doi]
- Blockchain Machine: A Network-Attached Hardware Accelerator for Hyperledger FabricHaris Javaid, Ji Yang, Nathania Santoso, Mohit Upadhyay, Sundararajarao Mohan, Chengchen Hu, Gordon J. Brebner. 258-268 [doi]
- Nezha: Exploiting Concurrency for Transaction Processing in DAG-based BlockchainsJiang Xiao, Shijie Zhang, Zhiwei Zhang, Bo Li, Xiaohai Dai, Hai Jin 0001. 269-279 [doi]
- MoNet: A Fast Payment Channel Network for Scriptless Cryptocurrency MoneroZhimei Sui, Joseph K. Liu, Jiangshan Yu, Xianrui Qin. 280-290 [doi]
- ERA: Meeting the Fairness between Sender-driven and Receiver-driven Transmission Protocols in Data Center NetworksSen Liu, Furong Liang, Wei Yan, Zehua Guo 0001, Xiang Lin, Yang Xu 0010. 291-301 [doi]
- Supporting Massive DLRM Inference through Software Defined MemoryEhsan K. Ardestani, Changkyu Kim, Seung Jae Lee, Luoshang Pan, Jens Axboe, Valmiki Rampersad, Banit Agrawal, Fuxun Yu, Ansha Yu, Trung Le, Hector Yuen, Dheevatsa Mudigere, Shishir Juluri, Akshat Nanda, Manoj Wodekar, Krishnakumar Nair, Maxim Naumov, Chris Petersen, Mikhail Smelyanskiy, Vijay Rao. 302-312 [doi]
- Escra: Event-driven, Sub-second Container Resource AllocationGreg Cusack, Maziyar Nazari, Sepideh Goodarzy, Erika Hunhoff, Prerit Oberai, Eric Keller, Eric Rozner, Richard Han. 313-324 [doi]
- Performance Optimization of Machine Learning Inference under Latency and Server Power ConstraintsGuoyu Chen, Xiaorui Wang. 325-335 [doi]
- Prism: Streamlined Packet Processing for Containers with Flow PrioritizationManish Munikar, Jiaxin Lei, Hui Lu 0001, Jia Rao. 336-346 [doi]
- FlowValve: Packet Scheduling Offloaded on NP-based SmartNICsShaoke Xi, Fuliang Li, Xingwei Wang 0001. 347-358 [doi]
- Stabilizer: Geo-Replication with User-defined ConsistencyPengze Li, Lichen Pan, Xinzhe Yang, Weijia Song, Zhen Xiao, Ken Birman. 359-369 [doi]
- Toward Low-Overhead Inter-Switch Coordination in Network-Wide Data Plane Program DeploymentXiang Chen, Hongyan Liu, Qingjiang Xiao, Kaiwei Guo, Tingxin Sun, Xiang Ling 0001, Xuan Liu, Qun Huang 0001, Dong Zhang, Haifeng Zhou, Fan Zhang, Chunming Wu 0001. 370-380 [doi]
- Lightweight Privacy-Preserving Spatial Keyword Query over Encrypted Cloud DataYutao Yang, Yinbin Miao, Kim-Kwang Raymond Choo, Robert H. Deng. 392-402 [doi]
- Towards Elasticity in Heterogeneous Edge-dense EnvironmentsLei Huang, Zhiying Liang, Nikhil Sreekumar, Sumanth Kaushik 0001, Abhishek Chandra, Jon B. Weissman. 403-413 [doi]
- To Turn or Not To Turn, SafeCross is the AnswerBaofu Wu, Yuankai He, Zheng Dong 0002, Jian Wan 0001, Jilin Zhang, Weisong Shi. 414-424 [doi]
- Distributed and Decentralized Edge Caching in 5G Networks Using Non-Volatile Memory SystemsYiming Zeng, Yaodong Huang, Zhenhua Liu 0002, Ji Liu 0001. 425-435 [doi]
- Multi-granularity Weighted Federated Learning in Heterogeneous Mobile Edge Computing SystemsShangxuan Cai, Yunfeng Zhao, Zhicheng Liu, Chao Qiu, Xiaofei Wang 0001, Qinghua Hu. 436-446 [doi]
- Mobility-aware Seamless Virtual Function Migration in Deviceless Edge Computing EnvironmentsYaodong Huang, Zelin Lin, Tingting Yao, Xiaojun Shang, Laizhong Cui, Joshua Zhexue Huang. 447-457 [doi]
- ENIGMA: Low-Latency and Privacy-Preserving Edge Inference on Heterogeneous Neural Network AcceleratorsQiushi Li, Ju Ren, Xinglin Pan, Yuezhi Zhou, Yaoxue Zhang. 458-469 [doi]
- Thwarting Longitudinal Location Exposure Attacks in Advertising Ecosystem via Edge ComputingLe Yu, Shufan Zhang, Lu Zhou, Yan Meng, Suguo Du, Haojin Zhu. 470-480 [doi]
- LoADPart: Load-Aware Dynamic Partition of Deep Neural Networks for Edge OffloadingHongzhou Liu, Wenli Zheng, Li Li 0064, Minyi Guo. 481-491 [doi]
- Curb: Trusted and Scalable Software-Defined Network Control Plane for Edge ComputingMinghui Xu 0001, Chenxu Wang, Yifei Zou, Dongxiao Yu, Xiuzhen Cheng 0001, Weifeng Lyu. 492-502 [doi]
- Multi-View Scheduling of Onboard Live Video Analytics to Minimize Frame Processing LatencyShengzhong Liu, Tianshi Wang, Hongpeng Guo, Xinzhe Fu, Philip David, Maggie B. Wigness, Archan Misra, Tarek F. Abdelzaher. 503-514 [doi]
- D3: Lightweight Secure Fault Localization in Edge CloudSongtao Fu, Qi Li 0002, Xiaoliang Wang, Su Yao, Xuewei Feng, Ziqiang Wang, Xinle Du, Kao Wan, Ke Xu 0002. 515-525 [doi]
- A Game Theoretical Balancing Approach for Offloaded Tasks in Edge DatacentersHongli Lu, Guangping Xu, Chi Wan Sung, Salwa Mostafa, Yulei Wu. 526-536 [doi]
- Edge Assisted Real-time Instance Segmentation on Mobile DevicesJialin Zhang, Xiang Huang, Jingao Xu, Yue Wu, Qiang Ma 0007, Xin Miao, Li Zhang, Pengpeng Chen, Zheng Yang 0002. 537-547 [doi]
- AdaDrone: Quality of Navigation Based Neural Adaptive Scheduling for Edge-Assisted DronesHaowei Chen, Liekang Zeng, Xiaoxi Zhang, Xu Chen. 548-558 [doi]
- Query Recombination: To Process a Large Number of Concurrent Top-k Queries towards IoT Data on an Edge ServerTuo Shi, Zhipeng Cai 0001, Yingshu Li. 559-569 [doi]
- ContextFL: Context-aware Federated Learning by Estimating the Training and Reporting Phases of Mobile ClientsHuawei Huang, Ruixin Li, Jialiang Liu, Sicong Zhou, Kangying Lin, Zibin Zheng. 570-580 [doi]
- Distributed Training for Deep Learning Models On An Edge Computing Network Using Shielded Reinforcement LearningTanmoy Sen, Haiying Shen. 581-591 [doi]
- BloomBox: Improving Availability and Efficiency in Geographic Hash TablesXinwen Wang, Robbert van Renesse. 592-602 [doi]
- RAPTEE: Leveraging trusted execution environments for Byzantine-tolerant peer sampling servicesMatthieu Pigaglio, Joachim Bruneau-Queyreix, Yérom-David Bromberg, Davide Frey, Etienne Rivière, Laurent Réveillère. 603-613 [doi]
- PivotRepair: Fast Pipelined Repair for Erasure-Coded Hot StorageQiaori Yao, Yuchong Hu, Xinyuan Tu, Patrick P. C. Lee, Dan Feng 0001, Xia Zhu, Xiaoyang Zhang, Zhen Yao, Wenjia Wei. 614-624 [doi]
- ESCAPE to Precaution against Leader FailuresGengrui Zhang, Hans-Arno Jacobsen. 625-635 [doi]
- Optimizing Near-Data Processing for SparkSri Pramodh Rachuri, Arun Gantasala, Prajeeth Emanuel, Anshul Gandhi, Robert Foley, Peter Puhov, Theodoros Gkountouvas, Hui Lei. 636-646 [doi]
- Dissecting the Workload of Cloud Storage SystemYaodanjun Ren, Xiaoyi Sun, Kaishi Li, Jiale Lin, Shuzhi Feng, Zhenyu Ren, Jian Yin 0023, Zhengwei Qi. 647-657 [doi]
- Monitoring Data Requests in Decentralized Data Storage Systems: A Case Study of IPFSLeonhard Balduf, Sebastian A. Henningsen, Martin Florian, Sebastian Rust, Björn Scheuermann 0001. 658-668 [doi]
- A Digital-Twin Based Architecture for Software Longevity in Smart HomesPeter Zdankin, Marco Picone, Marco Mamei, Torben Weis. 669-679 [doi]
- Defending against Thru-barrier Stealthy Voice Attacks via Cross-Domain Sensing on Phoneme SoundsCong Shi 0004, Tianming Zhao 0001, Wenjin Zhang, Ahmed Tanvir Mahdad, Zhengkun Ye, Yan Wang 0003, Nitesh Saxena, Yingying Chen 0001. 680-690 [doi]
- E-TSN: Enabling Event-triggered Critical Traffic in Time-Sensitive Networking for Industrial ApplicationsYi Zhao, Zheng Yang 0002, Xiaowu He, Jiahang Wu, Hao Cao, Liang Dong, Fan Dang 0001, Yunhao Liu. 691-701 [doi]
- Defending against Cross-Technology Jamming in Heterogeneous IoT SystemsSihan Yu, ChunChih Lin, Xiaonan Zhang, Linke Guo. 702-712 [doi]
- AoI Minimization Charging at Wireless-Powered Network EdgeQuan Chen 0003, Song Guo, Wenchao Xu, Zhipeng Cai 0001, Lianglun Cheng, Hong Gao 0001. 713-723 [doi]
- Are You Really Charging Me?Chi Lin, Ziwei Yang 0004, Jiankang Ren, Lei Wang 0005, Wei Zhong, Guowei Wu, Qiang Zhang 0008. 724-734 [doi]
- mmV2V: Combating One-hop Multicasting in Millimeter-wave Vehicular NetworksJiangang Shen, Hongzi Zhu, Yunxiang Cai, Bangzhao Zhai, Xudong Wang 0001, Shan Chang, Haibin Cai, Minyi Guo. 735-742 [doi]
- CODE: Compact IoT Data Collection with Precise Matrix Sampling and Efficient InferenceHuali Lu, Feng Lyu 0001, Ju Ren, Jiadi Yu, Fan Wu 0014, Yaoxue Zhang, Xuemin Sherman Shen. 743-753 [doi]
- SledZig: Boosting Cross-Technology Coexistence for Low-Power Wireless DevicesJunmei Yao, Haolang Huang, Ruitao Xie, Xiaolong Zheng, Kaishun Wu. 754-764 [doi]
- Precise Wireless Charging in Complicated EnvironmentsWei Yang, Chi Lin, Haipeng Dai, Jiankang Ren, Pengfei Wang, Lei Wang 0005, Guowei Wu, Qiang Zhang 0008. 765-775 [doi]
- ActListener: Imperceptible Activity Surveillance by Pervasive Wireless InfrastructuresLi Lu 0008, Zhongjie Ba, Feng Lin 0004, Jinsong Han, Kui Ren 0001. 776-786 [doi]
- Vehicle-Key: A Secret Key Establishment Scheme for LoRa-enabled IoV CommunicationsHuanqi Yang, Hongbo Liu, Chengwen Luo 0001, Yuezhong Wu, Wei Li, Albert Y. Zomaya, Linqi Song, Weitao Xu. 787-797 [doi]
- Pinpoint Achilles' Heel in RFID Localization: Phase Calibration of RFID Antenna based on Linear Localization ModelYanling Bu, Lei Xie 0004, Jia Liu 0008, Chuyu Wang, Ge Wang 0001, Zenglong Wang, Sanglu Lu. 798-808 [doi]
- Aligning before Aggregating: Enabling Cross-domain Federated Learning via Consistent Feature ExtractionGuogang Zhu, Xuefeng Liu 0001, ShaoJie Tang, Jianwei Niu 0002. 809-819 [doi]
- Toward Cleansing Backdoored Neural Networks in Federated LearningChen Wu, Xian Yang, Sencun Zhu, Prasenjit Mitra. 820-830 [doi]
- BikeCAP: Deep Spatial-temporal Capsule Network for Multi-step Bike Demand PredictionShuxin Zhong, Wenjun Lyu, Desheng Zhang, Yu Yang 0010. 831-841 [doi]
- Distributionally Robust Federated Learning for Differentially Private DataSiping Shi, Chuang Hu, Dan Wang 0002, Yifei Zhu, Zhu Han 0001. 842-852 [doi]
- AIACC-Training: Optimizing Distributed Deep Learning Training through Multi-streamed and Concurrent Gradient CommunicationsLixiang Lin, Shenghao Qiu, Ziqi Yu, Liang You, Long Xin, Xiaoyang Sun, Jie Xu 0007, Zheng Wang. 853-863 [doi]
- Lagrange Coded Federated Learning (L-CoFL) Model for Internet of VehiclesWeiquan Ni, Shaoliang Zhu, Md. Monjurul Karim, Alia Asheralieva, Jiawen Kang, Zehui Xiong, Carsten Maple. 864-872 [doi]
- KAFL: Achieving High Training Efficiency for Fast-K Asynchronous Federated LearningXueyu Wu, Cho-Li Wang. 873-883 [doi]
- Hierarchical Reinforcement Learning with Opponent Modeling for Distributed Multi-agent CooperationZhixuan Liang, Jiannong Cao 0001, Shan Jiang 0005, Divya Saxena, Huafeng Xu. 884-894 [doi]
- Sustainable Federated Learning with Long-term Online VCG Auction MechanismLeijie Wu, Song Guo 0001, Yi Liu 0057, Zicong Hong, Yufeng Zhan, Wenchao Xu. 895-905 [doi]
- Sectum: Accurate Latency Prediction for TEE-hosted Deep Learning InferenceYan Li, Junming Ma, Donggang Cao, Hong Mei. 906-916 [doi]
- Neurotrie: Deep Reinforcement Learning-based Fast Software IPv6 LookupHao Chen, Yuan Yang 0001, Mingwei Xu, Yuxuan Zhang, Chenyi Liu. 917-927 [doi]
- FedZKT: Zero-Shot Knowledge Transfer towards Resource-Constrained Federated Learning with Heterogeneous On-Device ModelsLan Zhang 0005, Dapeng Wu 0001, Xiaoyong Yuan. 928-938 [doi]
- Energy Minimization for Federated Asynchronous Learning on Battery-Powered Mobile Devices via Application Co-runningCong Wang 0006, Bin Hu, Hongyi Wu. 939-949 [doi]
- IoDSCF: A Store-Carry-Forward Routing Protocol for joint Bus Networks and Internet of DronesLailla M. Siqueira Bine, Azzedine Boukerche, Linnyer Beatrys Ruiz, Antonio A. F. Loureiro. 950-960 [doi]
- Persival: Simulating Complex 3D Meshes on Resource-Constrained Mobile AR Devices Using InterpolationJohannes Kässinger, David Rosin, Frank Dürr, Niklas Hornischer, Oliver Röhrle, Kurt Rothermel. 961-971 [doi]
- A Novel Distributed Task Scheduling Framework for Supporting Vehicular Edge IntelligenceKun Yang, Peng Sun 0007, Jieyu Lin, Azzedine Boukerche, Liang Song. 972-982 [doi]
- Joint Beamforming and Trajectory Optimizations for Statistical Delay and Error-Rate Bounded QoS Over MIMO-UAV/IRS-Based 6G Mobile Edge Computing Networks Using FBCXi Zhang, Jingqing Wang, H. Vincent Poor. 983-993 [doi]
- Energy-Efficient and QoE-Aware 360-Degree Video Streaming on Mobile DevicesXianda Chen, Guohong Cao. 994-1004 [doi]
- Joint Optimization of Energy Consumption and Completion Time in Federated LearningXinyu Zhou, Jun Zhao, Huimei Han, Claude Guet. 1005-1017 [doi]
- Enhancing Quality of Experience for Collaborative Virtual Reality with Commodity Mobile DevicesJiangong Chen, Feng Qian 0001, Bin Li. 1018-1028 [doi]
- HARP: Hierarchical Resource Partitioning in Dynamic Industrial Wireless NetworksJiachen Wang, Tianyu Zhang, Dawei Shen, Xiaobo Sharon Hu, Song Han 0002. 1029-1039 [doi]
- BlinkRadar: Non-Intrusive Driver Eye-Blink Detection with UWB RadarJingyang Hu, Hongbo Jiang 0001, Daibo Liu, Zhu Xiao, Schahram Dustdar, Jiangchuan Liu, Geyong Min. 1040-1050 [doi]
- GRAFICS: Graph Embedding-based Floor Identification Using Crowdsourced RF SignalsWeipeng Zhuo, Ziqi Zhao, Ka Ho Chiu, Shiju Li, Sangtae Ha, Chul-Ho Lee, S.-H. Gary Chan. 1051-1061 [doi]
- DeepCSI: Rethinking Wi-Fi Radio Fingerprinting Through MU-MIMO CSI Feedback Deep LearningFrancesca Meneghello, Michele Rossi, Francesco Restuccia. 1062-1072 [doi]
- Exploiting Frame Similarity for Efficient Inference on Edge DevicesZiyu Ying 0001, Shulin Zhao 0001, Haibo Zhang 0005, Cyan Subhra Mishra, Sandeepa Bhuyan, Mahmut T. Kandemir, Anand Sivasubramaniam, Chita R. Das. 1073-1084 [doi]
- Spindle: Techniques for Optimizing Atomic Multicast on RDMASagar Jha, Lorenzo Rosa, Ken Birman. 1085-1097 [doi]
- QWin: Core Allocation for Enforcing Differentiated Tail Latency SLOs at Shared Storage BackendLiuying Ma, Zhenqing Liu, Jin Xiong, Dejun Jiang 0001. 1098-1109 [doi]
- Secure Distributed Outsourcing of Large-scale Linear SystemsDa Feng, Fucai Zhou, Debiao He, Mengna Guo, Qiyu Wu 0002. 1110-1121 [doi]
- Implication of Animation on Android SecurityShan Wang 0008, Zhen Ling, Yue Zhang 0025, Ruizhao Liu, Joshua Kraunelis, Kang Jia, Bryan Pearson, Xinwen Fu. 1122-1132 [doi]
- Enhancing Cryptocurrency Blocklisting: A Secure, Trustless, and Effective RealizationYuefeng Du 0001, Anxin Zhou, Cong Wang 0001. 1133-1143 [doi]
- K-Indistinguishable Data Access for Encrypted Key-Value StoresChen Zhang, Qingyuan Xie, Yinbin Miao, Xiaohua Jia. 1144-1154 [doi]
- DELA: A Deep Ensemble Learning Approach for Cross-layer VSI-DDoS Detection on the EdgeJavad Forough, Monowar Bhuyan, Erik Elmroth. 1155-1165 [doi]
- Are You Moving as You Claim: GPS Trajectory Forgery and Detection in Location-Based ServicesHuaming Yang, Zhongzhou Xia, Jersy Shin, Jingyu Hua, Yunlong Mao, Sheng Zhong 0002. 1166-1176 [doi]
- WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZoneJämes Ménétrey, Marcelo Pasin, Pascal Felber, Valerio Schiavoni. 1177-1189 [doi]
- NWADE: A Neighborhood Watch Mechanism for Attack Detection and Evacuation in Autonomous Intersection ManagementJian Kang, Alian Yu, Wei Jiang, Dan Lin 0001. 1190-1200 [doi]
- Slicer: Verifiable, Secure and Fair Search over Encrypted Numerical Data Using BlockchainHaotian Wu 0001, Rui Song, Kai Lei, Bin Xiao 0001. 1201-1211 [doi]
- Distributed Data-Sharing Consensus in Cooperative Perception of Autonomous VehiclesChenxi Qiu, Sourabh Yadav, Anna Cinzia Squicciarini, Qing Yang 0003, Song Fu, Juanjuan Zhao, Chengzhong Xu 0001. 1212-1222 [doi]
- Byzantine-robust Federated Learning through Collaborative Malicious Gradient FilteringJian Xu, Shao-Lun Huang, Linqi Song, Tian Lan. 1223-1235 [doi]
- ScalaCert: Scalability-Oriented PKI with Redactable Consortium Blockchain Enabled "On-Cert" Certificate RevocationXinyi Luo, Zhuo Xu, Kaiping Xue, Qiantong Jiang, Ruidong Li, David S. L. Wei. 1236-1246 [doi]
- Consent Routing: Towards Bilaterally Trusted Communication PathsMathias Blarer, Jonghoon Kwon, Vincent Graf, Adrian Perrig. 1247-1257 [doi]
- Interactive Programming as an "Operating System" for Resilience in Distributed SystemsAlbert Zak. 1258-1259 [doi]
- Computational Offloading for Non-Time-Critical ApplicationsRichard Patsch. 1260-1261 [doi]
- Explainable Deep Learning Methodologies for Biomedical Images ClassificationMarcello Di Giammarco, Francesco Mercaldo, Fabio Martinelli, Antonella Santone. 1262-1264 [doi]
- Designing Robust Deep Learning Classifiers for Image-based Malware AnalysisGiacomo Iadarola, Francesco Mercaldo, Fabio Martinelli, Antonella Santone. 1265-1267 [doi]
- Performance Modeling of Weather Forecast Machine Learning for Efficient HPCKarthick Panner Selvam, Mats Brorsson. 1268-1269 [doi]
- Reinforcement Learning for Minimizing Communication Delay in Edge ComputingKolichala Rajashekar. 1270-1271 [doi]
- Interdependence Analysis and Co-optimization of Scattered Data Centers and Power SystemsYu Weng, Hung D. Nguyen. 1272-1273 [doi]
- AoI-Aware Markov Decision Policies for CachingSooHyun Park, Soyi Jung, Minseok Choi, Joongheon Kim. 1274-1275 [doi]
- Design Considerations of A Novel Distributed Key-Value Store for New StorageRuicheng Liu, Peiquan Jin, Xiaoliang Wang, Yongping Luo, Zhaole Chu. 1276-1277 [doi]
- Collaborative Load Management in Smart Home Area NetworkJagnyashini Debadarshini, Sudipta Saha. 1278-1279 [doi]
- Multi-Party Computation in IoT for Privacy-PreservationHimanshu Goyal, Sudipta Saha. 1280-1281 [doi]
- Poster: INSANE - A Uniform Middleware API for Differentiated Quality using Heterogeneous Acceleration Techniques at the Network EdgeLorenzo Rosa, Andrea Garbugli. 1282-1283 [doi]
- Poster: A Dynamic Task Scheduling using Multi-Platoon Architecture in Vehicular NetworksTingting Xiao, Chen Chen, Qingqi Pei, Shaohua Wan. 1284-1285 [doi]
- Privacy-Preserving Spam-Protected Gossip-Based RoutingSanaz Taheri-Boshrooyeh, Oskar Thorén, Barry Whitehat, Wei Jie Koh, Onur Kilic, Kobi Gurkan. 1286-1287 [doi]
- Demo: Dynamic Suppression of Selfish Node Attack Motivation in the Process of VANET CommunicationBowei Zhang, Xiaoliang Wang 0002, Ru Xie, Huazheng Zhang, Frank Jiang 0001. 1288-1291 [doi]
- Quality-Aware Real-Time Augmented Reality Visualization under Delay ConstraintsRhoan Lee, SooHyun Park, Soyi Jung, Joongheon Kim. 1292-1293 [doi]
- Towards a Monitoring System for a LoRa Mesh NetworkAlejandro Jesus Capella Del Solar, Joan Miquel Solé, Felix Freitag. 1294-1295 [doi]
- Digital Twin Assisted Computation Offloading and Service Caching in Mobile Edge ComputingZhenyu Zhang, Huan Zhou 0002, Liang Zhao, Victor C. M. Leung. 1296-1297 [doi]
- Demo: EdgeNet, a Production Internet-Scale Container-Based Distributed System TestbedBerat Can Senel, Maxime Mouchet, Justin Cappos, Timur Friedman, Olivier Fourmaux, Rick McGeer. 1298-1301 [doi]
- An Automated Framework for Distributed Deep Learning-A Tool DemoGharib Gharibi, Ravi Patel, Anissa Khan, Babak Poorebrahim Gilkalaye, Praneeth Vepakomma, Ramesh Raskar, Steve Penrod, Greg Storm, Riddhiman Das. 1302-1305 [doi]
- BP-DEBUG: A Fault Debugging and Resolution Tool for Business ProcessesMuhammad Adeel Zahid, Basit Shafiq, Shafay Shamail, Ayesha Afzal, Jaideep Vaidya. 1306-1309 [doi]
- Topology Aware Cluster Configuration for Minimizing Communication Delay in Edge ComputingKolichala Rajashekar, Souradyuti Paul, Sushanta Karmakar, Subhajit Sidhanta. 1310-1311 [doi]
- Towards Developing a Global Federated Learning Platform for IoTHamza Safri, Mohamed Mehdi Kandi, Youssef Miloudi, Christophe Bortolaso, Denis Trystram, Frédéric Desprez. 1312-1315 [doi]
- A Lightweight and Secure Vehicular Edge Computing Framework for V2X ServicesRamneek, Sangheon Pack. 1316-1317 [doi]
- Demo: FlockAI - A Framework for Rapidly Testing ML-Driven Drone ApplicationsDemetris Trihinas, Michalis Agathocleous, Karlen Avogian. 1318-1321 [doi]
- ZonedStore: A Concurrent ZNS-Aware Cache System for Cloud Data StorageYanqi Lv 0001, Peiquan Jin, Xiaoliang Wang, Ruicheng Liu, Liming Fang, Yuanjin Lin, Kuankuan Guo. 1322-1325 [doi]
- Personalized Cache Management for Multi-Tenant Cloud ServicesYigui Yuan, Peiquan Jin, Shouhong Wan. 1326-1327 [doi]
- Demonstration of a library prototype to build LoRa mesh networks for the IoTJoan Miquel Solé, Sergi Miralles Nogués, Roger Pueyo Centelles, Felix Freitag. 1328-1331 [doi]
- Quantum Multi-Agent Reinforcement Learning via Variational Quantum Circuit DesignWon Joon Yun, Yunseok Kwak, Jae Pyoung Kim, Hyunhee Cho, Soyi Jung, Jihong Park, Joongheon Kim. 1332-1335 [doi]
- Profiler: Distributed Model to Detect PhishingMariya Shmalko, Alsharif Abuadbba, Raj Gaire 0001, Tingmin Wu, Hye-Young Paik, Surya Nepal. 1336-1337 [doi]
- Awake-Efficient Distributed Algorithms for Maximal Independent SetKhalid Hourani, Gopal Pandurangan, Peter Robinson 0002. 1338-1339 [doi]