Abstract is missing.
- Fine-Grained Consistency Upgrades for Online ServicesFilipe Freitas, João Leitão 0001, Nuno M. Preguiça, Rodrigo Rodrigues. 1-10 [doi]
- A Practical Framework for Privacy-Preserving NoSQL DatabasesRicardo Macedo, João Paulo, Rogerio Pontes, Bernardo Portela, Tiago Oliveira, Miguel Matos, Rui Oliveira. 11-20 [doi]
- Parameterized and Runtime-Tunable Snapshot Isolation in Distributed Transactional Key-Value StoresHengfeng Wei, Yu Huang, Jian Lu. 21-33 [doi]
- Robust Multi-Resource Allocation with Demand Uncertainties in Cloud SchedulerJianguo Yao, Qiumin Lu, Hans-Arno Jacobsen, Haibing Guan. 34-43 [doi]
- Stateless Reliable GeocastingJordan Adamek, Mikhail Nesterenko, James Scott Robinson, Sébastien Tixeuil. 44-53 [doi]
- Controlling Cascading Failures in Interdependent Networks under Incomplete KnowledgeDiman Zad Tootaghaj, Novella Bartolini, Hana Khamfroush, Thomas F. La Porta. 54-63 [doi]
- On Availability for Blockchain-Based SystemsIngo Weber, Vincent Gramoli, Alexander Ponomarev, Mark Staples, Ralph Holz, An Binh Tran, Paul Rimba. 64-73 [doi]
- A Horizontally Scalable and Reliable Architecture for Location-Based Publish-SubscribeBertil Chapuis, Benoît Garbinato, Lucas Mourot. 74-83 [doi]
- On the Robustness of a Neural NetworkEl Mahdi El Mhamdi, Rachid Guerraoui, Sebastien Rouault. 84-93 [doi]
- Automated Fine Tuning of Probabilistic Self-Stabilizing AlgorithmsSaba Aflaki, Mathias Volk, Borzoo Bonakdarpour, Joost-Pieter Katoen, Arne Storjohann. 94-103 [doi]
- Reconfiguring Parallel State Machine ReplicationEduardo Alchieri, Fernando Luís Dotti, Odorico Machado Mendizabal, Fernando Pedone. 104-113 [doi]
- A Statistical Framework on Software Aging Modeling with Continuous-Time Hidden Markov ModelHiroyuki Okamura, Junjun Zheng, Tadashi Dohi. 114-123 [doi]
- Hybrid-RC: Flexible Erasure Codes with Optimized Recovery Performance and Low Storage OverheadLiuqing Ye, Dan Feng, Yuchong Hu, Qing Liu. 124-133 [doi]
- Correlation-Aware Stripe Organization for Efficient Writes in Erasure-Coded Storage SystemsZhirong Shen, Patrick P. C. Lee, Jiwu Shu, Wenzhong Guo. 134-143 [doi]
- A Simulation Analysis of Reliability in Erasure-Coded Data CentersMi Zhang, Shujie Han, Patrick P. C. Lee. 144-153 [doi]
- Optimal Storage under Unsynchronized Mobile Byzantine FaultsSilvia Bonomi, Antonella Del Pozzo, Maria Potop-Butucaru, Sébastien Tixeuil. 154-163 [doi]
- PULP: Achieving Privacy and Utility Trade-Off in User Mobility DataSophie Cerf, Vincent Primault, Antoine Boutet, Sonia Ben Mokhtar, Robert Birke, Sara Bouchenak, Lydia Y. Chen, Nicolas Marchand, Bogdan Robu. 164-173 [doi]
- Incremental Elasticity for NoSQL Data StoresAntonis Papaioannou, Kostas Magoutis. 174-183 [doi]
- CausalSpartan: Causal Consistency for Distributed Data Stores Using Hybrid Logical ClocksMohammad Roohitavaf, Murat Demirbas, Sandeep S. Kulkarni. 184-193 [doi]
- DottedDB: Anti-Entropy without Merkle Trees, Deletes without TombstonesRicardo Jorge Tome Goncalves, Paulo Sérgio Almeida, Carlos Baquero, Victor Fonte. 194-203 [doi]
- Optimal Cyber-Defense Strategies for Advanced Persistent Threats: A Game Theoretical AnalysisJeffrey Acquaviva, Mark Mahon, Bruce Einfalt, Tom LaPorta. 204-213 [doi]
- AutoFlowLeaker: Circumventing Web Censorship through Automation ServicesShengtuo Hu, Xiaobo Ma, Muhui Jiang, Xiapu Luo, Man Ho Au. 214-223 [doi]
- An Unsupervised Multi-Detector Approach for Identifying Malicious Lateral MovementAtul Bohara, Mohammad A. Noureddine, Ahmed M. Fawaz, William H. Sanders. 224-233 [doi]
- Optimal Network Reconfiguration for Software Defined Networks Using Shuffle-Based Online MTDJin Bum Hong, Seunghyun Yoon 0001, Hyuk Lim, Dong Seong Kim. 234-243 [doi]
- A Greedy-Based Method for Modified Condition/Decision Coverage Testing CriterionBo-His Li, Chin-Yu Huang. 244-246 [doi]
- A Resilient Auction Framework for Deadline-Aware Jobs in Cloud Spot MarketAbadhan Saumya Sabyasachi, Hussain Mohammed Dipu Kabir, Ahmed Mohamed Abdelmoniem, Subrota Kumar Mondal. 247-249 [doi]
- Automated Resource Sharing for Virtualized GPU with Self-ConfigurationJianguo Yao, Qiumin Lu, Zhengwei Qi. 250-252 [doi]
- Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric)Harish Sukhwani, José M. Martínez, Xiaolin Chang, Kishor S. Trivedi, Andy Rindos. 253-255 [doi]
- Detecting TCP-Based DDoS Attacks in Baidu Cloud Computing Data CentersJiahui Jiao, Benjun Ye, Yue Zhao, Rebecca J. Stones, Gang Wang, Xiaoguang Liu, Shaoyan Wang, Guangjun Xie. 256-258 [doi]
- PITR: An Efficient Single-Failure Recovery Scheme for PIT-Coded Cloud Storage SystemsPeng Li, Jiaxiang Dong, Xueda Liu, Gang Wang, Zhongwei Li, Xiaoguang Liu. 259-261 [doi]
- Runtime Measurement Architecture for Bytecode Integrity in JVM-Based CloudHaihe Ba, Huaizhe Zhou, Jiangchun Ren, Zhiying Wang. 262-263 [doi]
- An End-To-End Log Management Framework for Distributed SystemsPinjia He. 266-267 [doi]
- Fault-Tolerant Pattern Formation by Multiple Robots: A Learning ApproachJia Wang, Jiannong Cao, Shan Jiang. 268-269 [doi]