Abstract is missing.
- P3LS: Plausible Deniability for Practical Privacy-Preserving Live StreamingJérémie Decouchant, Antoine Boutet, Jiangshan Yu, Paulo Esteves Veríssimo. 1-10 [doi]
- Fuzzing IPC with Knowledge InferenceKun Yang, Hanqing Zhao, Chao Zhang, Jianwei Zhuge, Haixin Duan. 11-20 [doi]
- Anonymous and Confidential File Sharing over Untrusted CloudsStefan Contiu, Sébastien Vaucher, Rafael Pires, Marcelo Pasin, Pascal Felber, Laurent Réveillère. 21-31 [doi]
- Preacher: Network Policy Checker for Adversarial EnvironmentsKashyap Thimmaraju, Liron Schiff, Stefan Schmid 0001. 32-41 [doi]
- Architecture and Prototype Implementation for Process-Aware Intrusion Detection in Electrical GridsRobert Flosbach, Justyna Joanna Chromik, Anne Remke. 42-51 [doi]
- Supply Chain Malware Targets SGX: Take Care of what you SignAndrei Mogage, Rafael Pires, Vlad Cracium, Emanuel Onica, Pascal Felber. 52-60 [doi]
- d'Artagnan: A Trusted NoSQL Database on Untrusted CloudsRogério Pontes, Francisco Maia, Ricardo Vilaça, Nuno Machado. 61-70 [doi]
- Gyro: A Modular Scale-Out Layer for Single-Server DBMSsHabib Saissi, Marco Serafini, Neeraj Suri. 71-82 [doi]
- Fulva: Efficient Live Migration for In-Memory Key-Value Stores with Zero DowntimeJiewen Hai, Cheng Wang, Xusheng Chen, Tsz On Li, Heming Cui, Sen Wang. 83-92 [doi]
- ESCAPe: Elastic Caching For Big Data SystemsThanasis Priovolos, Stathis Maroulis, Vana Kalogeraki. 93-102 [doi]
- BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal LeakageBernardo Ferreira, Bernardo Portela, Tiago Oliveira 0004, Guilherme Borges, Henrique Domingos, João Leitão 0001. 103-112 [doi]
- Fault Tolerant High Performance Solver for Linear Equation SystemsMarcello Artioli, Daniela Loreti, Anna Ciampolini. 113-122 [doi]
- DBFT: A Byzantine Fault Tolerant Protocol with Graceful Performance DegradationJingjing Zhang, Yingyao Rong, Jiannong Cao 0001, Chunming Rong, Jing Bian, Weigang Wu. 123-132 [doi]
- Making Speculative BFT Resilient with Trusted Monotonic CountersLachlan J. Gunn, Jian Liu 0012, Bruno Vavala, N. Asokan. 133-142 [doi]
- Multilevel Checkpoint/Restart for Large Computational Jobs on Distributed Computing ResourcesMasoud Gholami Estahbanati, Florian Schintke. 143-152 [doi]
- Deterministic Fuzzy CheckpointsMichael Eischer, Markus Büttner, Tobias Distler. 153-162 [doi]
- A More Consistent Understanding of ConsistencySubhajit Sidhanta, Ricardo J. Dias, Rodrigo Rodrigues. 163-172 [doi]
- Improved Fast Rerouting Using PostprocessingKlaus-Tycho Foerster, Andrzej Kamisinski, Yvonne Anne Pignolet, Stefan Schmid 0001, Gilles Trédan. 173-182 [doi]
- Resilient Wide-Area Byzantine Consensus Using Adaptive Weighted ReplicationChristian Berger 0006, Hans P. Reiser, João Sousa 0002, Alysson Bessani. 183-192 [doi]
- Emergent Overlays for Adaptive MANET BroadcastRaziel Carvajal-Gomez, Yehia Elkhatib, Laurent Réveillère, Etienne Rivière, Yérom-David Bromberg. 193-202 [doi]
- A Dual Digraph Approach for Leaderless Atomic BroadcastMarius Poke, Colin W. Glass. 203-220 [doi]
- Merkle Search Trees: Efficient State-Based CRDTs in Open NetworksAlex Auvolat, François Taïani. 221-230 [doi]
- Revisiting Broadcast Algorithms for Wireless Edge NetworksAndré Rosa, Pedro Ákos Costa, João Leitão 0001. 231-240 [doi]
- THUNDERSTORM: A Tool to Evaluate Dynamic Network Topologies on Distributed SystemsLuca Liechti, Paulo Gouveia, João Neves, Peter Kropf, Miguel Matos, Valerio Schiavoni. 241-250 [doi]
- Attack-Resistant Spanning Tree Construction in Route-Restricted Overlay NetworksMartin Byrenheid, Stefanie Roos, Thorsten Strufe. 251-260 [doi]
- Challenges and Opportunities for Efficient Serverless Computing at the EdgePhani Kishore Gadepalli, Gregor Peach, Ludmila Cherkasova, Rob Aitken, Gabriel Parmer. 261-266 [doi]
- Scalability and Resilience in Practice: Current Trends and OpportunitiesJulien Ponge, Mark Little. 267 [doi]
- Toward an in-Kernel High Performance Key-Value Store ImplementationKahina Lazri, Antoine Blin, Julien Sopena, Gilles Muller. 268 [doi]
- Combining Learning and Model-Based Reasoning to Reduce Uncertainties in Cloud Security and Compliance AuditingUttam Thakore, Rohit Ranchal, Yi-Hsiu Wei, HariGovind V. Ramasamy. 269-274 [doi]
- A Generic Construction for All Parameters in Minimum Storage Regenerating CodesLiuqing Ye, Dan Feng 0001, Yuchong Hu, Xueliang Wei. 275-284 [doi]
- Exploring Declustered Software RAID for Enhanced Reliability and Recovery Performance in HPC Storage SystemsZhi Qiao, Shuwen Liang, Hsing-bung Chen, Song Fu, Bradley W. Settlemyer. 285-294 [doi]
- Lightweight Dynamic Redundancy Control for Server-Based StorageTakayuki Fukatani, Hieu Hanh Le, Haruo Yokota. 295-304 [doi]
- Bloxy: Providing Transparent and Generic BFT-Based Ordering Services for BlockchainsSigne Rüsch, Kai Bleeke, Rüdiger Kapitza. 305-314 [doi]
- Blockchain-Based Metadata Protection for Archival SystemsArnaud L'Hutereau, Dorian Burihabwa, Pascal Felber, Hugues Mercier, Valerio Schiavoni. 315-323 [doi]
- Trusted Computing Meets Blockchain: Rollback Attacks and a Solution for Hyperledger FabricMarcus Brandenburger, Christian Cachin, Rüdiger Kapitza, Alessandro Sorniotti. 324-333 [doi]
- The Notion of Universality in Crash-Prone Asynchronous Message-Passing Systems: A TutorialMichel Raynal. 334-350 [doi]
- Edge Applications: Just Right ConsistencyAnshul Ahuja, Geetesh Gupta, Subhajit Sidhanta. 351-353 [doi]
- Self-Stabilizing Manoeuvre Negotiation: The Case of Virtual Traffic LightsAntónio Casimiro, Emelie Ekenstedt, Elad Michael Schiller. 354-356 [doi]
- SmartMonit: Real-Time Big Data Monitoring SystemUmit Demirbaga, Ayman Noor, Zhenyu Wen, Philip James, Karan Mitra, Rajiv Ranjan. 357-359 [doi]
- Building Ad-Hoc Clouds with CloudAgoraTasos Bakogiannis, Ioannis Mytilinis, Katerina Doka, Georgios I. Goumas. 360-362 [doi]
- A Framework for Managing an Elastic Redis CacheThanasis Priovolos, Stathis Maroulis, Vana Kalogeraki. 363-365 [doi]
- HyperPubSub: Blockchain Based Publish/SubscribeGewu Bu, Thanh Son Lam Nguyen, Maria Potop-Butucaru, Kim Loan Thai. 366-368 [doi]
- ARTEMIS: An Intrusion Detection System for MQTT Attacks in Internet of ThingsEge Ciklabakkal, Ataberk Donmez, Mert Erdemir, Emre Suren, Mert Kaan Yilmaz, Pelin Angin. 369-371 [doi]
- Atomic Swapping Bitcoins and EthersLéonard Lys, Arthur Micoulet, Maria Potop-Butucaru. 372-374 [doi]
- A Testbed for Data Routing in Low-Power WSNs using DV-Hop Based Trajectory Encoding AlgorithmXiaofei Cao, Sanjay Madria. 375-377 [doi]
- ABEONA: An Architecture for Energy-Aware Task Migrations from the Edge to the CloudIsabelly Rocha, Gabriel Vinha, Andrey Brito, Pascal Felber, Marcelo Pasin, Valerio Schiavoni. 378-380 [doi]
- Low-Cost Serverless SIEM in the CloudAdriano Serckumecka, Ibéria Medeiros, Alysson Bessani. 381-382 [doi]
- Making Federated Networks More DistributedAlex Auvolat. 383-384 [doi]