Abstract is missing.
- Self-Stabilizing Construction of a Minimal Weakly ST-Reachable Directed Acyclic GraphJunya Nakamura 0001, Masahiro Shibata, Yuichi Sudo, YongHwan Kim. 1-10 [doi]
- Benefits of Stabilization versus Rollback in Self-Stabilizing Graph-Based Applications on Eventually Consistent Key-Value StoresDuong N. Nguyen, Sandeep S. Kulkarni. 11-20 [doi]
- Consensus Beyond Thresholds: Generalized Byzantine Quorums Made LiveOrestis Alpos, Christian Cachin. 21-30 [doi]
- TZ4Fabric: Executing Smart Contracts with ARM TrustZone : (Practical Experience Report)Christina Müller, Marcus Brandenburger, Christian Cachin, Pascal Felber, Christian Göttel, Valerio Schiavoni. 31-40 [doi]
- NF-Crowd: Nearly-free Blockchain-based CrowdsourcingChao Li, Balaji Palanisamy, Runhua Xu, Jian Wang, Jiqiang Liu. 41-50 [doi]
- An Efficient Query Scheme for Hybrid Storage Blockchains Based on Merkle Semantic TrieQingqi Pei, Enyuan Zhou, Yang Xiao, Deyu Zhang, Dongxiao Zhao. 51-60 [doi]
- Protect Your Smart Contract Against Unfair PaymentYue Li, Han Liu 0010, Zhiqiang Yang, Bin Wang, Qian Ren, Lei Wang, Bangdao Chen. 61-70 [doi]
- Fast and Robust Distributed Learning in High DimensionEl Mahdi El Mhamdi, Rachid Guerraoui, Sébastien Rouault. 71-80 [doi]
- Double Insurance: Incentivized Federated Learning with Differential Privacy in Mobile CrowdsensingChenhao Ying, Haiming Jin, Xudong Wang 0001, Yuan Luo 0003. 81-90 [doi]
- End-to-End Evaluation of Federated Learning and Split Learning for Internet of ThingsYansong Gao, Minki Kim, Sharif Abuadbba, Yeonjae Kim, Chandra Thapa, Kyuyeon Kim, Seyit A. Camtep, Hyoungshick Kim, Surya Nepal. 91-100 [doi]
- A Formally Verified Protocol for Log Replication with Byzantine Fault ToleranceJoel Wanner, Laurent Chuat, Adrian Perrig. 101-112 [doi]
- Using Model Checking to Formally Verify Rendezvous Algorithms for Robots with Lights in Euclidean SpaceXavier Défago, Adam Heriban, Sébastien Tixeuil, Koichi Wada. 113-122 [doi]
- Efficient Two-Layered Monitor for Partially Synchronous Distributed SystemsVidhya Tekken Valapil, Sandeep S. Kulkarni, Eric Torng, Gabe Appleton. 123-132 [doi]
- Parallel State Machine Replication from Generalized ConsensusTarcisio Ceolin Junior, Fernando Luís Dotti, Fernando Pedone. 133-142 [doi]
- A Generic Specification Framework for Weakly Consistent Replicated Data TypesXue Jiang, Hengfeng Wei, Yu Huang 0002. 143-154 [doi]
- PnyxDB: a Lightweight Leaderless Democratic Byzantine Fault Tolerant Replicated DatastoreLoïck Bonniot, Christoph Neumann, François Taïani. 155-164 [doi]
- Self-optimising Application-agnostic Multithreading for Replicated State MachinesGerhard Habiger, Franz J. Hauck, Hans P. Reiser, Johannes Köstler. 165-174 [doi]
- Secure Embedding of Rooted Spanning Trees for Scalable Routing in Topology-Restricted NetworksMartin Byrenheid, Thorsten Strufe, Stefanie Roos. 175-184 [doi]
- On the Detection of Shilling Attacks in Federated Collaborative FilteringYangfan Jiang, Yipeng Zhou, Di Wu, Chao Li, Yan Wang. 185-194 [doi]
- Anomaly Detection via Mining Numerical Workflow Relations from LogsBo Zhang, Hongyu Zhang 0002, Pablo Moscato, Aozhong Zhang. 195-204 [doi]
- TLP-IDS: A Two-layer Intrusion Detection System for Integrated Electronic SystemsXiaoxia Liu, Daojing He, Yun Gao, Sencun Zhu, Sammy Chan. 205-214 [doi]
- Audinet: A Decentralized Auditing System for Cloud StorageMeng Yan, Jiajia Xu, Trent G. Marbach, Haitao Li, Gang Wang, Xiaoguang Liu. 215-224 [doi]
- Device and Placement Aware Framework to optimize Single Failure Recoveries and Reads for Erasure Coded Storage System with Heterogeneous Storage DevicesYingxun Fu, Xun Liu, Jiwu Shu, Zhirong Shen, Shiye Zhang, Jun Wu, Jianyong Duan, Li Ma. 225-235 [doi]
- AZ-Recovery: An Efficient Crossing-AZ Recovery Scheme for Erasure Coded Cloud Storage SystemsXin Xie, Chentao Wu, Gen Yang, Zongxin Ye, Xubin He, Jie Li 0002, Minyi Guo, Guangtao Xue, Yuanyuan Dong, Yafei Zhao. 236-245 [doi]
- Enabling I/O-Efficient Redundancy Transitioning in Erasure-Coded KV Stores via Elastic Reed-Solomon CodesSi Wu, Zhirong Shen, Patrick P. C. Lee. 246-255 [doi]
- MQT-TZ: Hardening IoT Brokers Using ARM TrustZone : (Practical Experience Report)Carlos Segarra, Ricard Delgado-Gonzalo, Valerio Schiavoni. 256-265 [doi]
- Solving Linear Systems on High Performance Hardware with Resilience to Multiple Hard FaultsDaniela Loreti, Marcello Artioli, Anna Ciampolini. 266-275 [doi]
- Robust Cache-Aware Quantum Processor LayoutTravis LeCompte, Fang Qi, Lu Peng. 276-287 [doi]
- Performance Evaluation of the Impact of NUMA on One-sided RDMA InteractionsJacob Nelson, Roberto Palmieri. 288-298 [doi]
- Robust P2P Personalized LearningKarim Boubouh, Amine Boussetta, Yahya Benkaouz, Rachid Guerraoui. 299-308 [doi]
- Towards Efficient, Credible and Privacy-Preserving Service QoS Prediction in Unreliable Mobile Edge EnvironmentsYilei Zhang, Peiyun Zhang, Yonglong Luo, Liya Ji. 309-318 [doi]
- Intrusion-Tolerant and Confidentiality-Preserving Publish/Subscribe MessagingSisi Duan, Chao Liu, Xin Wang, Yusen Wu, Shuai Xu, Yelena Yesha, Haibin Zhang. 319-328 [doi]
- Poster: No More Slow Messages: Programmable Packet Handling in Hard IRQKo Natori, Takafumi Kikuchi, Kenji Kono. 329-331 [doi]
- Demo: A Proof-of-Concept Implementation of Guard Secure Routing ProtocolSanaz Taheri-Boshrooyeh, Ali Utkan Sahin, Yahya Hassanzadeh-Nazarabadi, Öznur Özkasap. 332-334 [doi]
- Demo: Skip Graph Middleware ImplementationYahya Hassanzadeh-Nazarabadi, Nazir Nayal, Shadi Sameh Hamdan, Ali Utkan Sahin, Öznur Özkasap, Alptekin Küpçü. 335-337 [doi]