Abstract is missing.
- Making Reads in BFT State Machine Replication Fast, Linearizable, and LiveChristian Berger 0006, Hans P. Reiser, Alysson Bessani. 1-12 [doi]
- Node-level indicators of soft faults in wireless sensor networksDominik Widhalm, Karl M. Göschka, Wolfgang Kastner. 13-22 [doi]
- The design, architecture and performance of the Tendermint Blockchain NetworkDaniel Cason, Enrique Fynn, Nenad Milosevic, Zarko Milosevic 0001, Ethan Buchman, Fernando Pedone. 23-33 [doi]
- Adding Fairness to Order: Preventing Front-Running Attacks in BFT Protocols using TEEsChrysoula Stathakopoulou, Signe Rüsch, Marcus Brandenburger, Marko Vukolic. 34-45 [doi]
- Chaos Duck: A Tool for Automatic IoT Software Fault-Tolerance AnalysisIgor Zavalyshyn, Thomas Given-Wilson, Axel Legay, Ramin Sadre, Etienne Rivière. 46-55 [doi]
- Active replication for latency-sensitive stream processing in Apache FlinkGuillaume Rosinosky, Florian Schmidt 0009, Oleh Bodunov, Christof Fetzer, André Martin, Etienne Rivière. 56-66 [doi]
- Parameterized Distributed Synthesis of Fault-Tolerance Using Counter AbstractionHadi Moloodi, Fathiyeh Faghih, Borzoo Bonakdarpour. 67-77 [doi]
- Threat Adaptive Byzantine Fault Tolerant State-Machine ReplicationDouglas Simões Silva, Rafal Graczyk, Jérémie Decouchant, Marcus Völp, Paulo Esteves Veríssimo. 78-87 [doi]
- Failure Recovery from Persistent Memory in Paxos-Based State Machine ReplicationJan Z. Konczak, Pawel T. Wojciechowski. 88-98 [doi]
- Enabling Low-Redundancy Proactive Fault Tolerance for Stream Machine Learning via Erasure CodingZhinan Cheng, Lu Tang 0004, Qun Huang 0001, Patrick P. C. Lee. 99-108 [doi]
- Characterizing the Impact of Network Delay on Bitcoin MiningTong Cao, Jérémie Decouchant, Jiangshan Yu, Paulo Esteves Veríssimo. 109-119 [doi]
- How to Trust Strangers: Composition of Byzantine Quorum SystemsOrestis Alpos, Christian Cachin, Luca Zanolini. 120-131 [doi]
- Vassago: Efficient and Authenticated Provenance Query on Multiple BlockchainsRui Han, Jiang Xiao, Xiaohai Dai, Shijie Zhang, Yi Sun, Baochun Li, Hai Jin 0001. 132-142 [doi]
- Argus: A Fully Transparent Incentive System for Anti-Piracy CampaignsXian Zhang, Xiaobing Guo, Zixuan Zeng, Wenyan Liu, Zhongxin Guo, Yang Chen, Shuo Chen 0001, Qiufeng Yin, Mao Yang. 143-153 [doi]
- BROFY: Towards Essential Integrity Protection for MicroservicesArdhi Putra Pratama Hartono, Christof Fetzer. 154-163 [doi]
- A Secure Access and Accountability Framework for Provisioning Services in Named Data NetworksNazatul Haque Sultan, Vijay Varadharajan, Chandan Kumar, Seyit Camtepe, Surya Nepal. 164-175 [doi]
- CODBS: A cascading oblivious search protocol optimized for real-world relational database indexesRogério Pontes, Bernardo Portela, Manuel Barbosa, Ricardo Vilaça. 176-186 [doi]
- Scrooge Attack: Undervolting ARM Processors for Profit: Practical experience reportChristian Göttel, Konstantinos Parasyris, Osman S. Unsal, Pascal Felber, Marcelo Pasin, Valerio Schiavoni. 187-197 [doi]
- 2PPS - Publish/Subscribe with Provable PrivacySarah Abdelwahab Gaballah, Christoph Coijanovic, Thorsten Strufe, Max Mühlhäuser. 198-209 [doi]
- A Comprehensive Measurement-based Investigation of DNS HijackingRebekah Houser, Shuai Hao, Zhou Li 0001, Daiping Liu, Chase Cotton, Haining Wang. 210-221 [doi]
- What Distributed Systems Say: A Study of Seven Spark Application LogsSina Gholamian, Paul A. S. Ward. 222-232 [doi]
- GeoPaxos+: Practical Geographical State Machine ReplicationPaulo R. Coelho, Fernando Pedone. 233-243 [doi]
- Automated Intelligent Healing in Cloud-Scale Data CentersRui Li, Zhinan Cheng, Patrick P. C. Lee, Pinghui Wang, Yi Qiang, Lin Lan, Cheng He, Jinlong Lu, Mian Wang, Xinquan Ding. 244-253 [doi]
- MinervaFS: A User-Space File System for Generalised Deduplication: (Practical experience report)Lars Nielsen, Dorian Burihabwa, Valerio Schiavoni, Pascal Felber, Daniel E. Lucani. 254-264 [doi]
- Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse FlowsSimon Scherrer, Che-Yu Wu, Yu-Hsi Chiang, Benjamin Rothenberger, Daniele Enrico Asoni, Arish Sateesan, Jo Vliegen, Nele Mentens, Hsu-Chun Hsiao, Adrian Perrig. 265-276 [doi]
- FIFO and Atomic broadcast algorithms with bounded message size for dynamic systemsColette Johnen, Luciana Arantes, Pierre Sens 0001. 277-287 [doi]
- Sliding Window CRDT SketchesDolev Adas, Roy Friedman. 288-298 [doi]
- Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial TrajectoryTong Chen 0007, Yingxiao Xiang, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Jiqiang Liu, Gang Li 0009, Qi Alfred Chen. 299-309 [doi]
- WAFFLE: Watermarking in Federated LearningBuse G. A. Tekgul, Yuxi Xia, Samuel Marchal, N. Asokan. 310-320 [doi]
- Detecting Malicious Gradients from Asynchronous SGD on Variational AutoencoderZhipin Gu, Yuexiang Yang, Heyuan Shi. 321-330 [doi]
- DragonFly: Drone-Assisted High-Rise Monitoring for Fire SafetyFangqi Liu, Tzu-Yi Fan, Casey Grant, Cheng-Hsin Hsu, Nalini Venkatasubramanian. 331-342 [doi]
- Sharding Techniques in the Era of BlockchainChunyu Mao, Wojciech M. Golab. 343-344 [doi]
- Adaptive Erasure Coded Data Maintenance for Consensus in Distributed NetworksYulei Jia, Guangping Xu, Chi Wan Sung, Salwa Mostafa. 345-346 [doi]
- Runtime Verification for BlockchainsRitam Ganguly. 347-348 [doi]
- Runtime Verification for Distributed Cyber-Physical SystemsAnik Momtaz. 349-350 [doi]