Title | Authors |
Argus: A Fully Transparent Incentive System for Anti-Piracy Campaigns | Xian Zhang, Xiaobing Guo, Zixuan Zeng, Wenyan Liu, Zhongxin Guo, Yang Chen, Shuo Chen, Qiufeng Yin, Mao Yang and Lidong Zhou |
What Distributed Systems Say: A Study of Seven Spark Application Logs | Sina Gholamian and Paul A. S. Ward |
Muesli+: Practical Geographically Scalable and Highly Available Services | Paulo Coelho and Fernando Pedone |
Node-level indicators of soft faults in wireless sensor networks | Dominik Widhalm, Karl M. Goeschka and Wolfgang Kastner |
Building oblivious search from the ground up | Rogério Pontes, Manual Barbosa, Bernardo Portela and Ricardo Vilaça |
Parameterized Distributed Synthesis of Fault-Tolerance Using Counter Abstraction | Hadi Moloodi, Fathiyeh Faghih and Borzoo Bonakdarpour |
The design, architecture and performance of the Tendermint Blockchain Network | Daniel Cason, Enrique Fynn, Nenad Milosevic, Zarko Milosevic, Ethan Buchman and Fernando Pedone |
Automated Intelligent Healing in Cloud-Scale Data Centers | Rui Li, Zhinan Cheng, Patrick P. C. Lee, Pinghui Wang, Yi Qiang, Lin Lan, Cheng He, Jinlong Lu, Mian Wang and Xinquan Ding |
Threat Adaptive Byzantine Fault Tolerant State-Machine Replication | Douglas Simões Silva, Rafal Graczyk, Jérémie Decouchant, Marcus Völp and Paulo Esteves-Verissimo |
A Secure Access and Accountability Framework for Provisioning Services in Named Data Networks | Nazatul Haque Sultan, Vijay Varadharajan, Chandan Kumar, Seyit Camtepe and Surya Nepal |
Sliding Window CRDT Sketches | Dolev Adas and Roy Friedman |
Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows | Simon Scherrer, Che-Yu Wu, Yu-Hsi Chiang, Benjamin Rothenberger, Daniele Asoni, Arish Sateesan, Jo Vliegen, Nele Mentens, Hsu-Chun Hsiao and Adrian Perrig |
Characterizing the Impact of Network Delay on Bitcoin Mining | Tong Cao, Jérémie Decouchant, Jiangshan Yu and Paulo Verissimo |
Adding Fairness to Order: Preventing Front-Running Attacks in BFT Protocols using TEEs | Chrysoula Stathakopoulou, Signe Rüsch, Marcus Brandenburger and Marko Vukolic |
2PPS – Publish/Subscribe with Provable Privacy | Sarah Abdelwahab Gaballah, Christoph Coijanovic, Thorsten Strufe and Max Mühlhäuser |
Enabling Low-Redundancy Proactive Fault Tolerance for Stream Machine Learning via Erasure Coding | Zhinan Cheng, Lu Tang, Qun Huang and Patrick P. C. Lee |
Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory | Tong Chen, Yingxiao Xiang, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Jiqiang Liu, Li Gang and Qi Alfred Chen |
FIFO and Atomic broadcast algorithms with bounded message size for dynamic systems | Colette Johnen, Luciana Arantes and Pierre Sens |
WAFFLE: Watermarking in Federated Learning | Buse Gul Atli Tekgul, Yuxi Xia, Samuel Marchal and N. Asokan |
How to Trust Strangers: Composition of Byzantine Quorum Systems | Orestis Alpos, Christian Cachin and Luca Zanolini |
Making Reads in BFT State Machine Replication Fast, Linearizable, and Live | Christian Berger, Hans P. Reiser and Alysson Bessani |
A Comprehensive Measurement-based Investigation of DNS Hijacking | Rebekah Houser, Shuai Hao, Zhou Li, Daiping Liu, Chase Cotton and Haining Wang |
DragonFly: Drone-Assisted High-Rise Monitoring for Fire Safety | Fangqi Liu, Tzu-Yi Fan, Casey Grant, Cheng-Hsin Hsu and Nalini Venkatasubramanian |
Vassago: Efficient and Authenticated Provenance Query on Multiple Blockchains | Rui Han, Jiang Xiao, Xiaohai Dai, Shijie Zhang, Yi Sun, Baochun Li and Hai Jin |
BROFY: Towards Essential Integrity Protection for Microservices | Ardhi Putra Pratama Hartono and Christof Fetzer |
Active replication for latency-sensitive stream processing in Apache Flink | Guillaume Rosinosky, Florian Schmidt, Oleh Bodunov, Christof Fetzer, André Martin and Etienne Rivière |
Detecting Malicious Gradients from Asynchronous Distributed SGD on Variational Autoencoder | Zhipin Gu and Yuexiang Yang |
Chaos Duck: a Tool for Automatic IoT Software Fault-Tolerance Analysis | Igor Zavalyshyn, Thomas Given-Wilson, Axel Legay, Ramin Sadre and Etienne Riviere |
Scrooge Attack: Undervolting ARM Processors for Profit | Christian Göttel, Konstantinos Parasyris, Pascal Felber, Marcelo Pasin, Valerio Schiavoni and Osman Unsal |
Failure Recovery from Persistent Memory in Paxos-based State Machine Replication | Jan Kończak and Paweł T. Wojciechowski |
MinervaFS: A User-Space File System for Generalised Deduplication | Lars Nielsen, Dorian Burihabwa, Valerio Schiavoni, Daniel E Lucani and Pascal Felber |