SRDS B

34 papers

YearTitle / Authors
201534th IEEE Symposium on Reliable Distributed Systems, SRDS 2015, Montreal, QC, Canada, September 28 - October 1, 2015
2015A Framework for the Design Configuration of Accountable Selfish-Resilient Peer-to-Peer Systems.
Guido Lena Cota, Sonia Ben Mokhtar, Julia Lawall, Gilles Muller, Gabriele Gianini, Ernesto Damiani, Lionel Brunie
2015A Practical Experience on Evaluating Intrusion Prevention System Event Data as Indicators of Security Issues.
Rodrigo Sanches Miani, Bruno Bogaz Zarpelão, Bertrand Sobesto, Michel Cukier
2015A Secure Collusion-Aware and Probability-Aware Range Query Processing in Tiered Sensor Networks.
Lei Dong, Xuan Chen, Jianxiang Zhu, Hong Chen, Ke Wang, Cuiping Li
2015Approximate Hash-Based Set Reconciliation for Distributed Replica Repair.
Nico Kruber, Maik Lange, Florian Schintke
2015Auditable Restoration of Distributed Programs.
Reza Hajisheykhi, Mohammad Roohitavaf, Sandeep S. Kulkarni
2015Chasing the Tail of Atomic Broadcast Protocols.
Daniel Cason, Parisa Jalili Marandi, Luiz Eduardo Buzato, Fernando Pedone
2015Communicating Reliably in Multihop Dynamic Networks Despite Byzantine Failures.
Alexandre Maurer, Sébastien Tixeuil, Xavier Défago
2015ControlFreak: Signature Chaining to Counter Control Flow Attacks.
Sergei Arnautov, Christof Fetzer
2015Denial of Service Elusion (DoSE): Keeping Clients Connected for Less.
Paul Wood, Christopher N. Gutierrez, Saurabh Bagchi
2015Distributed Attribute Based Access Control of Aggregated Data in Sensor Clouds.
Vimal Kumar, Sanjay Madria
2015Extending Eventually Consistent Cloud Databases for Enforcing Numeric Invariants.
Valter Balegas, Diogo Serra, Sérgio Duarte, Carla Ferreira, Marc Shapiro, Rodrigo Rodrigues, Nuno M. Preguiça
2015FTDE: Distributed Fault Tolerance for WSN Data Collection and Compression Schemes.
Azad Ali, Abdelmajid Khelil, Neeraj Suri
2015Identifying Global Icebergs in Distributed Streams.
Emmanuelle Anceaume, Yann Busnel, Nicolo Rivetti, Bruno Sericola
2015MICS: Mingling Chained Storage Combining Replication and Erasure Coding.
Yan Tang, Jianwei Yin, Wei Lo, Ying Li, Shuiguang Deng, Kexiong Dong, Calton Pu
2015Multi-objective Optimisation of Rolling Upgrade Allowing for Failures in Clouds.
Daniel Sun, Daniel Guimarans, Alan D. Fekete, Vincent Gramoli, Liming Zhu
2015Online Behavior Identification in Distributed Systems.
Javier Álvarez Cid-Fuentes, Claudia Szabo, Katrina Falkner
2015PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
Daniel Germanus, Hatem Ismail, Neeraj Suri
2015PCM: A Parity-Check Matrix Based Approach to Improve Decoding Performance of XOR-based Erasure Codes.
Yongzhe Zhang, Chentao Wu, Jie Li, Minyi Guo
2015PSG-Codes: An Erasure Codes Family with High Fault Tolerance and Fast Recovery.
Shiyi Li, Qiang Cao, Lei Tian, Shenggang Wan, Lu Qian, Changsheng Xie
2015PmDroid: Permission Supervision for Android Advertising.
Xing Gao, Dachuan Liu, Haining Wang, Kun Sun
2015Privacy-Preserving Content-Based Image Retrieval in the Cloud.
Bernardo Ferreira, João Rodrigues, João Leitão, Henrique João L. Domingos
2015Probabilistic Byzantine Tolerance for Cloud Computing.
Luciana Arantes, Roy Friedman, Olivier Marin, Pierre Sens
2015Recurrence in Self-Stabilization.
Oday Jubran, Oliver E. Theel
2015Replacement: Decentralized Failure Handling for Replicated State Machines.
Leander Jehl, Tormod Erevik Lea, Hein Meling
2015Ridge: High-Throughput, Low-Latency Atomic Multicast.
Carlos Eduardo Benevides Bezerra, Daniel Cason, Fernando Pedone
2015SafeSky: A Secure Cloud Storage Middleware for End-User Applications.
Rui Zhao, Chuan Yue, Byung-Chul Tak, Chunqiang Tang
2015Securing Passive Replication through Verification.
Bruno Vavala, Nuno Ferreira Neves, Peter Steenkiste
2015Seek-Efficient I/O Optimization in Single Failure Recovery for XOR-coded Storage Systems.
Zhirong Shen, Jiwu Shu, Yingxun Fu
2015Separating the WHEAT from the Chaff: An Empirical Design for Geo-Replicated State Machines.
João Sousa, Alysson Bessani
2015Signature-Based Top-k Query Processing against Data Replacement Attacks in MANETs.
Takuji Tsuda, Yuka Komai, Takahiro Hara, Shojiro Nishio
2015Temporality a NVRAM-based Virtualization Platform.
Vasily A. Sartakov, Arthur Martens, Rüdiger Kapitza
2015To Transmit Now or Not to Transmit Now.
Dacfey Dzung, Rachid Guerraoui, David Kozhaya, Yvonne-Anne Pignolet
2015Z Codes: General Systematic Erasure Codes with Optimal Repair Bandwidth and Storage for Distributed Storage Systems.
Qing Liu, Dan Feng, Hong Jiang, Yuchong Hu, Tianfeng Jiao