The 31st Int'l Conference on Distributed Computing Systems (ICDCS 2011)

June 20-24, 2011  Minneapolis, Minnesota, USA

 
 

 

Tuesday, June 21, 2011

A B C

8:00 - 9:00

Registration

9:00 - 9:30

Introduction and Welcome

9:30 - 10:30

Keynote 1

Innovating for Society: Realizing the Promise and Potential of Computing
Prof. Farnam Jahanian, National Science Foundation, USA
Room:
Chair: Wu-Chi Feng, Portland State University, USA

10:30 - 11:00

Break

11:00 - 12:30

A1 : Data Processing and Management

Room:
Chair: Biplob Debnath
Data Domain / EMC Corporation

B1 : Wireless Networking

Room:
Chair: Shiwen Mao
Auburn University

C1 : Power Management

Room:
Chair: Dimitrios Koutsonikolas
University at Buffalo, SUNY

12:30 - 13:30

Lunch

13:30 - 15:00

A2 : Peer-to-Peer

Room:
Chair: Chuan Wu
University of Hong Kong

B2 : Distributed Systems

Room:
Chair: Yuriy Brun
University of Washington

C2 : Communications

Room:
Chair: Won Mee Jang
University of Nebraska-Lincoln

15:00 - 15:30

Break

15:30 - 17:30

A3 : Algorithms

Room:
Chair: Neeraj Mittal
University of Texas-Dallas

B3 : Multimedia

Room:
Chair: TBD / Wu-chi Feng
Portland State University

C3 : Networking

Room:
Chair: Yingying Chen
Stevens Institute of Technology

18:00 - 20:00

Reception

 

Wednesday, June 22, 2011

A B C Workshop

8:00 - 9:00

Registration

9:00 - 10:00

Keynote 2

Cloud, Data Center, and the Future of Computing
Dr. Wen-Hann Wang, Intel Labs, USA
Room:
Chair: Xiaodong Zhang, The Ohio State University, USA

10:00 - 10:30

Break

10:30 - 12:30

A4 : Fault Tolerance and Dependability

Room:
Chair: Jeong-Hyon Hwang
SUNY - Albany

B4 : Privacy

Room:
Chair: Xuxian Jiang
North Carolina State University

C4 : Systems

Room:
Chair: Lisong Xu
University of Nebraska-Lincoln

12:30 - 13:30

Lunch

13:30 - 15:00

A5 : Middleware

Room:
Chair: Patrick Eugster
Purdue University

B5 : Sensor Networking

Room:
Chair: Xiaoxia Huang
Shenzhen Institutes of Advanced Technology

C5 : Wireless Security

Room:
Chair: Jie Wu
Temple University

Workshop SN

15:00 - 15:30

Break

15:30 - 17:30

A6 : Cloud Computing

Room:
Chair: Xiaorui Wang
University of Tennessee-Knoxville

B6 : Security and Anonymity

Room:
Chair: Wenjing Lou
Worcester Polytechnic Institute

C6 : Performance

Room:
Chair: Luis Garces-Erice
IBM Research Zurich Laboratory

Workshop SN

19:30 - 23:00

Conference Banquet

 

Thursday, June 23, 2011

A B C Workshop

8:00 - 9:00

Registration

9:00 - 10:00

Keynote 3

Complex Networked Systems
Dr. Robert Bonneau, Air Force Office of Scientific Research, USA
Room:
Chair: David H.-C. Du, University of Minnesota, USA

10:00 - 10:30

Break

10:30 - 12:30

A7 : Fault Tolerance

Room:
Chair: Anand Tripathi
University of Minnesota

B7 : Security

Room:
Chair: Wee Keong Ng
Nanyang Technological University

C7 : Localization and Tracking

Room:
Chair: Darek Kowalski
University of Liverpool

12:30 - 13:30

Lunch

13:30 - 15:00

Panel: Cloud Computing: Hype or Reality?

Room:
Chair: Abhishek Chandra
University of Minnesota

Workshop

SAHNS

15:00 - 15:30

Break

15:30 - 17:30

A8 : Publish / Subscribe Systems

Room:
Chair: Yang Chen
University of Goettingen

B8 : Routing

Room:
Chair: Lily Wu
University of Texas-Dallas

C8 : Sensor and Ubiquitous Computing Applications

Room:
Chair: Daniele Quercia
University of Cambridge

Workshop

SAHNS

 

Friday, June 24, 2011

Workshops Day

8:00 - 9:00

Registration

9:00 - 12:00

Workshops

Ball Room A

DCPerf

Ball Room B

WWASN

Collegiate

SIMPLEX

Big Ten

SPCC

12:00 - 13:30

Lunch

13:30 - 17:30

Workshops

Ball Room A

DCPerf

Ball Room B

WWASN

Collegiate

SIMPLEX

Big Ten

SPCC

 

 


 

A1 : Data Processing and Management

'Provisioning a Multi-Tiered Data Staging Area for Extreme-Scale Machines'
Ramya Prabhakar, Sudharshan S. Vazhkudai, Youngjae Kim, Ali R. Butt, Min Li and Mahmut Kandemir

'Design and Analysis of A Distributed Multi-leg Stock Trading System'
Jia Zou, Gong Su, Arun Iyengar, Yu Yuan and Yi Ge

'YSmart: Yet Another SQL-to-MapReduce Translator'
Rubao Lee, Tian Luo, Fusheng Wang, Yin Huai, Yongqiang He and Xiaodong Zhang

 

B1 : Wireless Networking

'PET: Probabilistic Estimating Tree for Large-Scale RFID Estimation'
Yuanqing Zheng, Mo Li and Chen Qian

'End-to-End Delay Analysis in Wireless Network Coding: A Network Calculus-Based Approach'
Huanzhong Li, Xue Liu, Wenbo He, Jian Li and Wenhua Dou

'Randomized Distributed Algorithms for Neighbor Discovery in Multi-Hop Multi-Channel Heterogeneous Wireless Networks'
Neeraj Mittal, Yanyan Zeng, S. Venkatesan and R. Chandrasekaran

 

C1 : Power Management

'An Energy-efficient Markov Chain-based Randomized Duty Cycling Scheme for Wireless Sensor Networks'
Giacomo Ghidini and Sajal Das

'M-PSM: Mobility-Aware Power Save Mode for IEEE 802.11 WLANs'
Xi Chen, Sunggeun Jin and Daji Qiao

'SOFA: A Sleep-Optimal Fair-Attention scheduler for the power-saving mode of WLANs'
Zheng Zeng, Yan Gao and P. R. Kumar

 

A2 : Peer - to - Peer

'Meeting the Digital Rights Requirements of Live Broadcast in a Peer-to-Peer Network'
Wenjie Wang, Hyunseok Chang, Adam Goodman, Eric Wucherer and Sugih Jamin

'Peer-to-peer Data Replication Meets Delay Tolerant Networking'
Peter Gilbert, Venugopalan Ramasubramanian, Doug Terry and Patrick Stuedi

'On the Dependencies between Source Neighbors in Optimally DoS-stable P2P Streaming Topologies'
Sascha Grau, Mathias Fischer and Guenter Schaefer

 

B2 : Distributed Systems

'Intelligent Placement of Datacenters for Internet Services'
Íñigo Goiri, Kien Le, Jordi Guitart, Jordi Torres and Ricardo Bianchini

'Data Migration in Heterogeneous Storage Systems'
Chadi Kari, Yoo-Ah Kim and Alexander Russell

'Supporting Cooperative Caching in Disruption Tolerant Networks'
Wei Gao, Guohong Cao, Arun Iyengar and Mudhakar Srivatsa

 

C2 : Communications

'Effective Channel Exploitation in IEEE 802.16j Networks for Maritime Communications'
Hanwu Wang, Weijia Jia and Geyong Min

'Accuracy-aware Interference Modeling and Measurement in Wireless Sensor Networks'
Jun Huang, Shucheng Liu, Guoliang Xing, Hongwei Zhang, Jianping Wang and Liusheng Huang

'Coolest Path: Spectrum Mobility Aware Routing Metrics in Cognitive Ad Hoc Networks'
Xiaoxia Huang, Dianjie Lu, Pan Li and Yuguang Fang

 

A3 : Algorithms

'A MapReduce-Based Maximum-Flow Algorithm for Large Small-World Network Graphs'
Felix Halim, Roland Yap and Yongzheng Wu

'The Client Assignment Problem for Continuous Distributed Interactive Applications'
Lu Zhang and Xueyan Tang

'Guidelines for Verification of Population Protocols'
Julien Clement, Carole Delporte-Gallet, Hugues Fauconnier and Mihaela Sighireanu

'Scaling Construction of Low Fan-out Overlays for Topic-based Publish/Subscribe Systems'
Chen Chen, Roman Vitenberg and Hans-Arno Jacobsen

 

B3 : Multimedia

'Efficient Online WiFi Delivery of Layered-Coding Media using Inter-layer Network Coding'
Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun Wang, Mary Comer and Amr Mohamed

'Dissecting video server selection strategies in the YouTube CDN'
Ruben Torres, Alessandro Finamore, Jesse Kim, Marco Mellia, Maurizio Munafo and Sanjay Rao

'Resource Allocation for Medium Grain Scalable Videos over Femtocell Cognitive Radio Networks'
Donglin Hu and Shiwen Mao

'CloudMedia: When Cloud on Demand Meets Video on Demand'
Yu Wu, Chuan Wu, Bo Li, Xuanjia Qiu and Francis C.M. Lau

 

C3 : Networking

'Correlated Resource Models of Internet End Hosts'
Eric Heien, Derrick Kondo and David Anderson

'Time-Dependent Broadband Pricing: Feasibility and Benefits'
Carlee Joe-Wong, Sangtae Ha and Mung Chiang

'Partitioning Network Testbed Experiments'
Wei-Min Yao and Sonia Fahmy

'TCP Congestion Avoidance Algorithm Identification'
Peng Yang, Wen Luo, Lisong Xu, Jitender Deogun and Ying Lu

 

A4 : Fault Tolerance and Dependability

'What Is Missing in Current Checkpoint Interval Models?'
Leonardo Fialho, Dolores Rexachs and Emilio Luque

'Scalable Symbolic Execution of Distributed Systems'
Raimondas Sasnauskas, Oscar Soria Dustmann, Benjamin Lucien Kaminski, Carsten Weise, Stefan Kowalewski and Klaus Wehrle

'A Scheduling and Certification Algorithm for Defeating Collusion in Desktop Grids'
Louis-Claude Canon, Emmanuel Jeannot and Jon Weissman

'Self-stabilizing (k,r)-Clustering in Wireless Ad-hoc Networks with Multiple Paths'
Andreas Larsson and Philippas Tsigas

 

B4 : Privacy

'SpotME If You Can: Randomized Responses for Location Obfuscation on Mobile Phones'
Daniele Quercia, Illias Leontiadis, Liam McNamara, Cecilia Mascolo and Jon Crowcroft

'HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare'
Jinyuan Sun, Xiaoyan Zhu, Chi Zhang and Yuguang Fang

'Authorized Private Keyword Search over Encrypted Personal Health Records in Cloud Computing'
Ming Li, Shucheng Yu, Ning Cao and Wenjing Lou

'Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing'
Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren and Wenjing Lou

 

C4 : Systems

'Delay-Cognizant Reliable Delivery for Publish/Subscribe Overlay Networks'
Shuo Guo, Kyriakos Karenos, Minkyong Kim, Hui Lei and Johnathan Reason

'Reducing the Delay and Power Consumption of Web Browsing on Smartphones in 3G networks'
Bo Zhao, Byung Chul Tak and Guohong Cao

'Energy-Aware Scheduling in Disk Storage Systems'
Jerry Chou, Jinoh Kim and Doron Rotem

'TIANS: Scheduling Large Interactive Services with Partial Results'
Yuxiong He, Sameh Elnikety and Hongyang Sun

 

A5 : Middleware

'Starlink: runtime interoperability between heterogeneous middleware protocols'
David Bromberg, Paul Grace and Laurent Reveillere

'Whisper: Middleware for Confidential Communication in Large-Scale Networks'
Valerio Schiavoni, Etienne Rivière and Pascal Felber

'sfatables: A firewall-like policy engine for federated systems'
Sapan Bhatia, Andy Bavier, Soner Sevinc and Larry Peterson

 

B5 : Sensor Networking

'Impact of Mobility and Heterogeneity on Coverage and Energy Consumption in Wireless Sensor Networks'
Xiao Wang and Xinbing Wang

'Cool: On Coverage with Solar-Powered Sensors'
Shaojie Tang, Xiang-Yang Li and Sajal Das

'LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor Networks'
Rui Zhang and Yanchao Zhang

 

C5 : Wireless Security

'Competitive and Fair Medium Access despite Reactive Jamming'
Andrea Richa, Christian Scheideler, Stefan Schmid and Jin Zhang

'Localizing Multiple Jamming Attackers in Wireless Networks'
Hongbo Liu, Zhenhua Liu, Yingying Chen and Wenyuan Xu

'JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks'
Rui Zhang, Yunzhong Liu, Yanchao Zhang and Xiaoxia Huang

 

A6 : Cloud Computing

'Cloud4Home — Enhancing Data Services with @Home Clouds'
Sudarsun Kannan, Ada Gavrilovska and Karsten Schwan

'Harnessing the Cloud for Securely Solving Large System of Linear Equations'
Cong Wang, Kui Ren, Jia Wang and Karthik Mahendra Raje Urs

'King?sher: Cost-aware Elasticity in the Cloud'
Upendra Sharma, Prashant Shenoy, Sambit Sahu and Anees Shaikh

'Economical and Robust Provisioning of N-Tier Cloud Workloads: A Multi-level Control Approach'
Pengcheng Xiong, Zhikui Wang, Simon Malkowski, Deepal Jayasinghe, Qingyang Wang and Calton Pu

 

B6 : Security and Anonymity

'Secure Aggregation with Malicious Node Revocation in Sensor Networks'
Binbin Chen and Haifeng Yu

'Defending Against Traffic Analysis in Wireless Networks through Traffic Reshaping'
Fan Zhang, Wenbo He and Xue Liu

'Confidential Gossip'
Chryssis Georgiou, Seth Gilbert and Dariusz Kowalski

'Understanding the Network and User-Targeting Properties of Web Advertising Networks'
Yong Wang, Daniel Burgener, Aleksandar Kuzmanovic and Gabriel Maci´a-Fern´andez

 

C6 : Performance

'Cache Miss Analysis for GPU Programs Based on Stack Distance Profile'
Tao Tang, Xuejun Yang and Yisong Lin

'BloomFlash: Bloom Filter on Flash-based Storage'
Biplob Debnath, Sudipta Sengupta, Jin Li, David J. Lilja, and David H.-C. Du

'Understanding Vicious Cycles in Server Clusters'
Mohammad Khan, Jin Heo, Shen Li and Tarek Abdelzaher

'Searching for Bandwidth-Constrained Clusters'
Sukhyun Song, Pete Keleher and Alan Sussman

 

A7 : Fault Tolerance

'Smart Redundancy for Distributed Computation'
Yuriy Brun, George Edwards, Jae young Bang and Nenad Medvidovic

'A Fusion-based Approach For Handling Mutiple Faults in Distributed Systems'
Bharath Balasubramanian and Vijay Garg

'Low-overhead fault tolerance for high-throughput data processing systems'
André Martin, Thomas Knauth, Diogo Becker de Brum, Stefan Weigert, Stephan Creutz, Andrey Brito and Christof Fetzer

'Guaranteeing High Availability Goals for Virtual Machine Placement'
Eyal Bin, Ofer Biran, Odellia Boni, Erez Hadad, Elliot Kolodner, Yosef Moatti and Dean Lorenz

 

B7 : Security

'Efficient and Private Access to Outsourced Data'
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi and Pierangela Samarati

'Towards Fine-Grained Access Control in JavaScript Contexts'
Kailas Patil, Xinshu Dong, Xiaolei Li, Zhenkai Liang and Xuxian Jiang

'A New Class of Buffer Overflow Attacks'
Ashish Kundu and Elisa Bertino

'Location Cheating: A Security Challenge to Location-based Social Network Services'
Mai Ren, Wenbo He and Xue Liu

 

C7 : Localization and Tracking

'A Monte Carlo Method for Mobile Target Counting'
Dengyuan Wu, Xiuzhen Cheng, Dechang Chen, Wei Cheng, Biao Chen and Wei Zhao

'Whistle: Synchronization-Free TDOA for Localization'
Bin Xu, Ran Yu, Guodong Sun, Zheng Yang and Yunhao Liu

'Bubble Trace: Mobile Target Tracking under Insufficient Anchor Coverage'
Pengpeng Chen, Ziguo Zhong and Tian He

'Efficient and Robust Localization of Multiple Radiation Sources in Complex Environments'
Jren-Chit Chin, David Yau and Nageswara Rao

 

A8 : Publish / Subscribe Systems

'Towards Approximate Event Processing in A Large-Scale Content-Based Network'
Yaxiong Zhao and Jie Wu

'Foundations for Highly Available Content-based Publish/Subscribe Overlays'
Young Yoon, Vinod Muthusamy and Hans-Arno Jacobsen

'Resource Allocation Algorithms for Publish/Subscribe Systems'
Alex King Yeung Cheung and Hans-Arno Jacobsen

'Split and Subsume: Subscription Normalization for Effective Content-based Messaging'
K. R. Jayaram and Patrick Eugster

B8 : Routing

'One More Weight is Enough: Toward the Optimal Traffic Engineering with OSPF'
Ke Xu, Hongying Liu, Jiangchuan Liu and Meng Shen

'The Routing Continuum From Shortest-path to All-path: A Unifying Theory'
Yanhua Li, Zhi-Li Zhang and Daniel Boley

'Greedy Distance Vector Routing'
Chen Qian and Simon Lam

'Making CDN and ISP Routings Symbiotic'
Varun Khare and Beichuan Zhang

 

C8 : Sensor and Ubiquitous Computing Applications

'SID: Ship Intrusion Detection With Wireless Sensor Networks'
Hanjiang Luo, Kaishun Wu, Zhongwen Guo, Lin Gu and Lionel M. Ni

'Compressive Sensing Approach to Urban Traffic Sensing'
Zhi Li, Yanmin Zhu, Hongzi Zhu and Minglu Li

'Towards Optimal Sensor Placement for Hot Server Detection in Data Centers'
Xiaodong Wang, Xiaorui Wang, Guoliang Xing, Jinzhu Chen, Cheng-Xian Lin and Yixin Chen

'E-Shadow: Lubricating Social Interaction using Mobile Phones'
Jin Teng, Boying Zhang, Xinfeng Li, Xiaole Bai and Dong Xuan

 

www.ewallpapers.org