The 31st Int'l Conference on Distributed Computing Systems (ICDCS 2011)
June 20-24, 2011 Minneapolis, Minnesota, USA
The 31st Int'l Conference on Distributed Computing Systems (ICDCS 2011)
June 20-24, 2011 Minneapolis, Minnesota, USA
Tuesday, June 21, 2011
A | B | C |
8:00 - 9:00 Registration |
||
9:00 - 9:30 Introduction and Welcome |
||
9:30 - 10:30 Keynote 1 Prof. Farnam Jahanian, National Science Foundation, USA Room: Chair: Wu-Chi Feng, Portland State University, USA |
||
10:30 - 11:00 Break |
||
11:00 - 12:30 | ||
A1 : Data Processing and Management Chair: Biplob Debnath Data Domain / EMC Corporation |
Chair: Shiwen Mao Auburn University |
Chair: Dimitrios Koutsonikolas University at Buffalo, SUNY |
12:30 - 13:30 Lunch |
||
13:30 - 15:00 | ||
Chair: Chuan Wu University of Hong Kong |
Chair: Yuriy Brun University of Washington |
Chair: Won Mee Jang University of Nebraska-Lincoln |
15:00 - 15:30 Break |
||
15:30 - 17:30 |
||
Chair: Neeraj Mittal University of Texas-Dallas |
Chair: TBD / Wu-chi Feng Portland State University |
Chair: Yingying Chen Stevens Institute of Technology |
18:00 - 20:00 Reception |
Wednesday, June 22, 2011
A | B | C | Workshop |
8:00 - 9:00 Registration |
|||
9:00 - 10:00 Keynote 2 Dr. Wen-Hann Wang, Intel Labs, USA Room: Chair: Xiaodong Zhang, The Ohio State University, USA |
|||
10:00 - 10:30 Break |
|||
10:30 - 12:30 |
|||
A4 : Fault Tolerance and Dependability Chair: Jeong-Hyon Hwang SUNY - Albany |
Chair: Xuxian Jiang North Carolina State University |
Chair: Lisong Xu University of Nebraska-Lincoln |
|
12:30 - 13:30 Lunch |
|||
13:30 - 15:00 |
|||
Chair: Patrick Eugster Purdue University |
Chair: Xiaoxia Huang Shenzhen Institutes of Advanced Technology |
Chair: Jie Wu Temple University |
Workshop SN |
15:00 - 15:30 Break |
|||
15:30 - 17:30 |
|||
Chair: Xiaorui Wang University of Tennessee-Knoxville |
Chair: Wenjing Lou Worcester Polytechnic Institute |
Chair: Luis Garces-Erice IBM Research Zurich Laboratory |
Workshop SN |
19:30 - 23:00 Conference Banquet |
Thursday, June 23, 2011
A | B | C | Workshop |
8:00 - 9:00 Registration |
|||
9:00 - 10:00 Keynote 3 Dr. Robert Bonneau, Air Force Office of Scientific Research, USA Room: Chair: David H.-C. Du, University of Minnesota, USA |
|||
10:00 - 10:30 Break |
|||
10:30 - 12:30 | |||
Chair: Anand Tripathi University of Minnesota |
Chair: Wee Keong Ng Nanyang Technological University |
C7 : Localization and Tracking Chair: Darek Kowalski University of Liverpool |
|
12:30 - 13:30 Lunch |
|||
13:30 - 15:00 | |||
Panel: Cloud Computing: Hype or Reality? Chair: Abhishek Chandra University of Minnesota |
Workshop SAHNS |
||
15:00 - 15:30 Break |
|||
15:30 - 17:30 | |||
A8 : Publish / Subscribe Systems Chair: Yang Chen University of Goettingen |
Chair: Lily Wu University of Texas-Dallas |
C8 : Sensor and Ubiquitous Computing Applications Chair: Daniele Quercia University of Cambridge |
Workshop SAHNS |
Friday, June 24, 2011
Workshops Day | |||
8:00 - 9:00 Registration |
|||
9:00 - 12:00 Workshops |
|||
Ball Room A DCPerf |
Ball Room B WWASN |
Collegiate SIMPLEX |
Big Ten SPCC |
12:00 - 13:30 Lunch |
|||
13:30 - 17:30 Workshops |
|||
Ball Room A DCPerf |
Ball Room B WWASN |
Collegiate SIMPLEX |
Big Ten SPCC |
A1 : Data Processing and Management |
'Provisioning a Multi-Tiered Data Staging Area for Extreme-Scale Machines'
Ramya Prabhakar, Sudharshan S. Vazhkudai, Youngjae Kim, Ali R. Butt, Min Li and Mahmut Kandemir
'Design and Analysis of A Distributed Multi-leg Stock Trading System'
Jia Zou, Gong Su, Arun Iyengar, Yu Yuan and Yi Ge
'YSmart: Yet Another SQL-to-MapReduce Translator'
Rubao Lee, Tian Luo, Fusheng Wang, Yin Huai, Yongqiang He and Xiaodong Zhang
B1 : Wireless Networking |
'PET: Probabilistic Estimating Tree for Large-Scale RFID Estimation'
Yuanqing Zheng, Mo Li and Chen Qian
'End-to-End Delay Analysis in Wireless Network Coding: A Network Calculus-Based Approach'
Huanzhong Li, Xue Liu, Wenbo He, Jian Li and Wenhua Dou
'Randomized Distributed Algorithms for Neighbor Discovery in Multi-Hop Multi-Channel Heterogeneous Wireless Networks'
Neeraj Mittal, Yanyan Zeng, S. Venkatesan and R. Chandrasekaran
C1 : Power Management |
'An Energy-efficient Markov Chain-based Randomized Duty Cycling Scheme for Wireless Sensor Networks'
Giacomo Ghidini and Sajal Das
'M-PSM: Mobility-Aware Power Save Mode for IEEE 802.11 WLANs'
Xi Chen, Sunggeun Jin and Daji Qiao
'SOFA: A Sleep-Optimal Fair-Attention scheduler for the power-saving mode of WLANs'
Zheng Zeng, Yan Gao and P. R. Kumar
A2 : Peer - to - Peer |
'Meeting the Digital Rights Requirements of Live Broadcast in a Peer-to-Peer Network'
Wenjie Wang, Hyunseok Chang, Adam Goodman, Eric Wucherer and Sugih Jamin
'Peer-to-peer Data Replication Meets Delay Tolerant Networking'
Peter Gilbert, Venugopalan Ramasubramanian, Doug Terry and Patrick Stuedi
'On the Dependencies between Source Neighbors in Optimally DoS-stable P2P Streaming Topologies'
Sascha Grau, Mathias Fischer and Guenter Schaefer
B2 : Distributed Systems |
'Intelligent Placement of Datacenters for Internet Services'
Íñigo Goiri, Kien Le, Jordi Guitart, Jordi Torres and Ricardo Bianchini
'Data Migration in Heterogeneous Storage Systems'
Chadi Kari, Yoo-Ah Kim and Alexander Russell
'Supporting Cooperative Caching in Disruption Tolerant Networks'
Wei Gao, Guohong Cao, Arun Iyengar and Mudhakar Srivatsa
C2 : Communications |
'Effective Channel Exploitation in IEEE 802.16j Networks for Maritime Communications'
Hanwu Wang, Weijia Jia and Geyong Min
'Accuracy-aware Interference Modeling and Measurement in Wireless Sensor Networks'
Jun Huang, Shucheng Liu, Guoliang Xing, Hongwei Zhang, Jianping Wang and Liusheng Huang
'Coolest Path: Spectrum Mobility Aware Routing Metrics in Cognitive Ad Hoc Networks'
Xiaoxia Huang, Dianjie Lu, Pan Li and Yuguang Fang
A3 : Algorithms |
'A MapReduce-Based Maximum-Flow Algorithm for Large Small-World Network Graphs'
Felix Halim, Roland Yap and Yongzheng Wu
'The Client Assignment Problem for Continuous Distributed Interactive Applications'
Lu Zhang and Xueyan Tang
'Guidelines for Verification of Population Protocols'
Julien Clement, Carole Delporte-Gallet, Hugues Fauconnier and Mihaela Sighireanu
'Scaling Construction of Low Fan-out Overlays for Topic-based Publish/Subscribe Systems'
Chen Chen, Roman Vitenberg and Hans-Arno Jacobsen
B3 : Multimedia |
'Efficient Online WiFi Delivery of Layered-Coding Media using Inter-layer Network Coding'
Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun Wang, Mary Comer and Amr Mohamed
'Dissecting video server selection strategies in the YouTube CDN'
Ruben Torres, Alessandro Finamore, Jesse Kim, Marco Mellia, Maurizio Munafo and Sanjay Rao
'Resource Allocation for Medium Grain Scalable Videos over Femtocell Cognitive Radio Networks'
Donglin Hu and Shiwen Mao
'CloudMedia: When Cloud on Demand Meets Video on Demand'
Yu Wu, Chuan Wu, Bo Li, Xuanjia Qiu and Francis C.M. Lau
C3 : Networking |
'Correlated Resource Models of Internet End Hosts'
Eric Heien, Derrick Kondo and David Anderson
'Time-Dependent Broadband Pricing: Feasibility and Benefits'
Carlee Joe-Wong, Sangtae Ha and Mung Chiang
'Partitioning Network Testbed Experiments'
Wei-Min Yao and Sonia Fahmy
'TCP Congestion Avoidance Algorithm Identification'
Peng Yang, Wen Luo, Lisong Xu, Jitender Deogun and Ying Lu
A4 : Fault Tolerance and Dependability |
'What Is Missing in Current Checkpoint Interval Models?'
Leonardo Fialho, Dolores Rexachs and Emilio Luque
'Scalable Symbolic Execution of Distributed Systems'
Raimondas Sasnauskas, Oscar Soria Dustmann, Benjamin Lucien Kaminski, Carsten Weise, Stefan Kowalewski and Klaus Wehrle
'A Scheduling and Certification Algorithm for Defeating Collusion in Desktop Grids'
Louis-Claude Canon, Emmanuel Jeannot and Jon Weissman
'Self-stabilizing (k,r)-Clustering in Wireless Ad-hoc Networks with Multiple Paths'
Andreas Larsson and Philippas Tsigas
B4 : Privacy |
'SpotME If You Can: Randomized Responses for Location Obfuscation on Mobile Phones'
Daniele Quercia, Illias Leontiadis, Liam McNamara, Cecilia Mascolo and Jon Crowcroft
'HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare'
Jinyuan Sun, Xiaoyan Zhu, Chi Zhang and Yuguang Fang
'Authorized Private Keyword Search over Encrypted Personal Health Records in Cloud Computing'
Ming Li, Shucheng Yu, Ning Cao and Wenjing Lou
'Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing'
Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren and Wenjing Lou
C4 : Systems |
'Delay-Cognizant Reliable Delivery for Publish/Subscribe Overlay Networks'
Shuo Guo, Kyriakos Karenos, Minkyong Kim, Hui Lei and Johnathan Reason
'Reducing the Delay and Power Consumption of Web Browsing on Smartphones in 3G networks'
Bo Zhao, Byung Chul Tak and Guohong Cao
'Energy-Aware Scheduling in Disk Storage Systems'
Jerry Chou, Jinoh Kim and Doron Rotem
'TIANS: Scheduling Large Interactive Services with Partial Results'
Yuxiong He, Sameh Elnikety and Hongyang Sun
A5 : Middleware |
'Starlink: runtime interoperability between heterogeneous middleware protocols'
David Bromberg, Paul Grace and Laurent Reveillere
'Whisper: Middleware for Confidential Communication in Large-Scale Networks'
Valerio Schiavoni, Etienne Rivière and Pascal Felber
'sfatables: A firewall-like policy engine for federated systems'
Sapan Bhatia, Andy Bavier, Soner Sevinc and Larry Peterson
B5 : Sensor Networking |
'Impact of Mobility and Heterogeneity on Coverage and Energy Consumption in Wireless Sensor Networks'
Xiao Wang and Xinbing Wang
'Cool: On Coverage with Solar-Powered Sensors'
Shaojie Tang, Xiang-Yang Li and Sajal Das
'LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor Networks'
Rui Zhang and Yanchao Zhang
C5 : Wireless Security |
'Competitive and Fair Medium Access despite Reactive Jamming'
Andrea Richa, Christian Scheideler, Stefan Schmid and Jin Zhang
'Localizing Multiple Jamming Attackers in Wireless Networks'
Hongbo Liu, Zhenhua Liu, Yingying Chen and Wenyuan Xu
'JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks'
Rui Zhang, Yunzhong Liu, Yanchao Zhang and Xiaoxia Huang
A6 : Cloud Computing |
'Cloud4Home — Enhancing Data Services with @Home Clouds'
Sudarsun Kannan, Ada Gavrilovska and Karsten Schwan
'Harnessing the Cloud for Securely Solving Large System of Linear Equations'
Cong Wang, Kui Ren, Jia Wang and Karthik Mahendra Raje Urs
'King?sher: Cost-aware Elasticity in the Cloud'
Upendra Sharma, Prashant Shenoy, Sambit Sahu and Anees Shaikh
'Economical and Robust Provisioning of N-Tier Cloud Workloads: A Multi-level Control Approach'
Pengcheng Xiong, Zhikui Wang, Simon Malkowski, Deepal Jayasinghe, Qingyang Wang and Calton Pu
B6 : Security and Anonymity |
'Secure Aggregation with Malicious Node Revocation in Sensor Networks'
Binbin Chen and Haifeng Yu
'Defending Against Traffic Analysis in Wireless Networks through Traffic Reshaping'
Fan Zhang, Wenbo He and Xue Liu
'Confidential Gossip'
Chryssis Georgiou, Seth Gilbert and Dariusz Kowalski
'Understanding the Network and User-Targeting Properties of Web Advertising Networks'
Yong Wang, Daniel Burgener, Aleksandar Kuzmanovic and Gabriel Maci´a-Fern´andez
C6 : Performance |
'Cache Miss Analysis for GPU Programs Based on Stack Distance Profile'
Tao Tang, Xuejun Yang and Yisong Lin
'BloomFlash: Bloom Filter on Flash-based Storage'
Biplob Debnath, Sudipta Sengupta, Jin Li, David J. Lilja, and David H.-C. Du
'Understanding Vicious Cycles in Server Clusters'
Mohammad Khan, Jin Heo, Shen Li and Tarek Abdelzaher
'Searching for Bandwidth-Constrained Clusters'
Sukhyun Song, Pete Keleher and Alan Sussman
A7 : Fault Tolerance |
'Smart Redundancy for Distributed Computation'
Yuriy Brun, George Edwards, Jae young Bang and Nenad Medvidovic
'A Fusion-based Approach For Handling Mutiple Faults in Distributed Systems'
Bharath Balasubramanian and Vijay Garg
'Low-overhead fault tolerance for high-throughput data processing systems'
André Martin, Thomas Knauth, Diogo Becker de Brum, Stefan Weigert, Stephan Creutz, Andrey Brito and Christof Fetzer
'Guaranteeing High Availability Goals for Virtual Machine Placement'
Eyal Bin, Ofer Biran, Odellia Boni, Erez Hadad, Elliot Kolodner, Yosef Moatti and Dean Lorenz
B7 : Security |
'Efficient and Private Access to Outsourced Data'
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi and Pierangela Samarati
'Towards Fine-Grained Access Control in JavaScript Contexts'
Kailas Patil, Xinshu Dong, Xiaolei Li, Zhenkai Liang and Xuxian Jiang
'A New Class of Buffer Overflow Attacks'
Ashish Kundu and Elisa Bertino
'Location Cheating: A Security Challenge to Location-based Social Network Services'
Mai Ren, Wenbo He and Xue Liu
C7 : Localization and Tracking |
'A Monte Carlo Method for Mobile Target Counting'
Dengyuan Wu, Xiuzhen Cheng, Dechang Chen, Wei Cheng, Biao Chen and Wei Zhao
'Whistle: Synchronization-Free TDOA for Localization'
Bin Xu, Ran Yu, Guodong Sun, Zheng Yang and Yunhao Liu
'Bubble Trace: Mobile Target Tracking under Insufficient Anchor Coverage'
Pengpeng Chen, Ziguo Zhong and Tian He
'Efficient and Robust Localization of Multiple Radiation Sources in Complex Environments'
Jren-Chit Chin, David Yau and Nageswara Rao
A8 : Publish / Subscribe Systems |
'Towards Approximate Event Processing in A Large-Scale Content-Based Network'
Yaxiong Zhao and Jie Wu
'Foundations for Highly Available Content-based Publish/Subscribe Overlays'
Young Yoon, Vinod Muthusamy and Hans-Arno Jacobsen
'Resource Allocation Algorithms for Publish/Subscribe Systems'
Alex King Yeung Cheung and Hans-Arno Jacobsen
'Split and Subsume: Subscription Normalization for Effective Content-based Messaging'
K. R. Jayaram and Patrick Eugster
B8 : Routing |
'One More Weight is Enough: Toward the Optimal Traffic Engineering with OSPF'
Ke Xu, Hongying Liu, Jiangchuan Liu and Meng Shen
'The Routing Continuum From Shortest-path to All-path: A Unifying Theory'
Yanhua Li, Zhi-Li Zhang and Daniel Boley
'Greedy Distance Vector Routing'
Chen Qian and Simon Lam
'Making CDN and ISP Routings Symbiotic'
Varun Khare and Beichuan Zhang
C8 : Sensor and Ubiquitous Computing Applications |
'SID: Ship Intrusion Detection With Wireless Sensor Networks'
Hanjiang Luo, Kaishun Wu, Zhongwen Guo, Lin Gu and Lionel M. Ni
'Compressive Sensing Approach to Urban Traffic Sensing'
Zhi Li, Yanmin Zhu, Hongzi Zhu and Minglu Li
'Towards Optimal Sensor Placement for Hot Server Detection in Data Centers'
Xiaodong Wang, Xiaorui Wang, Guoliang Xing, Jinzhu Chen, Cheng-Xian Lin and Yixin Chen
'E-Shadow: Lubricating Social Interaction using Mobile Phones'
Jin Teng, Boying Zhang, Xinfeng Li, Xiaole Bai and Dong Xuan
www.ewallpapers.org