Notice
There is currently an issue with the citation download feature. Learn more

2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW)

Sept. 28 2015-Oct. 1 2015

Filter Results

Displaying Results 1 - 25 of 25
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (911 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Message from Workshop Co-chairs

    Publication Year: 2015, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (111 KB) | HTML iconHTML
    Freely Available from IEEE
  • Workshop Organization

    Publication Year: 2015, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2015, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2015, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • A Client-Based Replication Protocol for Multiversion Cloud File Storage

    Publication Year: 2015, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    In recent years, data replication have received attention in terms of tolerance for large-scale disasters. Also, file versioning features, by which more than one version of a file can be maintained, have been commercially available in some storage services. For providing file versioning with limited storage resources, it is essential to divide the resources among versions in accordance with the va... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling the Autoscaling Operations in Cloud with Time Series Data

    Publication Year: 2015, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1030 KB) | HTML iconHTML

    Autoscaling involves complex cloud operations that automate the provisioning and de-provisioning of cloud resources to support continuous development of customer services. Autoscaling depends on a number of decisions derived by aggregating metrics at the infrastructure and the platform level. In this paper, we review existing autoscaling techniques deployed in leading cloud providers. We identify ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hard Drive Failure Prediction Using Big Data

    Publication Year: 2015, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    We design a general framework named Hdoctor for hard drive failure prediction. Hdoctor leverages the power of big data to achieve a significant improvement comparing to all previous researches that used sophisticated machine learning algorithms. Hdoctor exhibits a series of engineering innovations: (1) constructing time dependent features to characterize the Self-Monitoring, Analysis and Reporting... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building Secure Applications Using Pattern-Based Design Fragments

    Publication Year: 2015, Page(s):19 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1132 KB) | HTML iconHTML

    Developing and operating a complex secure application with high assurance is difficult and requires experts. Security patterns and best practices have been proposed to assist architects in designing secure applications. However, these are usually written independently of the underlying platforms and operating environment. This leads to a gap between patterns and the platforms, and does not directl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural Support for DevOps in a Neo-Metropolis BDaaS Platform

    Publication Year: 2015, Page(s):25 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (969 KB) | HTML iconHTML

    Big data as a Service (BDaaS) provides a viable strategy for organizations to implement scalable, tailorable big data infrastructure and applications built on this infrastructure. New trends in the BDaaS market are moving toward an open world model -- what we call the Neo-Metropolis model -- for developing BDaaS platforms. The key to the success of such large-scale technology-agnostic platforms, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Monitoring and Reconfiguration Approach for Adaptive Network Computing

    Publication Year: 2015, Page(s):31 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (830 KB) | HTML iconHTML

    The past decade has witnessed immense developments in the field of network computing thanks to the rise of the cloud computing paradigm, which enables shared access to a wealth of computing and storage resources without needing to own them. While cloud computing facilitates on-demand deployment, mobility and collaboration of services, mechanisms for enforcing security and performance constraints w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SMS Botnet Detection for Android Devices through Intent Capture and Modeling

    Publication Year: 2015, Page(s):36 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    Mobile devices are subject to an increased attack surface vector as compared to desktop computing, due to the nature of sensors, radios, and increased peripherals. We investigate in this work mobile botnets with a specific focus on Android, which is the most widely adopted mobile platform, and a prime target for malicious software, 79% of reported malware threats to mobile operating systems are ta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Use of Mobile GPU for Accelerating Malware Detection Using Trace Analysis

    Publication Year: 2015, Page(s):42 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB) | HTML iconHTML

    Malware detection on mobile phones involves analysing and matching large amount of data streams against a set of known malware signatures. Unfortunately, as the number of threats grows continuously, the number of malware signatures grows proportionally. This is time consuming and leads to expensive computation costs, especially for mobile devices where memory, power and computation capabilities ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Dissemination of Video Data in Vehicle-to-Vehicle Systems

    Publication Year: 2015, Page(s):47 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3164 KB) | HTML iconHTML

    Data exchange between vehicles and base stations may contain information on traffic accidents, traffic jams, road constructions etc. Risks to data privacy in vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) systems need be minimized. We present a policybased solution that provides controlled and privacypreserving dissemination of video data in V2V and V2I. This policy-based solution re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conflict Graph Based Channel Allocation in Cognitive Radio Networks

    Publication Year: 2015, Page(s):52 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    Cognitive radio technology provides a framework for flexible way to utilize the white spaces using the various spectrum sharing techniques. Interference plays an important role in communication when the channels are shared by the licensed and unlicensed users. Further, the signal to interference plus noise ratio also provide the bounds for the channel capacity. For this the authors introduce a con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks

    Publication Year: 2015, Page(s):57 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (490 KB) | HTML iconHTML

    We propose application of Opportunistic Resource Utilization Networks (Oppnets), a novel type of Mobile Ad Hoc NETworks (MANETs), for ad hoc networking of Unmanned Aerial Vehicles (UAVs) in surveillance missions. Oppnets provide effective resource virtualization and adaption to highly dynamic and unstable nature of MANETs. They can be viewed as middleware to facilitate building flexible and adapti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selective Hearing: An Approach to Distributed, Eventually Consistent Edge Computation

    Publication Year: 2015, Page(s):62 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (965 KB) | HTML iconHTML

    We present a new programming model for large-scale mobile and "Internet of Things" style distributed applications. The model consists of two layers: a language layer based on the Lasp language with a runtime layer based on epidemic broadcast. The Lasp layer provides deterministic coordination-free computation primitives based on conflict-free replicated data types (CRDTs). The epidemic broadcast l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exactly-Once Quantity Transfer

    Publication Year: 2015, Page(s):68 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    Strongly consistent systems supporting distributed transactions can be prone to high latency and do not tolerate partitions. The present trend of using weaker forms of consistency, to achieve high availability, poses notable challenges in writing applications due to the lack of linearizability, e.g., to ensure global invariants, or perform mutator operations on a distributed datatype. This paper a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scaling Geo-replicated Databases to the MEC Environment

    Publication Year: 2015, Page(s):74 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    The Mobile-Edge Computing standard promises co-locating edge servers with mobile phone base stations. Web services running on this new ecosystem will have to address the challenges of this new model in order to see its benefits. In this work, we briefly discuss design guidelines for scaling strongly consistent geo-distributed databases to the MEC environment. Following these guidelines, we present... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2015, Page(s): 80
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • Publisher's Information

    Publication Year: 2015, Page(s): 82
    Request permission for commercial reuse | PDF file iconPDF (170 KB)
    Freely Available from IEEE