2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS)

26-29 Sept. 2017

Filter Results

Displaying Results 1 - 25 of 45
  • [Front cover]

    Publication Year: 2017, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2607 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2017, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2017, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • Message from the General Co-Chairs

    Publication Year: 2017, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (132 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Technical Program Co-Chairs

    Publication Year: 2017, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (113 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2017, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2017, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • External Reviewers

    Publication Year: 2017, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Fine-Grained Consistency Upgrades for Online Services

    Publication Year: 2017, Page(s):1 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (995 KB) | HTML iconHTML

    Online services such as Facebook or Twitter have public APIs to enable an easy integration of these services with third party applications. However, the developers who design these applications have no information about the consistency provided by these services, which exacerbates the complexity of reasoning about the semantics of the applications they are developing. In this paper, we show that i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Practical Framework for Privacy-Preserving NoSQL Databases

    Publication Year: 2017, Page(s):11 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1028 KB) | HTML iconHTML

    Cloud infrastructures provide database services as cost-efficient and scalable solutions for storing and processing large amounts of data. To maximize performance, these services require users to trust sensitive information to the cloud provider, which raises privacy and legal concerns. This represents a major obstacle to the adoption of the cloud computing paradigm. Recent work addressed this iss... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parameterized and Runtime-Tunable Snapshot Isolation in Distributed Transactional Key-Value Stores

    Publication Year: 2017, Page(s):21 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (988 KB) | HTML iconHTML

    Several relaxed variants of Snapshot Isolation (SI) have been proposed for improved performance in distributed transactional key-value stores. These relaxed variants, however, provide no specification or control of the severity of the anomalies with respect to SI. They have also been designed to be used statically throughout the whole system life cycle. To overcome these drawbacks, we propose the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Multi-Resource Allocation with Demand Uncertainties in Cloud Scheduler

    Publication Year: 2017, Page(s):34 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (939 KB) | HTML iconHTML

    Cloud scheduler manages multi-resources (e.g., CPU, GPU, memory, storage etc.) in cloud platform to improve resource utilization and achieve cost-efficiency for cloud providers. The optimal allocation for multi-resources has become a key technique in cloud computing and attracted more and more researchers' attentions. The existing multi-resource allocation methods are developed based on a conditio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stateless Reliable Geocasting

    Publication Year: 2017, Page(s):44 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    We present two geometric routing algorithms that reliably deliver messages to all devices in a geocast region. One algorithm is based on flooding, the other on concurrent geometric routing. They are the fist known stateless geocasting algorithms. We formally prove the algorithms correct, evaluate their performance through abstract and concrete simulation and estimate their message complexity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controlling Cascading Failures in Interdependent Networks under Incomplete Knowledge

    Publication Year: 2017, Page(s):54 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (737 KB) | HTML iconHTML

    Vulnerability due to inter-connectivity of multiple networks has been observed in many complex networks. Previous works mainly focused on robust network design and on recovery strategies after sporadic or massive failures in the case of complete knowledge of failure location. We focus on cascading failures involving the power grid and its communication network with consequent imprecision in damage... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Availability for Blockchain-Based Systems

    Publication Year: 2017, Page(s):64 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (834 KB) | HTML iconHTML

    Blockchain has recently gained momentum. Startups, enterprises, banks, and government agencies around the world are exploring the use of blockchain for broad applications including public registries, supply chains, health records, and voting. Dependability properties, like availability, are critical for many of these applications, but the guarantees offered by the blockchain technology remain uncl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Horizontally Scalable and Reliable Architecture for Location-Based Publish-Subscribe

    Publication Year: 2017, Page(s):74 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1159 KB) | HTML iconHTML

    With billions of connected users and objects, location-based services face a massive scalability challenge. We propose a horizontally-scalable and reliable location-based publish/subscribe architecture that can be deployed on a cluster made of commodity hardware. As many modern location-based publish/subscribe systems, our architecture supports moving publishers, as well as moving subscribers. Whe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Robustness of a Neural Network

    Publication Year: 2017, Page(s):84 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1453 KB) | HTML iconHTML

    With the development of neural networks based machine learning and their usage in mission critical applications, voices are rising against the black box aspect of neural networks as it becomes crucial to understand their limits and capabilities. With the rise of neuromorphic hardware, it is even more critical to understand how a neural network, as a distributed system, tolerates the failures of it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Fine Tuning of Probabilistic Self-Stabilizing Algorithms

    Publication Year: 2017, Page(s):94 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (550 KB) | HTML iconHTML

    Although randomized algorithms have widely been used in distributed computing as a means to tackle impossibility results, it is currently unclear what type of randomization leads to the best performance in such algorithms. This paper proposes three automated techniques to find the probability distribution that achieves minimum average recovery time for an input randomized distributed self-stabiliz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconfiguring Parallel State Machine Replication

    Publication Year: 2017, Page(s):104 - 113
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (547 KB) | HTML iconHTML

    State Machine Replication (SMR) is a well-known technique to implement fault-tolerant systems. In SMR, servers are replicated and client requests are deterministically executed in the same order by all replicas. To improve performance in multi-processor systems, some approaches have proposed to parallelize the execution of non-conflicting requests. Such approaches perform remarkably well in worklo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Statistical Framework on Software Aging Modeling with Continuous-Time Hidden Markov Model

    Publication Year: 2017, Page(s):114 - 123
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (526 KB) | HTML iconHTML

    This paper considers the statistical approach to model software degradation process from time series data of system attributes. We first develop the continuous-time Markov chain (CTMC) model to represent the degradation level of system. By combining the CTMC with system attributes distributions, a continuous-time hidden Markov model (CT-HMM) is proposed as the basic model to represent the degradat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid-RC: Flexible Erasure Codes with Optimized Recovery Performance and Low Storage Overhead

    Publication Year: 2017, Page(s):124 - 133
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (633 KB) | HTML iconHTML

    Erasure codes are widely used in practical storage systems to prevent disk failure and data loss. However, these codes require excessive disk I/Os and network traffic for recovering unavailable data. As a result, the recovery performance of erasure codes is suboptimal. Among all erasure codes, Minimum Storage Regenerating (MSR) codes can achieve optimal repair bandwidth under the minimum storage d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correlation-Aware Stripe Organization for Efficient Writes in Erasure-Coded Storage Systems

    Publication Year: 2017, Page(s):134 - 143
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1371 KB) | HTML iconHTML

    Erasure coding has been extensively employed for data availability protection in production storage systems by maintaining a low degree of data redundancy. However, how to mitigate the parity update overhead of partial stripe writes in erasure-coded storage systems is still a critical concern. In this paper, we reconsider this problem from two new perspectives: data correlation and stripe organiza... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simulation Analysis of Reliability in Erasure-Coded Data Centers

    Publication Year: 2017, Page(s):144 - 153
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB) | HTML iconHTML

    Erasure coding has been widely adopted to protect data storage against failures in production data centers. Given the hierarchical nature of data centers, characterizing the effects of erasure coding and redundancy placement on the reliability of erasure-coded data centers is critical yet largely unexplored. This paper presents a comprehensive simulation analysis of reliability on erasure-coded da... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.