


default search action
34. SRDS 2015: Montreal, QC, Canada
- 34th IEEE Symposium on Reliable Distributed Systems, SRDS 2015, Montreal, QC, Canada, September 28 - October 1, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-9302-7

Cloud Computing
- Luciana Arantes, Roy Friedman, Olivier Marin

, Pierre Sens
:
Probabilistic Byzantine Tolerance for Cloud Computing. 1-10 - Bernardo Ferreira

, João Rodrigues, João Leitão
, Henrique João L. Domingos
:
Privacy-Preserving Content-Based Image Retrieval in the Cloud. 11-20 - Rui Zhao, Chuan Yue, Byung-Chul Tak, Chunqiang Tang:

SafeSky: A Secure Cloud Storage Middleware for End-User Applications. 21-30 - Valter Balegas, Diogo Serra, Sérgio Duarte

, Carla Ferreira
, Marc Shapiro, Rodrigo Rodrigues, Nuno M. Preguiça
:
Extending Eventually Consistent Cloud Databases for Enforcing Numeric Invariants. 31-36
Recovery and Stabilization
- Reza Hajisheykhi, Mohammad Roohitavaf, Sandeep S. Kulkarni:

Auditable Restoration of Distributed Programs. 37-46 - Shiyi Li, Qiang Cao, Lei Tian, Shenggang Wan, Lu Qian, Changsheng Xie:

PSG-Codes: An Erasure Codes Family with High Fault Tolerance and Fast Recovery. 47-57 - Oday Jubran, Oliver E. Theel:

Recurrence in Self-Stabilization. 58-67 - Daniel Sun, Daniel Guimarans

, Alan D. Fekete, Vincent Gramoli, Liming Zhu
:
Multi-objective Optimisation of Rolling Upgrade Allowing for Failures in Clouds. 68-73
Security and Safety
- Daniel Germanus, Hatem Ismail, Neeraj Suri

:
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation. 74-83 - Sergei Arnautov, Christof Fetzer:

ControlFreak: Signature Chaining to Counter Control Flow Attacks. 84-93 - Paul Wood, Christopher N. Gutierrez, Saurabh Bagchi:

Denial of Service Elusion (DoSE): Keeping Clients Connected for Less. 94-103 - Vasily A. Sartakov, Arthur Martens, Rüdiger Kapitza:

Temporality a NVRAM-based Virtualization Platform. 104-109
Sensors and Mobility
- Lei Dong, Xuan Chen, Jianxiang Zhu, Hong Chen, Ke Wang, Cuiping Li:

A Secure Collusion-Aware and Probability-Aware Range Query Processing in Tiered Sensor Networks. 110-119 - Xing Gao, Dachuan Liu, Haining Wang, Kun Sun:

PmDroid: Permission Supervision for Android Advertising. 120-129 - Takuji Tsuda, Yuka Komai, Takahiro Hara, Shojiro Nishio:

Signature-Based Top-k Query Processing against Data Replacement Attacks in MANETs. 130-139 - Azad Ali, Abdelmajid Khelil

, Neeraj Suri
:
FTDE: Distributed Fault Tolerance for WSN Data Collection and Compression Schemes. 140-145
Replication
- João Sousa

, Alysson Bessani
:
Separating the WHEAT from the Chaff: An Empirical Design for Geo-Replicated State Machines. 146-155 - Leander Jehl

, Tormod Erevik Lea, Hein Meling:
Replacement: Decentralized Failure Handling for Replicated State Machines. 156-165 - Nico Kruber, Maik Lange, Florian Schintke:

Approximate Hash-Based Set Reconciliation for Distributed Replica Repair. 166-175 - Bruno Vavala, Nuno Ferreira Neves

, Peter Steenkiste
:
Securing Passive Replication through Verification. 176-181
Storage and Systems Behavior
- Yongzhe Zhang, Chentao Wu, Jie Li

, Minyi Guo:
PCM: A Parity-Check Matrix Based Approach to Improve Decoding Performance of XOR-based Erasure Codes. 182-191 - Yan Tang, Jianwei Yin, Wei Lo, Ying Li, ShuiGuang Deng

, Kexiong Dong, Calton Pu:
MICS: Mingling Chained Storage Combining Replication and Erasure Coding. 192-201 - Javier Álvarez Cid-Fuentes, Claudia Szabo

, Katrina Falkner
:
Online Behavior Identification in Distributed Systems. 202-211 - Qing Liu, Dan Feng, Hong Jiang, Yuchong Hu, Tianfeng Jiao:

Z Codes: General Systematic Erasure Codes with Optimal Repair Bandwidth and Storage for Distributed Storage Systems. 212-217
Nominated Best Papers
- Vimal Kumar, Sanjay Madria:

Distributed Attribute Based Access Control of Aggregated Data in Sensor Clouds. 218-227 - Zhirong Shen, Jiwu Shu, Yingxun Fu:

Seek-Efficient I/O Optimization in Single Failure Recovery for XOR-coded Storage Systems. 228-237 - Alexandre Maurer, Sébastien Tixeuil, Xavier Défago

:
Communicating Reliably in Multihop Dynamic Networks Despite Byzantine Failures. 238-245
Algorithms and Analysis
- Dacfey Dzung, Rachid Guerraoui

, David Kozhaya, Yvonne-Anne Pignolet:
To Transmit Now or Not to Transmit Now. 246-255 - Carlos Eduardo Benevides Bezerra, Daniel Cason, Fernando Pedone

:
Ridge: High-Throughput, Low-Latency Atomic Multicast. 256-265 - Emmanuelle Anceaume, Yann Busnel

, Nicolo Rivetti, Bruno Sericola:
Identifying Global Icebergs in Distributed Streams. 266-275
Experience Papers
- Guido Lena Cota, Sonia Ben Mokhtar

, Julia Lawall, Gilles Muller, Gabriele Gianini
, Ernesto Damiani
, Lionel Brunie:
A Framework for the Design Configuration of Accountable Selfish-Resilient Peer-to-Peer Systems. 276-285 - Daniel Cason, Parisa Jalili Marandi, Luiz Eduardo Buzato, Fernando Pedone

:
Chasing the Tail of Atomic Broadcast Protocols. 286-295 - Rodrigo Sanches Miani, Bruno Bogaz Zarpelão, Bertrand Sobesto, Michel Cukier:

A Practical Experience on Evaluating Intrusion Prevention System Event Data as Indicators of Security Issues. 296-305

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














