icdcs 2017: program at a glanceicdcs2017.gatech.edu/.../icdcs2017-program-posting-v17.pdfvision/blue...

Post on 26-Apr-2018

231 Views

Category:

Documents

5 Downloads

Preview:

Click to see full reader

TRANSCRIPT

1

ICDCS 2017

IEEE 37th International Conference on Distributed Computing Systems

June 5-8, 2017 Atlanta, USA

Editors

Dr. Kisung Lee Louisiana State University, USA

Dr. Ling Liu Georgia Institute of Technology, USA

2

Table of Contents

Conference Hotel Floor Plan .................................................................................................. 3

Message from the General Chairs and PC Chair .................................................................... 4

Organizing Committee ............................................................................................................ 6

Program Committee ................................................................................................................ 7

Keynotes ............................................................................................................................... 16

Program at a Glance ............................................................................................................. 19

Day 1 – Monday, June 5, 2017 .............................................................................................. 21

Day 2 – Tuesday, June 6, 2017 ............................................................................................. 28

Day 3 – Wednesday, June 7, 2017 ........................................................................................ 39

Day 4 – Thursday, June 8, 2017 ............................................................................................ 49

Research Track Paper Abstracts ......................................................................................... 55

Industry and Experimentation Track Paper Abstracts ........................................................ 73

Applications and Experiences Track Paper Abstracts ........................................................ 76

Vision/Blue Sky Thinking Track Paper Abstracts ................................................................ 88

Short Paper Abstracts .......................................................................................................... 95

Demonstration Track Paper Abstracts .............................................................................. 108

Poster Track Paper Abstracts ............................................................................................ 112

Tutorial Abstracts ............................................................................................................... 119

ADSN 2017 Workshop Abstracts ........................................................................................ 121

BGP 2017 Workshop Abstracts .......................................................................................... 122

CCN-CPS 2017 Workshop Abstracts .................................................................................. 124

HotPOST 2017 Workshop Abstracts .................................................................................. 127

IoTCA 2017 Workshop Abstracts ....................................................................................... 129

JCC 2017 Workshop Abstracts ........................................................................................... 131

PED 2017 Workshop Abstracts ........................................................................................... 134

PSBD 2017 Workshop Abstracts ........................................................................................ 135

WoSC 2017 Workshop Abstracts ........................................................................................ 136

NSF-JST 2017 Workshop Abstracts ................................................................................... 137

Local Information ............................................................................................................... 138

3

Conference Hotel Floor Plan

4

Message from the General Chairs and PC Chair

WewouldliketowelcomeyoutoICDCS2017,the37thIEEEInternationalConferenceonDistributedComputingSystems,beingheldfromJune5toJune8,2017,inAtlanta,Georgia,USA.TheconferenceisheldintheJ.W.MarriottHotel,convenientlylocatedinBuckhead,Atlanta.

Asapremierforumforthepresentationofresearchresultsonabroaderspectrumofdistributedcomputingsystems,the2017ICDCScontinuesthetraditionwithsimilarorganizationalstructure,andintroducessomeinnovations.

Theresearchtrackshavereceivedatotalof531originalsubmissionstotheelevenresearchtracks.Eachpaperwasreviewedbyatleastthreeindependentreviewers,anddiscussedduringtheonlinePCmeetingheldbytrackchairs.Furthermore,thetoprankedpapersfromeachtrackwerefurtherdiscussedduringthefacetofacetrackchairsmeetingheldatGeorgiaInstituteofTechnologyinAtlanta.Atotalof89papershavebeenacceptedbytheresearchtrackswiththeacceptanceratioof16.8%.Wewouldliketoexpressourheartfeltthankstoallofthetrackchairs:MichaelKozuchandAnshulGandhi(CloudandDataCenters),SrinivasAluru(BigDataSystemsandAnalytics),FredDouglis(OSandMiddleware),DougBlough(DistributedFaultTolerantComputing),ElisaBertino(Security,PrivacyandTrust),KarthikSundaresan(WirelessandMobileComputing),KuiRen(DistributedAlgorithms),CanturkIsci(DistributedGreenComputing),ThiemoVoigt(InternetofThingsandCyberPhysicalSystems),WeisongShiandTaoZhang(EdgeandFogComputing),MunindarSingh(SocialandCrowdComputing).

Inaddition,ICDCS2017technicalprogramalsoconsistsofindustrialandexperimentationsessions,applicationsandexperiencessessions,shortpaperssessions,postersanddemossessions,tutorials,andco-locatedworkshops.AnothertwohighlightsofICDCS2017are:(1)thethreekeynotesbydistinguishedspeakers:Dr.C.MohanfromIBMAlmaden,Prof.Dr.TamerOzsufromWaterlooUniversity,andDr.KennethCalvertfromNationalScienceFoundation,and(2)theBlueSkyeIdeasandVisionsessionsfeaturingthought-provokingandforwardlookingblueskyideasandvisionsonbroaderspectrumsoffuturedistributedcomputingsystems.Inaddition,the2017ICDCSmainconferenceisprecededbyeightco-locatedworkshops,describedintheworkshopchairs’message.Theseworkshopsprovideanopportunityforsmallgroupsoflike-mindedresearcherstodiscussareasofinterestandnewideas,andwearepleasedtoseeadiverseecosystemofworkshopsatICDCS.

Thesuccessof2017ICDCSreliedonthecontributionsofagreatteamofvolunteers,includingtheprogramcommitteemembersfromalltracks.Wewouldliketothankallofthemfortheirtime,highqualityservice,andtirelessefforts.Wewouldliketoexpressourspecialappreciationtotheindustryandexperimentationchairs(ScottKlasky,AameekSingh),theblueskyideasandvisiontrackchairs(ManfredHauswirth,ManishParashar),theapplicationsandexperienceschairs(SongqingChen,SangeethaSeshadri),theshortpaperchairs(LaksmishRamaswamy,JianweiYin),andthedemoandposterstrackchairs(GeraldLofstead,BalajiPalanisamy),theworkshopprogramchairs(JoaoE.Ferreira,TeruoHigashino),tutorialchairs(JamesCaverlee,VaidySunderam),panelchairs(DimitriosGeorgakopoulos,YiPan,YinglongXia),publicationchair(KisungLee),publicitychair(AibekMusaev,EmreYigitoglu),localarrangementchairs(AibekMusaev,JoshuaKimball,WeiZhou),andfinance/registrationchair(CarrieStein).

Finally,onbehalfofthe2017ICDCSorganizationandprogramcommittee,wewouldliketoexpressoursinceregratitudetoeveryonewhohascontributedtotheconference,especiallytheauthorsandtheparticipants.WewouldliketothankXiaodongZhang(ICDCSSteeringCommitteeChair)andCheng-ZhongXu(chairofIEEEComputerSocietyTechnicalCommitteeonDistributedProcessing)fortheirsupport,adviceandtrustingustoorganizetheconference.Theyalsospearheadedthesuccessfulefforttoobtainanddisbursefundingtosponsorthestudenttravelawards.Inaddition,wewouldliketoacknowledgethesponsorshipsupportbytheNationalScienceFoundation(NSF/USA)andJapanScienceandTechnologyAgency(JST/Japan)forthe1stUS-JapanWorkshoponEnablingGlobalCollaborationsinBigDataResearch.

5

WewishyouanenjoyableandproductiveconferenceandapleasantstayinAtlanta.

ProgramChair:

LingLiu,GeorgiaInstituteofTechnology,USA

GeneralChairs:

CaltonPu,GeorgiaInstituteofTechnology,USA

MasaruKitsuregawa,NIIandU.Tokyo,Japan

KarlAberer,EPFL,Switzerland

6

Organizing Committee

General Co-Chairs Calton Pu, Georgia Institute of Technology, USA Masaru Kitsuregawa, University of Tokyo, Japan Karl Aberer, EPFL, Switzerland

Program Chair

Ling Liu, Georgia Institute of Technology, USA Workshops Program Chairs

Joao E. Ferreira, University of Sao Paulo, Brazil Teruo Higashino, University of Osaka, Japan

Tutorial Chairs

James Caverlee, Texas A&M University, USA Vaidy Sunderam, Emory University, USA

Panel Chairs

Dimitrios Georgakopoulos, Swinburne University, Australia Yi Pan, Georgia State University, USA Yinglong Xia, Huawei Research America, USA

Short Papers Track Chairs

Laksmish Ramaswamy, UGA, USA Jianwei Yin, Zhejiang University, PR China

Demonstration and Posters Track Chairs

Gerald F Lofstead, Sandia National Laboratories, USA Balaji Palanisamy, University of Pittsburg, USA

Publication Chair

Kisung Lee, Louisiana State University, USA Workshops Publication Chair

Aibek Musaev, University of Alabama, USA Publicity Chair, Local Arrangement Chair, Webmaster

Aibek Musaev, University of Alabama, USA Publicity Co-Chair

Emre Yigitoglu, Georgia Institute of Technology, USA Steering Committee Chair

Xiaodong Zhang, Ohio State University, USA Finance Manager (non-volunteer, reporting to General Chairs)

Carrie Stein, Ohio State University, USA

7

Program Committee

Program Chair

Ling Liu, Georgia Institute of Technology, USA Program Vice Chairs and TPC Members (Research Tracks) § Cloud Computing and Data Centers

Co-Chair: Michael A. Kozuch, Intel, USA Co-Chair: Anshul Gandhi, Stony Brook University, USA § George Amvrosiadis, Carnegie Mellon University § Ganesh Ananthanarayanan, Microsoft Research § Danilo Ardagna, Politecnico di Milano § Alvin AuYoung, Uber § Bharath Balasubramanian, ATT Labs Research § Sonia Ben Mokhtar, LIRIS CNRS § Sara Bouchenak, INSA, Lyon § Ali R. Butt, Virginia Tech § Irina Calciu, VMware Research Group § Maria Carla Calzarossa, Universita di Pavia § Giovanni Toffetti Carughi, ZHAW § Giuliano Casale, Imperial College London § Claris Castillo, RENCI@UNC Chapel Hill § Lydia Y. Chen, IBM Research Zurich Lab § Keke Chen, Wright State University § Byung-Gon Chun, Seoul National University § Erik Elmroth, Umeå University and Elastisys § Renato Figueiredo, University of Florida § Sahan Gamage, VMware § Christos Gkantsidis, Microsoft Research § Chris Gniady, University of Arizona § Kartik Gopalan, Binghamton University § Daniel Grosu, Wayne State University § Xiaohui Gu, North Carolina State University § Haryadi S. Gunawi, University of Chicago § Yu Hua, Huazhong University of Science and Technology § Alexandru Iosup, Delft University of Technology § Evangelia Kalyvianaki, City, University of London § Eric Keller, University of Colorado, Boulder § Steve Ko, SUNY Buffalo § Donald Kossmann, Microsoft Research Redmond & ETH Zurich § Diwakar Krishnamurthy, University of Calgary § Purushottam Kulkarni, Indian Institute of Technology, Bombay § John Lange, University of Pittsburgh § Marin Litoiu, York University § Zhenhua Liu, Stony Brook University § Fangming Liu, Huazhong University of Science and Technology § Amiya Maji, Purdue University § Lena Mashayekhy, University of Delaware § Thu Nguyen, Rutgers University § Balaji Palanisamy, University of Pittsburgh

8

§ Donald E. Porter, The University of North Carolina at Chapel Hill § Chen Qian, University of California Santa Cruz § Ioan Raicu, Illinois Institute of Technology § Shriram Rajagopalan, IBM Watson Research § Shaolei Ren, University of California, Riverside § Henry Robinson, Cloudera § Stefan Schmid, Aalborg University & TU Berlin § Haiying Shen, University of Virginia § Evgenia Smirni, College of William and Mary § Yuzhe Tang, Syracuse University § Devesh Tiwari, ORNL § Bhuvan Urgaonkar, Pennsylvania State University § Xiaorui Wang, The Ohio State University § Anduo Wang, Temple University § Jianguo Yao, Shanghai Jiao Tong University § Ming Zhao, Arizona State University § Xiaobo Zhou, University of Colorado, Colorado Springs § Xiaoyun Zhu, Futurewei Technologies, Inc.

§ Distributed Big Data Systems & Analytics Chair: Srinivas Aluru, Georgia Institute of Technology, USA § Gagan Agrawal, Ohio State University § Rajesh Bordawekar, IBM T. J. Watson Research Center § Polo Chau, Georgia Institute of Technology § Alin Dobra, University of Florida § Vijay Gadepally, Massachusetts Institute of Technology § Bugra Gedik, Bilkent University, Turkey § Tony Xiaohua Hu, Drexel University § Hans-Arno Jacobsen, University of Toronto § George Karypis, University of Minnesota § Tevfik Kosar, State University of New York at Buffalo § Zhenhui (Jessie) Li, Pennsylvania State University § Ron Oldfield, Sandia National Laboratories § Srinivasan Parthasarathy, Ohio State University § Peter Pietzuch, Imperial College § Vijay Raghavan, Louisiana State University § Yogesh Simmhan, Indian Institute of Science § Nesime Tatbul, Intel Labs and Massachusetts Institute of Technology § Ying Xie, Kennesaw State University § Jianfeng Zhan, Chinese Academy of Sciences § Justin Z. Zhan, University of Nevada Las Vegas

§ Distributed Operating Systems & Middleware Chair: Fred Douglis, Dell EMC, USA § Paolo Bellavista, University of Bologna, Italy § Surendar Chandra, Datrium, USA § Yuan Chen, Hewlett Packard Labs, USA § Geoffrey Fox, Indiana University, USA § Indranil Gupta, University of Illinois at Urbana-Champaign, USA § Yu Hua, Huazhong University of Science and Technology, China

9

§ Hong Jiang, University of Texas at Arlington, USA § Vana Kalogeraki, Athens Institute of Economics and Business, Greece § Fabio Kon, University of São Paulo, Brazil § Xiaosong Ma, Qatar Computing Research Institute, Qatar § Rajesh Panta, AT&T Labs – Research, USA § Luís Rodrigues, IST, ULisboa, Portugal § Liuba Shrira, Brandeis University, USA § Francois Taiani, University of Rennes 1, IRISA / Inria, France § Maarten Van Steen, University of Twente, Netherlands § Chitra Venkatramani, Google, USA § Zhen Xiao, Peking Univ, China § Gala Yadgar, Technion, Israel § Ming Zhao, Arizona State University, USA

§ Distributed Algorithms and Theory Chair: Kui Ren, SUNY, Buffalo, USA § Jiannong Cao, Hong Kong Polytechnic University § Xiuzhen Cheng, The George Washington University § Ding-Zhu Du, University of Texas at Dallas § Michael Fang, University of Florida § Vincent Gramoli, University of Sydney § Xiaohua Jia, City University of Hong Kong § Murat Kantarcioglu, University of Texas at Dallas § Nei Kato, Tohoku University § Sastry Kompella, Naval Research Lab § Sam Kwong, City University of Hong Kong § Baochun Li, University of Toronto § Xiangyang Li, University of Science and Technology of China § Phone Lin, National Taiwan University § Benyuan Liu, University of Massachusetts Lowell § Jiangchuan Liu, Simon Fraser University § Xue Liu, McGill University § Tommaso Melodia, Northeastern University § Aziz Mohaisen, SUNY Buffalo § Guevara Noubir, Northeastern University § Francesco Pasquale, Sapienza Università di Roma § Sherman Shen, University of Waterloo § Paul Spirakis, RA.CTI and University of Patras § Anna Squicciarini, The Pennsylvania State University § Lu Su, SUNY Buffalo § My Thai, University of Florida § Peng-Jun Wan, Illinois Institiute of Technology § Jie Wu, Temple University § Nicholas Zhang, Huawei Technologies § Sheng Zhong, SUNY Buffalo

§ Distributed Fault Tolerance & Dependability Chair: Doug Blough, Georgia Institute of Technology, USA § Emmanuelle Anceaume, IRISA, France § Saurabh Bagchi, Purdue University, USA

10

§ Antonio Casimiro, University of Lisbon, Portugal § Xavier Defago, Tokyo Institute of Technology, Japan § Felicita di Giandomenico, ISTI-CNR, Italy § Elias Duarte, Federal University of Parana, Brazil § Christof Fetzer, Technical University of Dresden, Germany § Roy Friedman, Technion, Israel § Patrick Lee, Chinese University of Hong Kong, China § Michael Lyu, Chinese University of Hong Kong, China § Cristina Nita-Rotaru, Northeastern University, USA § Fernando Pedone, University of Lugano, Switzerland § Sebastiano Peluso, Virginia Tech, USA § Ravi Prakash, University of Texas at Dallas, USA § Tatsuhiro Tsuchiya, Osaka University, Japan § Ymir Vigfusson, Emory University, USA

§ Distributed Green Computing & Energy Management Chair: Canturk Isci, IBM T.J. Watson, USA § Niklas Carlsson, Linköping University, Sweden § Ayse Coskun, Boston University § Yuanxiong (Richard) Guo, Oklahoma State University § David Irwin, University of Massachusetts Amherst § Prabhakar Kudva, IBM TJ Watson Research Center § Fangming Liu, Huazhong University of Science & Technology § Vijay Janapa Reddi, University of Texas at Austin § Suzanne McIntosh, Cloudera & NYU § Shaolei Ren, University of California, Riverside § Tajana Simunic Rosing, University of California, San Diego § Anand Sivasubramaniam, Pennsylvania State University § Christopher Stewart, Ohio State University § Devesh Tiwari, Oak Ridge National Laboratory § Di Wang, Microsoft Research, Redmond § Carole-Jean Wu, Arizona State University

§ Internet of Things & Cyber-Physical Systems Chair: Thiemo Voigt, SICS and Uppsala University, Sweden § Tarek Abdelzaher, University of Illinois at Urbana Champaign, USA § Carlo Boano, TU Graz, Austria § Qing Cao, University of Tennessee, USA § Octav Chipara, University of Iowa, USA § Wan Du, Nanyang Technological University, Singapore § Simon Duquennoy, Inria, France, and SICS, Sweden § Yuan He, Tsinghua University, China § Wen Hu, University of New South Wales, Australia § JeongGil Ko, Ajou University, South Korea § Linghe Kong, Shanghai Jiao Tong University, China § Mike Chieh-Jan Liang, Microsoft Research Asia § Margaret Loper, Georgia Institute of Technology, USA § Pedro Marron, University of Duisburg-Essen, Germany § Luca Mottola, Politecnico di Milano, Italy and SICS, Sweden § Edith Ngai, Uppsala University, Sweden

11

§ Gian Pietro Picco, University of Trento, Italy § Mo Sha, SUNY Binghamton, USA § David Smith, Data61, CSIRO, Australia § Eduardo Tovar, Polytechnic Institute of Porto, Portugal § Chenshu Wu, Tsinghua University, China § I-Ling Yen, University of Texas at Dallas, USA § Haibo Zhang, University of Otago, New Zealand

§ Mobile and Wireless Network Computing Chair: Karthik Sundaresan, NEC Labs Princeton, USA § Ehsan Aryafar, Intel, USA § Zhipeng Cai, Georgia State Univ § Mehmet Can Vuran, Univ of Nebraska Lincoln § Guohong Cao, Penn State Univ § Aveek Dutta, Univ at Albany § Monisha Ghosh, Univ of Chicago § Tian He, Univ of Minnesota § Ravi Kokku, IBM research § Dimitrios Koutsonikolas, Univ of Buffalo § Sandeep Kulkarni, Michigan State Univ § Mo Li, NTU § Shiwen Mao, Auburn Univ § Joerg Ott, Aalto University § Neal Patwari, Univ of Utah § Feng Qian, Indiana University § Sampath Rangarajan, NEC Labs America § Kay Romer, ETH Zurich § Theodoros Salonidis, IBM research § Thrasyvoulos Spyropoulos, Eurocom § Lu Su, Univ of Buffalo § Nalini Venkatasubramanian, Univ of California, Irvine § Xinbing Wang, Shanghai Jiao Tong Univ § Jie Wu, Temple Univ § Jie Xiong, Singapore Management University § Jongwon Yoon, Hanyang university, Korea § Moustafa A. Youssef, Egypt-Japan University of Science and Technology (E-JUST)

§ Edge and Fog Computing Co-Chair: Weisong Shi, Wayne State University, USA Co-Chair: Tao Zhang, Cisco, USA § Gary Chan, The Hong Kong University of Science and Technology § Dilma Da Silva, Texas A&M University § Schahram Dustdar, TU Wien § Sangtae Ha, University of Colorado at Boulder § Robert Hall, AT&T Labs Research § Bhaskar Krishnamachari, USC § Tian Lan, GWU § Martin Lehofer, Siemens VAI Metals Technologies GmbH § Qun Li, College of William and Mary § Michael Rabinovich, Case Western Reserve University

12

§ Eve Schooler, Intel Research § Andrew Weinert, MIT § Fan Ye, Stony Brook University § Junshan Zhang, Arizona State University § Yanyong Zhang, Rutgers University

§ Security, Privacy, Trust in Distributed Systems Chair: Elisa Bertino, Purdue University, USA § Ehab Al-Shaer, UNC Charlotte § Salman A Baset, IBM Research § Nilanjan Banerjee, UMBC § Barbara Carminati, University of Insubria, Italy § Aniello Castiglione, University of Salerno, Italy § Dario Catalano, University of Catania, Italy § Yan Chen, Northwestern University § Lucas Davi, University of Duisburg-Essen, Germany § Robert Deng, Singapore Management University § Elena Ferrari, University of Insubria, Italy § Aurelien Francillon, Eurecom § Michael Franz, University of California at Irvine § Gabriel Ghinita, UMass at Boston § Guofei Gu, Texas A&M § Xinyi Huang, Fujian Normal University § Aniket Kate, Purdue University § Florian Kerschbaum, SAP § Taesoo Kim, Georgia Institute of Technology § Zhenkai Liang, National University of Singapore § Dan Lin, Missouri University of Science and Technology § Alex Liu, Michigan State University § Surya Nepal, CSIRO, Australia § Kui Ren, SUNY Buffalo § Seung-Yun Seo, Korea University § Anna Squicciarini, Pennsylvania State University § Cong Wang, Hong Kong City University § Danfeng Yao, Virginia Tech § Xun Yi, RMIT, Australia § Ting Yu, Qatar Computing Research Institute

§ Social Networks and Crowdsourcing Chair: Munindar P. Singh, NCSU, USA § Alessandro Bozzon, Delft University of Technology, Netherlands § James Caverlee, Texas A&M University, USA § Peng Cui, Tsinghua University, China § Raghu Ganti, IBM T J Watson Research Center, USA § Chung-Wei Hang, IBM, USA § Catholijn Jonker, Delft University of Technology, Netherlands § Anup Kalia, IBM T. J. Watson Research Center, USA § Vana Kalogeraki, Athens University of Economics and Business, Greece § Sharad Mehrotra, University of California, Irvine, USA § Pradeep Kumar Murukannaiah, Rochester Institute of Technology, USA

13

§ Mirco Musolesi, University College London, UK § Nishanth Sastry, King’s College London, UK § Murat Sensoy, Ozyegin University, Turkey § Erez Shmueli, Tel-Aviv University, Turkey § Mudhakar Srivatsa, IBM T.J. Watson Research Center, USA § Guangchao Yuan, Microsoft, USA § Zhe Zhang, IBM Watson, USA

Special Tracks TPC Chairs and TPC Members

§ Industry and Experimentation

Co-Chair: Scott Klasky, Oak Ridge National Lab. USA Co-Chair: Aameek Singh, IBM T.J. Watson § Dorian Arnold, UNM, USA § Rong Chang, IBM, USA § Carlos Costa, IBM, USA § Alfredo Cuzzocrea, University of Trieste, Italy § Raghu Ganti, IBM, USA § Garth Gibson, CMU, USA § Tahsin Kurc, SBU, USA § Qing Liu, NJIT, USA § Xuanzhe Liu, Peking University, China § Heiko Ludwig, IBM, USA § Carlos Maltzahn, UCSC, USA § Nagapramod Mandagere, IBM, USA § Manish Parashar, Rutgers, USA § Yang Song, IBM, USA § Matthew Wolf, Oak Ridge National Lab., USA § Pengcheng Xiong, Hortonworks, USA § Pingpeng Yuan, Huazhong University of Science and Technology, China § Fan Zhang, IBM, USA § Yiming Zhang, National University of Defense Technology, China § Xiaomin Zhu, National University of Defense University, China

§ Applications and Experiences

Co-Chair: Songqing Chen, George Mason University, USA Co-Chair: Sangeetha Seshadri, IBM Almaden, USA § Kun Bai, IBM TJ Watson Research Center, USA § Bhuvan Bamba, Oracle, USA § Anu Bourgeois, Georgia State University, USA § Umesh Deshpande, IBM, USA § Xiaoning Ding, New Jersey Institute of Technology, USA § Vijay Gopalakrishnan, AT&T Labs – Research, USA § Yang Guo, NIST, USA § Vana Kalogeraki, Athens University of Economics and Business, Greece § Kisung Lee, Louisiana State University, USA § Qi Li, Tsinghua University, China § Fei Li, George Mason University, USA § Baochun Li, University of Toronto, Canada § Yao Liu, SUNY Binghamton, USA

14

§ Aziz Mohaisen, SUNY Buffalo, USA § Shannon Quinn, University of Georgia, USA § Lukas Rupprecht, Imperial College London, UK § Aki-Hiro Sato, Kyoto University, Japan § Viswanathan Swaminathan, Adobe, USA § Masashi Toyoda, Univ Tokyo, Japan § Qingyang Wang, Louisiana State University, USA § Ting Wang, Lehigh University, USA § Li Xiao, Michigan State University, USA § Weijun Xiao, Virginia Commonwealth University, USA § Jianwei Yin, Zhejiang University, China § Gong Zhang, Oracle Corporation, USA § Rui Zhang, Institute of Information Engineering, Chinese Academy of Sciences, China § Yanqing Zhang, Georgia State University, USA § Zhao Zhang, University of Illinois at Chicago, USA § Xuan Zhou, Renmin University of China, China

§ Vision / Blue Sky Thinking Co-Chair: Manfred Hauswirth, TU Berlin, Germany Co-Chair: Manish Parashar, Rutgers University, USA § Ozalp Babaoglu, University of Bologna, Italy § Umesh Bellur, IIT Bombay, India § Jesus Carretero, Universidad Carlos III de Madrid, Spain § Frederic Desprez, INRIA, France § Dieter Kranzlmüller, Ludwig-Maximilians-Universitaet Muenchen, Germany § Christine Morin, INRIA, France § Thu Nguyen, Rutgers University, USA § Vladimir Vlassov, Royal Institute of Technology (KTH), Sweden

Short Papers Track

Co-Chair: Laksmish Ramaswamy, UGA, USA Co-Chair: Jianwei Yin, Zhejiang University, PR China § Amir Abdolrashidi, The University of Georgia, USA § Cao Bin, College of Computer Science and Technology, Zhejiang University of Technology, China § Vinay Boddula, University of Georgia, USA § Arash Fard, Hewlett Packard Enterprise, USA § Rong Ge, Clemson University, USA § Takahiro Hara, Graduate School of Information Science and Technology, Osaka University, Japan § Kyu Lee, University of Georgia, USA § Wenjia Li, New York Institute of Technology, USA § Xinjian Lu, East China University of Science and Technology, China § Shuai Ma, Beihang University, China § Rohit Mullangi, University of Georgia, USA § Aibek Musaev, University of Alabama, USA § Surya Nepal, CSIRO, Australia § Balaji Palanisamy, University of Pittsburgh, USA § Shannon Quinn, University of Georgia, USA § Michael Sheng, The University of Adelaide, Australia § Varun Soundararajan, Google, USA § Anna Squicciarini, The Pennsylvania State University, USA

15

§ Yueshen Xu, Xidian University, China § Yun Yang, Swinburne University of Technology, Australia § Emre Yigitoglu, Georgia Institute of Technology, USA

Demonstration and Posters Track

Co-Chair: Gerald F Lofstead, Sandia Nat. Lab., USA Co-Chair: Balaji Palanisamy, University of Pittsburg, USA § Nathalie Baracaldo, IBM Research, USA § Suren Byna, Lawrence Berkeley National Laboratory, USA § Toni Collis, EPCC, UK § Liting Hu, Florida International University, USA § Suzanne McIntosh, NYU Courant Institute, and Cloudera Inc., USA § Devesh Tiwari, ORNL, USA § Ming Zhao, Arizona State University, USA

16

Keynotes

Keynote 1: C. Mohan (IBM Research)

NewErainDistributedComputingwithBlockchainsandDatabases

Aneweraisemergingintheworldofdistributedcomputingwiththegrowingpopularityofblockchains(shared,replicatedanddistributedledgers)andtheassociateddatabasesasawayofintegratinginter-organizationalwork.Originally,theconceptofadistributedledgerwasinventedastheunderlyingtechnologyofthecryptocurrencyBitcoin.Buttheadoptionandfurtheradaptationofitforuseinthecommercialorpermissionedenvironmentsiswhatisofutmostinteresttomeandhencewillbethefocusofthiskeynote.ComputercompanieslikeIBMandMicrosoft,andmanykeyplayersindifferentverticalindustrysegmentshaverecognizedtheapplicabilityofblockchainsinenvironmentsotherthancryptocurrencies.IBMdidsomepioneeringworkbyarchitectingandimplementingFabric,andthenopensourcingit.NowFabricisbeingenhancedviatheHyperledgerConsortiumaspartofTheLinuxFoundation.AfewoftheothereffortsincludeEnterpriseEthereum,R3CordaandBigchainDB.

Whilethereisnostandardintheblockchainspacecurrently,alltheongoingeffortsinvolvesomecombinationofdatabase,transaction,encryption,consensusandotherdistributedsystemstechnologies.Someoftheapplicationareasinwhichblockchainpilotsarebeingcarriedoutare:smartcontracts,supplychainmanagement,knowyourcustomer,derivativesprocessingandprovenancemanagement.Inthistalk,Iwillsurveysomeoftheongoingblockchainprojectswithrespecttotheirarchitecturesingeneralandtheirapproachestosomespecifictechnicalareas.Iwillfocusonhowthefunctionalityoftraditionalandmoderndatastoresarebeingutilizedornotutilizedinthedifferentblockchainprojects.Iwillalsodistinguishhowtraditionaldistributeddatabasemanagementsystemshavehandledreplicationandhowblockchainsystemsdoit.Sincemostoftheblockchaineffortsarestillinanascentstate,thetimeisrightfordatabaseandotherdistributedsystemsresearchersandpractitionerstogetmoredeeplyinvolvedtofocusonthenumerousopenproblems.

Bio:Dr.C.MohanhasbeenanIBMresearcherfor35yearsinthedatabasearea,impactingnumerousIBMandnon-IBMproducts,theresearchandacademiccommunities,andstandards,especiallywithhisinventionoftheARIESfamilyofdatabaselockingandrecoveryalgorithms,andthePresumedAbortcommitprotocol.ThisIBM(1997),andACM/IEEE(2002)FellowhasalsoservedastheIBMIndiaChiefScientistfor3years(2006-2009).InadditiontoreceivingtheACMSIGMODInnovationAward(1996),theVLDB10YearBestPaperAward(1999)andnumerousIBMawards,MohanwaselectedtotheUSandIndianNationalAcademiesofEngineering(2009),andwasnamedanIBMMasterInventor(1997).ThisDistinguishedAlumnusofIITMadras(1977)receivedhisPhDattheUniversityofTexasatAustin(1981).Heisaninventorof50patents.HeiscurrentlyfocusedonBigData,HTAPandBlockchaintechnologies.In2016,hewasnamedaDistinguishedVisitingProfessorofChina’sprestigiousTsinghuaUniversity.HehasservedontheadvisoryboardofIEEESpectrum,andonnumerousconferenceandjournalboards.MohanisafrequentspeakerinNorthAmerica,EuropeandIndia,andhasgiventalksin40countries.Heisveryactiveonsocialmediaandhasahugenetworkoffollowers.MoreinformationcouldbefoundintheWikipediapageathttp://bit.ly/CMwIkP

17

Keynote 2: M. Tamer Özsu (University of Waterloo)

WebDataManagementintheRDFAge

Webdatamanagementhasbeenatopicofinterestformanyyearsduringwhichanumberofdifferentmodellingapproacheshavebeentried.ThelatestinthisapproachesistouseRDF(ResourceDescriptionFramework),whichseemstoproviderealopportunityforqueryingatleastsomeofthewebdatasystematically.RDFhasbeenproposedbytheWorldWideWebConsortium(W3C)formodelingWebobjectsaspartofdevelopingthe“semanticweb”.W3ChasalsoproposedSPARQLasthequerylanguageforaccessingRDFdatarepositories.ThepublicationofLinkedOpenData(LOD)ontheWebhasgainedtremendousmomentumoverthelastnumberofyears,andthisprovidesanewopportunitytoaccomplishwebdataintegration.AnumberofapproacheshavebeenproposedforrunningSPARQLqueriesoverRDF-encodedWebdata:datawarehousing,SPARQLfederation,andlivelinkedqueryexecution.Inthistalk,IwillreviewtheseapproacheswithparticularemphasisonsomeofourresearchwithinthecontextofgStoreproject(jointprojectwithProf.LeiZouofPekingUniversityandProf.LeiChenofHongKongUniversityofScienceandTechnology),chameleon-dbproject(jointworkwithGünesAluç,Dr.OlafHartig,andProf.KhuzaimaDaudjeeofUniversityofWaterloo),andlivelinkedqueryexecution(jointworkwithDr.OlafHartig).

Bio:M.TamerÖzsuisProfessorofComputerScienceattheDavidR.CheritonSchoolofComputerScience.Hisresearchisindatamanagementfocusingonlarge-scaledatadistributionandmanagementofnon-traditionaldata.HeisaFellowoftheRoyalSocietyofCanada,oftheAssociationforComputingMachinery(ACM),andoftheInstituteofElectricalandElectronicsEngineers(IEEE).HeisanelectedmemberoftheScienceAcademyofTurkey,andamemberofSigmaXiandAmericanAssociationfortheAdvancementofScience(AAAS).HispublicationsincludethebookPrinciplesofDistributedDatabaseSystems(withPatrickValduriez),whichisnowinitsthirdedition.Hehasalsoedited,withLingLiu,theEncyclopediaofDatabaseSystems,whichisnowinitssecondedition.HewastheFoundingSeriesEditorofSynthesisLecturesonDataManagement(Morgan&Claypool),andisnowtheEditor-in-ChiefofACMBooks.Heservesontheeditorialboardsofthreejournals,andtwobookSeries.Prof.Dr.M.TamerÖzsuwasawardedtheACMSIGMODTest-of-TimeAwardin2015,ACMSIGMODContributionsAwardin2008andtheOhioStateUniversityCollegeofEngineeringDistinguishedAlumnusAwardin2008.

18

Keynote 3: Kenneth Calvert (National Science Foundation)

APerspectiveonDistributedComputingSystems:Past,PresentandFuture

ThiskeynotetalkwillofferabroadviewofdistributedcomputingfromtheperspectiveofpastandpresentNSFinvestments.Itwillincludealooktowardfuturechallengesandopportunitiesfacingthedistributedcomputingresearchcommunity.

Bio:Dr.KennethCalvertisDivisionDirectorforComputerandNetworkSystemsintheComputerandInformationScienceandEngineering(CISE)DirectorateattheNationalScienceFoundation.HeisonrotationfromtheUniversityofKentucky,whereheisGartnerGroupProfessorinNetworkEngineeringintheDepartmentofComputerScience.Hisresearchdealswiththedesignandimplementationofadvancednetworkprotocolsandservices,withparticularinterestinroutingandincentivesinfuturenetworkarchitectures.HereceivedhisPh.D.incomputersciencefromtheUniversityofTexasatAustin.HeholdsaM.S.incomputersciencefromStanfordUniversityandaB.S.incomputerscienceandengineeringfromtheMassachusettsInstituteofTechnology.PriortohisappointmentattheUniversityofKentucky,hewasaMemberoftheTechnicalStaffatBellLaboratoriesinHolmdel,NJ,andservedonthefacultyintheCollegeofComputingattheGeorgiaInstituteofTechnology.HeisanIEEEFellowandamemberoftheACM.

19

Program at a Glance

Day1:Monday,June5,2017

Time Track1(SalonII)

Track2(SalonIV)

Track3(SalonVI)

Track4(Atlanta)

Track5(Columbia)

Track6(Savannah)

Track7(Charleston1)

7:00-8:00 ContinentalBreakfast(Foyer)8:00-9:30

Workshop:CCN-CPS Workshop:

HotPOSTWorkshop:

PSBDWorkshop:

JCC

Workshop:NSF-JSTDay1

Tutorial1:Serverless

Programming(Functionasa

Service)9:30-10:00 CoffeeBreak(Foyer)10:00-12:00

Workshop:CCN-CPS

Workshop:ADSN

Workshop:HotPOST

Workshop:PSBD

Workshop:JCC

Workshop:NSF-JSTDay1

Tutorial1:Serverless

Programming(Functionasa

Service)12:00-13:30 Lunch(PhoenixBallroom)13:30-15:30 Workshop:

CCN-CPSWorkshop:

ADSNWorkshop:PED-BGP

Workshop:IoTCA

Workshop:WoSC

Workshop:NSF-JSTDay1

15:30-16:00 CoffeeBreak(Foyer)

16:00-17:00Workshop:CCN-CPS

Workshop:ADSN

Workshop:PED-BGP

Workshop:IoTCA

Workshop:WoSC

Workshop:NSF-JSTDay1

17:00-18:00 Workshop:

PED-BGP

Day2:Tuesday,June6,2017

Time Track1(SalonI)

Track2(SalonII)

Track3(Atlanta)

Track4(Columbia)

Track5(Nashville)

Track6(Charleston1)

7:00-8:00 ContinentalBreakfast(Foyer)8:00-8:30 ConferenceOpening(PhoenixBallroom)8:30-9:30 Keynote1(PhoenixBallroom)9:30-10:00 CoffeeBreak(Foyer)

10:00-12:00Research1:

DistributedFaultToleranceandDependability

Research2:DistributedOperating

SystemsandMiddleware

Vision1:InternetofThings,SmartCitiesandCyber-Physical

Systems

Application1:Security,Privacy,TrustinDistributedSystems

Application2:SocialNetworksand

Crowdsourcing

Industry1:CloudDataCentersandPerformance

12:00-13:30 Lunch(PhoenixBallroom)

13:30-15:30Research3:

SecurityandPrivacyinDistributedSystemsI

Research4:CloudComputingandDataCenterSystems

Vision2:FutureNetworking

andCyberinfrastructure

Application3:InternetofThings,SmartCities,andCyber-Physical

Systems

Application4:Mobile,Wireless,and

EdgeComputing

ShortPaper1:DistributedOperatingSystems,Middleware,

andAlgorithms

15:30-16:00 CoffeeBreak(Foyer)

16:00-18:00Research5:EdgeandFogComputing

Research6:DistributedGreen

ComputingandEnergyManagement

Vision3:NextGenerationCloudandEdge

Services

ShortPaper2:CloudandDataCenterSystemsandNetworks

ShortPaper3:InternetofThings,SmartCities,andCyber-Physical

Systems

Poster1–4:16:00-17:00Lighteningtalks

(Charleston1&2)17:00-19:00

Display(PhoenixBallroom)

10:00-18:00 The1stUS-JapanWorkshoponCollaborativeGlobalResearchonApplyingInformationTechnologyDay2(Savannah)

18:00-20:00 Reception(PhoenixBallroom)

20

Day3:Wednesday,June7,2017

Time Track1(SalonI)

Track2(SalonII)

Track3(Atlanta)

Track4(Columbia)

Track5(Nashville)

Track6(Charleston1)

7:30-8:30 ContinentalBreakfast(Foyer)8:30-9:30 Keynote2(PhoenixBallroom)9:30-10:00 CoffeeBreak(Foyer)

10:00-12:00

Research7:InternetofThings,SmartCities,andCyber-Physical

Systems

Research8:MobileandWirelessComputingSystemsI

Vision4:SecurityandTrustin

FutureSystems

Application5:CloudComputingandDataCenterSystems

Application6:BigDataSystemsandDistributedDataManagementand

Analytics

Industry2:MobileComputingand

InternetofThings

12:00-13:30 ConferenceLuncheon(PhoenixBallroom)

13:30-15:30Research9:

DistributedBigDataSystems

Research10:DistributedAlgorithms

andTheoryI

Vision5:FutureDistributed

Systems

Application7:Distributed

MiddlewareSystems

Application8:DistributedSystemsandOptimizations

ShortPaper4:Mobile,Wireless,Edge,andCrowd

Computing15:30-16:00 CoffeeBreak(Foyer)

16:00-18:00Research11:

SecurityandPrivacyinDistributedSystemsII

Research12:CloudComputingand

DistributedDataAnalytics

Vision6:InnovationinBigData

Systems

Research13:DistributedAlgorithms

andTheoryII

ShortPaper5:DistributedBigDataSystemsandAnalytics

Demo1–4(Charleston1&2)

19:00-21:00 OrganizationEvent(InvitationOnly)

Day4:Thursday,June8,2017

Time Track1(SalonI)

Track2(SalonII)

Track3(Atlanta)

Track4(Columbia)

Track5(Nashville)

Track6(Charleston1)

7:30-8:30 ContinentalBreakfast(Foyer)8:30-9:30 Keynote3(PhoenixBallroom)9:30-10:00 CoffeeBreak(Foyer)

10:00-12:00Research14:

MobileandWirelessComputingSystemsII

Research15:SocialNetworksand

Crowdsourcing

Application9:DistributedSystemsandApplications

Application10:DistributedSystems

andServices

ShortPaper6:Security,Privacy,Trust,andFaultTolerancein

DistributedSystems

Tutorial2:SensorCloud:ACloudofSensor

Networks

12:00-13:30

BusinessLunchincludingAwardsandICDCS2018Announcements

(PhoenixBallroom)

13:30-15:30PlenaryPanel&

ConferenceClosingRemarks(PhoenixBallroom)

Tutorial2:SensorCloud:ACloudofSensor

Networks

21

Day 1 – Monday, June 5, 2017

TenWorkshopsandtwotutorials(seeProgramataglanceandworkshopswebsiteandICDCS2017websitefordetails)

7:00-8:00 Monday, June 5, 2017 ContinentalBreakfastLocation:Foyer

8:00-9:30 Monday, June 5, 2017 Tutorial1:ServerlessProgramming(FunctionasaService)Location:Charleston1

PaulCastro(IBMT.J.WatsonResearchCenter),VatcheIshakian(BentleyUniversity),VinodMuthusamy(IBMT.J.WatsonResearchCenter),AleksanderSlominski(IBMT.J.WatsonResearchCenter)

Workshop:CCN-CPS,Session1Location:SalonII

SessionChair:NaderMohamed(MiddlewareTechnologiesLab.)

PoliciesGuidingCohesiveInteractionsamongInternetofThingswithCommunicationCloudandSocialNetworks HenryHexmoor(SouthernIllinoisUniversity)

EnhancedSecurityofBuildingAutomationSystemsThroughMicrokernel-BasedControllerPlatforms XiaolongWang(UniversityofSouthFlorida),RichardHabeeb(UniversityofSouthFlorida),XinmingOu(UniversityofSouthFlorida),SiddharthAmaravadi(KansasStateUniversity),JohnHatcliff(KansasStateUniversity),MasaakiMizuno(KansasStateUniversity),MitchellLNeilsen(KansasStateUniversity),RajRajagopalan(Honeywell),SrivatsanVaradarajan(HoneywellAerospaceAdvancedTechnologyLabs)

HighlevelDesignofaHomeAutonomousSystemBasedonCyberPhysicalSystemModeling BasmanAlhafidh(FloridaInstituteofTechnology),WilliamH.Allen(FloridaInstituteofTechnology)

Workshop:HotPOST,Session1Location:SalonVI

KeynoteSpeech:AMarkovGameTheoreticApproachforPowerGridSecurity CharlesA.Kamhoua(AirForceResearchLaboratory)

Router-basedBrokeringforSurrogateDiscoveryinEdgeComputing JulienGedeon(TechnischeUniversitätDarmstadt),ChristianMeurisch(TechnischeUniversitätDarmstadt),DishaBhat(TechnischeUniversitätDarmstadt),MichaelStein(TechnischeUniversitätDarmstadt),LinWang(TechnischeUniversitätDarmstadt),MaxMühlhäuser(TechnischeUniversitätDarmstadt)

ModelingtheSpreadofInfluenceforIndependentCascadeDiffusionProcessinSocialNetworks ZeshengChen(IndianaUniversity-PurdueUniversityFortWayne),KurtisTaylor(IndianaUniversity-PurdueUniversityFortWayne)

Workshop:PSBD,OpeningandInvitedTalksLocation:Atlanta

KeynoteSpeech:BigData-SecurityandPrivacy(andTransparency) ElisaBertino(PurdueUniversity)

InvitedTalk:SupportingTime-varyingPrivacywithSelf-emergingData BalajiPalanisamy(UniversityofPittsburgh)

Workshop:JCC,Session1Location:Columbia

HeterogeneousMalwareSpreadProcessinStarNetwork LiboJiao(TsinghuaUniversity),HaoYin(TsinghuaUniversity),DongchaoGuo(TsinghuaUniversity),YongqiangLyu(TsinghuaUniversity)

CostReductioninHybridCloudsforEnterpriseComputing

22

BiyuZhou(InstituteofComputingTechnology,ChineseAcademyofSciences),FaZhang(InstituteofComputingTechnology,ChineseAcademyofSciences),JieWu(TempleUniversity),ZhiyongLiu(InstituteofComputingTechnology,ChineseAcademyofSciences)

DC-RSF:ADynamicandCustomizedReputationSystemFrameworkforJointCloudComputingFanghuaYe(SunYat-senUniversity),ZibinZheng(SunYat-senUniversity),ChuanChen(SunYat-senUniversity),YurenZhou(SunYat-senUniversity)

WebServiceApplianceBasedonUnikernel KaiYu(NationalLabforParallelandDistributedProcessing),ChengfeiZhang(NationalLabforParallelandDistributedProcessing),YunxiangZhao(NationalLabforParallelandDistributedProcessing)

AnalysisandEvaluationoftheGASModelforDistributedGraphComputation WangJinyan(NationalLabforParallelandDistributedProcessing),ZhangChengfei(NationalLabforParallelandDistributedProcessing)

TrafficSignsDetectionBasedonFasterR-CNN ZhongrongZuo(NationalLabforParallelandDistributedProcessing),KaiYu(NationalLabforParallelandDistributedProcessing),QiaoZhou(NationalLabforParallelandDistributedProcessing),XuWang(NationalLabforParallelandDistributedProcessing),TingLi(NationalLabforParallelandDistributedProcessing)

JCLedger:ABlockchainBasedDistributedLedgerforJointCloudComputing XiangFu(NationalUniversityofDefenseTechnology),HuaiminWang(NationalUniversityofDefenseTechnology),PeichangShi(NationalUniversityofDefenseTechnology),YingweiFu(NationalUniversityofDefenseTechnology),YijieWang(NationalUniversityofDefenseTechnology)

CorporationArchitectureforMultipleCloudServiceProvidersinJointCloudComputing PeichangShi(NationalUniversityofDefenseTechnology),HuaiminWang(NationalUniversityofDefenseTechnology),XikunYue(NationalUniversityofDefenseTechnology),ShilanYang(NationalUniversityofDefenseTechnology),ShangzhiYang(NationalUniversityofDefenseTechnology),YuxingPeng(NationalUniversityofDefenseTechnology)

SharingPrivacyDatainSemi-TrustworthyStoragethroughHierarchicalAccessControl YuzhaoWu(TsinghuaUniversity),YongqiangLyu(TsinghuaUniversity),QianFang(TsinghuaUniversity),GengZheng(TsinghuaUniversity),HaoYin(TsinghuaUniversity),YuanchunShi(TsinghuaUniversity)

Workshop:NSF-JSTLocation:Savannah

9:30-10:00 Monday, June 5, 2017 CoffeeBreakLocation:PhoenixBallroom

10:00-12:00 Monday, June 5, 2017 Tutorial1:ServerlessProgramming(FunctionasaService)Location:Charleston1

PaulCastro(IBMT.J.WatsonResearchCenter),VatcheIshakian(BentleyUniversity),VinodMuthusamy(IBMT.J.WatsonResearchCenter),AleksanderSlominski(IBMT.J.WatsonResearchCenter)

Workshop:CCN-CPS,Session2Location:SalonII

SessionChair:JameelaAlJaroodi(RobertMorrisUniversity)

ACyberPhysicalBuses-and-DronesMobileEdgeInfrastructureforLargeScaleDisasterEmergencyCommunications MamtaNarang(AucklandUniversityofTechnology),WilliamLiu(AucklandUniversityofTechnology),JairoAGutierrez(AucklandUniversityofTechnology),LucaChiaraviglio(UniversityofRomeTorVergata)

APerformanceComparisonofContainersandVirtualMachinesinWorkloadMigrationContext KumarGaurav(VMwareSoftwareIndiaPvtLtd),PavanKarkun(VMwareSoftwareIndiapvtLTD),Y.C.Tay(NationalUniversityofSingapore)

23

TowardsService-OrientedMiddlewareforCyberPhysicalSystems NaderMohamed(MiddlewareTechnologiesLab.),SanjaLazarova-Molnar(UniversityofSouthernDenmark)

NetworkingandCommunicationinCyberPhysicalSystems ImadJawhar(UAEUniversity),JameelaAl-Jaroodi(RobertMorrisUniversity)

Workshop:ADSN,Session1:Keynote,Session2:AssuringTemporalFairnessandSecuringCommunicationLocation:SalonIV

KeynoteSpeech:DependabilityChallengesin5GCellularNetworks DouglasM.Blough(GeorgiaInstituteofTechnology)

UnderstandingandImprovingTemporalFairnessonanElectronicTradingVenue HaydenMelton(DeakinUniversity)

CertificateLessCryptography-basedRuleManagementProtocolforAdvancedMissionDeliveryNetworks JonghoWon(PurdueUniversity),AnkushSingla(PurdueUniversity),ElisaBertino(PurdueUniversity)

Workshop:HotPOST,Session2Location:SalonVI

ThankYouForBeingAFriend:AnAttackerViewonOnline-Social-Network-basedSybilDefenses DavidKoll(UniversityofGoettingen),MartinSchwarzmaier(UniversityofGoettingen),JunLi(UniversityofOregon),Xiang-YangLi(UniversityofScienceandTechnologyofChina),XiaomingFu(UniversityofGoettingen)

EfficientDynamicServiceFunctionChainCombinationofNetworkFunctionVirtualization WenkeYan(BeijingUniversityofPostsandTelecommunications),KonglinZhu(BeijingUniversityofPostsandTelecommunications),LinZhang(BeijingUniversityofPostsandTelecommunications),SixiSu(BeijingUniversityofPostsandTelecommunications)

WhenAugmentedRealitymeetsBigData CarlosBermejo(TheHongKongUniversityofScienceandTechnology),ZhanpengHuang(TheHongKongUniversityofScienceandTechnology),TristanBraud(TheHongKongUniversityofScienceandTechnology),PanHui(TheHongKongUniversityofScienceandTechnology)

SamplingBasedEfficientAlgorithmtoEstimatetheSpectralRadiusofLargeGraphs SamarAbbas(LahoreUniversityofManagementSciences),JuvariaTariq(LahoreUniversityofManagementSciences),ArifZaman(LahoreUniversityofManagementSciences),ImdadullahKhan(LahoreUniversityofManagementSciences)

ExtemporaneousMicro-MobileServiceExecutionWithoutCodeSharing ZhengSong(VirginiaTech),MinhLe(UtahStateUniversity),Young-WooKwon(UtahStateUniversity),EliTilevich(VirginiaTech)

PreventingColludingIdentityCloneAttacksinOnlineSocialNetworks GeorgesA.Kamhoua(FloridaInternationalUniversity),NikiPissinou(FloridaInternationalUniversity),S.S.Iyengar(FloridaInternationalUniversity),JonathanBeltran(FloridaInternationalUniversity),CharlesKamhoua(AirForceResearchLaboratory),BrandonLHernandez(UTRGV),LaurentNjilla(AirForceResearchLaboratory)

Workshop:PSBD,ResearchSessionLocation:Atlanta

Anovelgame-theoreticmodelforcontent-adaptiveimagesteganography QiLi(HunanUniversity),XinLiao(HunanUniversity),GuoyongChen(HunanUniversity),LipingDing(GuangzhouBranchofInstituteofSoftware,ChineseAcademyofScience)

AFine-grainedAccessControlSchemeforBigDataBasedonClassificationAttributes TengfeiYang(StateKeyLaboratoryofInformationSecurity,InstituteofInformationEngineering,ChineseAcademyofSciences),PeisongShen(StateKeyLaboratoryofInformationSecurity,InstituteofInformationEngineering,ChineseAcademyofSciences),XueTian(StateKeyLaboratoryofInformationSecurity,InstituteofInformationEngineering,ChineseAcademyofSciences),ChiChen(StateKeyLaboratoryofInformationSecurity,InstituteofInformationEngineering,ChineseAcademyofSciences)

Social-AwareDecentralizationforEfficientandSecureMulti-PartyComputation YuzheTang(SyracuseUniversity),SuchetaSoundarajan(SyracuseUniversity)

StatisticalAnomalyDetectiononMetadataStreamsviaCommoditySoftwaretoProtectCompany ChristineChen(UniversityofPortland),JamesGurganus(MicroSystemsEngineering,Inc.)

Computationalimprovementsinparallelizedk-anonymousmicroaggregationoflargedatabases AhmadMohamadMezher(UniversitatPolitècnicadeCatalunya(UPC)),AlejandroGarcíaÁlvarez(UniversitatPolitècnicadeCatalunya(UPC)),DavidRebollo-Monedero(UniversitatPolitècnicadeCatalunya(UPC)),JordiForné(UniversitatPolitècnicadeCatalunya(UPC))

24

Workshop:JCC,Session2Location:Columbia

AReliabilityBenchmarkforBigDataSystemsonJointCloudYingyingZheng(InstituteofSoftware,ChineseAcademyofSciences),LijieXu(InstituteofSoftware,ChineseAcademyofSciences),WeiWang(InstituteofSoftware,ChineseAcademyofSciences),WeiZhou(KSYUN),YingDing(ChangchunUniversityofScienceandTechnology)

UCPR:UserClassificationandInfluenceAnalysisinSocialNetwork CongZha(TsinghuaUniversity),YongqiangLv(TsinghuaUniversity)

AdaptiveRoutingAlgorithmforJointCloudVideoDelivery ZexunJiang(TsinghuaUniversity),HaoYin(TsinghuaUniversity)

TowardsEfficientResourceManagementinVirtualClouds BoAn(PekingUniversity),JunmingMa(PekingUniversity),DonggangCao(PekingUniversity),GangHuang(PekingUniversity)

MonitoringandBillingofALightweightCloudSystemBasedonLinuxContainer YujianZhu(PekingUniversity),JunmingMa(PekingUniversity),BoAn(PekingUniversity),DonggangCao(PekingUniversity)

Buildingemulationframeworkfornon-volatilememory GuoliangZhu(NationalUniversityofDefenseTechnology),KaiLu(NationalUniversityofDefenseTechnology),XiaopingWang(NationalUniversityofDefenseTechnology)

Seflow:EfficientFlowSchedulingforData-ParallelJobs QiaoZhou(NationalLabforParallelandDistributedProcessing),ZiyangLi(NationalLabforParallelandDistributedProcessing),PingZhong(CentralSouthUniversity),TianTian(NationalLabforParallelandDistributedProcessing),YuxingPeng(NationalLabforParallelandDistributedProcessing)

OnlineEncodingforErasure-CodedDistributedStorageSystems FangliangXu(NationalUniversityofDefenseTechnology),YijieWang(NationalUniversityofDefenseTechnology),XingkongMa(NationalUniversityofDefenseTechnology)

Workshop:NSF-JST,Session1Location:Savannah

AcceleratingBigDataInfrastructureandApplications KevinBrown(TokyoInstituteofTechnology),TianqiXu(TokyoInstituteofTechnology),KeitaIwabuchi(TokyoInstituteofTechnology),KentoSato(LawrenceLivermoreNationalLaboratory),AdamMoody(LawrenceLivermoreNationalLaboratory),KathrynMohror(LawrenceLivermoreNationalLaboratory),NikhilJain(LawrenceLivermoreNationalLaboratory),AbhinavBhatele(LawrenceLivermoreNationalLaboratory),MartinSchulz(LawrenceLivermoreNationalLaboratory),RogerPearce(LawrenceLivermoreNationalLaboratory),MayaGokhale(LawrenceLivermoreNationalLaboratory),SatoshiMatsuoka(TokyoInstituteofTechnology)

DisasterNetworkEvolutionUsingDynamicClusteringofTwitterData KrishnaKant(TempleUniversity),YilangWu(AizuUniversity),ShanshanZhang(TempleUniversity),JunboWang(AizuUniversity),AmitangshuPal(TempleUniversity)

Single-epochsupernovaclassificationwithdeepconvolutionalneuralnetworks AkisatoKimura(NTT),IchiroTakahashi(KavliIPMU,TheUniversityofTokyo),MasaomiTanaka(NationalAstronomicalObservatoryofJapan),NaokiYasuda(KavliIPMU,TheUniversityofTokyo),NaonoriUeda(NTT),NaokiYoshida(KavliIPMU,TheUniversityofTokyo)

EnablingLargeScaleDeliberationusingIdeationandNegotiation-SupportAgents KatsuhideFujita(TokyoUniversityofAgricultureandTechnology),TakayukiIto(NagoyaInstituteofTechnology),MarkKlein(MIT)

12:00-13:30 Monday, June 5, 2017 LunchLocation:Foyer

13:30-15:30 Monday, June 5, 2017 Workshop:CCN-CPS,Session3Location:SalonII

SessionChair:UttamGhosh(TennesseeStateUniversity)

OptimalDeploymentofChargingStationsforElectricVehicles:AFormalApproach

25

AmarjitDatta(TennesseeTechnologicalUniversity),BrianLedbetter(TennesseeTechnologicalUniversity),MohammadAshiqurRahman(TennesseeTechnologicalUniversity)

FormalVerificationofControlStrategiesforaCyberPhysicalSystemAmjadGawanmeh(KhalifaUniversityofScienceandTechnology),AliAlwadi(AucklandUniversityofTechnology),SaziaParvin(UniversityofNewSouthWales)

LightweightDetectionandIsolationofBlackHoleAttacksinConnectedVehicles SamiAlbouq(OaklandUniversity),ErikFredericks(OaklandUniversity)

AnewthreatassessmentmethodforintegratinganIoTinfrastructureinaninformationsystem BrunoDorsemaine(OrangeLabs),Jean-PhilippeGaulier(OrangeLabs),Jean-PhilippeWary(OrangeLabs),NizarKheir(Thales),PascalUrien(TelecomParisTech)

Workshop:ADSN,Session3:NetworkAssuranceLocation:SalonIV

FaultySensorDataDetectioninWirelessSensorNetworksUsingLogisticalRegressionTianyuZhang(UniversityofHyogo),QianZhao(UniversityofHyogo),YukikazuNakamoto(UniversityofHyogo)

AnAdaptability-EnhancedRoutingMethodforMultipleGateway-basedWirelessSensorNetworksUsingSecureDispersedDataTransfer RyumaTani(HiroshimaCityUniversity),KentoAoi(HiroshimaCityUniversity),EitaroKohno(HiroshimaCityUniversity),YoshiakiKakuda(HiroshimaCityUniversity)

ProgressiveDownloadMethodBasedonTimer-DrivenRequestingSchemesUsingMultipleTCPFlowsonMultiplePaths HiroakiHoriba(HiroshimaCityUniversity),TokumasaHiraoka(HiroshimaCityUniversity),JunichiFunasaka(HiroshimaCityUniversity)

Workshop:PED-BGP,Session1Location:SalonVI

Keynotespeech:Application-awaredatadissemination BettinaKemme(McGillUniversity)

WED-SQL:ARelationalFrameworkforDesignandImplementationofProcess-AwareInformationSystems BrunoPadilha(UniversityofSaoPaulo),AndréLuisSchwerz(FederalUniversityofTechnology),RafaelLiberatoRoberto(FederalUniversityofTechnology)

QueryingWorkflowLogsYanTang(UniversityofCaliforniaatSantaBarbara),JianwenSu(UniversityofCaliforniaatSantaBarbara)

Ontheintegrationofevent-basedandtransaction-basedarchitecturesforSupplyChains ZhijieLi(IndianaUniversity–PurdueUniversityIndianapolis),HaoyanWu(IndianaUniversity–PurdueUniversityIndianapolis),BrianKing(IndianaUniversity–PurdueUniversityIndianapolis),ZinaBen-Miled(IndianaUniversity–PurdueUniversityIndianapolis),JohnWassick(TheDowChemicalCompany),JeffreyTazelaar(TheDowChemicalCompany)

Workshop:IoTCA,Session1Location:Atlanta

KeynoteSpeech:TheInternetofThings,People,andSystems:FromtheEdgetotheCloud SchahramDustdar(TUWien)

TowardsPrivacy-AwareSmartBuildings:Capturing,Communicating,andEnforcingPrivacyPoliciesandPreferences PrimalPappachan(UniversityofCaliforniaIrvine),MartinDegelingy(CarnegieMellonUniversity),RobertoYus(UniversityofCaliforniaIrvine),AnupamDasy(CarnegieMellonUniversity),SrutiBhagavatulay(CarnegieMellonUniversity),WilliamMelichery(CarnegieMellonUniversity),PardisEmamiNaeiniy(CarnegieMellonUniversity),ShikunZhangy(CarnegieMellonUniversity),LujoBauery(CarnegieMellonUniversity),AlfredKobsa(UniversityofCaliforniaIrvine),SharadMehrotra(UniversityofCaliforniaIrvine),NormanSadeh(CarnegieMellonUniversity),NaliniVenkatasubramanian(UniversityofCaliforniaIrvine)

DeployingData-DrivenSecuritySolutionsonResource-ConstrainedWearableIoTSystem HangCai(WorcesterPolytechnicInstitute),TianlongYun(WorcesterPolytechnicInstitute),JosiahHester(DartmouthCollege),KrishnaK.Venkatasubramanian(ClemsonUniversity)

AMotifbasedIoTFrameworkforDataEfficiency AkashSahoo(TexasA&MUniversity),RabiMahapatra(TexasA&MUniversity)

Workshop:WoSC,Session1

26

Location:Columbia

KeynoteSpeech:ServerlessComputing:PatternsandRoadAhead RogerBarga(AmazonWebServices)

Ripple:HomeAutomationforResearchDataManagement RyanChard(ArgonneNationalLaboratory),KyleChard(ComputationInstitute,UniversityofChicagoandArgonneNationalLab),JasonAlt(NationalCenterforSupercomputingApplications),DilworthParkinson(LawrenceBerkeleyNationalLaboratory),SteveTuecke(ComputationInstitute,UniversityofChicagoandArgonneNationalLab),IanFoster(ArgonneNationalLaboratory&TheUniversityofChicago)

Pipsqueak:LeanLambdaswithLargeLibraries EdwardOakes(UniversityofWisconsin-Madison),LeonYang(UniversityofWisconsin-Madison),KevinHouck(UniversityofWisconsin-Madison),TylerHarter(MicrosoftGraySystemsLab),AndreaC.Arpaci-Dusseau(UniversityofWisconsin-Madison),RemziH.Arpaci-Dusseau(UniversityofWisconsin-Madison)

LeveragingtheServerlessArchitectureforSecuringLinuxContainersNiltonBila(IBM),PaoloDettori(IBM),AliKanso(IBM),YujiWatanabe(IBM),AlaaYoussef(IBM)

Workshop:NSF-JSTLocation:Savannah

15:30-16:00 Monday, June 5, 2017 CoffeeBreakLocation:Foyer

16:00-17:00 Monday, June 5, 2017 Workshop:CCN-CPS,Session4Location:SalonII

SessionChair:BrunoDorsemaine(OrangeLabs)

ASecurityFrameworkforSDN-enabledSmartPowerGrids UttamGhosh(TennesseeStateUniversity),PushpitaChatterjee(SRMRESEARCHINSTITUTE),SachinShetty(OldDominionUniversity)

Real-timeMonitoringSteamGeneratorsusingaHybridImagingSystem MahmoudMeribout(PetroleumInstitute),ImranSaied(PetroleumInstitute),EsraAlHosani(AdcoGroup)

SecuringbigDataEfficientlythroughMicroaggregationTechniqueandHuffmanCompression ShakilaMahjabinTonni(BangladeshArmyInternationalUniversityofScienceandTechnology),MohammadZahidurRahman(JahangirnagarUniversity),SaziaParvin(UniversityofNewSouthWales),AmjadGawanmeh(KhalifaUniversityofScienceandTechnology)

ModelBasedEnergyConsumptionAnalysisofWirelessCyberPhysicalSystems JingLiu(PekingUniversity),PingWang(PekingUniversity),JinlongLin(PekingUniversity),Chao-HsienChu(PennsylvanniaStateUniversity)

Workshop:ADSN,Session4:Panelon“AssuranceinInternetofThings(IoT)”Location:SalonIV

Moderator:EitaroKohno

Workshop:PED-BGP,Session2Location:SalonVI

CacheDOCS:ADynamicKey-ValueObjectCachingService JulienGascon-Samson(UniversityofBritishColumbia),MichaelCoppinger(McGillUniversity),FanJin(McGillUniversity),JörgKienzle(McGillUniversity),BettinaKemme(McGillUniversity)

WolfPath:Acceleratingiterativetraversing-basedgraphprocessingalgorithmsonGPU HuanzhouZhu(UniversityofWarwick),LigangHe(UniversityofWarwick)

ANovelAuction-basedQueryPricingSchema XingwangWang(JilinUniversity),XiaohuiWei(JilinUniversity),ShangGao(JilinUniversity),YuanyuanLiu(JilinUniversity),ZongpengLi(UniversityofCalgary)

BlockGraphChi:EnablingBlockUpdateinOut-of-coreGraphProcessing

27

ZhiyuanShao(HuazhongUniversityofScienceandTechnology),ZhenjieMei(HuazhongUniversityofScienceandTechnology),XiaofengDing(HuazhongUniversityofScienceandTechnology),HaiJin(HuazhongUniversityofScienceandTechnology)

Workshop:IoTCA,Session2Location:Atlanta

CoTWare:ACloudofThingsMiddleware JameelaAl-Jaroodi(RobertMorrisUniversity),NaderMohamed(MiddlewareTechnologiesLab.),ImadJawhar(MidcompResearchCenter)

SecuringtheInternetofThings:AMeta-StudyofChallenges,Approaches,andOpenProblemsMahmudHossain(UniversityofAlabamaatBirmingham),RagibHasan(UniversityofAlabamaatBirmingham),AnthonySkjellum(AuburnUniversity)

InternetofThingsFrameworkforSmartLearningAnalyticsAliYavari(SwinburneUniversityofTechnology),RezaSoltanpoor(RMITUniversity)

Workshop:WoSC,Session2Location:Columbia

ServerlessComputing:Design,Implementation,andPerformance GarrettMcGrath(UniversityofNotreDame),PaulR.Brenner(UniversityofNotreDame)

PaneldebateonthenoveltyandchallengesofserverlesscomputingParticipants:TBA

Workshop:NSF-JSTLocation:Savannah

17:00-18:00 Monday, June 5, 2017 Workshop:PED-BGP,Session2Location:SalonVI

IncrementalParallelComputingusingTransactionalModelinLarge-scaleDynamicGraphStructures AnandTripathi(UniversityofMinnesota),RahulR.Sharma(UniversityofMinnesota),ManuKhandelwal(UniversityofMinnesota),TanmayMehta(UniversityofMinnesota),VarunPandey(UniversityofMinnesota)

AgainstSigned-GraphDeanonymizationAttacks:PrivacyProtectionforSocialNetworks JianliangGao(CentralSouthUniversity),YuLiu(CentralSouthUniversity),PingZhong(CentralSouthUniversity),JianxinWang(CentralSouthUniversity)

28

Day 2 – Tuesday, June 6, 2017

7:00-8:00 Tuesday, June 6, 2017 ContinentalBreakfastLocation:Foyer

8:00-8:30 Tuesday, June 6, 2017 ConferenceOpeningLocation:PhoenixBallroom

8:30-9:30 Tuesday, June 6, 2017 Keynote1byC.Mohan(IBMResearch)Location:PhoenixBallroom

SessionChair:MasaruKitsuregawa(UniversityofTokyo)

9:30-10:00 Tuesday, June 6, 2017 CoffeeBreakLocation:Foyer

10:00-12:00 Tuesday, June 6, 2017 Research1:DistributedFaultToleranceandDependabilityLocation:SalonI

SessionChair:MudhakarSrivatsa(IBMT.J.WatsonResearchCenter)

Timely,Reliable,andCost-EffectiveInternetTransportServiceusingDisseminationGraphs AmyBabay(JohnsHopkinsUniversity),EmilyWagner(JohnsHopkinsUniversity,LTNGlobalCommunications),MichaelDinitz(JohnsHopkinsUniversity),YairAmir(JohnsHopkinsUniversity,LTNGlobalCommunications)

Pronto:EfficientTestPacketGenerationforDynamicNetworkDataPlanes YuZhao(UniversityofKentucky),HuazheWang(UniversityofCaliforniaatSantaCruz),XinLin(UniversityofCaliforniaatSantaCruz),TingtingYu(UniverstiyofKentucky),ChenQian(UniversityofCaliforniaatSantaCruz)

Agar:ACachingSystemforErasure-CodedData RalucaHalalai(UniversityofNeuchâtel),PascalFelber(UniversityofNeuchâtel),Anne-MarieKermarrec(INRIA),FrançoisTaïani(IRISA)

Highperformancerecoveryforparallelstatemachinereplication OdoricoMendizabal(FURG),FernandoLuisDotti(PUCRS),FernandoPedone(UniversityofLugano)

OnDataParallelismofErasureCodinginDistributedStorageSystems JunLi(UniversityofToronto),BaochunLi(UniversityofToronto)

MeteorShower:MinimizingRequestLatencyforMajorityQuorum-basedDataConsistencyAlgorithmsinMultipleDataCenters YingLiu(KTHRoyalInstituteofTechnology),XiGuan(KTHRoyalInstituteofTechnology),VladimirVlassov(KTHRoyalInstituteofTechnology),SeifHaridi(KTHRoyalInstituteofTechnology)

Research2:DistributedOperatingSystemsandMiddlewareLocation:SalonII

SessionChair:PeterPietzuch(ImperialCollegeLondon)

LSbM-tree:Re-enablinghigh-speedcachinginDataManagementforMixedReadsandWrites DejunTeng(TheOhioStateUniversity),LeiGuo(Google),RubaoLee(TheOhioStateUniversity),FengChen(LouisianaStateUniversity),SiyuanMa(TheOhioStateUniversity),XiaodongZhang(TheOhioStateUniversity),YanfengZhang(NortheasternUniversity)

IncrementalTopologyTransformationforPublish/SubscribeSystemsUsingIntegerProgramming PooyaSalehi(TechnicalUniversityofMunich),KaiwenZhang(TechnicalUniversityofMunich),Hans-ArnoJacobsen(UniversityofToronto)

milliScope:aFine-GrainedMonitoringFrameworkforPerformanceDebuggingofn-TierWebServices

29

Chien-AnLai(GeorgiaInstituteofTechnology),JoshKimball(GeorgiaInstituteofTechnology),TaoZhu(GeorgiaInstituteofTechnology),QingyangWang(LouisianaStateUniversity),CaltonPu(GeorgiaInstituteofTechnology)

Stark:OptimizingIn-MemoryComputingForDynamicDatasetCollections ShenLi(IBMResearch),MdTanvirAlAmin(UIUC),RaghuGanti(IBMResearch),MudhakarSrivatsa(IBMResearch),ShaohanHu(IBMResearch),YiranZhao(UIUC),TarekAbdelzaher(UIUC)

CRESON:CallableandReplicatedSharedObjectsoverNoSQL PierreSutra(TélécomSudParis,CNRS,UniversitéParis-Saclay,France),EtienneRivière(UniversityofNeuchatel),CristianCotes(UniversitatRoviraiVirgili),MarcSánchezArtigas(UniversitatRoviraiVirgili),PedroGarciaLopez(UniversitatRoviraiVirgili),EmmanuelBernard(RedHat),WilliamBurns(RedHat),GalderZamarreno(RedHat)

VirtualizedNetworkCodingFunctionsontheInternet LinquanZhang(UniversityofCalgary),ShangqiLai(TheUniversityofHongKong),ChuanWu(TheUniversityofHongKong),ZongpengLi(UniversityofCalgary),ChuanxiongGuo(MicrosoftResearch)

Vision1:InternetofThings,SmartCitiesandCyber-PhysicalSystemsLocation:Atlanta

SessionChair:LingLiu(GeorgiaInstituteofTechnology)

Observable-by-Design MasaruKitsuregawa(NationalInstituteofInformatics(NII)/InstituteofIndustrialScience,UniversityofTokyo)

AnArchitecturalVisionforaData-CentricIoT:RethinkingThings,TrustandClouds EveM.Schooler(Intel),DavidZage(Intel),JeffSedayao(Intel),HassnaaMoustafa(Intel),AndrewBrown(Intel),MorenoAmbrosin(UniversityofPadua)

EdgeComputingandIoTBasedResearchforBuildingSafeSmartCitiesResistanttoDisasters TeruoHigashino(OsakaUniversity),HirozumiYamaguchi(OsakaUniversity),AkihitoHiromori(OsakaUniversity),AkiraUchiyama(OsakaUniversity),KeiichiYasumoto(NaraInstituteofScienceandTechnology)

TheInternetofThingsandMultiagentSystems:DecentralizedIntelligenceinDistributedComputing MunindarSingh(NorthCarolinaStateUniversity),AmitChopra(LancasterUniversity)

InternetofThings:FromSmall-toLarge-ScaleOrchestration CharlesConsel(Inria/BordeauxINP),MilanKabac(ImperialCollege)

EdgeOS_H:AHomeOperatingSystemforInternetofEverything JieCao(WayneStateUniversity),LanyuXu(WayneStateUniversity),RaefAbdallah(WayneStateUniversity),WeisongShi(WayneStateUniversity)

Application1:Security,Privacy,TrustinDistributedSystemsLocation:Columbia

SessionChair:SongqingChen(GeorgeMasonUniversity)

PrivacyPreservingUser-basedRecommenderSystem ShahriarBadsha(RMITUniversity),XunYi(RMITUniversity),IbrahimKhalil(RMITUniversity),ElisaBertino(PurdueUniversity)

PrivacyPreservingOptimizationofParticipatorySensinginMobileCloudComputing YeYan(OaklandUniversity),DongHan(OaklandUniversity),TaoShu(AuburnUniversity)

SPHINX:APasswordStorethatPerfectlyHidesPasswordsfromItself MalihehShirvanian(UniversityofAlabamaatBirmingham),StanislawJarecki(UniversityofCaliforniaatIrvine),HugoKrawczyk(IBMResearch),NiteshSaxena(UniversityofAlabamaatBirmingham)

WhenSmartTVMeetsCRN:Privacy-preservingFine-grainedSpectrumAccess ChaowenGuan(StateUniversityofNewYorkatBuffalo),AzizMohaisen(StateUniversityofNewYorkatBuffalo),ZhiSun(StateUniversityofNewYorkatBuffalo),LuSu(StateUniversityofNewYorkatBuffalo),KuiRen(StateUniversityofNewYorkatBuffalo),YalingYang(VirginiaTech)

RevisitingSecurityRisksofAsymmetricScalarProductPreservingEncryptionandItsVariants WeipengLin(SimonFraserUniveristy),KeWang(SimonFraserUniversity),ZhilinZhang(SimonFraserUniversity),HongChen(RenminUniversityofChina)

AnAdversary-CentricBehaviorModelingofDDoSAttacks AnWang(GeorgeMasonUniversity),AzizMohaisen(SUNYBuffalo),SongqingChen(GeorgeMasonUniversity)

30

Application2:SocialNetworksandCrowdsourcingLocation:Nashville

SessionChair:YaoLiu(SUNYBinghamton)

Anti-MaliciousCrowdsourcingUsingtheZero-DeterminantStrategy QinHu(BeijingNormalUniversity),ShenglingWang(BeijingNormalUniversity),LiranMa(TexasChristianUniversity),RongfangBie(BeijingNormalUniversity),XiuzhenCheng(GeorgeWashingtonUniversity)

JPR:ExploringJointPartitioningandReplicationforTrafficMinimizationinOnlineSocialNetworks JingyaZhou(SoochowUniversity),JianxiFan(SoochowUniversity)

OptimizingSourceSelectioninSocialSensinginthePresenceofInfluenceGraphs HuajieShao(UIUC),ShiguangWang(UIUC),ShenLi(UIUC),ShuochaoYao(UIUC),YiranZhao(UIUC),MdTanvirAlAmin(UIUC),TarekAbdelzaher(UIUC),LanceKaplan(UIUC)

DynamicContractDesignforHeterogenousWorkersinCrowdsourcingforQualityControl ChenxiQiu(PennsylvaniaStateUniversity),AnnaSquicciarini(PennsylvaniaStateUniversity),SarahRajtmajer(PennsylvaniaStateUniversity),JamesCaverlee(TexasA&MUniversity)

JointRequestBalancingandContentAggregationinCrowdsourcedCDN MingMa(TsinghuaUniversity),ZhiWang(TsinghuaUniversity),KunYi(TsinghuaUniversity),JiangchuanLiu(SouthChinaAgriculturalUniversity),LifengSun(TsinghuaUniversity)

Shrink:ABreastCancerRiskAssessmentModelBasedonMedicalSocialNetwork AliLi(UniversityofScienceandTechnologyBeijing),RuiWang(UniversityofScienceandTechnologyBeijing),LeiXu(UniversityofScienceandTechnologyBeijing)

Industry1:CloudDataCentersandPerformanceLocation:Charleston1

SessionChair:RaghuGanti(IBMT.J.WatsonResearchCenter)

Phoenix:Constraintawareschedulingforheterogeneousdatacenters PrashanthThinakaran(PennsylvaniaStateUniversity),JashwantRajGunasekaran(PennsylvaniaStateUniversity),BikashSharma(MicrosoftCorp),MahmutKandemir(PennsylvaniaStateUniversity),ChitaDas(PennsylvaniaStateUniversity)

DualScalingVMsandQueries:Cost-effectiveLatencyCurtailment JuanPérez(UniversityofMelbourne),RobertBirke(IBMResearchZurich),MathiasBjörkqvist(IBMResearchZurich),LydiaY.Chen(IBMResearchZurich)

Aframeworkforenablingsecurityservicescollaborationacrossmultipledomains DanielMigault(EricssonSecurityResearch),MarcosSimplicioJunior(EscolaPolitécnica),BrunoBarros(EscolaPolitécnica),MakanPourzandi(EricssonSecurityResearch),ThiagoAlmeida(EscolaPolitécnica),EwertonAndrade(EscolaPolitécnica),TerezaCarvalho(EscolaPolitécnica)

GroupClusteringUsingInter-GroupDissimilarities DebessayFesehayeKassa(VMware),LeninSingaravelu(Google),Chien-ChiaChen(VMware),XiaoboHuang(VMware),AmitabhaBanerjee(VMware),RuijinZhou(VMware),RajeshSomasundaran(VMware)

ComprehensiveMeasurementandAnalysisoftheUser-PerceivedI/OPerformanceinaProductionLeadership-ClassStorageSystemLipengWan(OakRidgeNationalLaboratory),MatthewWolf(OakRidgeNationalLaboratory),FeiyiWang(OakRidgeNationalLaboratory),JongYoulCho(OakRidgeNationalLaboratory),GeorgeOstruchov(OakRidgeNationalLaboratory),ScottKlasky(OakRidgeNationalLaboratory)

12:00-13:30 Tuesday, June 6, 2017 LunchLocation:PhoenixBallroom

13:30-15:30 Tuesday, June 6, 2017 Research3:SecurityandPrivacyinDistributedSystemsILocation:SalonI

SessionChair:RolandYap(NationalUniversityofSingapore)

31

ConsensusRobustnessandTransactionDe-AnonymizationintheRippleCurrencyExchangeSystem AdrianoDiLuzio(SapienzaUniversityofRome),AlessandroMei(SapienzaUniversityofRome),JulindaStefa(SapienzaUniversityofRome)

LearningprivacyhabitsofPDSowners BikashSingh(UniversityofInsubria),BarbaraCarminati(universityofinsubria),ElenaFerrari(universityofinsubria)

City-Hunter:HuntingSmartphonesinUrbanAreas XuefengLiu(HongKongPolytechnicUniversity),JiaqiWen(HongKongPolytechnicUniversity),ShaojieTang(UniversityofTexasatDallas),JiannongCao(HongKongPolytechnicUniversity),JiaxingShen(HongKongPolytechnicUniversity)

WhenSeeingIsn'tBelieving:OnFeasibilityandDetectabilityofScapegoatinginNetworkTomography ShangqingZhao(UniversityofSouthFlorida),ZhuoLu(UniversityofSouthFlorida),CliffWang(NorthCarolinaStateUniversity/ArmyResearchOffice)

YouCanHearButYouCannotSteal:DefendingagainstVoiceImpersonationAttacksonSmartphones SiChen(UniversityatBuffalo/WestChesterUniversity),KuiRen(UniversityatBuffalo),SixuPiao(UniversityatBuffalo),CongWang(CityUniversityofHongKong),QianWang(WuhanUniversity),JianWeng(JinanUniversity),LuSu(UniveristyatBuffalo),AzizMohaisen(UniversityatBuffalo)

FlowReconnaissanceviaTimingAttacksonSDNSwitches ShengLiu(UniversityofNorthCarolinaatChapelHill),MichaelReiter(UniversityofNorthCarolinaatChapelHill),VyasSekar(CarnegieMellonUniversity)

Research4:CloudComputingandDataCenterSystemsLocation:SalonII

SessionChair:VladimirVlassov(KTHRoyalInstituteofTechnology)

AStudyofLong-TailLatencyinn-TierSystems:RPCvs.AsynchronousInvocations QingyangWang(LouisianaStateUniversity),Chien-AnLai(GeorgiaTech),YasuhikoKanemasa(FujitsuLaboratoriesLtd.),ShungengZhang(LouisianaStateUniversity),CaltonPu(GeorgiaTech)

RainorShine?-MakingSenseofCloudyReliabilityData IyswaryaNarayanan(ThePennsylvaniaStateUniversity),BikashSharma(Microsoft),DiWang(Microsoft),SriramGovindan(Microsoft),LauraCaulfield(Microsoft),AnandSivasubramaniam(ThePennsylvaniaStateUniversity),AmanKansal(Microsoft),JieLiu(Microsoft),BadriddineKhessib(Microsoft),KushagraVaid(Microsoft)

Right-sizingGeo-distributedDataCentersforAvailabilityandLatency IyswaryaNarayanan(ThePennsylvaniaStateUniversity),AmanKansal(Microsoft),AnandSivasubramaniam(ThePennsylvaniaStateUniversity)

PerformanceDrivenResourceSharingMarketsfortheSmallCloud Sung-HanLin(UniversityofSouthernCalifornia),RanjanPal(UniversityofSouthernCalifornia),MarcoPaolieri(UniversityofSouthernCalifornia),LeanaGolubchik(UniversityofSouthernCalifornia)

Fault-scalableVirtualizedInfrastructureManagement MukilKesavan(VMwareInc.),AdaGavrilovska(GeorgiaInstituteofTechnology),KarstenSchwan(GeorgiaInstituteofTechnology)

DeltaCFS:BoostingDeltaSyncforCloudStorageServicesbyLearningfromNFS QuanluZhang(PekingUniversity),ZhenhuaLi(TsinghuaUniversity),ZhiYang(PekingUniversity),ShenglongLi(PekingUniversity),YangzeGuo(PekingUniversity),YafeiDai(PekingUniversity),ShouyangLi(PekingUniversity)

Vision2:FutureNetworkingandCyberinfrastructureLocation:Atlanta

SessionChair:ManishParashar(RutgersUniversity)

AVisionforZero-HopNetworking(ZeN) MostafaAmmar(SchoolofComputerScience,GeorgiaTech),EllenZegura(SchoolofComputerScience,GeorgiaTech),YimengZhao(SchoolofComputerScience,GeorgiaTech)

StructuredOverlayNetworksforaNewGenerationofInternetServices AmyBabay(JohnsHopkinsUniversity),ClaudiuDanilov(BoeingResearchandTechnology),JohnLane(LTNGLobalCommunications),MichalMiskin-Amir(LTNGlobalCommunications,SpreadConceptsLLC),DanielObenshain(JohnsHopkinsUniversity),JohnSchultz(LTNGlobalCommunications,SpreadConceptsLLC),JonathanStanton(LTNGlobalCommunications,SpreadConceptsLLC),ThomasTantillo(JohnsHopkinsUniversity),YairAmir(JohnsHopkinsUniversity,LTNGlobalCommunications,SpreadConceptsLLC)

32

EnsuringNetworkNeutralityforFutureDistributedSystems ThiagoGarrett(FederalUniversityofParana),SchahramDustdar(TUWien),LuisC.E.Bona(FederalUniversityofParana),EliasP.DuarteJr.(FederalUniversityofParana)

UncoveringtheUsefulStructuresofComplexNetworksinSocially-RichandDynamicEnvironments JieWu(TempleUniversity)

FutureNetworkingChallenges:TheCaseofMobileAugmentedReality TristanBraud(TheHongKongUniversityofScienceandTechnology),FarshidHassaniBijarbooneh(TheHongKongUniversityofScienceandTechnology),DimitrisChatzopoulos(TheHongKongUniversityofScienceandTechnology),PanHui(TheHongKongUniversityofScienceandTechnology)

SoftwareDefinedCyberinfrastructure IanFoster(ArgonneNationalLaboratoryandTheUniversityofChicago),BenBlaiszik(TheUniversityofChicago),KyleChard(ComputationInstitute,UniversityofChicagoandArgonneNationalLab),RyanChard(VictoriaUniversityofWellington)

Application3:InternetofThings,SmartCities,andCyber-PhysicalSystemsLocation:Columbia

SessionChair:GuanhuaYan(BinghamtonUniversity)

OpportunisticEnergySharingBetweenPowerGridandElectricVehicles:AGameTheory-BasedPricingPolicy AnkurSarker(UniversityofVirginia),ZhuozhaoLi(UniversityofVirginia),WilliamKolodzey(ClemsonUniversity),HaiyingShen(UniversityofVirginia)

EnergyEfficientObjectDetectioninCameraSensorNetworks TuanDao(UCRiverside),KarimKhalil(UCRiverside),AmitRoy-Chowdhury(UCRiverside),SrikanthKrishnamurthy(UCRiverside),LanceKaplan(U.S.ArmyResearchLaboratory)

DeepOpp:Context-awareMobileAccesstoSocialMediaContentonUndergroundMetroSystems DiWu(HunanUniversity&ImperialCollegeLondon),DmitriArkhipov(UniversityofCaliforniaIrvine),ThomasPrzepiorka(ImperialCollegeLondon),QiangLiu(DartmouthCollege),JulieMcCann(ImperialCollegeLondon),AmeliaRegan(UniversityofCaliforniaIrvine)

PhaseBeat:ExploitingCSIPhaseDataforVitalSignMonitoringwithCommodityWiFiDevices XuyuWang(AuburnUniversity),ChaoYang(AuburnUniversity),ShiwenMao(AuburnUniversity)

REX:RapidEnsembleClassificationSystemforLandslideDetectionusingSocialMediaAibekMusaev(UniversityofAlabama),DeWang(GeorgiaInstituteofTechnology),JiatengXie(GeorgiaInstituteofTechnology),CaltonPu(GeorgiaInstituteofTechnology)

TowardAnIntegratedApproachtoLocalizingFailuresinCommunityWaterNetworksQingHan(UCIrvine),PhuNguyen(UCIrvine),RonaldT.Eguchi(ImageCat),Kuo-LinHsu(UCIrvine),NaliniVenkatasubramanian(UCIrvine)

Application4:Mobile,Wireless,andEdgeComputingLocation:Nashville

SessionChair:ShiwenMao(AuburnUniversity)

MobiQoR:PushingtheEnvelopeofMobileEdgeComputingviaQuality-of-ResultOptimizationYongboLi(GeorgeWashingtonUniversity),YurongChen(GeorgeWashingtonUniversity),TianLan(GeorgeWashingtonUniversity),GuruVenkataramani(GeorgeWashingtonUniversity)

TruthfulAuctionsforUserDataAllowanceTradinginMobileNetworks ZhongxingMing(TsinghuaUniversity),MingweiXu(TsinghuaUniversity),NingWang(SurreyUniversity),BeijeGao(TsinghuaUniversity),QiLi(TsinghuaUniversity)

OnlineResourceAllocationforArbitraryUserMobilityinDistributedEdgeClouds LinWang(TUDarmstadt),LeiJiao(UniversityofOregon),JunLi(UniversityofOregon),MaxMühlhäuser(TUDarmstadt)

LeveragingTargetk-CoverageinWirelessRechargeableSensorNetworks PengzhanZhou(StonyBrookUniversity),CongWang(StonyBrookUniversity),YuanyuanYang(StonyBrookUniversity)

ReducingCellularSignalingTrafficforHeartbeatMessagesviaEnergy-EfficientD2DForwarding YanqiJin(HuazhongUniversityofScience&Technology),FangmingLiu(HuazhongUniversityofScienceandTechnology),XiaomengYi(HuazhongUniversityofScience&Technology),MinghuaChen(TheChineseUniversityofHongKong)

k-ProtectedRoutingProtocolinMulti-hopCognitiveRadioNetworks

33

Chin-JungLiu(MichiganStateUniversity),LiXiao(MichiganStateUniversity)

ShortPaper1:DistributedOperatingSystems,Middleware,andAlgorithmsLocation:Charleston1

SessionChair:SripadNadagowda(IBMTJWatsonResearchCenter)

SRLB:ThePowerofChoicesinLoadBalancingwithSegmentRoutingYoannDesmouceaux(ÉcolePolytechnique),PierrePfister(CiscoSystems),JérômeTollet(CiscoSystems),MarkTownsley(CiscoSystems),ThomasClausen(ÉcolePolytechnique)

ImprovingEfficiencyofLinkClusteringonMulti-CoreMachines GuanhuaYan(BinghamtonUniversity)

S3:JointSchedulingandSourceSelectionforBackgroundTrafficinErasure-CodedStorage ShijingLi(GeorgeWashingtonUniversity),TianLan(GeorgeWashingtonUniversity),Moo-RyongRa(AT&TLabsResearch),RajeshPanta(AT&TLabsResearch)

OntheFeasibilityofInter-domainRoutingviaaSmallBrokerSet DongLin(HuaweiTechnologiesLtdCo.),DavidHui(HuaweiTechnologiesLtdCo.),WeijieWu(HuaweiTechnologiesLtdCo.),TingweiLiu(TheChineseUniversityofHongKong),YatingYang(BeijingInstituteofTechnology),YiWang(TsinghuaUniversity),JohnChi-ShingLui(ChineseUniversityofHongKong),GongZhang(HuaweiTechnologiesLtdCo.),YingtaoLi(HuaweiTechnologiesLtdCo.)

SubscriptionCoveringforRelevance-basedFilteringinContent-BasedPublish/SubscribeSystems KaiwenZhang(TechnischeUniversitatMunchen),VinodMuthusamy(IBMResearch),MohammadSadoghi(PurdueUniversity),Hans-ArnoJacobsen(UniversityofToronto)

WorkflowOptimizationinPAW MaximFilatov(UNIGE),VerenaKantere(UniversityofGeneva)

AFirstLookatInformationEntropy-BasedDataPricing XijunLi(ShanghaiJiaoTongUniversity),JianguoYao(ShanghaiJiaoTongUniversity),XueLiu(McGillUniversity),HaibingGuan(ShanghaiJiaoTongUniversity)

RestrospectiveLightweightDistributedSnapshotsUsingLooselySynchronizedClocks AlekseyCharapko(SUNYBuffalo),AilidaniAilijiang(SUNYBuffalo),MuratDemirbas(SUNYBuffalo),SandeepKulkarni(MichiganStateUniversity)

Power-AwarePopulationProtocols ChuanXu(LRI(CNRS/UPSud)),JannaBurman(LRI(CNRS/UPSud)),JoffroyBeauquier(LRI(CNRS/UPSud))

MultiPub:LatencyandCost-AwareGlobal-ScaleCloudPublish/Subscribe JulienGascon-Samson(McGillUniversity),JörgKienzle(McGillUniversity),BettinaKemme(McGillUniversity)

ReachabilityinBinaryMultithreadedProgramsIsPolynomial AlexanderMalkis(TechnischeUniversitätMünchen),SteffenBorgwardt(UCDavis)

AnEvent-LevelAbstractionforAchievingEfficiencyandFairnessinNetworkUpdate TingQu(NationalUniversityofDefenseTechnology),DekeGuo(NationalUniversityofDefenseTechnology),XiaominZhu(NationalUniversityofDefenseTechnology),JieWu(TempleUniversity),XiaoleiZhou(NationalUniversityofDefenseTechnology),ZhongLiu(NationalUniversityofDefenseTechnology)

15:30-16:00 Tuesday, June 6, 2017 CoffeeBreakLocation:Foyer

16:00-18:00 Tuesday, June 6, 2017 Research5:EdgeandFogComputingLocation:SalonI

SessionChair:WeisongShi(WayneStateUniversity)

Cachier:Edge-cachingforrecognitionapplications UtsavDrolia(CarnegieMellonUniversity),KatherineGuo(BellLabs),JiaqiTan(Nokia),RajeevGandhi(CarnegieMellonUniversity),PriyaNarasimhan(CarnegieMellonUniversity)

34

ContentCentricPeerDataSharinginPervasiveEdgeComputingEnvironments XintongSong(PekingUniversity),YaodongHuang(StonyBrookUniversity),QianZhou(StonyBrookUniversity),FanYe(StonyBrookUniversity),YuanyuanYang(StonyBrookUniversity),XiaomingLi(PekingUniversity)

FLARE:CoordinatedRateAdaptationforHTTPAdaptiveStreaminginCellularNetworks YoungbinIm(UniversityofColoradoatBoulder),JinyoungHan(HanyangUniversity),JiHoonLee(JuniKorea),YoonKwon(Kakao),CarleeJoe-Wong(CarnegieMellonUniversity),TaekyoungKwon(SeoulNationalUniversity),SangtaeHa(UniversityofColoradoatBoulder)

NetworkedDroneCamerasforSportsStreaming XiaoliWang(PrincetonUniversity),AakankshaChowdhery(PrincetonUniversity),MungChiang(PrincetonUniversity)

Chronus:ConsistentDataPlaneUpdatesinTimedSDNs JiaqiZheng(NanjingUniversity),GuihaiChen(NanjingUniversity),StefanSchmid(AalborgUniversity),HaipengDai(NanjingUniversity),JieWu(TempleUniversity)

DistributedDeepNeuralNetworksovertheCloud,theEdgeandEndDevicesSuratTeerapittayanon(HarvardUniversity),BradleyMcDanel(HarvardUniversity),H.T.Kung(HarvardUniversity)

Research6:DistributedGreenComputingandEnergyManagementLocation:SalonII

SessionChair:GeraldFLofstead(SandiaNationalLab)

DynamicControlofFlowCompletionTimeForPowerEfficientDataCenterNetworks KuangyuZheng(TheOhioStateUniversity),XiaoruiWang(TheOhioStateUniversity)

OnEnergy-EfficientCongestionControlforMultipathTCP JiaZhao(SimonFraserUniversity),JiangchuanLiu(SimonFraserUniversity),HaiyangWang(UniversityofMinnesotaDuluth)

AMechanismforCooperativeDemand-SideManagement GuangchaoYuan(Microsoft),Chung-WeiHang(IBM),MichaelHuhns(UniversityofSouthCarolina),MunindarSingh(NorthCarolinaStateUniversity)

AHierarchicalFrameworkofCloudResourceAllocationandPowerManagementUsingDeepReinforcementLearning NingLiu(SyracuseUniversity),ZheLi(SyracuseUniversity),ZhiyuanXu(SyracuseUniversity),JielongXu(SyracuseUniversity),ShengLin(SyracuseUniversity),QinruQiu(SyracuseUniversity),JianTang(SyracuseUniversity),YanzhiWang(SyracuseUniversity)

SunChase:Energy-EfficientRoutePlanningforSolar-PoweredEVs. LanduJiang(McGillUniversity),YuHua(HuazhongUniversityofScienceandTechnology),ChenMa(McGillUniversity),XueLiu(McGillUniversity)

Vision3:NextGenerationCloudandEdgeServicesLocation:Atlanta

SessionChair:ManfredHauswirth(TUBerlin)

ComputingintheContinuum:CombiningPervasiveDevicesandServicestoSupportData-drivenApplications ManishParashar(RutgersUniversity),MoustafaAbdelbaky(RutgersUniversity),MengsongZou(RutgersUniversity),AliRezaZamani(RutgersUniversity),EduardRenart(RutgersUniversity),JavierDiaz-Montes(RutgersUniversity)

Decision-drivenExecution:ADistributedResourceManagementParadigmfortheAgeofIoT TarekAbdelzaher(UIUC),TanvirAlAmin(UIUC),AmotzBar-Noy(UIUC),WilliamDron(BBN),RameshGovindan(USC),ReginaldHobbs(ARL),ShaohanHu(IBM),Jung-EunKim(UIUC),ShuochaoYao(UIUC),YiranZhao(UIUC)

ACTiCLOUD:EnablingtheNextGenerationofCloudApplications GeorgiosGoumas(NationalTechnicalUniversityofAthens),KonstantinosNikas(ComputingSystemsLaboratory,NTUA),EwnetuBayuhLakew(Dept.ofComputingScience,UmeaUniversity),ChristosKotselidis(TheUniversityofManchester),VasileiosKarakostas(ComputingSystemsLaboratory,NTUA),AtleVesterkjaer(Numascale),EinarRustad(Numascale),JohnGoodacre(Kaleao),AndrewAttwood(Kaleao),MichailFlouris(OnApp),JohnThomson(OnApp),NikosFoutris(TheUniversityofManchester),MikelLujan(TheUniversityofManchester),YingZhang(MonetDBSolutions),PanagiotisKoutsourakis(MonetDBSolutions),MartinKersten(MonetDBSolutions),JimWebber(NeoTechnology),DavideGrohmann(NeoTechnology),ErikElmroth(Dept.ofComputingScience,UmeaUniversity),LuisTomas(Dept.ofComputingScience,UmeaUniversity),NectariosKoziris(NationalTechnicalUniversityofAthens)

JointCloud:ACross-CloudCooperationArchitectureforIntegratedInternetServiceCustomization HuaiminWang(NationalUniversityofDefenseTechnology),PeichangShi(NationalUniversityofDefenseTechnology),YimingZhang(NationalUniversityofDefenseTechnology)

35

SupportingDataAnalyticsApplicationsWhichUtilizeCognitiveServices ArunIyengar(IBMResearch)

TrillionOperationsKey-ValueStorageEngine:RevisitingtheMissionCriticalAnalyticsStorageSoftwareStack SangeethaSeshadri(IBMAlmadenResearchCenter),LawrenceChiu(IBMAlmadenResearchCenter),PaulMuench(IBMAlmadenResearchCenter)

ShortPaper2:CloudandDataCenterSystemsandNetworksLocation:Columbia

SessionChair:QingyangWang(LouisianaStateUniversity)

DCM:DynamicConcurrencyManagementforScalingn-TierApplicationsinCloud HuiChen(LouisianaStateUniversity),QingyangWang(LouisianaStateuniversity),BalajiPalanisamy(UniversityofPittsburgh),PengchengXiong(Hortonworks)

MorePeak,LessDifferentiation:TowardsAPricing-awareOnlineControlFrameworkforInter-DatacenterTransfers WenxinLi(DalianUniversityofTechnology),XiaoboZhou(TiajjinUniversity),KeqiuLi(DalianUniversityofTechnology),HengQi(DalianUniversityofTechnology),DekeGuo(NationalUniversityofDefenceTechnology)

RobustMulti-TenantServerConsolidationintheCloudforDataAnalyticsWorkloads JosephMate(UniversityofWaterloo),KhuzaimaDaudjee(UniversityofWaterloo),ShahinKamali(MITCSAIL)

Flow-AwareAdaptivePacingtoMitigateTCPIncastinDatacenterNetworks ShaojunZou(CentralSouthUniversity),JiaweiHuang(CentralSouthUniversity),YutaoZhou(CentralSouthUniversity),JianxinWang(CentralSouthUniversity),TianHe(UniversityofMinnesota)

Real-TimePowerCyclinginVideoonDemandDataCentresusingOnlineBayesianPrediction VicentSanzMarco(LancasterUniversity),ZhengWang(LancasterUniversity),BarryPorter(LancasterUniversity)

ADistributedAccessControlSystemforCloudFederations ShorouqAlansari(UniversityofSouthampton),FedericaPaci(UniversityofSouthampton),VladimiroSassone(UniversityofSouthampton)

Voyager:CompleteContainerStateMigration ShripadNadgowda(IBMTJWatsonResearchCenter),SahilSuneja(IBMTJWatsonResearchCenter),NiltonBila(IBMTJWatsonResearchCenter),CanturkIsci(IBMTJWatsonResearchCenter)

Keddah:CapturingHadoopNetworkBehaviour JieDeng(QueenMaryUniversityLondon),GarethTyson(QueenMary),FélixCuadrado(QueenMaryUniversityofLondon),SteveUhlig(QueenMaryUniversityofLondon)

AScalableandDistributedApproachforNFVServiceChainCostMinimization ZijunZhang(UniversityofCalgary),ZongpengLi(UniversityofCalgary),ChuanWu(UniversityofHongKong),ChuanheHuang(WuhanUniversity)

ElasticPaxos:ADynamicAtomicMulticastProtocol SamuelBenz(UniversitàdellaSvizzeraitaliana),FernandoPedone(UniversitàdellaSvizzeraitaliana)

BoostingTheBenefitsOfHybridSDN WenWang(McGillUniversity),WenboHe(McMasterUniversity),JinshuSu(NationalUniversityofDefenseTechnology)

AdoptingSDNSwitchBuffer:BenefitsAnalysisandMechanismDesign FuliangLi(NortheasternUniversity),JiannongCao(TheHongKongPolytechnicUniversity),XingweiWang(NortheasternUniversity),YinchuSun(NortheasternUniversity),TianPan(BeijingUniversityofPostsandTelecommunication),XuefengLiu(TheHongKongPolytechnicUniversity)

ShortPaper3:InternetofThings,SmartCities,andCyber-PhysicalSystemsLocation:Nashville

SessionChair:NanLi(CSIRO)

IOTSENTINEL:AutomatedDevice-TypeIdentificationforSecurityEnforcementinIoT MarkusMiettinen(TechnischeUniversitatDarmstadt),SamuelMarchal(AaltoUniversity),IbbadHafeez(UniversityofHelsinki),N.Asokan(AaltoUniversity),Ahmad-RezaSadeghi(TechnischeUniversitatDarmstadt),SasuTarkoma(UniversityofHelsinki)

EfficientZ-orderEncodingBasedMulti-modelDataCompressioninWSNs XiaofeiCao(MissouriUniversityofScienceandTechnology),SanjayMadria(MissouriUniversityofScienceandTechnology),TakahiroHara(OsakaUniversity)

PTrack:EnhancingtheApplicabilityofPedestrianTrackingwithWearables

36

YonghangJiang(CityUniversityofHongKong),ZhenjiangLi(CityUniversityofHongKong),JianpingWang(CityUniversityofHongKong)

SourceLocationPrivacy-AwareDataAggregationSchedulingforWirelessSensorNetworks JackKirton(UniversityofWarwick),MatthewBradbury(TheUniversityofWarwick),ArshadJhumka(UniversityofWarwick)

VelocityOptimizationofPureElectricVehicleswithTrafficDynamicsConsideration LiuwangKang(UniversityofVirginia),HaiyingShen(UniversityofVirginia),AnkurSarker(UniversityofVirginia)

PIANO:Proximity-basedUserAuthenticationonVoice-PoweredInternet-of-ThingsDevices NeilZhenqiangGong(IowaStateUniversity),AltayOzen(IowaStateUniversity),YuWu(UCDavis),XiaoyuCao(IowaStateUniversity),RichardShin(UCBerkeley),DawnSong(UCBerkeley),HongxiaJin(SamsungResearchAmerica),XuanBao(GoogleInc.)

CategoryInformationCollectioninRFIDSystems JiaLiu(NanjingUniversity),ShigangChen(UniversityofFlorida),BinXiao(TheHongKongPolytechnicUniversity),YanyanWang(NanjingUniversity),LijunChen(NanjingUniversity)

ScalableRole-basedDataDisclosureControlfortheInternetofThings AliYavari(RMITUniversity),ArezouSoltaniPanah(RMITUniversity),DimitriosGeorgakopoulos(SwinburneUniversityofTechnology),PremPrakashJayaraman(SwinburneUniversityofTechnology),RonvanSchyndel(RMITUniversity)

Multi-representationbasedDataProcessingArchitectureforIoTApplications VaibhavArora(UniversityofCalifornia,SantaBarbara),FaisalNawab(UniversityofCalifornia,SantaBarbara),DivyakantAgrawal(UniversityofCalifornia,SantaBarbara),AmrElAbbadi(UniversityofCalifornia,SantaBarbara)

LongTermSensingviaBatteryHealthAdaptation GregJackson(ImperialCollegeLondon),ZhijinQin(ImperialCollegeLondon),JulieAMcCann(ImperialCollegeLondon)

DetectingTimeSynchronizationAttacksinCyber-PhysicalSystemswithMachineLearningTechniques JingxuanWang(TheUniversityofHongKong),WentingTu(ShanghaiUniversityofFinanceandEconomics),LucasC.K.Hui(TheUniversityofHongKong),SiuMingYiu(TheUniversityofHongKong),EricKeWang(HarbinInstituteofTechnologyShenzhenGraduateSchool)

Speed-basedLocationTrackinginUsage-basedAutomotiveInsurance LuZhou(ShanghaiJiaoTongUniversity),QingrongChen(ShanghaiJiaoTongUniversity),ZutianLuo(ShanghaiJiaoTongUniversity),HaojinZhu(ShanghaiJiaoTongUniversity),CailianChen(ShanghaiJiaoTongUniversity)

Poster1-4Location:Charleston1and2(Lighteningtalksfrom16:00to17:00)

SessionChairs:GeraldFLofstead(SandiaNationalLab)andBalajiPalanisamy(UniversityofPittsburg)

Location:PhoenixBallroom(Displayfrom17:00to19:00)

Poster1:DistributedApplicationsCluster

TowardVehicleSensing:Anintegratedapplicationwithsparsevideocamerasandintelligenttaxicabs YangWang(UniversityofScienceandTechnologyofChina),WujiChen(UniversityofScienceandTechnologyofChina),WeiZheng(Sanofi-AventisUSLLC),HeHuang(SoochowUniversity),WenZhang(UniversityofScienceandTechnologyofChina),HengchangLiu(UniversityofScienceandTechnologyofChina)

SegmentationofTimeSeriesbasedonKineticCharacteristicsforStorageConsumptionPrediction BeibeiMiao(Baidu,Inc),YuChen(Baidu,Inc),XueboJin(SchoolofComputerandInformationEngineering,BeijingTechnologyandBusinessUniversity),BoWang(Baidu,Inc),XianpingQu(Baidu,Inc),DongWang(Baidu,Inc),ShiminTao(Baidu,Inc),ZhiZang(Baidu,Inc)

AMulti-stageHierarchicalWindowModelwithApplicationtoReal-TimeGraphAnalysis SachiniJayasekara(UniversityofMelbourne),ShanikaKarunasekera(UniversityofMelbourne),AaronHarwood(UniversityofMelbourne)

DynamicPricingatElectricVehicleChargingStationsforQueueingDelayReduction XiaoshanSun(UniversityofScienceandTechnologyofChina),PengXu(UniversityofScienceandTechnologyofChina),JinyangLi(UniversityofScienceandTechnologyofChina),HengchangLiu(UniversityofScienceandTechnologyofChina),WeiZheng(Sanofi-Aventis)

PairwiseRankingAggregationbyNon-interactiveCrowdsourcingwithBudgetConstraints ChangjiangCai(StevensInstituteofTechnology),HaipeiSun(StevensInstituteofTechnology),BoxiangDong(MontclairStateUniversity),BoZhang(StevensInstituteofTechnology),TingWang(LehighUniversity),WendyHuiWang(StevensInstituteofTechnology)

Buffer-BasedReinforcementLearningforAdaptiveStreaming YueZhang(SUNYBinghamton),YaoLiu(SUNYBinghamton)

Thecaseforusingcontent-centricnetworkingfordistributinghigh-energyphysicssoftware

37

MohammadAlhowaidi(UniversityofNebraska-Lincoln),ByravRamamurthy(UniversityofNebraska-Lincoln),BrianBockelman(UniversityofNebraska-Lincoln),DavidSwanson(UniversityofNebraska-Lincoln)

LAVEA:Latency-awareVideoAnalyticsonEdgeComputingPlatformShanheYi(CollegeofWilliamandMary),ZijiangHao(CollegeofWilliamandMary),QingyangZhang(WayneStateUniversity),QuanZhang(WayneStateUniversity),WeisongShi(WayneStateUniversity),QunLi(CollegeofWilliamandMary)

CompleteToleranceRelationbasedFillingAlgorithmusingSpark JinglingYuan(WuhanUniversityofTechnology),YaoXiang(WuhanUniversityofTechnology),XianZhong(WuhanUniversityofTechnology),MinchengChen(WuhanUniversityofTechnology),TaoLi(UniversityofFlorida)

Poster2:SecurityandPrivacyCluster

TowardsSecurePublicDirectoryforPrivacy-PreservingDataSharingAminFallahi(SyracuseUniversity),XiLiu(SyracuseUniversity),YuzheTang(SyracuseUniversity),ShuangWang(UCSD),RuiZhang(ChineseAcademyofSciences)

AnonymousRoutingtoMaximizeDeliveryRatesinDTNs KazuyaSakai(TokyoMetropolitanUniversity),Min-TeSun(NationalCentralUniversity),Wei-ShinnKu(AuburnUniversity),JieWu(TempleUniversity)

EvaluatingConnectionResiliencefortheOverlayNetworkKademliaHennerHeck(UniversitätKassel),OlgaKieselmann(UniversitätKassel),ArnoWacker(UniversitätKassel)

Shortfall-basedOptimalSecurityProvisioningforInternetofThings AntoninoRullo(UniversityofCalabria),EdoardoSerra(BoiseStateUniversity),JorgeLobo(UniversitatPompeaFabra),ElisaBertino(PurdueUniversity)

GroupDifferentialPrivacy-preservingDisclosureofMulti-levelAssociationGraphs BalajiPalanisamy(UniversityofPittsburgh),ChaoLi(UniversityofPittsburgh),PrashantKrishnamurthy(UniversityofPittsburgh)

TrackingInformationFlowinCyber-PhysicalSystems StefanGries(UniversityofDuisburg-Essen),MarcHesenius(UniversityofDuisburg-Essen),VolkerGruhn(UniversityofDuisburg-Essen)

Privacy-preservingMatchmakinginGeosocialNetworkswithUntrustedServers QiuxiangDong(ArizonaStateUniversity),DijiangHuang(ArizonaStateUniversity)

You’veBeenTricked!AUserStudyoftheEffectivenessofTyposquattingTechniques JeffreySpaulding(SUNYBuffalo),ShambhuUpadhyaya(SUNYBuffalo),AzizMohaisen(SUNYBuffalo)

Real-timeDetectionofIllegalFileTransfersintheCloud AdamBowers(MissouriUniversityofScienceandTechnology),DanLin(MissouriUniversityofScienceandTechnology),AnnaSquicciarini(ThePennsylvaniaStateUniversity),AliHurson(MissouriUniversityofScienceandTechnology

EyesoftheSwarm:Streamers'DetectioninBitTorrent DanielSilva(FluminenseFederalUniversity),AntonioRocha(FluminenseFederalUniversity)

Poster3:CloudsandVirtualizationCluster

Loadpredictionforenergy-awareschedulingforCloudscomputingplatformsAlexandreDambreville(LRI),JoannaTomasik(CentraleSupélec),JohanneCohen(LRI-CNRS),FabienDufoulon(LRI)

Learn-as-you-gowithMegh:EfficientLiveMigrationofVirtualMachines DebabrotaBasu(NationalUniversityofSingapore),XiayangWang(InstituteofParallelandDistributedSystems,ShanghaiJiaoTongUniversity),YangHong(ShanghaiJiaoTongUniversity),HaiboChen(ShanghaiJiaoTongUniversity),StephaneBressan(NationalUniversityofSingapore)

Machine-LearningBasedPerformanceEstimationforDistributedParallelApplicationsinVirtualizedHeterogeneousClusters SeontaeKim(UNIST),NguyenPham(UNIST),WoongkiBaek(UNIST),Young-RiChoi(UNIST)

IncrementalelasticityforNoSQLdatastores AntonisPapaioannou(ICS-FORTHandUniversityofCrete),KostasMagoutis(ICS-FORTHandUniversityofIoannina)

AFrameworkforEfficientEnergySchedulingofSparkWorkloads StathisMaroulis(AthensUniversityofEconomicsandBusiness),NikosZacheilas(AthensUniversityofEconomicsandBusiness),VanaKalogeraki(AthensUniversityofEconomicsandBusiness)

TowardsaCompleteVirtualDataCenterEmbeddingAlgorithmusingHybridStrategy MPGilesh(NationalInstituteofTechnologyCalicut),SDMadhuKumar(NationalInstituteofTechnologyCalicut),LillykuttyJacob(NationalInstituteofTechnologyCalicut),UmeshBellur(IndianInstituteofTechnologyBombay)

38

FederatingConsistencyforPartition-ProneNetworks BenjaminBengfort(UniversityofMaryland),PeteKeleher(UniversityofMaryland)

Mitigatingnesting-agnostichypervisorpoliciesinderivativeclouds ChandraPrakash(IITBombay),Prashanth(IITBombay),PurushottamKulkarni(IITBombay),UmeshBellur(IITBombay)

ANovelArchitectureforEfficientFogtoCloudDataManagementinSmartCities AmirSinaeepourfard(UPC),JordiGarcia(UPC),XavierMasip-Bruin(UPC),EvaMarin-Tordera(UPC)

Networklet:ConceptandDeploymentShengZhang(NanjingUniversity),YuLiang(NanjingUniversityofPostsandTelecommunications),ZhuzhongQian(NanjingUniversity),MingjunXiao(UniversityofScienceandTechnologyofChina),JieWu(TempleUniversity),FanyuKong(AntFinancial),SangluLu(NanjingUniversity)

OptimisticCausalConsistencyforGeo-ReplicatedKey-ValueStores KristinaSpirovska(EPFL),DiegoDidona(EPFL),WillyZwaenepoel(EPFL)

AutomatedPerformanceEvaluationforMulti-TierCloudServiceSystemsSubjecttoMixedWorkloads XudongZhao(ShandongUniversity),LizhenCui(ShandongUniversity),JiweiHuang(BeijingUniversityofPostsandTelecommunications),ShijunLiu(ShandongUniversity),LeiLiu(ShandongUniversity),CaltonPu(GeorgiaTech)

DecentralisedRuntimeMonitoringforAccessControlSystemsinCloudFederations MdSadekFerdous(UniversityofSouthampton),AndreaMargheri(UniversityofSouthampton),FedericaPaci(UniversityofSouthampton),MuYang,VladimiroSassone(UniversityofSouthampton)

Poster4:DistributedSystemsandNetworkingCluster

DuoFS:AnAttemptatEnergy-SavingandRetainingReliabilityofStorageSystems ShuYin(HunanUniversity)

AProposalofanEfficientTrafficMatrixEstimationunderPacketDrops KoheiWatabe(NagaokaUniversityofTechnology),ToruMano(NTTNetworkInnovationLaboratories),KimihiroMizutani(NTTNetworkInnovationLaboratories),OsamuAkashi(NTTNetworkInnovationLaboratories),KenjiNakagawa(NagaokaUniversityofTechnology),TakeruInoue(NTTNetworkInnovationLaboratories)

StragglerMitigationforDistributedBehavioralSimulation EmanBinKhunayn(UniversityofMelbourne),ShanikaKarunasekera(UniversityofMelbourne),HairuoXie(UniversityofMelbourne),KotagiriRamamohanarao(UniversityofMelbourne)

SupportingResourceControlforActorSystemsinAkka AhmedAbdelMoamen(UniversityofSaskatchewan),DezhongWang(UniversityofSaskatchewan),NadeemJamali(UniversityofSaskatchewan)

ADistributedOperatingSystemNetworkStackandDeviceDriverforMulticores BMSaifAnsary(ECE,VirginiaTech),AntonioBarbalace(ECE,VirginiaTech),BinoyRavindran(ECE,VirginiaTech),ThomasLazor(ECE,VirginiaTech),Ho-RenChuang(ECE,VirginiaTech)

CachePotentialityofMONs:APrime PeiyanYuan(HenanNormalUniversity),HonghaiWu(HenanUniversityofScienceandTechnology),XiaoyanZhao(HenanNormalUniversity),ZhengnanDong(HenanNormalUniversity)

Oak:User-TargetedWebPerformance MarcelFlores(NorthwesternUniversity),AlexanderWenzel(NorthwesternUniversity),AleksandarKuzmanovic(NorthwesternUniversity)

Ctrl-A:ASelf-*DistributedandIn-bandSDNControlPlaneMarcoCanini(UniversitécatholiquedeLouvain),IosifSalem(ChalmersUniversityofTechnology),LironSchiff(TelAvivUniversity),EladMichaelSchiller(ChalmersUniversityofTechnology),StefanSchmid(AalborgUniversity&TUBerlin)

18:00-20:00 Tuesday, June 6, 2017 ReceptionLocation:PhoenixBallroom

39

Day 3 – Wednesday, June 7, 2017

7:30-8:30 Wednesday, June 7, 2017 ContinentalBreakfastLocation:Foyer

8:30-9:30 Wednesday, June 7, 2017 Keynote2byM.TamerÖzsu(UniversityofWaterloo)Location:PhoenixBallroom

SessionChair:KarlAberer(EPFL)

9:30-10:00 Wednesday, June 7, 2017 CoffeeBreakLocation:Foyer

10:00-12:00 Wednesday, June 7, 2017 Research7:InternetofThings,SmartCities,andCyber-PhysicalSystemsLocation:SalonI

SessionChair:JoaoEduardoFerreira(UniversityofSaoPaulo)

PersistentTrafficMeasurementThroughVehicle-to-InfrastructureCommunications HeHuang(SoochowUniversity),Yu-ESun(SoochowUniversity),ShigangChen(UniversityofFlorida),HongliXu(UniversityofScienceandTechnologyofChina),YianZhou(Google)

TagBreathe:MonitorBreathingwithCommodityRFIDSystems YuxiaoHou(TheHongKongPolytechnicUniversity),YanwenWang(TheHongKongPolytechnicUniversity),YuanqingZheng(TheHongKongPolytechnicUniversity)

Double-EdgedSword:IncentivizedVerifiableProductPathQueryforRFID-enabledSupplyChain SaiyuQi(XidianUniversity),YuanqingZheng(TheHongKongPolytechnicUniversity),XiaofengChen(XidianUniversity),JianfengMa(XidianUniversity),YongQi(XianJiaotongUniversity)

TowardsAccurateCorruptionEstimationinZigBeeUnderCross-TechnologyInterference GongLongChen(ZhejiangUniversity),WeiDong(ZhejiangUniversity),ZhiweiZhao(UniversityofElectronicScienceandTechnologyofChina),TaoGu(RMITUniversity)

UnseenActivityRecognition:AHierarchicalActiveTransferLearningApproach MohammadArifUlAlam(UniversityofMarylandBaltimoreCounty),NirmalyaRoy(UniversityofMarylandBaltimoreCounty)

RFIPad:EnablingCost-efficientandDevice-freeIn-airHandwritingusingPassiveTags HanDing(Xi'anJiaotongUniversity),ChenQian(UniversityofCaliforniaSantaCruz),JinsongHan(Xi'anJiaotongUniversity),GeWang(Xi'anJiaotongUniversity),WeiXi(Xi'anJiaotongUniversity),KunZhao(Xi'anJiaotongUniversity),JizhongZhao(Xi'anJiaotongUniversity)

Research8:MobileandWirelessComputingSystemsILocation:SalonII

SessionChair:KarthikSundaresan(NECLaboratoriesAmerica)

RobustIncentiveTreeDesignforMobileCrowdsensing XiangZhang(ArizonaStateUniversity),GuoliangXue(ArizonaStateUniversity),RuozhouYu(ArizonaStateUniversity),DejunYang(ColoradoSchoolofMines),JianTang(SyracuseUniversity)

WearLock:UnlockingYourPhoneviaAcousticsusingSmartwatch ShanheYi(CollegeofWilliamandMary),ZhengruiQin(NorthwestMissouriStateUniversity),NancyCarter(CollegeofWilliamandMary),QunLi(CollegeofWilliamandMary)

ModelingMobileCodeAccelerationintheCloud

40

HuberFlores(UniversityofOulu),XiangSu(UniversityofOulu),VassilisKostakos(UniversityofOulu),JukkaRiekki(UniversityofOulu),EemilLagerspetz(UniversityofHelsinki),SasuTarkoma(HelsinkiUniversityofTechnology),PanHui(HKUST),YongLi(TsinghuaUniversity),JukkaManner(AaltoUniversity)

E-Android:ANewEnergyProfilingToolforSmartphones XingGao(CollegeofWIlliamandMary),DachuanLiu(CollegeofWIlliamandMary),DaipingLiu(UniversityofDelaware),HainingWang(UniversityofDelaware),AngelosStavrou(GeorgeMasonUniversity)

LocalandLow-CostWhiteSpaceDetection AhmedSaeed(GeorgiaInstituteofTechnology),KhaledHarras(CarnegieMellonUniversity),EllenZegura(GeorgiaInstituteofTechnology),MostafaAmmar(GeorgiaInstituteofTechnology)

GeneralAnalysisofIncentiveMechanismsforPeer-to-PeerTransmissions:AQuantumGamePerspective WeimanSun(BeijingNormalUniversity),ShenglingWang(BeijingNormalUniversity)

Vision4:SecurityandTrustinFutureSystemsLocation:Atlanta

SessionChair:LingLiu(GeorgiaInstituteofTechnology)

HowComputerScienceRiskstoLoseItsInnocence,andShouldAttempttoTakeResponsibilityKarlAberer(EPFL)

ACognitivePolicyFrameworkforNext-GenerationDistributedFederatedSystems-ConceptsandResearchDirections ElisaBertino(PurdueUniversity),SeraphinCalo(IBM),MarounTouma(IBM),DineshVerma(IBM),ChristopherWilliams(UKDSTL),BrianRivera(ArmyResearchLabs)

MachinetoMachineTrustinSmartCities MargaretLoper(GeorgiaTechResearchInstitute),BrianSwenson(GeorgiaInstituteofTechnology)

LateralThinkingforTrustworthyApps HermannHärtig(TechnischeUniversitätDresden),MichaelRoitzsch(TechnischeUniversitätDresden),CarstenWeinhold(TechnischeUniversitätDresden),AdamLackorzynski(TechnischeUniversitätDresden)

RumorInitiatorDetectioninInfectedSignedNetworks JiaweiZhang(UniversityofIllinoisatChicago),CharuC.Aggarwal(IBMT.J.WatsonResearchCenter),PhilipS.Yu(UniversityofIllinoisatChicago)

AddressingSmartphone-basedMulti-factorAuthenticationviaHardware-rootedTechnologiesZhongjieBa(TheStateUniversityofNewYorkatBuffalo),KuiRen(TheStateUniversityofNewYorkatBuffalo)

Application5:CloudComputingandDataCenterSystemsLocation:Columbia

SessionChair:YuanyuanYang(StonyBrookUniversity)

Multi-ResourceLoadBalancingforVirtualNetworkFunctions TaoWang(HuazhongUniversityofScience&Technology),HongXu(CityUniversityofHongKong),FangmingLiu(HuazhongUniversityofScienceandTechnology)

Learningfromfailureacrossmultipleclusters:Atrace-drivenapproachtounderstanding,predicting,andmitigatingjobterminations NosaybaEl-Sayed(MIT),HongyuZhu(UniversityofToronto),BiancaSchroeder(UniversityofToronto)

RBAY:AScalableandExtensibleInformationPlaneforFederatingDistributedDatacenterResources XinChen(GeorgiaInstituteofTechnology),LitingHu(FloridaInternationalUniversity),DouglasM.Blough(GeorgiaInstituteofTechnology),MichaelA.Kozuch(IntelLabsPittsburgh),MatthewWolf(OakRidgeNationalLaboratory)

Task-awareTCPinDataCenterNetworks SenLiu(CentralSouthUniversity),JiaweiHuang(CentralSouthUniversity),YutaoZhou(CentralSouthUniversity),JianxinWang(CentralSouthUniversity),TianHe(UniversityofMinnesota)

LimitationsofLoadBalancingMechanismsforN-TierSystemsinthePresenceofMillibottlenecks TaoZhu(GeorgiaInstituteofTechnology),JackLi(GeorgiaInstituteofTechnology),JoshKimball(GeorgiaInstituteofTechnology),JunheePark(IndianaUniversity),Chien-AnLai(GeorgiaInstituteofTechnology),CaltonPu(GeorgiaInstituteofTechnology),QingyangWang(LouisianaStateUniversity)

PerformanceAnalysisofCloudComputingCentersServingParallelizableRenderingJobsUsingM/M/c/rQueuingSystems

41

XiulinLi(ShandongUniversity),LiPan(ShandongUniversity),JiweiHuang(BeijingUniversityofPostsandTelecommunications),ShijunLiu(ShandongUniversity),YuliangShi(ShandongUniversity),CaltonPu(GeorgiaInstituteofTechnology)

Application6:BigDataSystemsandDistributedDataManagementandAnalyticsLocation:Nashville

SessionChair:ZhengruiQin(NorthwestMissouriStateUniversity)

EvaluationofDeepLearningFrameworksoverDifferentHPCArchitectures ShayanShams(LouisianaStateUniversity),RichardPlatania(LouisianaStateuniversity),KisungLee(LouisianaStateUniversity),Seung-JongPark(LouisianaStateUniversity)

OnAchievingEfficientDataTransferforGraphProcessinginGeo-DistributedDatacenters AmelieChiZhou(InriaRennes),ShadiIbrahim(InriaRennes),BingshengHe(NationalUniversityofSingapore)

GBooster:TowardsAccelerationofGPU-intensiveMobileApplications ElliottWen(VictoriaUniversityofWellington),BryanNg(VictoriaUniversityofWellington),WinstonSeah(VictoriaUniversityofWellington),XueLiu(McGillUniversity),JiannongCao(TheHongKongPolytechnicUniversity),XuefengLiu(HuangzhongUniversityofScienceandTechnology)

Scalingk-NearestNeighborsQueries(Therightway) AtoshumSamuelCahsai(UniversityOfGlasgow),NikosNtarmos(UniversityOfGlasgow),ChristosAnagnostopoulos(UniversityofGlasgow),PeterTriantafillou(UniversityOfGlasgow)

ParallelizingBigDeBruijnGraphConstructiononHeterogeneousProcessors ShuangQiu(TheHongKongUniversityofScienceandTechnology),QiongLuo(TheHongKongUniversityofScienceandTechnology)

Private,yetPractical,MultipartyDeepLearning XinyangZhang(LehighUniversity),ShoulingJi(ZhejiangUniversity),HuiWang(StevensInstituteofTechnology),TingWang(LehighUniversity)

Industry2:MobileComputingandInternetofThingsLocation:Charleston1

SessionChair:RobertBirke(IBMResearchZurich)

OntheLimitsofSubsamplingofLocationTraces MudhakarSrivatsa(IBMT.J.WatsonResearchCenter),RaghuGanti(IBMT.J.WatsonResearchCenter),PrasantMohapatra(UCDavis)

SOM-TC:Self-organizingmapforHierarchicalTrajectoryClustering PranitaDewan(IBMTJWatsonResearchCenter),RaghuGanti(IBMTJWatsonResearchCenter),MudhakarSrivatsa(IBMTJWatsonResearchCenter)

ProcessingEncryptedandCompressedTime-SeriesData MatúšHarvan(EnovosLuxembourgS.A.),SamuelKimoto(OpenSystems),ThomasLocher(ABBCorporateResearch),Yvonne-AnnePignolet(ABBCorporateResearch),JohannesSchneider(UniversityofLiechtenstein)

CalvinConstrained-AFrameworkforIoTApplicationsinHeterogeneousEnvironments AmardeepMehta(UmeåUniversity),RamiBaddour(UniversitádellaSvizzeraitaliana),FredrikSvensson(EricssonResearch),HaraldGustafsson(EricssonResearch),ErikElmroth(UmeåUniversity)

12:00-13:30 Wednesday, June 7, 2017 ConferenceLuncheonLocation:PhoenixBallroom

13:30-15:30 Wednesday, June 7, 2017 Research9:DistributedBigDataSystemsLocation:SalonI

SessionChair:KisungLee(LouisianaStateUniversity)

High-PerformanceandResilientKey-ValueStorewithOnlineErasureCodingforBigDataWorkloads DiptiShankar(TheOhioStateUniversity),XiaoyiLu(TheOhioStateUniversity),DhabaleswarPanda(TheOhioStateUniversity)

ModelingandAnalyzingLatencyintheMemcachedsystemWenxueCheng(TsinghuaUniversity),FengyuanRen(TsinghuaUniversity),WanchunJiang(CentralSouthUniversity),TongZhang(TsinghuaUniversity)

42

SpeculativeSlotReservation:EnforcingServiceIsolationforDependentData-ParallelComputations ChenChen(HKUST),WeiWang(HKUST),BoLi(HKUST)

OptimizingShuffleinWide-AreaDataAnalytics ShuhaoLiu(UniversityofToronto),HaoWang(UniversityofToronto),BaochunLi(UniversityofToronto)

JobSchedulingwithoutPriorInformationinBigDataProcessingSystems ZhimingHu(UniversityofToronto),BaochunLi(UniversityofToronto),ZhengQin(InstituteofHighPerformanceComputing),RickSiowMongGoh(InstituteofHighPerformanceComputing)

DistributedLoadBalancinginKey-ValueNetworkedCachesSikderHuq(TheUniversityofIowa),ZubairShafiq(TheUniversityofIowa),SukumarGhosh(TheUniversityofIowa),AmirKhakpour(VerizonDigitalMediaServices),HarkeeratBedi(VerizonDigitalMediaServices)

Research10:DistributedAlgorithmsandTheoryILocation:SalonII

SessionChair:HaiyingShen(UniversityofVirginia)

CognitiveContext-awareDistributedStorageOptimizationinMobileCloudComputing:AStableMatchingbasedApproach DongHan(OaklandUniversity),YeYan(OaklandUniversity),TaoShu(AuburnUniversity),LiuqingYang(ColoradoStateUniversity),ShuguangCui(UniversityofCalifornia,Davis)

FairCachingAlgorithmsforPeerDataSharinginPervasiveEdgeComputingEnvironments YaodongHuang(StonyBrookUniversity),XintongSong(PekingUniversity),FanYe(StonyBrookUniversity),YuanyuanYang(StonyBrookUniversity),XiaomingLi(PekingUniversity)

Latency-DrivenCooperativeTaskComputinginMulti-UserFog-RadioAccessNetworks Ai-ChunPang(NationalTaiwanUniversity),Wei-HoChung(AcademiaSinica),Te-ChuanChiu(NationalTaiwanUniversity),JunshanZhang(ArizonaStateUniversity)

ApproximationandOnlineAlgorithmsforNFV-EnabledMulticastinginSDNs ZichuanXu(UniversityCollegeLondon),WeifaLiang(TheAustralianNationalUniversity),MeitianHuang(TheAustralianNationalUniversity),MikeJia(TheAustralianNationalUniversity),SongGuo(TheHongKongPolytechnicUniversity),AlexGalis(UniversityCollegeLondon)

DistributedAuctionsforTaskAssignmentandSchedulinginMobileCrowdsensingSystems ZhuojunDuan(GeorgiaStateUniversity),WeiLi(GeorgiaStateUniversity),ZhipengCai(GeorgiaStateUniversity)

EffectiveMobileDataTradinginSecondaryAd-hocMarketwithHeterogeneousandDynamicEnvironment HengkySusanto(HuaweiFutureNetworkTheoryLab),HonggangZhang(UniversityofMassachusettsBoston),ShingYipHo(ShareMedia),BenyuanLiu(UniversityofMassachusettsLowell)

Vision5:FutureDistributedSystemsLocation:Atlanta

SessionChair:ManishParashar(RutgersUniversity)

EnablingwideareadataanalyticswithCollaborativeDistributedProcessingPipes(CDPPs) AnjaFeldmann(TUBerlin),ManfredHauswirth(TUBerlin),VolkerMarkl(TUBerlin)

TheMillibottleneckTheoryofPerformanceBugs,andItsExperimentalVerification CaltonPu(GeorgiaInstituteofTechnology),JoshuaKimball(GeorgiaInstituteofTechnology),Chien-AnLai(GeorgiaInstituteofTechnology),TaoZhu(GeorgiaInstituteofTechnology),JackLi,JunheePark,QingyangWang,DeepalJayasinghe,PengchengXiong,SimonMalkowski,QinyiWu,GueyoungJung,YounggyunKoh,GalenSwint

Exacution:EnhancingScientificDataManagementforExascale ScottKlasky(OakRidgeNationalLaboratory),EricSuchyta(OakRidgeNationalLab),MarkAinsworth(BrownUniversity),QingLiu(NewJerseyInstituteofTechnology),BenWhitney(BrownUniversity),MatthewWolf(OakRidgeNationalLaboratory),JongChoi(OakRidgeNationalLaboratory),IanFoster(ArgonneNationalLaboratory),MarkKim(OakRidgeNationalLaboratory),JeremyLogan(UniversityOfTennesseeKnoxville),KshitijMehta(OakRidgeNationalLaboratory),ToddMunson(ArgonneNationalLaboratory),GeorgeOstrouchov(OakRidgeNationalLaboratory),ManishParashar(RutgersUniversity),NorbertPodhorszk(OakRidgeNationalLaboratory),DavidPugmire(OakRidgeNationalLaboratory),LipengWan(OakRidgeNationalLaboratory)

HardwareAccelerationLandscapeforDistributedReal-timeAnalytics:VirtuesandLimitations MohammadrezaNajafi(TechnischeUniversitatMunchen),KaiwenZhang(TechnischeUniversitatMunchen),Hans-ArnoJacobsen(UniversityofToronto),MohammadSadoghi(PurdueUniversity)

43

CoordinatingDistributedSpeakingObjects MarcoLippi(DISMI–UniversitàdiModenaeReggioEmilia),MarcoMamei(DISMI–UniversitàdiModenaeReggioEmilia),StefanoMariani(DISMI–UniversitàdiModenaeReggioEmilia),FrancoZambonelli(DISMI–UniversitàdiModenaeReggioEmilia)

Model-DrivenDomain-SpecificMiddleware FabioCosta(FederalUniversityofGoias),KarlMorris(TempleUniversity),FabioKon(UniversityofSãoPaulo),PeterClarke(FloridaInternationalUniversity)

Application7:DistributedMiddlewareSystemsLocation:Columbia

SessionChair:QingyangWang(LouisianaStateUniversity)

FastandFlexibleNetworkingforMessage-orientedMiddleware LarsKroll(KTHRoyalInstituteofTechnology),AlexandruA.Ormenisan(KTHRoyalInstituteofTechnology),JimDowling(KTHRoyalInstituteofTechnology)

TailCut:PowerReductionunderQualityandLatencyConstraintsinDistributedSearchSystems Chih-HsunChou(UniversityofCalifornia,Riverside),LaxmiBhuyan(UniversityofCalifornia,Riverside),ShaoleiRen(UniversityofCalifornia,Riverside)

StoArranger:EnablingEfficientUsageofCloudStorageServicesonMobileDevices YongshuBai(SUNYBinghamton),YifanZhang(SUNYBinghamton)

CharacterizingPerformanceandEnergy-efficiencyofTheRAMCloudStorageSystem YacineTaleb(Inria),ShadiIbrahim(Inria),GabrielAntoniu(Inria),ToniCortes(BarcelonaSupercomputingCenter)

ProactivelySecureCloud-EnabledStorageKarimEldefrawy(HughesResearchLab),TylerKaczmarek(UniversityofCalifornia,Irvine),SkyFaber(UniversityofCalifornia,Irvine)

BEES:Bandwidth-andEnergy-EfficientImageSharingforReal-timeSituationAwareness PengfeiZuo(HuazhongUniversityofScienceandTechnology),YuHua(HuazhongUniversityofScienceandTechnology),XueLiu(McGillUniverisity),DanFeng(HuazhongUniversityofScienceandTechnology),WenXia(HuazhongUniversityofScienceandTechnology),ShundeCao(HuazhongUniversityofScienceandTechnology),JieWu(HuazhongUniversityofScienceandTechnology),YuanyuanSun(HuazhongUniversityofScienceandTechnology),YunchengGuo(HuazhongUniversityofScienceandTechnology)

Application8:DistributedSystemsandOptimizationsLocation:Nashville

SessionChair:AzizMohaisen(StateUniversityofNewYorkatBuffalo)

TransparentFault-ToleranceusingIntra-MachineFull-Software-StackReplication GiulianoLosa(VirginiaTech),AntonioBarbalace(VirginiaTech),YuzhongWen(VirginiaTech),MarinaSadini(VirginiaTech),Ho-RenChuang(VirginiaTech),BinoyRavindran(VirginiaTech)

Apreventiveauto-parallelizationapproachforelasticstreamprocessing RolandKottoKombi(UniversityClaudeBernard),NicolasLumineau(UniversitédeLyon),PhilippeLamarre(INSALyon)

DependableCloudResourceswithGuardian BaraAbusalah(PurdueUniversity),DerekSchatzlein(PurdueUniversity),JulianJamesStephen(PurdueUniversity),MasoudSaeidaArdekani(PurdueUniversity),PatrickEugster(PurdueUniversity)

ACommunication-awareContainerRe-distributionApproachforHighPerformanceVNFs YuchaoZhang(TsinghuaUniversity),YusenLi(NankaiUniversity),KeXu(TsinghuaUniversity),DanWang(HongKongPolytechnicUniversity),MinghuiLi(Baidu),XuanCao(Baidu),QingqingLiang(Baidu)

MinimizingCostinIaaSCloudsviaScheduledInstanceReservation QiushiWang(NanyangTechnologicalUniversity),MingMingTan(NanyangTechnologicalUniversity),XueyanTang(NanyangTechnologicalUniversity),WentongCai(NanyangTechnologicalUniversity)

EfficientDistributedCoordinationatWAN-scale AilidaniAilijiang(SUNYBuffalo),AlekseyCharapko(SUNYBuffalo),MuratDemirbas(SUNYBuffalo),BekirOguzTurkkan(SUNYBuffalo),TevfikKosar(SUNYBuffalo)

ShortPaper4:Mobile,Wireless,Edge,andCrowdComputingLocation:Charleston1

44

SessionChair:LakshmishRamaswamy(UniversityofGeorgia)

Onefficientoffloadingcontrolincloudradioaccessnetworkwithmobileedgecomputing TongLi(TsinghuaUniversity),ChathuraSarathchandraMagurawalage(UniversityofEssex),KezhiWang(UniversityofEssex),KeXu(TsinghuaUniversity),KunYang(UniversityofEssex),HaiyangWang(UniversityofMinnesotaatDuluth)

LocationPrivacyinMobileEdgeClouds TingHe(PennsylvaniaStateUniversity),ErtugrulCiftcioglu(ArmyResearchLaboratory),ShiqiangWang(IBM),KevinChan(ArmyResearchLaboratory)

ApproximationDesignforCooperativeRelayDeploymentinWirelessNetworks HaotianWang(ShanghaiJiaoTongUniversity),ShileiTian(ShanghaiJiaoTongUniversity),XiaofengGao(ShanghaiJiaoTongUniversity),LidongWu(UniversityofTexasatTyler),GuihaiChen(ShanghaiJiaoTongUniversity)

DispersingSocialContentinMobileCrowdthroughOpportunisticContacts LeiZhang(SimonFraserUniversity),FengWang(TheUniversityofMississippi),JiangchuanLiu(SouthChinaAgriculturalUniversity)

ALightweightRecommendationFrameworkforMobileUser'sLinkSelectioninDenseNetwork JiWang(NationalUniversityofDefenseTechnology),XiaominZhu(NationalUniversityofDefenseTechnology),WeidongBao(NationalUniversityofDefenseTechnology),GuanlinWu(NationalUniversityofDefenseTechnology)

MakingSmartphoneSmartonDemandforLongerBatteryLife MarcoBrocanelli(TheOhioStateUniversity),XiaoruiWang(TheOhioStateUniversity)

FADEWICH:FastDeauthenticationovertheWirelessChannel GiulioLovisotto(UniversityofOxford),MauroConti(UniversityofPadua),IvanMartinovic(UniversityofOxford),GeneTsudik(UniversityofCalifornia,Irvine)

CognitiveWirelessCharger:Sensing-BasedReal-TimeFrequencyControlForNear-FieldWirelessCharging Sang-YoonChang(UniversityofColoradoColoradoSprings),SristiLakshmiSravanaKumar(AdvancedDigitalSciencesCenter),Yih-ChunHu(UniversityofIllinoisatUrbana-Champaign)

DensityandMobility-drivenEvaluationofBroadcastAlgorithmsforMANETs RazielCarvajalGómez(UniversityofNeuchatel),IntiGonzalez-Herrera(LaBRI/UniversityofBordeaux),Yérom-DavidBromberg(UniversityofRennes1),LaurentRéveillère(UniversityofBordeaux),EtienneRivière(UniversityofNeuchatel)

Energy-AwareCPUFrequencyScalingforMobileVideoStreaming WenjieHu(ThePennsylvaniaStateUniversity),GuohongCao(ThePennsylvaniaStateUniversity)

CrazyCrowdSourcingtoMitigateResourceScarcity NovaAhmed(NorthSouthUniversity),MdMahfuzurRahmanSiddiquee(IndependentResearcher),RefayaKarim(NorthSouthUniversity),MohsinaZaman(IndependentResearcher),SayedMahmudulAlam(NorthSouthUniversity),SyedFahimAsraf(NorthSouthUniversity)

DetectingRogueAPwiththeCrowdWisdom TongqingZhou(NationalUniversityofDefenseTechnology),ZhipingCai(NationalUniversityofDefenseTechnology),BinXiao(TheHongKongPolytechnicUniversity),YueyueChen(NationalUniversityofDefenseTechnology),MingXu(NationalUniversityofDefenseTechnology)

15:30-16:00 Wednesday, June 7, 2017 CoffeeBreakLocation:Foyer

16:00-18:00 Wednesday, June 7, 2017 Research11:SecurityandPrivacyinDistributedSystemsIILocation:SalonI

SessionChair:KuiRen(StateUniversityofNewYorkatBuffalo)

Kalis-ASystemforKnowledge-drivenAdaptableIntrusionDetectionfortheInternetofThings DanieleMidi(PurdueUniversity),AntoninoRullo(UniversityofCalabria),AnandMudgerikar(PurdueUniversity),ElisaBertino(PurdueUniversity)

FuzzyExtractorsforBiometricIdentification NanLi(CSIRO),FuchunGuo(UniversityofWollongong),YiMu(UniversityofWollongong),WillySusilo(UniversityofWollongong),SuryaNepal(CSIRO)

SmartphonePrivacyLeakageofSocialRelationshipsandDemographicsfromSurroundingAccessPoints

45

ChenWang(StevensInstituteofTechnology),ChuyuWang(StevensInstituteofTechnology),YingyingChen(StevensInstituteofTechnology),LeiXie(NanjingUniversity),SangluLu(NanjingUniversity)

EV-Matching:BridgingLargeVisualDataandElectronicDataforEfficientSurveillanceGangLi(TheOhioStateUniversity),FanYang(TheOhioStateUniversity),GuoxingChen(TheOhioStateUniversity),QiangZhai(TheOhioStateUniversity),XinfengLi(TheOhioStateUniversity),JinTeng(TheOhioStateUniversity),JundaZhu(UniversityofMacau),DongXuan(TheOhioStateUniversity),BiaoChen(UniversityofMacau),WeiZhao(UniversityofMacau)

AdaptiveReconnaissanceAttackswithNear-OptimalParallelBatching XiangLi(UniversityofFlorida),JohnathanSmith(UniversityofFlorida),MyThai(UniversityofFlorida)

AchievingStrongPrivacyinOnlineSurvey YouZhou(UniversityofFlorida),YianZhou(UniversityofFlorida),ShigangChen(UniversityofFlorida),SamuelS.Wu(UniversityofFlorida)

Research12:CloudComputingandDistributedDataAnalyticsLocation:SalonII

SessionChair:KekeChen(WrightStateUniversity)

ServiceOverlayForestEmbeddingforSoftware-DefinedCloudNetworks Jian-JhihKuo(AcademiaSinica),Shan-HsiangShen(NationalTaiwanUniversityofScienceandTechnology),Ming-HongYang(UniversityofMinnesota),De-NianYang(AcademiaSinica),Ming-JerTsai(NationalTsingHuaUniversity),Wen-TsuenChen(AcademiaSinica)

JointOptimizationofChainPlacementandRequestSchedulingforNetworkFunctionVirtualization QixiaZhang(HuazhongUniversityofScience&Technology),YikaiXiao(HuazhongUniversityofScience&Technology),FangmingLiu(HuazhongUniversityofScienceandTechnology),JohnChiShingLui(ChineseUniversityofHongKong),JianGuo(HuazhongUniversityofScience&Technology),TaoWang(HuazhongUniversityofScience&Technology)

BIGCacheAbstractionforCacheNetworks EmanRamadan(UniversityofMinnesota),ArvindNarayanan(UniversityofMinnesota),Zhi-LiZhang(UniversityofMinnesota),RunhuiLi(HuaweiFutureNetworkTheoryLab),GongZhang(HuaweiFutureNetworkTheoryLab)

DistributedQRdecompositionframeworkfortrainingSupportVectorMachines JyotikrishnaDass(TexasA&MUniversity),V.N.S.PrithviSakuru(TexasA&MUniversity),VivekSarin(TexasA&MUniversity),RabiN.Mahapatra(TexasA&MUniversity)

DistributivelyComputingRandomWalkBetweennessCentralityinLinearTime Qiang-ShengHua(HuazhongUniversityofScienceandTechnology),MingAi(HuazhongUniversityofScienceandTechnology),HaiJin(HuazhongUniversityofScienceandTechnology),DongxiaoYu(HuazhongUniversityofScienceandTechnology),XuanhuaShi(HuazhongUniversityofScienceandTechnology)

DeGPar:LargeScaleTopicDetectionusingNode-CutPartitioningonDenseWeightedGraphs KambizGhoorchian(RoyalInstituteofTechnology(KTH)),SarunasGirdzijauskas(RoyalInstituteofTechnology(KTH)),FatemehRahimian(SwedishInstituteofComputerScience(SICS))

Vision6:InnovationinBigDataSystemsLocation:Atlanta

SessionChair:ManfredHauswirth(TUBerlin)

OntheDesignofaBlockchainPlatformforClinicalTrialandPrecisionMedicine ZonyinShae(ASIAUniversity,Taiwan),JeffreyTsai(ASIAUniversity,Taiwan)

TowardsDataflow-basedGraphAccelerator HaiJin(HuazhongUniversityofScienceandTechnology),PengchengYao(HuazhongUniversityofScienceandTechnology),XiaofeiLiao(HuazhongUniversityofScienceandTechnology),LongZheng(HuazhongUniversityofScienceandTechnology),XianliangLi(HuazhongUniversityofScienceandTechnology)

TowardsaRISCFrameworkforEfficientContextualizationinIoT DimitriosGeorgakopoulos(SwinburneUniversity),AliYavari(RMITUniversity),PremPrakashJayaraman(SwinburneUniversity),RajivRanjan(NewcastleUniversity)

TheFutureoftheSemanticWeb:PrototypesonaGlobalDistributedFilesystem MichaelCochez(Fraunhofer-FIT),DominikHüser(RWTHAachenUniversity),StefanDecker(RWTHAachen)

OnBroadBigData SteffenStaab(InstitutWeST,UniversityKoblenz-LandauandWAIS,UniversityofSouthampton)

46

Research13:DistributedAlgorithmsandTheoryIILocation:SalonII

SessionChair:AzizMohaisen(StateUniversityofNewYorkatBuffalo)

NetworkedStochasticMulti-ArmedBanditswithCombinatorialStrategies ShaojieTang(UniversityofTexasatDallas),YaqinZhou(SUTD),KaiHan(UniversityofScienceandTechnologyofChina),ZhaoZhang(ZhejiangNormalUniversity),JingYuan(UniversityofTexasatDallas),WeiliWu(UniversityofTexasatDallas)

ComputabilityofPerpetualExplorationinHighlyDynamicRings MarjorieBournat(UPMCSorbonneUniversités),SwanDubois(UPMCSorbonneUniversités),FranckPetit(UPMCSorbonneUniversités)

LocallySelf-AdjustingSkipGraphs SikderHuq(TheUniversityofIowa),SukumarGhosh(TheUniversityofIowa)

OnlinetoOfflineBusiness:UrbanTaxiDispatchingwithPassenger-DriverMatchingStability HuanyangZheng(TempleUniversity),JieWu(TempleUniversity)

AnOptimizationFrameworkForOnlineRide-sharingMarkets YongzhengJia(TsinghuaUniversity),WeiXu(TsinghuaUniversity),XueLiu(McGillUniversity)

FastandAccurateTrackingofPopulationDynamicsinRFIDSystems MuhammadShahzad(NorthCarolinaStateUniversity),AlexLiu(MichiganStateUniversity)

ShortPaper5:DistributedBigDataSystemsandAnalyticsLocation:Nashville

SessionChair:VarunSoundararajan(Google)

TowardsMultilingualAutomatedClassificationSystems AibekMusaev(UniversityofAlabama),CaltonPu(GeorgiaInstituteofTechnology)

TheJointEffectsofTweetContentSimilarityandTweetInteractionsforTopicDerivation RobertusNugroho(MacquarieUniversity),WeiliangZhao(MacquarieUniversity),JianYang(MacquarieUniversity),CecileParis(CSIRO–ICTCentre),SuryaNepal(CSIRO)

Timed-releaseofSelf-emergingDatausingDistributedHashTables ChaoLi(UniversityofPittsburgh),BalajiPalanisamy(UniversityofPittsburgh)

CachingforPatternMatchingQueriesinTimeEvolvingGraphs:ChallengesandApproaches MuhammadNisar(UniversityofGeorgia),SaharVoghoei(UniversityofGeorgia),LakshmishRamaswamy(UniversityofGeorgia)

GraphA:AdaptivePartitioningforNaturalGraphs DongshengLi(NationalUniversityofDefenseTechnology),ChengfeiZhang(NationalUniversityofDefenseTechnology),JinyanWang(NationalUniversityofDefenseTechnology),ZhaoningZhang(NationalUniversityofDefenseTechnology),YimingZhang(NationalUniversityofDefenseTechnology)

ParallelAlgorithmforCoreMaintenanceinDynamicGraphs NaWang(HuazhongUniversityofScienceandTechnology),DongxiaoYu(HuazhongUniversityofScienceandTechnology),HaiJin(HuazhongUniversityofScienceandTechnology),ChenQian(HuazhongUniversityofScienceandTechnology),XiaXie(HuazhongUniversityofScienceandTechnology),Qiang-ShengHua(HuazhongUniversityofScienceandTechnology)

DHCRF:ADistributedConditionalRandomFieldAlgorithmonHeterogeneousCPU-GPUClusterforBigData AiWei(HunanUniversity),LiKenli(HunanUniversity),ChenCen(HunanUniversity),PengJiwu(HunanUniversity),LiKeqin(HunanUniversity)

TowardsNewAbstractionsforImplementingQuorum-basedSystems TormodErevikLea(UniversityofStavanger),LeanderJehl(UniversityofStavanger),HeinMeling(UniversityofStavanger)

SelectiveTrafficOffloadingOntheFly:aMachineLearningApproach ZaiyangTang(HuazhongUniversityofScienceandTechnology),PengLi(TheUniversityofAizu),SongGuo(TheHongKongPolytechnicUniversity),XiaofeiLiao(HuazhongUniversityofScienceandTechnology),HaiJin(HuazhongUniversityofScienceandTechnology),DaqingZhang(InstitutMines-Telecom,TelecomSudParis)

AFastHeuristicAttributeReductionAlgorithmusingSpark MinchengChen(WuhanUniversityofTechnology),JinglingYuan(WuhanUniversityofTechnology),LinLi(WuhanUniversityofTechnology),DonglingLiu(WuhanUniversityofTechnology),TaoLi(UniversityofFlorida)

ProfilingUsersbyModelingWebTransactions

47

RadekTomsu(AaltoUniversity),SamuelMarchal(AaltoUniversity),N.Asokan(AaltoUniversity)

JeCache:Just-EnoughDataCachingwithJust-in-TimePrefetchingforBigDataApplications YifengLuo(FudanUniversity),JiaShi(FudanUniversity),ShuigengZhou(FudanUniversity)

Demo1-4Location:Charleston1and2

SessionChairs:GeraldFLofstead(SandiaNationalLab)andBalajiPalanisamy(UniversityofPittsburg)

Demo1:DistributedApplicationsCluster

LITMUS:TowardsMultilingualReportingofLandslides AibekMusaev(UniversityofAlabama),QixuanHou(GeorgiaInstituteofTechnology),YangYang(GeorgiaInstituteofTechnology),CaltonPu(GeorgiaInstituteofTechnology)

Pythia:ASystemforOnlineTopicDiscoveryofSocialMediaPosts IoulianaLitou(AthensUniversityofEconomicsandBusiness),VanaKalogeraki(AthensUniversityofEconomicsandBusiness)

Data-drivenSerendipityNavigationinUrbanPlaces XiaoyuGe(UniversityofPittsburgh),AmeyaDaphalapurkar(UniversityofPittsburgh),ManaliShimpi(UniversityofPittsburgh),KohliDarpun(UniversityofPittsburgh),KonstantinosPelechrinis(UniversityofPittsburgh),PanosChrysanthis(UniversityofPittsburgh),DemetriosZeinalipour-Yazti(MaxPlanckInstituteforInformaticsandUniversityofCyprus)

TowardAnIntegratedApproachtoLocalizingFailuresinCommunityWaterNetworks(DEMO) QingHan(UniversityofCaliforniaIrvine),PhuNguyen(UniversityofCaliforniaIrvine),RonaldT.Eguchi(ImageCat,Inc.),Kuo-LinHsu(UniversityofCaliforniaIrvine),NaliniVenkatasubramanian(UniversityofCaliforniaIrvine)

Demo2:SecurityandPrivacyCluster

PrivateGraph:ACloud-CentricSystemforPrivacy-PreservingSpectralAnalysisofLargeEncryptedGraphs SagarSharma(WrightStateUniversity),KekeChen(WrightStateUniversity)

IoTSentinelDemo:AutomatedDevice-TypeIdentificationforSecurityEnforcementinIoT MarkusMiettinen(TechnischeUniversitatDarmstadt),SamuelMarchal(AaltoUniversity),IbbadHafeez(universityofhelsinki),TommasoFrassetto(TechnischeUniversitatDarmstadt),N.Asokan(AaltoUniversity),Ahmad-RezaSadeghi(TechnischeUniversitatDarmstadt),SasuTarkoma(UniversityofHelsinki)

RogueAccessPointDetectorUsingCharacteristicsofChannelOverlappingin802.11nRhonghoJang(INHAuniversityofKorea),JeonilKang(INHAuniversity),AzizMohaisen(SUNYBuffalo),DaehunNyang(DepartmentofComputerandInformationEngineering,INHAUniversity,Incheon,Korea)

ReverseCloak:AReversibleMulti-levelLocationPrivacyProtectionSystem ChaoLi(UniversityofPittsburgh),BalajiPalanisamy(UniversityofPittsburgh),AravindKalaivanan(UniversityofPittsburgh),SriramRaghunathan(UniversityofPittsburgh)

Demo3:CloudsandVirtualizationCluster

Hopsworks:ImprovingUserExperienceandDevelopmentonHadoopwithScalable,StronglyConsistentMetadata MahmoudIsmail(KTH-RoyalInstituteofTechnology),ErmiasGebremeskel(RISESICS),TheofilosKakantousis(RISESICS),GautierBerthou(RISESICS),JimDowling(KTH-RoyalInstituteofTechnology)

IsolationinDockerthroughLayerEncryption IoannisGiannakopoulos(NationalTechnicalUniversityofAthens),KonstantinosPapazafeiropoulos(NationalTechnicalUniversityofAthens),KaterinaDoka(NationalTechnicalUniversityofAthens),NectariosKoziris(NationalTechnicalUniversityofAthens)

Dela-SharingLargeDatasetsbetweenHadoopClusters AlexandruA.Ormenisan(KTHRoyalInstituteofTechnology),JimDowling(KTHRoyalInstituteofTechnology)

InVivoEvaluationoftheSecureOpportunisticSchemesMiddlewareusingaDelayTolerantSocialNetworkCoreyE.Baker(UniversityofCaliforniaSanDiego),AllenStarke(UniversityofFlorida),TanishaG.Hill-Jarrett(UniversityofFlorida),JaniseMcNair(UniversityofFlorida)

Demo4:DistributedSystemsandNetworkingCluster

ScalingandLoadTestingLocation-basedPublishandSubscribe BertilChapuis(UniversityofLausanne),BenoîtGarbinato(UniversityofLausanne)

48

ADistributedEvent-centricCollaborativeWorkflowsDevelopmentSystemforIoTApplication YongyangCheng(BUPT),ShuaiZhao(BUPT),BoCheng(BUPT),ShouluHou(BUPT),XiuleiZhang(BUPT),JunliangChen(BUPT)

IncentiveMechanismforData-CentricMessageDeliveryinDelayTolerantNetworks HimanshuJethawa(MissouriUniversityofScienceandTechnology),SanjayMadria(MissouriUniversityofScienceandTechnology)

PerformanceOfCognitiveWirelessChargerForNear-FieldWirelessChargingSang-YoonChang(UniversityofColorado,ColoradoSpringsandAdvancedDigitalSciencesCenter),SristiLakshmiSravanaKumar(AdvancedDigitalSciencesCenter),Yih-ChunHu(UniversityofIllinoisatUrbana-Champaign)

19:00-21:00 Wednesday, June 7, 2017 OrganizationEvent(InvitationOnly)

49

Day 4 – Thursday, June 8, 2017

7:30-8:30 Thursday, June 8, 2017 ContinentalBreakfastLocation:Foyer

8:30-9:30 Thursday, June 8, 2017 Keynote3byKennethCalvert(NationalScienceFoundation)Location:PhoenixBallroom

SessionChair:CaltonPu(GeorgiaInstituteofTechnology)

9:30-10:00 Thursday, June 8, 2017 CoffeeBreakLocation:Foyer

10:00-12:00 Thursday, June 8, 2017 Tutorial2:SensorCloud:ACloudofSensorNetworksLocation:Charleston1

SanjayMadria(MissouriUniversityofScienceandTechnology)

Research14:MobileandWirelessComputingSystemsIILocation:SalonI

SessionChair:CarleeJoe-Wong(CarnegieMellonUniversity)

RobustIndoorWirelessLocalizationUsingSparseRecovery WeiGong(SimonFraserUniversity),JiangchuanLiu(SimonFraserUniversity)

Max-MinFairResourceAllocationinHetNets:DistributedAlgorithmsandHybridArchitecture EhsanAryafar(PortlandStateUniversity),AlirezaKeshavarz-Haddad(ShirazUniversity),CarleeJoe-Wong(CarnegieMellonUniversity),MungChiang(PrincetonUniversity)

OptimizationofFull-ViewBarrierCoveragewithRotatableCameraSensors XiaofengGao(ShanghaiJiaoTongUniversity),RuiYang(UniversityofIllinoisUrbana-Champaign),FanWu(ShanghaiJiaoTongUniversity),GuihaiChen(ShanghaiJiaoTongUniversity),JingguangZhou(ShanghaiJiaoTongUniversity)

CommunicationthroughSymbolSilence:TowardsFreeControlMessagesinIndoorWLANs BingFeng(UniversityofScienceandTechnologyofChina),JianqingLiu(UniversityofFlorida),ChiZhang(UniversityofScienceandTechnologyofChina),YuguangFang(UniversityofFlorida)

Secureconnectivityofwirelesssensornetworksunderkeypredistributionwithon/offchannels JunZhao(CarnegieMellonUniversity)

iUpdater:LowCostRSSFingerprintsUpdatingforDevice-freeLocalization LiqiongChang(NorthwestUniversity),JieXiong(SingaporeManagementUniversity),YuWang(UniversityofNorthCarolinaatCharlotte),XiaojiangChen(NorthwestUniversity),JunhaoHu(NorthwestUniversity),FangDingyi(NorthwestUniversity)

Research15:SocialNetworksandCrowdsourcingLocation:Columbia

SessionChair:TingWang(LehighUniversity)

InfluenceMaximizationinaManyCascadesWorldIoulianaLitou(AUEB),VanaKalogeraki(AUEB),DimitriosGunopulos(UoA)

Expertise-AwareTruthAnalysisandTaskAllocationinMobileCrowdsourcingXiaomeiZhang(UniversityofSouthCarolinaBeaufort),YiboWu(PennsylvaniaStateUniversity),LifuHuang(RensselaerPolytechnicInstitute),HengJi(RensselaerPolytechnicInstitute),GuohongCao(PennsylvaniaStateUniversity)

50

MeLoDy:ALong-termDynamicQuality-awareIncentiveMechanismforCrowdsourcing HongweiWang(ShanghaiJiaoTongUniversity),SongGuo(TheHongKongPolytechnicUniversity),JiannongCao(TheHongKongPolytechnicUniversity),MinyiGuo(ShanghaiJiaoTongUniversity)

TheStrongLinkGraphforEnhancingSybilDefenses SuhendryEffendy(NationalUniversityofSingapore),RolandYap(NationalUniversityofSingapore)

MechanismDesignforMobileCrowdsensingwithExecutionUncertainty ZhenzheZheng(ShanghaiJiaoTongUniversity),ZhaoxiongYang(ShanghaiJiaoTongUniversity),FanWu(ShanghaiJiaoTongUniversity),GuihaiChen(ShanghaiJiaoTongUniversity)

TowardsScalableandDynamicSocialSensingUsingADistributedComputingFramework DanielZhang(UniversityofNotreDame),ChaoZheng(UniversityofNotreDame),DongWang(UniversityofNotreDame),DougThain(UniversityofNotreDame),XinMu(UniversityofNotreDame),GregMadey(UniversityofNotreDame),ChaoHuang(UniversityofNotreDame)

Application9:DistributedSystemsandApplicationsLocation:Atlanta

SessionChair:XueyanTang(NanyangTechnologicalUniversity)

SpecifyingaDistributedSnapshotAlgorithmasaMeta-programandModelCheckingitatMeta-level HaThiThuDoan(JapanAdvancedInstituteofScienceandTechnology),FrancoisBonnet(OsakaUniversity),KazuhiroOgata(JapanAdvancedInstituteofScienceandTechnology)

Self-EvolvingSubscriptionsforContent-BasedPublish/SubscribeSystems CesarCañas(McGillUniversity),KaiwenZhang(TechnicalUniversityofMunich),BettinaKemme(McGillUniversity),JörgKienzle(McGillUniversity),Hans-ArnoJacobsen(TechnicalUniversityofMunich)

ScalableRoutingforTopic-basedPublish/SubscribeSystemsunderFluctuations VolkerTurau(HamburgUniversityofTechnology),GerrySiegemund(HamburgUniversityofTechnology)

OPPay:DesignandImplementationofAPaymentSystemforOpportunisticDataServices FengruiShi(ImperialCollegeLondon),ZhijinQin(ImperialCollegeLondon),JulieMcCann(ImperialCollegeLondon)

OptimalResourceAllocationforMulti-userVideoStreamingovermmWaveNetworksZhifengHe(AuburnUniversity),ShiwenMao(AuburnUniversity)

AMulti-AgentParallelApporachtoAnalyzingLargeClimateDataSets JasonWoodring(UniversityofWashingtonBothell),MatthewSell(UniversityofWashingtonBothell),MunehiroFukuda(UniversityofWashingtonBothell),HazelineAsuncion(UniversityofWashingtonBothell),EricSalathe(UniversityofWashingtonBothell)

Application10:DistributedSystemsandServicesLocation:Columbia

SessionChair:SangeethaSeshadri(IBMAlmadenResearchCenter)

EnergyProportionalServers:WhereAreWein2016? CongfengJiang(HangzhouDianziUniversity),YumeiWang(HangzhouDianziUniversity),DongyangOu(HangzhouDianziUniversity),BingLuo(WayneStateUniversity),WeisongShi(WayneStateUniversity)

AreHTTP/2ServersReadyYet? MuhuiJiang(TheHongKongPolytechnicUniversity),XiapuLuo(TheHongKongPolytechnicUniversity),TungngaiMiu(NexusguardLimited),ShengtuoHu(TheHongKongPolytechnicUniversity),WeixiongRao(TongjiUniversity)

DataIntegrityforCollaborativeApplicationsoverHostedServices ErtemEsiner(NanyangTechnologicalUniversity),AnwitamanDatta(NanyangTechnologicalUniversity)

VirtualMachinePowerAccountingwithShapleyValue WeixiangJiang(HuazhongUniversityofScience&Technology),FangmingLiu(HuazhongUniversityofScienceandTechnology),GuomingTang(UniversityofVictoria),KuiWu(UniversityofVictoria),HaiJin(HuazhongUniversityofScience&Technology)

AVersatilePlatformforMobileDataGatheringExperimentsinWirelessSensorNetworks JiLi(StonyBrookUniversity),CongWang(StonyBrookUniversity),YuanyuanYang(StonyBrookUniversity)

OnDirectionalNeighborDiscoveryinmmWaveNetworks YuWang(AuburnUniversity),ShiwenMao(AuburnUniversity),TheodoreS.Rappaport(NewYorkUniversity)

51

ShortPaper6:Security,Privacy,Trust,andFaultToleranceinDistributedSystemsLocation:Nashville

SessionChair:BalajiPalanisamy(UniversityofPittsburgh)

ProximityAwarenessApproachtoEnhancePropagationDelayontheBitcoinPeer-to-PeerNetwork MuntadherFadhilSallal(UniversityofPortsmouth),GarethOwenson(UniversityofPortsmouth),MoAdda(UniversityofPortsmouth)

CatchMeIfYouCan:DetectingCompromisedUsersThroughPartialObservationonNetworksDerekWang(DeakinUniversity),ShengWen(DeakinUniversity),JunZhang(DeakinUniversity),SuryaNepal(Data61),YangXiang(DeakinUniversity),WanleiZhou(DeakinUniversity)

LocationPrivacyBreach:AppsAreWatchingYouinBackground DachuanLiu(CollegeofWilliam&Mary),XingGao(CollegeofWilliam&Mary),HainingWang(UniversityofDelaware)

AndroidMalwareDetectionusingComplex-Flows FengShen(SUNYBuffalo),JustinDelVecchio(SUNYBuffalo),AzizMohaisen(SUNYBuffalo),StevenY.Ko(SUNYBuffalo),LukaszZiarek(SUNYBuffalo)

PrivacyImplicationsofDNSSECLook-asideValidation AzizMohaisen(SUNYBuffalo),ZhongshuGu(IBMResearch),KuiRen(SUNYBuffalo)

FlipNet:ModelingCovertandPersistentAttacksonNetworkedResources SudipSaha(VirginiaPolytechnicInstituteandStateUniversity),AnilVullikanti(VirginiaPolytechnicInstituteandStateUniversity),MahanteshHalappanavar(PacificNorthwestNationalLab)

UnderstandingtheMarket-levelandNetwork-levelBehaviorsoftheAndroidMalwareEcosystem ChaoYang(Niara,Inc.),JialongZhang(IBMResearch),GuofeiGu(TexasA&MUniversity)

EnGarde:Mutually-TrustedInspectionofSGXEnclaves. HaiNguyen(RutgersUniversity),VinodGanapathy(RutgersUniversity)

TruthfulOnlineAuctionforCloudInstanceSubletting YifeiZhu(SimonFraserUniversity),SilveryFu(SimonFraserUniversity),JiangchuanLiu(SimonFraserUniversity),YongCui(TsinghuaUniversity)

OnthePowerofWeakerPairwiseInteraction:Fault-TolerantSimulationofPopulationProtocols GiuseppeAntonioDiLuna(LaSapienza),PaolaFlocchini(UniversityofOttawa),TaisukeIzumi(NagoyaInstituteofTechnology),TomokoIzumi(CollegeofInformationScienceandEngineering),NicolaSantoro(CarletonUniversity),GiovanniViglietta(UniversityofOttawa)

DistributedFaultTolerantLinearSystemSolversbasedonErasureCoding XuejiaoKang(PurdueUniversity--WestLafayette),DavidF.Gleich(PurdueUniversity--WestLafayette),AhmedSameh(PurdueUniversity--WestLafayette),AnanthGrama(PurdueUniversity--WestLafayette)

PreservingIncumbentUsers’PrivacyinExclusion-Zone-BasedSpectrumAccessSystems YanzhiDou(VirginiaTech),HeLi(VirginiaTech),KexiongZeng(VirginiaTech),JinshanLiu(VirginiaTech),YalingYang(VirginiaTech),BoGao(ChineseAcademyofSciences),KuiRen(SUNYBuffalo)

12:00-13:30 Thursday, June 8, 2017 BusinessLunchincludingAwardsandICDCS2018AnnouncementsLocation:PhoenixBallroom

13:30-15:30 Thursday, June 8, 2017 Tutorial2:SensorCloud:ACloudofSensorNetworks(until14:30)Location:Charleston1

SanjayMadria(MissouriUniversityofScienceandTechnology) PlenaryPanelontheConvergenceofBigData,IoT/CPS,andSCC(Smart&ConnectedCommunities)Location:PhoenixBallroom

ThekeywordsofBigData,InternetofThings(IoT),Cyber-PhysicalSystems(CPS),andSmart&ConnectedCommunities(a.k.a.SmartCitiesandSmartPlanet)havebeenaroundforquiteafewyears.Theystartedfromdifferentdisciplines:

52

• Bigdataoriginatedfromscientificsensors(e.g.,satellites)andenterpriseapplications(e.g.,Walmartcashregisters).

• IoT/CPSstartedfromwirelesssensornetworksandreal-timesystems(e.g.,theCPSweekseriesofconferences)• SmartPlanet,SmartCities,andSCCstartedfromAutonomicComputing(withthesekeywordspopularized

initiallybyIBM)

Theseresearchfieldsandapplicationareashavebeenexpandingtremendouslyinrecentyears,withsignificantandgrowingoverlapsamongthem.Webelievetheseoverlapsrepresenthugeopportunitiesforinnovativeresearchandpotentialsocietalimpact.Atthesametime,theyalsocreateunprecedentedresearchchallengesthatsurpassthetraditionalconfinesofeachoriginaldiscipline.

Assimpleexamples,bigdataanalyticsandreal-timeIoTsensor-baseddecisionmaking(individually)havebeenthefrontrunnersmartapplicationsshowcasedbySmartCityprojects.However,theircombinationhasseenlimitedintegrationoftechniquesfrombothfields.Anexampleofoverlappingareasisstreaminganalyticsofreal-timeIoTsensors,whichtypicallyusebigdatatoolsatfinetimegranularity(e.g.,ApacheSparkandStorm)withlingeringlimitationsinreal-timeguaranteesandmachinelearningcapabilitiesneededforsmartapplications.Aconcreteexampleofchallengeapplicationsistheautomatedreal-timetrackingofmovingentitiesacrossnetworksofvideocameras.Althoughsuchtrackingisdoneroutinelybyhumans,itsautomationrequiressignificantadvancesintheintegrationofvision/machinelearningtools(objectrecognitionfromvideoimages)withstreaminganalytics(parallelprocessingofvideoimagesfromrelatedcameras).

Thepanelwilldiscusstheoverlappingareasamongbigdata,IoT/CPS,andSCC/SmartCities,withemphasisontheresearchopportunitiesandtechnicalchallenges.

PanelModerator:CaltonPu

CaltonPuCalton'sresearchinterestsareintheareasofservicecomputing,distributedandcloudcomputing,integrationandveracityofbigdata.Hiscurrentprojectsincludecloudcomputing(Elba)andbigdata(GRAIT-DM)research.Usingexperimentaldatafromrealisticbenchmarks,theElbaprojectstudiestheinterestingphenomenasuchasveryshortbottlenecksthathavelargeimpactonn-tiersystemresponsetime.TheGRAIT-DMprojectcollectsrealworlddatafromsocialsensors(e.g.,TwitterandYouTube)andphysicalsensors(e.g.,USGSGSNandNASATRMM)todetectphysicaleventsandmanagereal-timeinformationonthem.ThesponsorsforCaltonPu'sresearchincludebothgovernmentfundingagenciessuchasNSF,andcompaniesfromindustrysuchasHP,Fujitsu,IBM,andIntel.Heisaco-directorofCenterforExperimentalResearchinComputerSystems(CERCS),andaffiliatefacultyofInstituteforInformationSecurityandPrivacy(IISP)atGeorgiaTech.HeisalsothedirectorofRCNonBigDataforSmartCities,withcollaborationsaroundtheworld.Positionsavailable:GeorgiaTechisrecruitinggoodgraduatestudents.

Panelists

53

KarlAbererKarlAbererreceivedhisPhDinmathematicsin1991fromtheETHZürich.From1991to1992hewaspostdoctoralfellowattheInternationalComputerScienceInstitute(ICSI)attheUniversityofCalifornia,Berkeley.In1992,hejoinedtheIntegratedPublicationandInformationSystemsinstitute(IPSI)ofGMDinGermany,wherehewasleadingtheresearchdivisionOpenAdaptiveInformationManagementSystems.In2000hejoinedEPFLasfullprofessor.Since2005heisthedirectoroftheSwissNationalResearchCenterforMobileInformationandCommunicationSystems(NCCR-MICS,www.mics.ch).HeismemberoftheeditorialboardsofVLDBJournal,ACMTransactiononAutonomousandAdaptiveSystemsandWorldWideWebJournal.HehasbeenconsultingfortheSwissgovernmentinresearchandsciencepolicyasamemberoftheSwissResearchandTechnologyCouncil(SWTR)from2003-2011.

SrinivasAluruSrinivasAluruisaprofessorintheSchoolofComputationalScienceandEngineeringwithintheCollegeofComputingatGeorgiaInstituteofTechnology.Heco-leadstheGeorgiaTechStrategicInitiativeinDataEngineeringandScience.Heconductsresearchinhighperformancecomputing,bioinformaticsandsystemsbiology,combinatorialscientificcomputing,andappliedalgorithms.Hepioneeredthedevelopmentofparallelmethodsincomputationalbiology,andcontributedtotheassemblyandanalysisofcomplexplantgenomes.Hisgroupiscurrentlyfocusedondevelopingbioinformaticsmethodsforhigh-throughputDNAsequencing,particularlyerrorcorrectionandgenomeassembly.Insystemsbiology,hisgroupisworkingonnetworkinferencemethodsusingmutualinformationandBayesianapproaches,andnetworkanalysistechniquestofurthertheknowledgeofpartiallycharacterizedpathways.HiscontributionsinscientificcomputinglieinparallelFastMultipoleMethod,domaindecompositionmethods,spatialdatastructures,andapplicationsincomputationalelectromagneticsandmaterialsinformatics.AluruisaFellowoftheAmericanAssociationfortheAdvancementofScience(AAAS)andtheInstituteforElectricalandElectronicEngineers(IEEE).HeisarecipientoftheNSFCareeraward(1997),IBMfacultyaward(2002),andSwarnajayantifellowshipfromtheGovernmentofIndia(2007).HeservesontheeditorialboardsoftheIEEETransactionsonParallelandDistributedSystems,theJournalofParallelandDistributedComputing,andtheInternationalJournalofDataMiningandBioinformatics.

KennethCalvertKenCalvertisDivisionDirectorforComputerandNetworkSystemsintheComputerandInformationScienceandEngineering(CISE)DirectorateattheNationalScienceFoundation.HeisonrotationfromtheUniversityofKentucky,whereheisGartnerGroupProfessorinNetworkEngineeringintheDepartmentofComputerScience.Hisresearchdealswiththedesignandimplementationofadvancednetworkprotocolsandservices,withparticularinterestinroutingandincentivesinfuturenetworkarchitectures.HereceivedhisPh.D.incomputersciencefromtheUniversityofTexasatAustin.HeholdsaM.S.incomputersciencefromStanfordUniversityandaB.S.incomputerscienceandengineeringfromtheMassachusettsInstituteofTechnology.PriortohisappointmentattheUniversityofKentucky,hewasaMemberoftheTechnicalStaffatBellLaboratoriesinHolmdel,NJ,andservedonthefacultyintheCollegeofComputing

54

attheGeorgiaInstituteofTechnology.HeisanIEEEFellowandamemberoftheACM.

C.MohanDr.C.MohanhasbeenanIBMresearcherfor35yearsinthedatabasearea,impactingnumerousIBMandnon-IBMproducts,theresearchandacademiccommunities,andstandards,especiallywithhisinventionoftheARIESfamilyofdatabaselockingandrecoveryalgorithms,andthePresumedAbortcommitprotocol.ThisIBM(1997),andACM/IEEE(2002)FellowhasalsoservedastheIBMIndiaChiefScientistfor3years(2006-2009).InadditiontoreceivingtheACMSIGMODInnovationAward(1996),theVLDB10YearBestPaperAward(1999)andnumerousIBMawards,MohanwaselectedtotheUSandIndianNationalAcademiesofEngineering(2009),andwasnamedanIBMMasterInventor(1997).ThisDistinguishedAlumnusofIITMadras(1977)receivedhisPhDattheUniversityofTexasatAustin(1981).Heisaninventorof50patents.HeiscurrentlyfocusedonBigData,HTAPandBlockchaintechnologies.In2016,hewasnamedaDistinguishedVisitingProfessorofChina’sprestigiousTsinghuaUniversity.HehasservedontheadvisoryboardofIEEESpectrum,andonnumerousconferenceandjournalboards.MohanisafrequentspeakerinNorthAmerica,EuropeandIndia,andhasgiventalksin40countries.Heisveryactiveonsocialmediaandhasahugenetworkoffollowers.MoreinformationcouldbefoundintheWikipediapageathttp://bit.ly/CMwIkP

ManishParasharManishParasharisDistinguishedProfessorofComputerScienceatRutgers,TheStateUniversityofNewJerseyUniversity.HeisalsothefoundingDirectoroftheRutgersDiscoveryInformaticsInstitute(RDI2)andTheAppliedSoftwareSystemsLaboratory(TASSL),FullMember(ClinicalInvestigationsandPrecisionTherapeuticsProgram)oftheRutgersCancerInstituteofNewJersey,andisAssociateDirectorattheRutgersCenterforInformationAssurance(RUCIA).HealsohasaJointFacultyAppointmentwithOakRidgeNationalLaboratory(ORNL),andisVisitingProfessorintheFacultyofBusiness,Computing&Law,UniversityofDerby,UK.Heco-foundedandwasCo-DirectoroftheCloudandAutonomicComputingCenter(CAC)NSFIUCRCatRutgers(CAC@Rutgers)between2008and2013.AtRutgers,heled(withProf.H.Berman)thestrategicplanningeffortsinResearchComputingandservedastheInterimAssociateVicePresidentofResearchComputingbetween2015–2016tooverseetheestablishmentoftheRutgersOfficeofAdvancedResearchComputing(OARC).HeisalsocurrentlytheLeadPIforCyberinfrastructurefortheNSFOceanObservatoriesInitiative.

55

Research Track Paper Abstracts

Research1:DistributedFaultToleranceandDependabilityTimely,Reliable,andCost-EffectiveInternetTransportServiceusingDisseminationGraphs AmyBabay(JohnsHopkinsUniversity),EmilyWagner(JohnsHopkinsUniversity,LTNGlobalCommunications),MichaelDinitz(JohnsHopkinsUniversity),YairAmir(JohnsHopkinsUniversity,LTNGlobalCommunications)

Emergingapplicationssuchasremotemanipulationandremoteroboticsurgeryrequirecommunicationthatisbothtimelyandreliable,buttheInternetnativelysupportsonlycommunicationthatiseithercompletelyreliablewithnotimelinessguarantees(e.g.TCP)ortimelywithbest-effortreliability(e.g.UDP).Wepresentanoverlaytransportservicethatcanprovidehighlyreliablecommunicationwhilemeetingstringenttimelinessguarantees(e.g.130msround-triplatencyacrosstheUS)overtheInternet.Toenableroutingschemesthatcansupportthenecessarytimelinessandreliability,weintroducedisseminationgraphs,providingaunifiedframeworkforspecifyingroutingschemesrangingfromasinglepath,tomultipledisjointpaths,toarbitrarygraphs.Weconductanextensiveanalysisofrealworldnetworkdata,findingthataroutingapproachusingtwodisjointpathsperformswellinmostcases,andthatcaseswheretwodisjointpathsdonotperformwelltypicallyinvolveproblemsaroundasourceordestination.Basedonthisanalysis,wedevelopatimelydissemination-graph-basedroutingmethodthatcanaddtargetedredundancyinproblematicareasofthenetwork.Thisapproachcancoverover99%oftheperformancegapbetweenatraditionalsingle-pathapproachandanoptimal(butprohibitivelyexpensive)scheme,whiletwodynamicdisjointpathscoverabout70%ofthisgap,andtwostaticdisjointpathscoverabout45%.Thisperformanceimprovementisobtainedatacostincreaseofabout2%overtwodisjointpaths.

Pronto:EfficientTestPacketGenerationforDynamicNetworkDataPlanes YuZhao(UniversityofKentucky),HuazheWang(UniversityofCaliforniaatSantaCruz),XinLin(UniversityofCaliforniaatSantaCruz),TingtingYu(UniverstiyofKentucky),ChenQian(UniversityofCaliforniaatSantaCruz)

Computernetworksarebecomingincreasinglycomplextodayandthuspronetovariousnetworkfaults.Traditionaltestingtools(e.g.,ping,traceroute)thatofteninvolvesubstantialmanualefforttouncoverfaultsareinefficient.Thispaperfocusesonfaultdetectionofthenetworkdataplaneusingtestpackets.Existingsolutionsoftestpacketgenerationeithertakeverylongtime(e.g.,morethanonehour)tocompleteorgeneratetoomanytestpacketsthatmayhurtregulartraffic.Inthispaper,wepresentPronto,anautomatedtestpacketgenerationtoolthatgeneratestestpacketstoexercisedataplanerulesintheentirenetworkinashorttime(e.g.,severalseconds)andcanquicklyreacttorulechangesduetonetworkdynamics.Inaddition,Prontominimizesthenumberoftestpacketsbyallowingapackettotestmultiplerulesatdifferentswitches.TheperformanceevaluationusingtworealnetworkdataplanerulesetsshowsthatProntoisfasterthanarecentlydevelopedtoolbymorethantwoordersofmagnitude.Prontocanupdatetheprobesforrulechangesusinglessthan1mswhileexistingmethodshavenosuchupdatefunction.

Agar:ACachingSystemforErasure-CodedData RalucaHalalai(UniversityofNeuchâtel),PascalFelber(UniversityofNeuchâtel),Anne-MarieKermarrec(INRIA),FrançoisTaïani(IRISA)

Erasurecodingisanestablisheddataprotectionmechanism.Itprovideshighresiliencywithlowstorageoverhead,whichmakesitveryattractivetostoragesystemsdevelopers.Unfortunately,whenusedinadistributedsetting,erasurecodinghampersastoragesystemsperformance,becauseitrequiresclientstocontactseveral,possiblyremotesitesinordertoretrievetheirdata.Thishashinderedtheadoptionoferasurecodinginpractice,limitingitsusetocold,archivaldata.Recentresearchshowedthatitisfeasibletouseerasurecodingforhotdataaswell,thusopeningupnewperspectivesforimprovingerasurecodedstoragesystems.Inthispaper,weaddresstheproblemofminimizingaccesslatencyinerasure-codedstorage.WeproposeAgaranovelcachingsystemtailoredforerasure-codedcontent.Agaroptimizesthecontentsofthecachebasedonliveinformationregardingdatapopularityandaccesslatencytodifferentdatastoragesites.Oursystemadaptsadynamicprogrammingalgorithmtooptimizethechoiceofdatablocksthatarecached,usinganapproachakintoKnapsackalgorithms.WecompareAgartotheclassicalLeastRecentlyUsedandLeastFrequentlyUsedcacheevictionpolicies,whilevaryingtheamountofdatacachedbetweenadatachunkandawholereplicaoftheobject.WeshowthatAgarcanachieve16%to41%lowerlatencythansystemsthatuseclassicalcachingpolicies.

Highperformancerecoveryforparallelstatemachinereplication OdoricoMendizabal(FURG),FernandoLuisDotti(PUCRS),FernandoPedone(UniversityofLugano)

Statemachinereplicationisafundamentalapproachtohighavailability.Despitethevastliteratureonthetopic,relativelyfewstudieshaveconsideredtheissuesinvolvedinrecoveringfaultyreplicas.Recoveringareplicarequires(a)retrievingandinstallinganup-to-datereplicacheckpoint,and(b)restoringandre-executingthelogofcommandsnotreflectedinthecheckpoint.Paralleltechniquestostatemachinereplicationrenderrecoveryparticularlychallengingsincethroughputundernormalexecution(i.e.,intheabsenceoffailures)isveryhigh.Consequently,thelogofcommandsthatneedtobeapplieduntilthereplicaisavailableistypicallylarge,whichdelaysrecovery.Inthispaper,wepresenttwotechniquestooptimizerecoveryinparallelstatemachinereplication.Thefirsttechniqueallowsnewcommandstoexecuteconcurrentlywiththeexecutionofloggedcommands,beforereplicasarecompletelyupdated.Thesecondtechniqueintroduceson-demandstaterecovery,whichallowssegmentsofacheckpointtoberecoveredconcurrently.

OnDataParallelismofErasureCodinginDistributedStorageSystems JunLi(UniversityofToronto),BaochunLi(UniversityofToronto)

Deployedinvariousdistributedstoragesystems,erasurecodinghasdemonstrateditsadvantagesoflowstorageoverheadandhighfailuretolerance.Typicallyinanerasurecodeddistributedstoragesystem,systematicmaximumdistanceseperable(MDS)codesarechosensincetheoptimalstorageoverheadcanbeachievedandmeanwhiledatacanbereaddirectlywithoutdecodingoperations.However,dataparallelismofexistingMDScodesislimited,becausewecanonlyreaddatafromsomespecificserversinparallelwithoutdecodingoperations.Inthispaper,weproposeCarouselcodes,designedtoallowdatatobereadfromanarbitrarynumberofserversinparallelwithoutdecoding,whilepreservingtheoptimalstorageoverheadofMDScodes.Furthermore,Carouselcodescanachievetheoptimalnetworktraffictoreconstructanunavailableblock.WehaveimplementedaprototypeofCarouselcodesonApacheHadoop.OurexperimentalresultshavedemonstratedthatCarouselcodescanmakeMapReducejobsfinishwithalmost50%lesstimeandreducedataaccesslatencysignificantly,withacomparablethroughputintheencodinganddecodingoperationsandnoadditionalsacrificeoffailuretoleranceorthenetworkoverheadtoreconstructunavailabledata.

MeteorShower:MinimizingRequestLatencyforMajorityQuorum-basedDataConsistencyAlgorithmsinMultipleDataCenters

56

YingLiu(KTHRoyalInstituteofTechnology),XiGuan(KTHRoyalInstituteofTechnology),VladimirVlassov(KTHRoyalInstituteofTechnology),SeifHaridi(KTHRoyalInstituteofTechnology)

Withtheincreasingpopularityofservingandstoringdatainmultipledatacenters,weinvestigatetheefficiencyofmajorityquorum-baseddataconsistencyalgorithmsunderthisscenario.Becauseofthefailure-pronenatureofdistributedstoragesystems,majorityquorum-baseddataconsistencyalgorithmsbecomeoneofthemostwidelyadoptedapproaches.Inthispaper,weproposetheMeteorShowerframework,whichprovidesfaulttolerantread/writekey-valuestorageserviceacrossmultipledatacenterswithsequentialconsistencyguarantees.Amajorfeatureisthatmostreadoperationsareexecutedlocallywithinasingledatacenter.Thisresultsinloweringreadlatencyfromhundredsofmillisecondstotensofmilliseconds.ThedataconsistencyalgorithminMeteorShoweraugmentsmajorityquorum-basedalgorithms.Thus,itkeepsallthedesirablepropertiesofmajorityquorums,suchasfaulttolerance,balancedload,etc.AnimplementationofMeteorShowerontopofCassandraisdeployedandevaluatedinmultipledatacentersusingtheGoogleCloudPlatform.EvaluationsofMeteorShowerframeworkhaveshownthatitcanconsistentlyservereadrequestswithoutpayingthecommunicationdelaysamongreplicasmaintainedinmultipledatacenters.Asaresult,weareabletoimprovethelatencyofreadrequestsfromhundredsofmillisecondstotensofmillisecondswhileachievingthesamelatencyonwriterequestsandthesamefaulttoleranceguarantee.Thus,MeteorShowerisoptimizedforreadintensiveworkloads.

Research2:DistributedOperatingSystemsandMiddlewareLSbM-tree:Re-enablinghigh-speedcachinginDataManagementforMixedReadsandWrites DejunTeng(TheOhioStateUniversity),LeiGuo(Google),RubaoLee(TheOhioStateUniversity),FengChen(LouisianaStateUniversity),SiyuanMa(TheOhioStateUniversity),XiaodongZhang(TheOhioStateUniversity),YanfengZhang(NortheasternUniversity)

LSM-treehasbeenwidelyusedindatamanagementproductionsystemsforwrite-intensiveworkloads.However,asreadandwriteworkloadsco-existunderLSM-tree,dataaccessescanexperiencelonglatencyandlowthroughputduetotheinterferencestobuffercachingfromthecompaction,amajorandfrequentoperationinLSM-tree.Afteracompaction,theexistingdatablocksarereorganizedandwrittentootherlocationsondisks.Asaresult,therelateddatablocksthathavebeenloadedinthebuffercacheareinvalidatedsincetheirreferencingaddressesarechanged,causingseriousperformancedegradations.Inordertore-enablehigh-speedbuffercachingduringintensivewrites,weproposeLog-Structuredbuffered-Mergetree(simplifiedasLSbM-tree)byaddingacompactionbufferondisks,tominimizethecacheinvalidationsonbuffercachecausedbycompactions.Thecompactionbufferefficientlyandadaptivelymaintainsthefrequentlyvisiteddatasets.InLSbM,stronglocalityobjectscanbeeffectivelykeptinthebuffercachewithminimumorwithoutharmfulinvalidations.Withthehelpofasmallon-diskcompactionbuffer,LSbMachievesahighqueryperformancebyenablingeffectivebuffercaching,whileretainingallthemeritsofLSM-treeforwrite-intensivedataprocessing,andprovidinghighbandwidthofdisksforrangequeries.WehaveimplementedLSbMbasedonLevelDB.Weshowthatwithastandardbuffercacheandaharddisk,LSbMcanachieve2xperformanceimprovementoverLevelDB.WehavealsocomparedLSbMwithotherexistingsolutionstoshowitsstrongeffectiveness.

IncrementalTopologyTransformationforPublish/SubscribeSystemsUsingIntegerProgramming PooyaSalehi(TechnicalUniversityofMunich),KaiwenZhang(TechnicalUniversityofMunich),Hans-ArnoJacobsen(UniversityofToronto)

Distributedoverlay-basedpublish/subscribesystemsprovideaselective,scalable,anddecentralizedapproachtodatadissemination.Duetothedynamiccommunicationflowsbetweendataproducersandconsumers,theoverlaytopologyofsuchsystemscanbecomeinefficientovertimeandthereforerequiresadaptationtotheexistingload.Existingstudiesproposealgorithmstodesignoverlaytopologieswhichareoptimizedforspecificworkloads.However,theproblemofgeneratingaplantoincrementallytransformthecurrenttopologytoanoptimizedonehasbeenlargelyignored.Inthispaper,wepresentIPITT,anapproachbasedonintegerprogrammingfortheincrementaltopologytransformation(ITT)problem.Giventhecurrenttopologyandatargettopology,IPITTgeneratesatransformationplanwithaminimalnumberofstepsinordertolessenservicedisruption.Furthermore,weintroduceaplanexecutionmechanismandevaluateourapproachonanexistingpublish/subscribesystem.Basedonourevaluation,IPITTcanreduceplancomputationtimebyafactorof10andgeneratesplanswithanexecutiontimeupto55%shorterthanthoseofexistingapproaches.

milliScope:aFine-GrainedMonitoringFrameworkforPerformanceDebuggingofn-TierWebServices Chien-AnLai(GeorgiaInstituteofTechnology),JoshKimball(GeorgiaInstituteofTechnology),TaoZhu(GeorgiaInstituteofTechnology),QingyangWang(LouisianaStateUniversity),CaltonPu(GeorgiaInstituteofTechnology)

Moderndistributedsystemsareoftenconsideredtobeblack-boxesthatgreatlylimitthepotentialtounderstandbehaviorsatthelevelofdetailnecessarytodiagnosesomeofthemostimportanttypesofperformanceproblems.Recentlyresearchershavefoundabnormalresponsetimedelay,onetotwoorderofmagnitudelongertimethantheaverageresponsetime,existsinshortperiodandcauseseconomicallossforserviceproviders.Theseveryshortbottlenecksarehardtodetectduetoitsshortlivespananditsvarietyofpossiblereasons.Inthispaper,weproposemilliScope(mScope),thefirstmillisecond-granularitysoftware-basedresourceandeventmonitoringfordistributedsystemsthatachievesbothperformance,lowoverheadathighfrequency,andhighaccuracymatchedwithotherfirmwaremonitoringtool.Morespecifically,milliScopeisafine-grainedmonitoringframeworktocollaboratemultiplemScopeMonitorsforeventandresourcemonitoringtoreconstructtheflowofeachclientrequestandprofileexecutionperformanceinadistributedsystem.WeutilizetheresourcemScopeMonitorsforsystemresourcemonitoring,andwedevelopourowneventmScopeMonitorstoidentifytheexecutionboundaryinalightweight,preciseandsystematicmethodology.Thesemanticandsyntacticofthesemonitoringlogswitharbitraryformatsareenrichedbyourmulti-stagedatatransformationtool,mScopeDataTransformer,whichunifiesthediversemonitoringlogsintoadynamicdatawarehouse,mScopeDB,foradvancedanalysis.WeconductseveralillustrativescenariosinwhichmilliScopesuccessfullydiagnosestheresponsetimeanomaliescausedbyveryshortbottlenecksusingarepresentativewebapplicationbenchmark(RUBBoS).Besides,wevalidatetheaccuracyofoureventmScopeMonitorsanddemonstrateavailabilityandflexibilityofmilliScopethroughseveralevaluations.

Stark:OptimizingIn-MemoryComputingForDynamicDatasetCollections ShenLi(IBMResearch),MdTanvirAlAmin(UIUC),RaghuGanti(IBMResearch),MudhakarSrivatsa(IBMResearch),ShaohanHu(IBMResearch),YiranZhao(UIUC),TarekAbdelzaher(UIUC)

Emergingdistributedin-memorycomputingframeworks,suchasApacheSpark,canprocessahugeamountofcacheddatawithinseconds.Thisremarkablyhighefficiencyrequiresthesystemtowellbalancedataacrosstasksandensuredatalocality.However,itischallengingtosatisfytheserequirementsforapplicationsthatoperateonacollectionofdynamicallyloadedandevicteddatasets.Thedynamicsmayleadtotime-varyingdatavolumeanddistribution,whichwouldfrequentlyinvokeexpensivedatare-partitionandtransferoperations,resultinginhighoverheadandlargedelay.Toaddressthisproblem,wepresentStark,a

57

systemspecificallydesignedforoptimizingin-memorycomputingondynamicdatasetcollections.Starkenforcesdatalocalityfortransformationsspanningmultipledatasets(e.g.,joinandcogroup)toavoidunnecessarydatareplicationsandshuffles.Moreover,toaccommodatefluctuatingdatavolumeandskeweddatadistribution,Starkdeliverselasticityintopartitionstobalancetaskexecutiontimeandreducejobmakespan.Finally,Starkachievesboundedfailurerecoverylatencybyoptimizingthedatacheckpointingstrategy.Evaluationsona50-serverclustershowthatStarkreducesthejobmakespanby4Xandimprovessystemthroughputby6XcomparedtoSpark.

CRESON:CallableandReplicatedSharedObjectsoverNoSQL PierreSutra(TélécomSudParis,CNRS,UniversitéParis-Saclay,France),EtienneRivière(UniversityofNeuchatel),CristianCotes(UniversitatRoviraiVirgili),MarcSánchezArtigas(UniversitatRoviraiVirgili),PedroGarciaLopez(UniversitatRoviraiVirgili),EmmanuelBernard(RedHat),WilliamBurns(RedHat),GalderZamarreno(RedHat)

TheabilitytoshareandpersistobjectssimplifiesthedesignofapplicationsinCloudenvironments.StoringobjectsonaNoSQLdatabaseensuresavailabilityandscalability.WhenObject-NoSQLMappingisperformedattheclientside,objectsthatareaccessedconcurrentlyarerepeatedlyconvertedbetweentheirin-memoryandserializedrepresentations.Thisnegativelyimpactsperformanceandincreasesreplicationcosts.WedescribeinthispaperthedesignofCRESON,asystemsupportingcallableobjectsoverNoSQL,inwhichapplicationobjectsaremappedandinstantiateddirectlyonthestoragenodes.CRESONsupportscompositionbyreferenceandensuresstrongconsistency.ObjectsarereplicatedandmaintainedcoherentusingStateMachineReplication.TheimplementationofCRESONleveragesthesupportofalistenablekey-valuestore(LKVS),anovelNoSQLstorageabstractionthatweintroduceinthispaper.WediscusstheperformanceandcomplexityofusingCRESONwiththeexampleoftheportageofapersonalcloudstorageservice,initiallydevelopedusingobject-relationalmappingoverashardedPostgreSQLdatabase.OurresultsshowthatCRESONoffersasimplerprogrammingexperiencebothintermsoflearningtimeandlinesofcode,whileperformingbetteronaverageandbeingmorescalable.

VirtualizedNetworkCodingFunctionsontheInternet LinquanZhang(UniversityofCalgary),ShangqiLai(TheUniversityofHongKong),ChuanWu(TheUniversityofHongKong),ZongpengLi(UniversityofCalgary),ChuanxiongGuo(MicrosoftResearch)

Networkcodingisafundamentaltoolthatenableshighernetworkcapacityandlowercomplexityinroutingalgorithms,byencouragingthemixingofinformationflowsinthemiddleofanetwork.ImplementingnetworkcodinginthecoreInternetissubjecttopracticalconcerns,sinceInternetroutersareoftenoverwhelmedbypacketforwardingtasks,leavinglittleprocessingcapacityforcodingoperations.Inspiredbytherecentparadigmofnetworkfunctionvirtualization,weproposeimplementingnetworkcodingasanewnetworkfunction,anddeployingsuchcodingfunctionsingeo-distributedclouddatacenters,topracticallyenablenetworkcodingontheInternet.Wetargetmulticastsessions(includingunicastflowsasspecialcases),strategicallydeployrelaynodes(networkcodingfunctions)inselecteddatacentersbetweensendersandreceivers,andembracehighbandwidthefficiencybroughtbynetworkcodingwithdynamiccodingfunctiondeployment.Wedesignandimplementthenetworkcodingfunctionontypicalvirtualmachines,featuringefficientpacketprocessing.Weproposeanefficientalgorithmforcodingfunctiondeployment,scalinginandout,inthepresenceofsystemdynamics.Real-worldimplementationonAmazonEC2andLinodedemonstratessignificantthroughputimprovementandhigherrobustnessofmulticastviacodingfunctionsaswellasefficiencyofthedynamicdeploymentandscalingalgorithm.

Research3:SecurityandPrivacyinDistributedSystemsIConsensusRobustnessandTransactionDe-AnonymizationintheRippleCurrencyExchangeSystem AdrianoDiLuzio(SapienzaUniversityofRome),AlessandroMei(SapienzaUniversityofRome),JulindaStefa(SapienzaUniversityofRome)

Distributedfinancialsystemsareradicallychangingthewaywedobusinessandspendourmoney.Ripple,inparticular,isuniqueinitskind.Itisbuiltonconsensusandtrustamongitspeersand,differentlyfrommanyothersystems,itallowsexchangingbothfiatcurrenciesandgoods.Itdoessobystoringtheaccountsofitsusers,theirbalances,andallthetransactionsinadistributedledger,publiclyaccessible.Inthispaperweperformforthefirsttimeanin-depthstudyoftheRippleexchangesystemanditspublicdistributedledger.Weanalyzepayments,thestructureofpaymentpaths,andtheroleofimportantpeersinthesystemsuchasGateways(theequivalentofBanks)andMarketMakersthatallowcross-currencyexchangeamongusers.TocompletethestudyoftheecosystemweanalyzetheinternalstreamofeventsinRippleandshowthatthewholesystemreliesonasurprisinglysmallnumberofactivevalidators,raisingseveralconcernsontherobustnessandontheactualfairnessofthesystem.Finally,weshowhowdistributedfinancialsystemscanjeopardizetheprivacyoftheirusers.Byexaminingthefirst3yearsofRipplehistory(morethan500GBofdata),weshowthatevenapproximateinformationonasinglepaymentcanuncover,withincredibleaccuracy,thewholefinanciallifeoftheuser.Forexample,thisallowsanyonewhooverhearsourorderforaLatteatourfavouritebartogaincompleteandunlimitedaccesstoourbalance,ourpreviousandfuturepayments,ourmonthlyincome,aswellastheplaceswhereweshopandthepeoplewetrust.

LearningprivacyhabitsofPDSowners BikashSingh(UniversityofInsubria),BarbaraCarminati(universityofinsubria),ElenaFerrari(universityofinsubria)

TheconceptofPersonalDataStorage(PDS)hasrecentlyemergedasanalternativeandinnovativewayofmanagingpersonaldataw.r.t.theservice-centriconecommonlyusedtoday.ThePDSoffersauniquelogicalrepository,allowingindividualstocollect,store,andgiveaccesstotheirdatatothirdparties.TheresearchonPDShassofarmainlyfocusedontheenforcementmechanisms,thatis,onhowuserprivacypreferencescanbeenforced.Incontrast,thefundamentalissueofpreferencespecificationhasbeensofarnotdeeplyinvestigated.Inthispaper,wedoastepinthisdirectionbyproposingdifferentlearningalgorithmsthatallowafine-grainedlearningoftheprivacyaptitudesofPDSowners.Thelearnedmodelsarethenusedtoanswerthirdpartyaccessrequests.Theextensiveuserstudieswehaveperformedshowtheeffectivenessoftheproposedapproach.

City-Hunter:HuntingSmartphonesinUrbanAreas XuefengLiu(HongKongPolytechnicUniversity),JiaqiWen(HongKongPolytechnicUniversity),ShaojieTang(UniversityofTexasatDallas),JiannongCao(HongKongPolytechnicUniversity),JiaxingShen(HongKongPolytechnicUniversity)

ThesecurityissueofpublicWiFiisgainingmoreandmoreconcern.Bylisteningtoproberequests,anadversarycanobtaintheSSIDlistoftheAPstowhichasmartphonepreviouslyconnected,andutilizesthisinformationtotrickthesmartphoneintoassociatingtoit.However,withtheenhancementofsecuritylevel,mostsmartphonesnowdonotproactivelydisclosetheirSSIDlists,makingtheseattacksobsolete.Inthispaper,weproposeCity-Hunter,anattackerthatcanlurenearbysmartphoneswithoutknowingtheirSSIDinformation.City-HunterestablishesandmaintainsanSSIDdatabasebyintegratingbothofflineandonlineinformation.Meanwhile,itsmartlychoosessomeSSIDstohitasmartphoneaccordingtothepastrecordandfreshness.WeevaluatetheperformanceofCity-

58

Hunterindifferentpublicplaces.TheresultsdemonstratethatCity-Hunterisabletosuccessfullyhit12%_18%smartphoneswithoutknowingtheirSSIDinformation,whichisabout4_8timesimprovementcomparedtothesimilarattackslikeKARMAandMANA.

WhenSeeingIsn'tBelieving:OnFeasibilityandDetectabilityofScapegoatinginNetworkTomography ShangqingZhao(UniversityofSouthFlorida),ZhuoLu(UniversityofSouthFlorida),CliffWang(NorthCarolinaStateUniversity/ArmyResearchOffice)

Networktomographyisavitaltooltoestimatelinkqualitiesfromend-to-endnetworkmeasurements.Animplicitassumptioninnetworktomographyisthatobservedmeasurementsindeedreflecttheaggregateoflinkperformance(i.e.,seeingisbelieving).However,itisnotguaranteedtodaythatthereexistsnoanomaly(e.g.,maliciousautonomoussystemsandinsiderthreats)inlarge-scalenetworks.Maliciousnodescanintentionallymanipulatelinkmetricsviadelayingordroppingpacketstoaffectmeasurements.Willsuchanassumptionrenderavulnerabilitywhenfacingattackers?Theproblemisofessentialimportanceinthatnetworktomographyisdevelopedtowardseffectivenetworkdiagnosticsandfailurerecovery.Inthispaper,wedemonstratethatthevulnerabilityisrealandproposeanewattackstrategy,calledscapegoating,inwhichmaliciousnodescansubstantiallydamageanetwork(e.g.,delayingpackets)andatthesametimemaliciouslymanipulateend-to-endmeasurementresultssuchthatalegitimatenodeismisleadinglyidentifiedastherootcauseofthedamage(therebybecomingascapegoat)undernetworktomography.Weformulatethreebasicscapegoatingapproachesandshowunderwhatconditionsattackscanbesuccessful.Wealsorevealconditionstodetectsuchattacks.Ourtheoreticalandexperimentalresultsshowthatsimplytrustingmeasurementsleadstoscapegoatingvulnerabilities.Thus,existingmethodsshouldberevisitedaccordinglyforsecurityinvariousapplications.

YouCanHearButYouCannotSteal:DefendingagainstVoiceImpersonationAttacksonSmartphones SiChen(UniversityatBuffalo/WestChesterUniversity),KuiRen(UniversityatBuffalo),SixuPiao(UniversityatBuffalo),CongWang(CityUniversityofHongKong),QianWang(WuhanUniversity),JianWeng(JinanUniversity),LuSu(UniveristyatBuffalo),AzizMohaisen(UniversityatBuffalo)

Voice,asaconvenientandefficientwayofinformationdelivery,hasasignificantadvantageovertheconventionalkeyboard-basedinputmethods,especiallyonsmallmobiledevicessuchassmartphonesandsmartwatches.However,thehumanvoicecouldoftenbeexposedtothepublic,whichallowsanattackertoquicklycollectsoundsamplesoftargetedvictimsandfurtherlaunchvoiceimpersonationattackstospoofthosevoicebasedapplications.Inthispaper,weproposethedesignandimplementationofarobustsoftware-onlyvoiceimpersonationdefensesystem,whichistailoredformobileplatformsandcanbeeasilyintegratedwithexistingoff-the-shelfsmartdevices.Inoursystem,weexploremagneticfieldemittedfromloudspeakersastheessentialcharacteristicfordetectingmachine-basedvoiceimpersonationattacks.Furthermore,weuseastate-of-the-artautomaticspeakerverificationsystemtodefendagainsthumanimitationattacks.Ouradvancedsensorydataprocessingtechniqueachievesfastauthenticationspeed(6.1s)whichmakesitsuitableformobileplatforms.Finally,ourevaluationresultsshowthatoursystemachievessignificantlyhighaccuracy(100%)andlow(0%)equalerrorrates(EERs)indetectingthemachinebasedvoiceimpersonationattackonsmartphones.

FlowReconnaissanceviaTimingAttacksonSDNSwitches ShengLiu(UniversityofNorthCarolinaatChapelHill),MichaelReiter(UniversityofNorthCarolinaatChapelHill),VyasSekar(CarnegieMellonUniversity)

Whenencounteringapacketflowforwhichithasnocoveringrule,asoftware-definednetworking(SDN)switchrequestsanappropriaterulefromitscontroller;thisrequestdelaystheroutingoftheflowuntilthecontrollerresponds.Weshowthatthisdelaygivesrisetoatimingsidechannelinwhichanattackercantestfortherecentoccurrenceofatargetflowbyjudiciouslyprobingtheswitchwithforgedflowsandusingthedelaystheysuffertodiscernwhethercoveringruleswerepreviouslyinstalledintheswitch.WedevelopaMarkovmodelofanSDNswitchtopermittheattackertoselectthebestprobe(orprobes)toinferwhetheratargetflowhasrecentlyoccurred.Ourmodelcapturescomplexitiesrelatedtoruleevictionstomakeroomforotherrules;ruletimeoutsduetoinactivity;thepresenceofmultiplerulesthatapplytooverlappingsetsofflows;andrulepriorities.Weshowthatourmodelpermitsdetectionoftargetflowswithconsiderableaccuracyinmanycases.

Research4:CloudComputingandDataCenterSystemsAStudyofLong-TailLatencyinn-TierSystems:RPCvs.AsynchronousInvocations QingyangWang(LouisianaStateUniversity),Chien-AnLai(GeorgiaTech),YasuhikoKanemasa(FujitsuLaboratoriesLtd.),ShungengZhang(LouisianaStateUniversity),CaltonPu(GeorgiaTech)

Long-taillatencyofweb-facingapplicationscontinuestobeaseriousproblem.Mostofthepreviouslypublishedresearchaddressestwoclassesoflonglatencyproblems:unevenworkloadssuchaswebsearch,andresourcesaturationinsinglenodes.Wedescribeanexperimentalstudyofathirdclassoflongtaillatencyproblemsthatarespecifictodistributedsystems:Cross-TierQueueOverflow(CTQO)duetoacombinationofmillibottlenecks(withsub-secondduration)andtightly-coupledserversinn-tiersystems(e.g.,Apache,Tomcat,andMySQL)usingRPC-stylerequest-responsecommunications.Ourexperimentsshowthattheappearanceofmillibottlenecks(e.g.,createdbyshortworkloadbursts)inoneserveroftencausesanotherserver(whichhasnosaturatedresources)inthesynchronousinvocationchaintofillupitsqueues(CTQO)anddroppackets,creatingverylongresponsetimequeries.CTQOcanbereducedoravoidedbyreplacingtheserverdroppingpacketswithanasynchronousserver.Insynchronousn-tiersystemexperiments,longtaillatencyduetoCTQOcanbereproducedconsistentlyatutilizationaslowas43%.Incontrast,whenalln-tierserversarereplacedbyasynchronousversions,CTQOandconsequentdroppedpacketsremainabsentatutilizationlevelsashighas83%,despitethesamemillibottlenecks.

RainorShine?-MakingSenseofCloudyReliabilityData IyswaryaNarayanan(ThePennsylvaniaStateUniversity),BikashSharma(Microsoft),DiWang(Microsoft),SriramGovindan(Microsoft),LauraCaulfield(Microsoft),AnandSivasubramaniam(ThePennsylvaniaStateUniversity),AmanKansal(Microsoft),JieLiu(Microsoft),BadriddineKhessib(Microsoft),KushagraVaid(Microsoft)

Clouddatacentersmustensurehighavailabilityforthehostedapplicationsandfailurescanbethebaneofdatacenteroperators.Understandingthewhat,whenandwhyoffailurescanhelptremendouslytomitigatetheiroccurrenceandimpact.Failurescan,however,dependonnumerousspatialandtemporalfactorsspanninghardware,workloads,supportfacilities,andeventheenvironment.Onehastorelyonfailuredatafromthefieldtoquantifytheinfluenceofthesefactorsonfailures.Towardsthisgoal,wecollectfailuresdataalongwithmanyparametersthatmightinfluencefailuresfromtwolargeproductiondatacenterswithvery

59

diversecharacteristics.Weshowthatmultiplefactorssimultaneouslyaffectfailures,andthesefactorsmayinteractinnon-trivialways.Thismakesconventionalapproachesthatstudyaggregatecharacteristicsorsingleparameterinfluences,ratherinaccurate.Instead,webuildamulti-factoranalysisframeworktosystematicallyidentifyinfluencingfactors,quantifytheirrelativeimpact,andhelpinmoreaccuratedecisionmakingforfailuremitigation.Wedemonstratethisapproachforthreeimportantdecisions:sparecapacityprovisioning,comparingthereliabilityofhardwareforvendorselection,andquantifyingflexibilityindatacenterclimatecontrolforcost-reliabilitytrade-offs.

Right-sizingGeo-distributedDataCentersforAvailabilityandLatency IyswaryaNarayanan(ThePennsylvaniaStateUniversity),AmanKansal(Microsoft),AnandSivasubramaniam(ThePennsylvaniaStateUniversity)

Weshowclouddevelopershowtorightsizedatacenter(DC)capacityforgeo-distributedapplicationsdeployedonseveralmulti-megawattDCs,possiblyalsousingmanysmalleredgeDCs.Notethatcapacityconsiderationsforageo-distributedinfrastructuredonotdecomposeintoindividualDCcapacityplanning.WhenedgeDCsareused,heterogeneousavailabilityandcostsaffectthecapacitysplitbetweentheedgeandcoreDCs.Non-uniformspatialdistributionofclientsandinterdependencebetweenlatencyandavailabilityconstraintsmakeitnon-trivialtoprovisiontherightcapacityateachDC.Wedevelopageo-distributedcapacityplanningframeworktocapturethekeyfactorsthatinfluencecapacity,rangingfromapplicationdemandpatterns,latencyandavailabilityrequirements,DCcost-availabilitytrade-offs,anddatareplicationoverheads.WeapplyourframeworktoarealisticapplicationandDCinfrastructuresettingtogatherinsightsintohowcapacityshouldbeprovisionedandallocatedacrossDCsforarepresentativesetofrequirementsandcosts.

PerformanceDrivenResourceSharingMarketsfortheSmallCloud Sung-HanLin(UniversityofSouthernCalifornia),RanjanPal(UniversityofSouthernCalifornia),MarcoPaolieri(UniversityofSouthernCalifornia),LeanaGolubchik(UniversityofSouthernCalifornia)

Small-scaleclouds(SCs)oftensufferfromresourceunder-provisioningduringpeakdemand,leadingtoinabilitytosatisfyservicelevelagreements(SLAs)andconsequentlossofcustomers.OneapproachtoaddressthisproblemisforasetofautonomousSCstoshareresourcesamongthemselvesinacostinducedcooperativefashion,therebyincreasingtheirindividualcapacities(whenneeded)withouthavingtosignificantlyinvestinmoreresources.Acentralproblem(inthiscontext)ishowtoproperlyshareresources(foraprice)toachieveprofitableservicewhilemaintainingcustomerSLAs.Toaddressthisproblem,inthispaper,weproposetheSC-Shareframeworkthatutilizestwointeractingmodels:(i)astochasticperformancemodelthatestimatestheachievedperformancecharacteristicsundergivenSLArequirements,and(ii)amarket-basedgame-theoreticmodelthat(asshownempirically)convergestoefficientresourcesharingdecisionsatmarketequilibrium.Ourresultsincludeextensiveevaluationsthatillustratetheutilityoftheproposedframework.

Fault-scalableVirtualizedInfrastructureManagement MukilKesavan(VMwareInc.),AdaGavrilovska(GeorgiaInstituteofTechnology),KarstenSchwan(GeorgiaInstituteofTechnology)

Large-scalevirtualizeddatacentersrequireconsiderableautomationininfrastructuremanagementinordertooperateefficiently.Automationisimpaired,however,bythefactthatdeploymentsarepronetomultipletypesofsubtlefaultsduetohardwarefailures,softwarebugs,misconfiguration,crashes,performancedegradedhardware,etc.ExistingInfrastructure-as-a-Service(IaaS)managementstacksincorporatelittletonoresiliencemeasurestoshieldendusersfromsuchcloudproviderlevelfailuresandpoorperformance.ThispaperproposesandevaluatesextensionstoIaaSstacksthatmaskfaultsinafault-agnosticmannerwhileensuringthattheoverheadscanbeproportionaltoobservedfailurerates.Wealsodemonstratethatinfrastructureautomationservicesandend-userapplicationscanuseservice-specificknowledge,togetherwithournewinterface,toachievebetteroutcomes.

DeltaCFS:BoostingDeltaSyncforCloudStorageServicesbyLearningfromNFS QuanluZhang(PekingUniversity),ZhenhuaLi(TsinghuaUniversity),ZhiYang(PekingUniversity),ShenglongLi(PekingUniversity),YangzeGuo(PekingUniversity),YafeiDai(PekingUniversity),ShouyangLi(PekingUniversity)

Cloudstorageservices,suchasDropbox,iCloudDrive,GoogleDrive,andMicrosoftOneDrive,havegreatlyfacilitateduserssynchronizingfilesacrossheterogeneousdevices.Amongthem,Dropbox-likeservicesareparticularlybeneficialowingtothedeltasyncfunctionalitythatstrivestowardsgreaternetwork-levelefficiency.However,whendeltasynctradescomputationoverheadfornetwork-trafficsaving,thetradeoffcouldbehighlyunfavorableundersometypicalworkloads.Werefertothisproblemastheabuseofdeltasync.Toaddressthisproblem,weproposeDeltaCFS,anovelfilesyncframeworkforcloudstorageservicesbylearningfromthedesignofconventionalNFS(NetworkFileSystem).Specifically,wecombinedeltasyncwithNFS-likefileRPCinanadaptivemanner,thussignificantlycuttingcomputationoverheadonboththeclientandserversideswhilepreservingthenetwork-levelefficiency.DeltaCFSalsoenablesaneatdesignforguaranteeingcausalconsistencyandfine-grainedversioncontroloffiles.InourFUSE-basedprototypesystem(whichisopen-source),DeltaCFSoutperformsDropboxbygeneratingupto11_lessdatatransferandupto100_lesscomputationoverheadunderconcernedworkloads.

Research5:EdgeandFogComputingCachier:Edge-cachingforrecognitionapplications UtsavDrolia(CarnegieMellonUniversity),KatherineGuo(BellLabs),JiaqiTan(Nokia),RajeevGandhi(CarnegieMellonUniversity),PriyaNarasimhan(CarnegieMellonUniversity)

Recognitionandperception-basedmobileapplications,suchasimagerecognition,areontherise.Theseapplicationsrecognizetheuserssurroundingsandaugmentitwithinformationand/ormedia.Theseapplicationsarelatencysensitive.Theyhaveasoft-realtimenature-lateresultsarepotentiallymeaningless.Ontheonehand,giventhecomputeintensivenatureofthetasksperformedbysuchapplications,executionistypicallyoffloadedtothecloud.Ontheotherhand,offloadingsuchapplicationstothecloudincursnetworklatency,whichcanincreasetheuser-perceivedlatency.Consequently,edge-computinghasbeenproposedtoletdevicesoffloadintensivetaskstoedge-serversinsteadofthecloud,toreducelatency.Inthispaper,weproposeadifferentmodelforusingedge-servers.Weproposetousetheedgeasaspecializedcacheforrecognitionapplicationsandformulatetheexpectedlatencyforsuchacache.Weshowthatusinganedge-serverlikeatypicalweb-cache,forrecognitionapplications,canleadtohigherlatencies.WeproposeCachier,asystemthatusesthecachingmodelalongwithnoveloptimizationstominimizelatencybyadaptivelybalancingloadbetweentheedgeandthecloudbyleveragingspatiotemporallocalityofrequests,usingofflineanalysisofapplications,andonlineestimatesofnetworkconditions.WeevaluateCachierforimage-recognitionapplicationsandshowthatourtechniquesyield3xspeed-upinresponsiveness,andperformaccuratelyoverarangeofoperatingconditions.Tothebestofourknowledge,thisisthefirstworkthatmodelsedge-serversascachesforcomputeintensiverecognitionapplications,andCachieristhefirstsystemthatusesthismodeltominimizelatencyfortheseapplications.

60

ContentCentricPeerDataSharinginPervasiveEdgeComputingEnvironments XintongSong(PekingUniversity),YaodongHuang(StonyBrookUniversity),QianZhou(StonyBrookUniversity),FanYe(StonyBrookUniversity),YuanyuanYang(StonyBrookUniversity),XiaomingLi(PekingUniversity)

Theproliferationanddailycongregationofmodernmobiledeviceshavecreatedabundantopportunitiesforpeeredgedevicestosharevaluabledatawitheachother.Theshortcontactdurations,relativelysmallsharingsizes,anduncertaindataavailability,demandagile,lightweightpeerbaseddatasharing.Inthispaper,weproposePeerDataSharing(PDS)thatenablesedgedevicestodiscoverwhichdataexistinnearbypeers,andretrieveinteresteddatarobustlyandefficiently.PDSusesnovellingeringqueries,mixedcastanden-routemessagerewritingtechniquestominimizeredundanttransmissionsandmaximizeopportunisticoverhearingthuscachingindatadiscoveryandretrieval.ExtensiveevaluationsbasedonanAndroidprototypeshowthatPDSdiscoversandretrievesalmost100%dataintensofseconds,andremainsrobustdespitewirelesscontention,simultaneousconsumerrequestsandusermobility.

FLARE:CoordinatedRateAdaptationforHTTPAdaptiveStreaminginCellularNetworks YoungbinIm(UniversityofColoradoatBoulder),JinyoungHan(HanyangUniversity),JiHoonLee(JuniKorea),YoonKwon(Kakao),CarleeJoe-Wong(CarnegieMellonUniversity),TaekyoungKwon(SeoulNationalUniversity),SangtaeHa(UniversityofColoradoatBoulder)

Fogcomputingisanemergingarchitecturethataimstorunapplicationsonmultipledevicesthatlieonacontinuumfromcentralizedcloudserverstopersonaluserdevices.Thesearchitecturesallowapplicationstooptimizeovertheinformationstoredateachtypeofdeviceanddividetheirfunctionalitiesbasedonthedevicecapabilities.Wedemonstratethebenefitsofthisapproachformobilevideostreaming.ExistingHAS(HTTPadaptivestreaming)techniques,usedbypopularvideoserviceproviders,oftensufferfromproblemslikeunstablevideoqualityandsuboptimalresourceutilization.Wefindthatalackofcoordinationpreventsbothclient-andnetwork-sideHAStechniquesfromsolvingthem.However,ourfogapproachcanexploitexistingtelecommunicationAPIs,whichexposenetworkcapabilitiestoapplications,inordertocoordinatebetweentheclientandnetwork.OurcoordinatedHASsolution,FLARE,optimizesthetotalutilityofallclientsinacellwhilemaintainingstablevideoqualityandsupportinguser-anddevice-specificneeds.WeimplementFLAREonacommodityLTEfemtocellandusetheimplementationtoconductthefirstcomparisonofHASplayersonanLTEfemtocell.Byconductingextensiveexperimentsusingthens-3simulator,wealsodemonstratethatFLARE(i)enhancestheaveragevideobitrate,(ii)achievesstablevideoquality,and(iii)balancesthethroughputofsimultaneousvideoanddataflows,comparedtootherrepresentativeHASsolutions.

NetworkedDroneCamerasforSportsStreaming XiaoliWang(PrincetonUniversity),AakankshaChowdhery(PrincetonUniversity),MungChiang(PrincetonUniversity)

Anetworkofdronecamerascanbedeployedtocoverliveevents,suchashigh-actionsportsgameplayedonalargefield,butmanagingnetworkeddronecamerasinreal-timeischallenging.Distributedapproachesyieldsuboptimalsolutionsfromlackofcoordinationbutcoordinationwithacentralizedcontrollerincursround-triplatenciesofseveralhundredsofmillisecondsoverawirelesschannel.Weproposeafog-networkingbasedsystemarchitecturetoautomaticallycoordinateanetworkofdronesequippedwithcamerastocaptureandbroadcastthedynamicallychangingscenesofinterestinasportsgame.Wedesignbothoptimalandpracticalalgorithmstobalancethetradeoffbetweentwometrics:coverageofthemostimportantscenesandstreamedvideobitrate.Tocompensatefornetworkround-triplatencies,thecentralizedcontrollerusesapredictiveapproachtopredictwhichlocationsthedronesshouldcovernext.Thecontrollermaximizesvideobitratebyassociatingeachdronetoanoptimallymatchedserveranddynamicallyre-assignsdronesasrelaynodestoboostthethroughputinlow-throughputscenarios.Thisdynamicassignmentatcentralizedcontrolleroccursatslowertime-scalepermittedbyround-triplatencies,whilethepredictiveapproachanddroneslocaldecisionensuresthatthesystemworksinreal-time.Experimentalresultsovertensofflightsonthefieldsuggestoursystemcanachievereallygoodperformance,forexample,8dronescanachieveatradeoffof94%coverageand(onaverage)2Kvideosupportat20Mbpsbyoptimizingbetweencoverageandthroughput.Bydynamicallyallocatingdronestocoverthegameoractasrelays,oursystemalsodemonstratesa2xgainoversystemsmaximizingstaticcoveragealonethatachievesonly9Mbpsvideothroughput.

Chronus:ConsistentDataPlaneUpdatesinTimedSDNs JiaqiZheng(NanjingUniversity),GuihaiChen(NanjingUniversity),StefanSchmid(AalborgUniversity),HaipengDai(NanjingUniversity),JieWu(TempleUniversity)

Software-DefinedNetworks(SDNs)introduceinterestingnewopportunitiesinhownetworkroutescanbedefined,verified,andchangedovertime.Yetdespitethelogicallycentralizedperspectiveoffered,anSDNstillneedstobeconsideredadistributedsystem:ruleupdatescommunicatedfromthecontrollertotheindividualswitchestraverseanasynchronousnetworkandmayarriveout-of-order,andhenceleadto(temporaryorpermanent)inconsistencies.Accordingly,theconsistentnetworkupdateproblemhasrecentlyreceivedmuchattention.MotivatedbytheadventoftightlysynchronizedSDNs,weinthispaperinitiatethestudyofalgorithmsforconsistentnetworkupdatesintimedSDNsSDNsinwhichindividualnodeupdatescanbescheduledatspecifictimes.ThispaperpresentsChronus,whichisbasedonprovablycongestion-andloop-freeupdateschedulingalgorithms,andavoidstheflowtablespaceheadroomrequiredbyexistingtwophaseupdateapproaches.WeformulatetheMinimumUpdateTimeProblem(MUTP)asanoptimizationprogram.Weproposeatreealgorithmtocheckthefeasibilityandagreedyalgorithmtofindaupdatesequenceinpolynomialtime.ExtensiveexperimentsonMininetandnumericalsimulationsshowthatChronuscansubstantiallyreducetransientcongestionby75%andsaveover60%oftherulescomparedtothestateoftheart.

DistributedDeepNeuralNetworksovertheCloud,theEdgeandEndDevicesSuratTeerapittayanon(HarvardUniversity),BradleyMcDanel(HarvardUniversity),H.T.Kung(HarvardUniversity)

Weproposedistributeddeepneuralnetworks(DDNNs)overdistributedcomputinghierarchies,consistingofthecloud,theedge(fog)andenddevices.Whilebeingabletoaccommodateinferenceofadeepneuralnetwork(DNN)inthecloud,aDDNNalsoallowsfastandlocalizedinferenceusingshallowportionsoftheneuralnetworkattheedgeandenddevices.Moreover,viadistributedcomputing,DDNNsenhancedataprivacyandsystemfaulttoleranceforDNNapplications.Whensupportedbyascalabledistributedcomputinghierarchy,aDDNNcanscaleupinneuralnetworksizeandscaleoutingeographicalspan.InimplementingaDDNN,wemapsectionsofaDNNontoadistributedcomputinghierarchy.Byjointlytrainingthesesections,weminimizecommunicationandresourceusagefordevicesandmaximizeusefulnessofextractedfeatureswhichareutilizedinthecloud.Asaproofofconcept,weshowaDDNNcanexploitgeographicaldiversityofsensorstoimproverecognitionaccuracyandreducecommunicationcost.Inourexperiment,comparedwiththetraditionalmethodofoffloadingrawsensordatatobeprocessedinthecloud,DDNNlocallyprocessesmostsensordataonenddevicesandisabletoreducethecommunicationcostbyafactorofover20x.

Research6:DistributedGreenComputingandEnergyManagement

61

DynamicControlofFlowCompletionTimeForPowerEfficientDataCenterNetworks KuangyuZheng(TheOhioStateUniversity),XiaoruiWang(TheOhioStateUniversity)

Datacenternetwork(DCN)canconsumeasignificantamountofpower(e.g.,10%to20%)inlarge-scaledatacenters.ToreducethepowerconsumptionofDCN,trafficconsolidationhasbeenrecentlyproposedasaneffectiveapproachtoreducethenumberofDCNdevicesinuse.However,existingconsolidationapproachesdonotsufficientlyconsidertheflowcompletiontime(FCT)requirement.Ononehand,missingtheFCTdeadlinescancauseseriousviolationofservice-levelagreement,especiallyfordelay-sensitivenetworkingservices,suchaswebsearchandE-commerce.Ontheotherhand,keepingallthedevicesontomakeFCTsmuchshorterthanthedesiredrequirementsisunnecessarybecause1)usersmaynotbeabletoperceivethedifference,and2)suchagreedystrategycanleadtounnecessarilyhighDCNpowerconsumptionandthusmoreelectricitycosts.Inthispaper,weproposeFCTcon,adynamicFCTcontrolstrategyforDCNpoweroptimization.FCTconisdesignedrigorouslybasedoncontroltheorytodynamicallycontroltheFCTofdelay-sensitivetrafficflowsexactlytorequirements,suchthatthedesiredFCTperformanceisguaranteedwhilethemaximumamountofDCNpowersavingscanbeachieved.Resultsfrombothhardwareexperimentsandsimulationevaluationsdemonstratethat,comparedtothestate-of-the-artDCNpoweroptimizationschemes,FCTconcanimprovetheDCNFCTperformance,whileachievingnearlythesameorevenmorepowersavings.Consequently,FCTconcanresultinmorethan22.0%to62.2%extranetprofitsforadatacenterwith50Kservers.

OnEnergy-EfficientCongestionControlforMultipathTCP JiaZhao(SimonFraserUniversity),JiangchuanLiu(SimonFraserUniversity),HaiyangWang(UniversityofMinnesotaDuluth)

Multipathtransportprotocols,e.g.MultipathTCP(MPTCP),enabletransmissionviamultipleroutesbetweenanend-to-endconnectiontoimproveresourceusageofregularTCP.Duetotheincreasingconcerningreencomputing,therehasbeensignificantinterestindesigningenergy-efficientmultipathtransport.ForexistingMPTCPcongestioncontrolalgorithms,theresearchcommunitystilllacksacomprehensiveunderstandingofwhichcomponentsinsuchanalgorithmplaythefundamentalroleinenergyefficiency,howvariousalgorithmscompareagainsteachotherfromenergy-consumingperspective,orwhetherthereexistpotentiallybettersolutionsforenergysaving.Inthispaper,wetakeafirststeptoanswerthesequestions.BasedontheMPTCPLinuxkernelexperiments,wefirstsummarizethattheenergyconsumptionisrelatedtothreeaspects:averagethroughput,pathdelayanddifferentnetworkscenarios.Inordertobridgecongestioncontroltothethreeaspects,weanalyzetheexistingalgorithmsandcapturetheessentialparametersofmultipathcongestioncontrolmodelrelatedtoMPTCPsenergyefficiency.Thenwedesignawindowincreasefactortoshifttraffictolow-delayenergy-efficientpaths.Wefurtherextendthisdesignbyusinganenergy-awarecompensativeparametertofitthegeneralhierarchicalInternettopology.Weevaluatetheperformanceofexistingmultipathcongestioncontrolalgorithmsandourproposedalgorithmindifferentnetworkscenarios.Theresultsshowenergyefficiencyofourdesign.

AMechanismforCooperativeDemand-SideManagement GuangchaoYuan(Microsoft),Chung-WeiHang(IBM),MichaelHuhns(UniversityofSouthCarolina),MunindarSingh(NorthCarolinaStateUniversity)

Demand-sidemanagement(DSM)isanimportantthemeintheSmartGridandoffersthepossibilityoflevelingpowerconsumptionwithitsattendantbenefitsofreducingcapitalexpenses.Thispaperdevelopsanalgorithmicmechanismthatreducespeaktotalconsumptionandencouragesprosocialbehavior,suchasexpressingflexibilityinonespowerconsumptionandreportingpreferencestruthfully.Ourobjectiveistoprovideatractable,budget-balancedmechanismthatpromotestruthtellingfromhouseholds.Theresultingmechanismistheoreticallyandempiricallyproventobeexantebudget-balanced,weaklyPareto-efficient,andweaklyBayesianincentive-compatible.Asimulationstudyverifiesthatthemechanismcouldlargelyreducethecomputationalcomplexitythattheoptimalallocationrequires,whilemaintainingapproximatelythesameperformance.Auserstudywith20subjectsfurthershowstheeffectivenessofthemechanisminpreventingparticipantsfromdefectingandincentivizingthemtorevealflexiblepreferences.

AHierarchicalFrameworkofCloudResourceAllocationandPowerManagementUsingDeepReinforcementLearning NingLiu(SyracuseUniversity),ZheLi(SyracuseUniversity),ZhiyuanXu(SyracuseUniversity),JielongXu(SyracuseUniversity),ShengLin(SyracuseUniversity),QinruQiu(SyracuseUniversity),JianTang(SyracuseUniversity),YanzhiWang(SyracuseUniversity)

Automaticdecision-makingapproaches,suchasreinforcementlearning(RL),havebeenappliedto(partially)solvetheresourceallocationproblemadaptivelyinthecloudcomputingsystem.However,acompletecloudresourceallocationframeworkexhibitshighdimensionsinstateandactionspaces,whichprohibittheusefulnessoftraditionalRLtechniques.Inaddition,highpowerconsumptionhasbecomeoneofthecriticalconcernsindesignandcontrolofcloudcomputingsystems,whichdegradessystemreliabilityandincreasescoolingcost.Aneffectivedynamicpowermanagement(DPM)policyshouldminimizepowerconsumptionwhilemaintainingperformancedegradationwithinanacceptablelevel.Thus,ajointvirtualmachine(VM)resourceallocationandpowermanagementframeworkarecriticaltotheoverallcloudcomputingsystem.Moreover,novelsolutionframeworkisnecessarytoaddresstheevenhigherdimensionsinstateandactionspaces.Inthispaper,weproposeanovelhierarchicalframeworkforsolvingtheoverallresourceallocationandpowermanagementproblemincloudcomputingsystems.TheproposedhierarchicalframeworkcomprisesaglobaltierforVMresourceallocationtotheserversandalocaltierfordistributedpowermanagementoflocalservers.Theemergingdeepreinforcementlearning(DRL)technique,whichcandealwithcomplicatedcontrolproblemswithlargestatespace,isadoptedtosolvetheglobaltierproblem.Furthermore,anautoencoderandanovelweightsharingstructureareadoptedtohandlethehigh-dimensionalstatespaceandacceleratetheconvergencespeed.Ontheotherhand,thelocaltierofdistributedserverpowermanagementscomprisesanLSTMbasedworkloadpredictorandamodel-freeRLbasedpowermanager,operatinginadistributedmanner.ExperimentresultsusingactualGoogleclustertracesshowthatourproposedhierarchicalframeworksignificantlysavesthepowerconsumptionandenergyusagethanthebaselinewhileachievingnoseverelatencydegradation.Meanwhile,theproposedframeworkcanachievethebesttrade-offbetweenlatencyandpower/energyconsumptioninaservercluster.

SunChase:Energy-EfficientRoutePlanningforSolar-PoweredEVs. LanduJiang(McGillUniversity),YuHua(HuazhongUniversityofScienceandTechnology),ChenMa(McGillUniversity),XueLiu(McGillUniversity)

Electricvehicles(EVs)playasignificantroleinthecurrenttransportationsystems.ThemainfactorthataffectsacceptanceofexistingEVmodelsistherangeanxietyproblemcausedbylimitedchargingstationsandlongrechargetimes.Recently,thesolar-poweredEVhasdrawnmanyattentionsduetobeingfreeofcharginglimitations.However,thesolarpoweredEVsmaystillstrugglewiththelimitedusebecauseofunpredictablesolaravailability.Forexample,shadingscausedbybuildingsandtreesalsopossiblydecreasethesolarpanelcellefficiency.Toaddressthis,weproposearouteplanningmethodforsolar-poweredEVstobalancetheenergyharvestingandconsumptionsubjecttotimeconstraint.Theideabehindoursolutionistoofferpower-awareoptimalrouting,whichmaximizestheon-roadenergyinputgivensolaravailabilityoneachroadsegment.Wefirstbuildasolaraccessestimationmodelusing3Dgeographicdataandthenemployamulti-criteria

62

searchmethodtogenerateasetofParetocandidateroutes.Inordertoreducethesizeoftheset,weleveragethebisectkmeansclusteringalgorithmtoextractthemostrepresentativeParetorouteswithbettersolaravailability.Intheevaluation,wedevelopedavalidationplatformonthevehicleandleveragedmobilesensingtechniquestoexamineourproposedmodelinrealroadenvironments.Weconductedsimulationstoevaluateourproposedrouteplanningalgorithmusingreallifescenarios.Experimentalresultsdemonstratethatoursolarinputmodelisrobusttorealroadscenarios,andtheroutingalgorithmhasgreatpotentialtoprovideefficientservicesforsolar-poweredEVinthefuture.

Research7:InternetofThings,SmartCities,andCyber-PhysicalSystemsPersistentTrafficMeasurementThroughVehicle-to-InfrastructureCommunications HeHuang(SoochowUniversity),Yu-ESun(SoochowUniversity),ShigangChen(UniversityofFlorida),HongliXu(UniversityofScienceandTechnologyofChina),YianZhou(Google)

Measuringpointtrafficvolumeandpoint-to-pointtrafficvolumeinaroadsystemhasimportantapplicationsintransportationengineering.Theconnectedvehicletechnologiesintegratewirelesscommunicationsandcomputersintotransportationsystems,allowingwirelessdataexchangesbetweenvehiclesandroad-sideequipment,andenablinglarge-scale,sophisticatedtrafficmeasurement.Thispaperinvestigatestheproblemsofpersistentpointtrafficmeasurementandpersistentpoint-to-pointtrafficmeasurement,whichwerenotadequatelystudiedinthepriorart,particularlyinthecontextofintelligentvehicularnetworks.Weproposetwonovelestimatorsforprivacypreservingpersistenttrafficmeasurement:oneforpointtrafficandtheotherforpoint-to-pointtraffic.Theestimatorsaremathematicallyderivedfromthejoinresultoftrafficrecords,whichareproducedbytheelectronicroadsideunitswithprivacypreservingdatastructures.Weevaluateourestimationmethodsusingsimulationsbasedonbothrealtransportationtrafficdataandsyntheticdata.Thenumericalresultsdemonstratetheeffectivenessoftheproposedmethodsinproducinghighmeasurementaccuracyandallowingaccuracy-privacytradeoffthroughparametersetting.

TagBreathe:MonitorBreathingwithCommodityRFIDSystems YuxiaoHou(TheHongKongPolytechnicUniversity),YanwenWang(TheHongKongPolytechnicUniversity),YuanqingZheng(TheHongKongPolytechnicUniversity)

Breathmonitoringhelpsassessthegeneralpersonalhealthandgivescluestochronicdiseases.Yetcurrentbreathmonitoringtechnologiesareinconvenientandintrusive.Forinstance,typicalbreathmonitoringdevicesneedtoattachnasalprobesorchestbandstousers.Wirelesssensingtechnologieshavebeenappliedtomonitorbreathingusingradiowaveswithoutphysicalcontact.Thosewirelesssensingtechnologieshoweverrequirecustomizedradioswhicharenotreadilyavailable.Moreimportantly,duetointerference,suchtechnologiesdonotworkwellwithmultipleusers.Withmultipleusersinpresence,thedetectionaccuracyofexistingsystemsdecreasesdramatically.Inthispaper,weproposetomonitorusersbreathingusingcommercial-off-the-shelf(COTS)RFIDsystems.Inoursystem,passivelightweightRFIDtagsareattachedtousersclothesandbackscatterradiowaves,andcommodityRFIDreadersreportlowleveldata(e.g.,phasevalues).Wetrackperiodicbodymovementduetoinhalingandexhalingbyanalyzingthelowleveldatareportedbycommodityreaders.Toenhancethemeasurementrobustness,wesynthesizedatastreamsfromanarrayofmultipletagstoimprovethemonitoringaccuracy.OurdesignfollowsthestandardEPCprotocolwhicharbitratescollisionsinthepresenceofmultipletags.WeimplementaprototypethebreathmonitoringsystemwithcommodityRFIDsystems.Theexperimentresultsshowthattheprototypesystemcansimultaneouslymonitorbreathingwithhighaccuracyevenwiththepresenceofmultipleusers.

Double-EdgedSword:IncentivizedVerifiableProductPathQueryforRFID-enabledSupplyChain SaiyuQi(XidianUniversity),YuanqingZheng(TheHongKongPolytechnicUniversity),XiaofengChen(XidianUniversity),JianfengMa(XidianUniversity),YongQi(XianJiaotongUniversity)

Queryingthepathinformationofindividualproductsinasupplychainiskeytomanyapplications.RFID(RadioFrequencyIDentification)isamaintechnologytoenableproductpathinformationquerytoday.WithRFIDtechnology,supplychainparticipantscanefficientlytrackproductsintransitandrecordtheirstatesindatabases.Inthispaper,weinvestigatethefollowingquestion:howcanweconductprivacy-preservingproductpathinformationquerywithverifiabilityonanRFIDenableddistributedsupplychain?WeaddressthisquestionwithDoubleEdged(DE)-Sword,anincentivizedverifiablequerysystem.DE-Swordintroducesanoveldouble-edgedreputationincentivemechanismtoencouragesupplychainparticipantstobehave;andcouplesitwithcryptographicprimitivesandcarefulprotocoldesign.WeevaluateDE-Swordthroughsecurityanalysisandperformanceexperiments.ThesecurityanalysisshowsthatDE-Swordguaranteesbothverifiabilityandprivacy.TheexperimentresultsshowthatDE-SwordachieveslowoverheadinRFID-enabledsupplychainapplications.

TowardsAccurateCorruptionEstimationinZigBeeUnderCross-TechnologyInterference GongLongChen(ZhejiangUniversity),WeiDong(ZhejiangUniversity),ZhiweiZhao(UniversityofElectronicScienceandTechnologyofChina),TaoGu(RMITUniversity)

Cross-TechnologyInterferenceaffectstheoperationoflow-powerZigBeenetworks,especiallyundersevereWiFiinterference.AccuratecorruptionestimationisveryimportanttoimprovetheresilienceofZigBeetransmissions.However,therearemanylimitationsinexistingapproachessuchaslowaccuracy,highoverhead,andrequiringhardwaremodification.Inthispaper,weproposeanaccuratecorruptionestimationapproach,AccuEst,whichutilizesper-byteSINR(Signal-to-Interferenceand-NoiseRatio)todetectcorruption.Wecombinetheuseofpilotsymbolswithper-byteSINRtoimprovecorruptiondetectionaccuracy,especiallyinhighlynoisyenvironments(i.e.,noiseandinterferenceareatthesamelevel).Inaddition,wedesignanadaptivepilotinstrumentationschemetostrikeagoodbalancebetweenaccuracyandoverhead.WeimplementAccuEstontheTinyOS2.1.1/TelosBplatformandevaluateitsperformancethroughextensiveexperiments.ResultsshowthatAccuEstimprovescorruptiondetectionaccuracyby78.6%onaveragecomparedwithstate-of-the-artapproach(i.e.,CARE)inhighlynoisyenvironments.Inaddition,AccuEstreducespilotoverheadby53.7%onaveragecomparedtothetraditionalpilot-basedapproach.WeimplementAccuEstinacoding-basedtransmissionprotocol,andresultsshowthatwithAccuEst,thepacketdeliveryratioisimprovedby20.3%onaverage.

UnseenActivityRecognition:AHierarchicalActiveTransferLearningApproach MohammadArifUlAlam(UniversityofMarylandBaltimoreCounty),NirmalyaRoy(UniversityofMarylandBaltimoreCounty)

Humanactivityrecognition(AR)isanessentialelementforuser-centricandcontext-awareapplications.Whilepreviousstudiesshowedpromisingresultsusingvariousmachinelearningalgorithms,mostofthemcanonlyrecognizetheactivitiesthatwerepreviouslyseeninthetrainingdata.Weinvestigatethechallengesofimprovingtherecognitionofunseendailyactivitiesinsmarthomeenvironment,bybetterexploitingthehierarchicaltaxonomyofcomplexdailyactivities.Wefirst(a)designahierarchicalrepresentationofcomplexactivitytaxonomyintermsofhuman-readablesemanticattributes,and(b)developahierarchyofclassifierswhichincorporatesaclustertreebuiltonthedomainknowledgefromtrainingsamples.Thoughthismodelisrichinrecognizingcomplexactivitiesthatare

63

previouslyseenintrainingdata,itisnotwellversedtorecognizeunseencomplexactivitieswithoutnewtrainingsamples.Totacklethischallenge,weextendHierarchicalActiveTransferLearning(HATL)approachthatexploitssemanticattributeclusterstructureofcomplexactivitiessharedbetweenseen(source)andunseen(target)activitydomains.Ourapproachemploystransferandactivelearningtohelplabeltargetdomainunlabeleddatabyspawningthemosteffectivequeries.Weevaluatedourapproachwithtworeal-timesmarthomesystems(IRB#HP-00064387)whichcorroboratesradicalimprovementsinrecognizingunseencomplexactivities.

RFIPad:EnablingCost-efficientandDevice-freeIn-airHandwritingusingPassiveTags HanDing(Xi'anJiaotongUniversity),ChenQian(UniversityofCaliforniaSantaCruz),JinsongHan(Xi'anJiaotongUniversity),GeWang(Xi'anJiaotongUniversity),WeiXi(Xi'anJiaotongUniversity),KunZhao(Xi'anJiaotongUniversity),JizhongZhao(Xi'anJiaotongUniversity)

Animportantfunctionofsmartenvironmentsistheubiquitousaccessofcomputingdevices.Inpublicareassuchashospitals,libraries,andairports,peoplemaywanttointeractwithnearbycomputingsystemstogetinformation,suchasdirectionstoahospitalroom,locationsofbooks,andflightdeparture/arrivalinformation.Touchscreenbaseddisplaysandkiosks,whicharecommonlyusedtoday,mayincurextrahardwarecostorevenpossiblegermandbacteriainfection.Thisworkprovidesanewsolution:userscanmakequeriesandinputsbyperformingin-airhandwritingtoanarrayofpassiveRFIDtags,namedRFIPad.Thisinputmethoddoesnotrequirehumanhandstocarryanydeviceandhenceisconvenientforapplicationsinpublicareas.Besidesthemobileandcontactlessproperty,thissystemisacost-efficientextensiontocurrentRFIDsystems:anexistingreadercanmonitormultipleRFIPadswhileperformingitsregularapplicationssuchasidentificationandtracking.WeimplementaprototypeofRFIPadusingcommercialoff-the-shelfUHFRFIDdevices.ExperimentalresultsshowthatRFIPadachieves>91%accuracyinrecognizingbasictouchscreenoperationsandEnglishletters.

Research8:MobileandWirelessComputingSystemsIRobustIncentiveTreeDesignforMobileCrowdsensing XiangZhang(ArizonaStateUniversity),GuoliangXue(ArizonaStateUniversity),RuozhouYu(ArizonaStateUniversity),DejunYang(ColoradoSchoolofMines),JianTang(SyracuseUniversity)

Withtheproliferationofsmartmobiledevicessuchassmartphones,tablets,andwearable,mobilecrowdsensingbecomesapowerfulsensingandcomputationparadigmwhichhasbeenappliedinmanyfields,suchasspectrumsensing,environmentalmonitoring,healthcare,andsoon.Drivenbypromisingincentives,thepowerofthecrowdgrantscrowdsensinganadvantageinmobilizinguserswhoperformsensingtaskswiththeembeddedsensorsonthesmartdevices.Auctionisoneofthecommonlyadoptedcrowdsensingincentivemechanismstoincentivizeusersforparticipation.However,auctiondoesnotconsidertheincentiveforusersolicitationwhereincrowdsensing,alargenumberofusersisoftenneeded.Todealwiththisissue,weaimtodesignanauction-basedincentivetreetoofferrewardstousersforbothparticipationandsolicitation.Meanwhile,wewanttheincentivemechanismtoberobustagainstdishonestbehaviorsuchasuntruthfulbiddingandsybilattacks,toeliminatethemaliciouspricemanipulation.WedesignanincentivemechanismRIT,whichcombinestheadvantagesofauctionsandincentivetrees.WeprovethatRITistruthfulandsybil-proofwithprobabilityatleastH,foranygivenH_(0,1).WealsoprovethatRITsatisfiesindividualrationality,computationalefficiency,andsolicitationincentive.SimulationresultsofRITfurtherconfirmouranalysis.

WearLock:UnlockingYourPhoneviaAcousticsusingSmartwatch ShanheYi(CollegeofWilliamandMary),ZhengruiQin(NorthwestMissouriStateUniversity),NancyCarter(CollegeofWilliamandMary),QunLi(CollegeofWilliamandMary)

Smartphonelockscreensareimplementedtoreducetheriskofdatalossorcompromisegiventhefactthatincreasingamountofpersondataareaccessibleonsmartphonesnowadays.Unfortunately,manysmartphoneusersabandonlockscreensduetotheinconvenienceofunlockingtheirphonesmanytimesaday.Withthewideadoptionofwearables,token-basedapproacheshavegainedpopularityinsimplifyingunlockingandretainingsecurityatthesametime.Tothisend,weproposetotakeadvantageofthesmartwatchforeasysmartphoneunlocking.Inthispaper,wehavedesignedWearLock,asystemthatusesacoustictonesastokenstoautomatetheunlockingsecurely.Webuildasub-channelselectionandanadaptivemodulationintheacousticmodemtomaximizeunlockingsuccessrateagainstambientnoiseonlywhenthosetwodevicesarenearby.Weleveragethemotionsensoronthesmartwatchtoreducetheunlockfrequency.Weoffloadsmartwatchtaskstothesmartphonetospeedupcomputationandsaveenergy.WehaveimplementedtheWearLockprototypeandconductedextensiveevaluations.Resultsachievedalowaveragebiterrorrate(BER)as8%invariousexperiments.Comparedtotraditionalmanualpersonalidentificationnumbers(PINs)entry,WearLockachievesatleast18%unlockspeedupwithoutanymanualeffort.

ModelingMobileCodeAccelerationintheCloud HuberFlores(UniversityofOulu),XiangSu(UniversityofOulu),VassilisKostakos(UniversityofOulu),JukkaRiekki(UniversityofOulu),EemilLagerspetz(UniversityofHelsinki),SasuTarkoma(HelsinkiUniversityofTechnology),PanHui(HKUST),YongLi(TsinghuaUniversity),JukkaManner(AaltoUniversity)

Tuningthequalityofserviceofamobileapplicationiscriticalinordertoensureuserssatisfaction.Techniqueshavebeenproposedtoaccomplishadaptationofqualityofservicedynamically.However,thereisstillalimitedunderstandingabouthowtoprovideanutilitymodelforcodeexecution.Onekeychallengeistomodelthelevelofqualityinthecodeexecutionthatcanbeprovisionedbythecloud.Sincetheallocationofcloudresourceshasacost,itisimportanttooptimizecloudusage.Weproposeasoftware-definednetworkingapproachthatallowsmodelingandcontrollingcodeaccelerationofamobileapplicationdeployedacrossmultipletypeofdevices.Bysegregatingthecomputationalrequirementsofthemobileapplicationintogroups,wewereabletodefinetheaccelerationneededbyeachgroupofdevices.Asthecomputationalrequirementsofadevicecanchangeacrosstime,amobiledevicecanbere-assignedtoanothergroupbasedondemand.OurSDNapproachimplementsamodelthatallowsthesystemtopredictworkloadbasedonaccelerationgroups.Evaluatingoursysteminarealtestbedshowedthatitispossibletopredictworkloadandallocateoptimalresourcestohandlethatworkloadwith87.5%ofaccuracy.

E-Android:ANewEnergyProfilingToolforSmartphones XingGao(CollegeofWIlliamandMary),DachuanLiu(CollegeofWIlliamandMary),DaipingLiu(UniversityofDelaware),HainingWang(UniversityofDelaware),AngelosStavrou(GeorgeMasonUniversity)

Smartphoneshavebecomeanindispensablepartofourdailylives.Asthelimitedbatterylifetimeremainsamajorfactorrestrictingtheapplicabilityofasmartphone,significantresearcheffortshavebeendevotedtounderstandtheenergyconsumptioninsmartphones.Existingenergymodelingmethodscanaccountenergydraininafine-grainedmannerandprovidewelldesignedhuman-batteryinterfacesforuserstocharacterizeenergyusageofeveryappinsmartphones.

64

However,inthispaper,wedemonstratethattherearestillpitfallsincurrentAndroidenergymodelingapproaches,makingAndroidvulnerabletomaliciousattacks.Inparticular,wepresentasetofnewcollateralenergyattacks,whichcandepletebatterylifebutsidestepthesupervisionofcurrentenergyaccounting.Todefendagainstcollateralenergyattacks,weproposeE-Androidtoaccuratelyprofileenergyconsumptionofasmartphoneinacomprehensivemanner.E-Androidmonitorscollateralenergyrelatedeventsandmaintainsenergyconsumptionmapsforrelevantapps.WeevaluatetheeffectivenessofE-Androidundersixdifferentcollateralenergyattacksandtwonormalscenarios,andcomparetheresultswiththoseofAndroid.WhileAndroidfailstodiscloseallcollateralenergyattacks,E-Androidcanaccuratelyprofileenergyconsumptionandrevealtheexistenceofenergymalware.OurevaluationresultsalsoshowthattheoverheadinducedbyE-Androidisminor.

LocalandLow-CostWhiteSpaceDetection AhmedSaeed(GeorgiaInstituteofTechnology),KhaledHarras(CarnegieMellonUniversity),EllenZegura(GeorgiaInstituteofTechnology),MostafaAmmar(GeorgiaInstituteofTechnology)

WhitespacesareportionsoftheTVspectrumthatareallocatedbutnotusedlocally.Ifaccuratelydetected,whitespacesofferavaluablenewopportunityforhighspeedwirelesscommunications.Weproposeanewmethodforwhitespacedetectionthatallowsanodetoactlocally,basedonacentrallyconstructedmodel,andatlowcost,whiledetectingmorespectrumopportunitiesthanbestknownapproaches.Weleveragetwoideas:first,wedemonstratethatlow-costspectrummonitoringhardwarecanoffergoodenoughdetectioncapabilities.Second,wedevelopamodelthatcombineslocallymeasuredsignalfeaturesandlocationtomoreefficientlydetectwhitespaceavailability.Weincorporatetheseideasintothedesign,implementation,andevaluationofacompletesystemwecallWaldo.WedeployWaldoonlaptopinAtlantametropolitanareaintheUScovering700km2showingthatusingsignalfeaturesinadditiontolocationcanimprovedetectionaccuracybyupto10xforsomechannels.WealsodeployWaldoonanAndroidsmartphone,demonstratingthefeasibilityofreal-timewhitespacedetectionwithefficientuseofsmartphoneresources.

GeneralAnalysisofIncentiveMechanismsforPeer-to-PeerTransmissions:AQuantumGamePerspective WeimanSun(BeijingNormalUniversity),ShenglingWang(BeijingNormalUniversity)

Thepeer-to-peertransmissionisamainstreaminchallengednetworkenvironments.Yet,thefreeriderphenomenoninpeer-topeertransmissionspressesaneedforincentivemechanismstostimulatecontributionsofdatatransmission.Asaresult,itisimperativetoanswerthequestions:whetherandtowhatextentanincentivemechanismcaninvokesuchcontributions?Toanswerthesequestions,weemployann-playercontinuousquantumgamemodeltoanalyzeextrinsicincentivemechanisms(promotingcooperativebehaviorsbyofferingrewards),andusethequantumprisoner’sdilemmamodeltoanalyzeintrinsicincentivemechanisms(encouragingreciprocalcooperationbyexploitinginternalbounds).Tothebestofourknowledge,wearethefirsttoanalyzeincentivemechanismsforpeer-to-peertransmissionsfromaquantumgameperspective.Suchaperspectiveisadoptedbecausetheextendedstrategyspaceinthequantumgamebroadenstherangeforsearchingoptimalstrategiesandtheintroductionofentanglementmakestheproposedanalyticalframeworksmorepracticalduetotheconsiderationofthepeers’relationshipsindecision-making.Ourproposedquantumgame-basedanalyticalframeworksaregenericbecausetheyarecompatiblewithclassicgame-basedschemes.Ouranalyticalresultscanprovidestraightforwardinsightsonevaluatingthepotentialofincentivemechanismsandcanserveasimportantreferencesfordesigningnewincentivemechanisms.

Research9:DistributedBigDataSystemsHigh-PerformanceandResilientKey-ValueStorewithOnlineErasureCodingforBigDataWorkloads DiptiShankar(TheOhioStateUniversity),XiaoyiLu(TheOhioStateUniversity),DhabaleswarPanda(TheOhioStateUniversity)

Distributedkey-valuestore-basedcachingsolutionsarebeingincreasinglyusedtoaccelerateBigDataapplicationsonmodernHPCclusters.Thishasnecessitatedincorporatingfaulttolerancecapabilitiesintohigh-performancekey-valuestoressuchasMemcachedthatareotherwisevolatileinnature.Inmemoryreplicationisbeingusedastheprimarymechanismtoensureresilientdataoperations.However,thisincursincreasednetworkI/Owithhighremotememoryrequirements.Ontheotherhand,erasurecodingisbeingextensivelyexploredforenablingdataresilience,whileachievingbetterstorageefficiency.Inthispaper,wefirstperformanin-depthmodeling-basedanalysisoftheperformancetrade-offsofIn-MemoryReplicationandErasureCodingschemesforkey-valuestores,andexplorethepossibilitiesofemployingOnlineErasureCodingforenablingresilienceinhigh-performancekey-valuestoresforHPCclusters.Wethendesignanon-blockingAPI-basedenginetoperformefficientSet/Getoperationsbyoverlappingtheencoding/decodinginvolvedinenablingErasureCoding-basedresiliencewiththerequest/responsephases,byleveragingRDMAonhighperformanceinterconnects.PerformanceevaluationsshowthattheproposeddesignscanoutperformsynchronousRDMA-basedreplicationbyabout2.8x,andcanimproveYCSBthroughputandaverageread/writelatenciesbyabout1.34x-2.6xoverasynchronousreplicationforlargerkey-valuepairsizes(>16KB).Wealsodemonstrateitsbenefitsbyincorporatingitintoahybridandresilientkey-valuestore-basedburst-buffersystemoverLustreforacceleratingBigDataI/OonHPCclusters.

ModelingandAnalyzingLatencyintheMemcachedsystemWenxueCheng(TsinghuaUniversity),FengyuanRen(TsinghuaUniversity),WanchunJiang(CentralSouthUniversity),TongZhang(TsinghuaUniversity)

Memcachedisawidelyusedin-memorycachingsolutioninlarge-scalesearchingscenarios.ThemostpivotalperformancemetricinMemcachedislatency,whichisaffectedbyvariousfactorsincludingtheworkloadpattern,theservicerate,theunbalancedloaddistributionandthecachemissratio.Toquantitatetheimpactofeachfactoronlatency,weestablishatheoreticalmodelfortheMemcachedsystem.Specially,weformulatetheunbalancedloaddistributionamongMemcachedserversbyasetofprobabilities,capturetheburstandconcurrentkeyarrivalsatMemcachedserversinformofbatchingblocks,andaddacachemissprocessingstage.Basedonthismodel,algebraicderivationsareconductedtoestimatelatencyinMemcached.Thelatencyestimationisvalidatedbyintensiveexperiments.Moreover,weobtainaquantitativeunderstandingofhowmuchimprovementoflatencyperformancecanbeachievedbyoptimizingeachfactorandprovideseveralusefulrecommendationstooptimallatencyinMemcached.

SpeculativeSlotReservation:EnforcingServiceIsolationforDependentData-ParallelComputations ChenChen(HKUST),WeiWang(HKUST),BoLi(HKUST)

Priorityschedulingisafundamentaltooltoprovideserviceisolationfordifferentjobsinsharedclusters.Ideally,theperformanceofahigh-priorityjobshouldnotbedraggeddownbyanotherwithalowerpriority.However,weshowinthispaperthatsimplyassigningahighpriorityprovidesnoisolationforjobswithdependentcomputations.Ajob,evenreceivingthehighestpriority,maygiveupcomputeslotstoanotherbeforeproceedingtothedownstreamcomputation,whichisbecause

65

ofbarrier,i.e.,thatthedownstreamcomputationcannotstartuntilalltheupstreamtaskshavecompleted.Suchaninterruptionofexecutioninevitablyresultsinasignificantdelay.Inthispaper,weproposespeculativeslotreservationthatjudiciouslyreservesslotsfordownstreamcomputations,soastoretainserviceisolationforhigh-priorityjobs.Tomitigatetheutilizationlossduetoslotreservation,weanalyzethetrade-offbetweenutilizationandisolation,andexposeatunableknobtonavigatethetrade-off.Wealsoproposeacomplementarystragglermitigationstrategythatusesthereservedslotstorunextracopiesofslowtasks.WehaveimplementedspeculativeslotreservationinSpark.Evaluationsbasedonbothclusterdeploymentandtrace-drivensimulationsshowthatourapproachenforcesstrictserviceisolationforhigh-priorityjobs,withoutslowingdowntheotherjobswithalowerpriority.

OptimizingShuffleinWide-AreaDataAnalytics ShuhaoLiu(UniversityofToronto),HaoWang(UniversityofToronto),BaochunLi(UniversityofToronto)

Asincreasinglylargevolumesofrawdataaregeneratedatgeographicallydistributeddatacenters,theyneedtobeefficientlyprocessedbydataanalyticjobsspanningmultipledatacentersacrosswide-areanetworks.Designedforasingledatacenter,existingdataprocessingframeworks,suchasApacheSpark,arenotabletodeliversatisfactoryperformancewhenthesewide-areaanalyticjobsareexecuted.Aswide-areanetworksinterconnectingdatacentersmaynotbecongestionfree,thereisacompellingneedforanewsystemframeworkthatisoptimizedforwide-areadataanalytics.Inthispaper,wedesignandimplementanewproactivedataaggregationframeworkbasedonApacheSpark,withafocusonoptimizingthenetworktrafficincurredinshufflestagesofdataanalyticjobs.Theobjectiveofthisframeworkistostrategicallyandproactivelyaggregatetheoutputdataofmappertaskstoasubsetofworkerdatacenters,asareplacementtoSparksoriginalpassivefetchmechanismacrossdatacenters.Itimprovestheperformanceofwide-areaanalyticjobsbyavoidingrepetitivedatatransfers,whichimprovestheutilizationofinter-datacenterlinks.OurextensiveexperimentalresultsusingstandardbenchmarksacrosssixAmazonEC2regionshaveshownthatourproposedframeworkisabletoreducejobcompletiontimesbyupto73%,ascomparedtotheexistingbaselineimplementationinSpark.

JobSchedulingwithoutPriorInformationinBigDataProcessingSystems ZhimingHu(UniversityofToronto),BaochunLi(UniversityofToronto),ZhengQin(InstituteofHighPerformanceComputing),RickSiowMongGoh(InstituteofHighPerformanceComputing)

Jobschedulingplaysanimportantroleforimprovingtheoverallsystemperformanceinbigdataprocessingframeworks.Simplejobschedulingpolicies,suchasFairandFIFOschedulingdonotconsiderjobsizes,andmaydegradetheperformancewhenjobsofvaryingsizesarrive.Moreelaboratejobschedulingpoliciesmaketheconvenientassumptionthatjobsarerecurring,andcompleteinformationabouttheirsizesisavailablefromtheirpriorruns.Inthispaper,wedesignandimplementanefficientandpracticaljobschedulerforbigdataprocessingsystemstoachievebetterperformanceevenwithoutpriorinformationaboutjobsizes.Thesuperiorperformanceofourjobscheduleroriginatesfromthedesignofamultiplelevelpriorityqueue,wherejobsaredemotedtolowerpriorityqueuesiftheamountofserviceconsumedsofarreachesacertainthreshold.Inthiscase,jobsinneedofasmallamountofservicecanfinishinthetopmostseverallevelsofqueues,whilejobsthatneedalargeamountofservicetocompletearemovedtolowerpriorityqueuestoavoidhead-of-lineblocking.Ournewjobschedulercaneffectivelymimicashortestjobfirstschedulingpolicywithoutknowingthejobsizesinadvance.Todemonstrateitsperformance,wehaveimplementedournewjobschedulerinYARN,apopularresourcemanagerusedbyHadoop/Spark,andvalidateditsperformancewithbothexperimentsonrealdatasetsandlarge-scaletrace-drivensimulations.Ourexperimentalandsimulationresultshavestronglyconfirmedtheeffectivenessofourdesign:ournewjobschedulercanreducetheaveragejobresponsetimeoftheFairschedulerbyupto45%.

DistributedLoadBalancinginKey-ValueNetworkedCachesSikderHuq(TheUniversityofIowa),ZubairShafiq(TheUniversityofIowa),SukumarGhosh(TheUniversityofIowa),AmirKhakpour(VerizonDigitalMediaServices),HarkeeratBedi(VerizonDigitalMediaServices)

Modernwebservicesrelyonanetworkofdistributedcacheserverstoefficientlydelivercontenttousers.Loadimbalanceamongcacheserverscansubstantiallydegradecontentdeliveryperformance.Duetotheskewedanddynamicnatureofreal-worldworkloads,cacheserversthatserveviralcontentexperiencehigherloadascomparedtoothercacheservers.WeproposeanoveldistributedloadbalancingprotocolcalledMeezantoaddresstheloadimbalanceamongcacheservers.Meezanreplicatespopularobjectstomitigateskewnessandadjustshashspaceboundariesinresponsetoloaddynamicsinanovelway.OurtheoreticalanalysisshowsthatMeezanachievesnearperfectloadbalancingforawiderangeofoperatingparameters.OurtracedrivensimulationsshowsthatMeezanreducesloadimbalancebyupto52%ascomparedtopriorsolutions.

Research10:DistributedAlgorithmsandTheoryICognitiveContext-awareDistributedStorageOptimizationinMobileCloudComputing:AStableMatchingbasedApproach DongHan(OaklandUniversity),YeYan(OaklandUniversity),TaoShu(AuburnUniversity),LiuqingYang(ColoradoStateUniversity),ShuguangCui(UniversityofCalifornia,Davis)

Mobilecloudstorage(MCS)isbeingextensivelyusednowadaystoprovidedataaccessservicestovariousmobileplatformssuchassmartphonesandtablets.Forcross-platformmobileapps,MCSisafoundationforsharingandaccessinguserdataaswellassupportingseamlessuserexperienceinamobilecloudcomputingenvironment.However,themobileusageofsmartphonesortabletsisquitedifferentfromlegacydesktopcomputers,inthesensethateachuserhashis/herownmobileusagepattern.Therefore,itischallengingtodesignanefficientMCSthatisoptimizedforindividualusers.Inthispaper,weinvestigateadistributedMCSsystemwhoseperformanceisoptimizedbyexploitingthefine-grainedcontextinformationofeverymobileuser.Inthisdistributedsystem,lightweightstorageserversaredeployedpervasively,suchthatdatacanbestoredclosertoitsuser.WesystematicallyoptimizethedataaccessefficiencyofsuchadistributedMCSbyexploitingthreetypesofusercontextinformation:mobilitypattern,networkcondition,anddataaccesspattern.Weproposetwooptimizationformulations:acentralizedonebasedonmixed-integerlinearprogramming(MILP),andadistributedonebasedonstablematching.Wethendevelopsolutionstobothformulations.Comprehensivesimulationsareperformedtoevaluatetheeffectivenessoftheproposedsolutionsbycomparingthemagainsttheircounterpartsundervariousnetworkandcontextconditions.

FairCachingAlgorithmsforPeerDataSharinginPervasiveEdgeComputingEnvironments YaodongHuang(StonyBrookUniversity),XintongSong(PekingUniversity),FanYe(StonyBrookUniversity),YuanyuanYang(StonyBrookUniversity),XiaomingLi(PekingUniversity)

Edgedevices(e.g.,smartphones,tablets,connectedvehicles,IoTnodes)withsensing,storageandcommunicationresourcesareincreasinglypenetratingourenvironments.Manynovelapplicationscanbecreatedwhennearbypeeredgedevicessharedata.Cachingcangreatlyimprovethedataavailability,retrieval

66

robustnessandlatency.Inthispaper,westudytheuniqueissueofcachingfairnessinedgeenvironment.Duetodistinctownershipofpeerdevices,cachingloadbalanceiscritical.Weconsiderfairnessmetricsandformulateanintegerlinearprogrammingproblem,whichisshownassummationofmultipleConnectedFacilityLocation(ConFL)problems.WeproposeanapproximationalgorithmleveraginganexistingConFLapproximationalgorithm,andprovethatitpreservesa6.55approximationratio.Wefurtherdevelopadistributedalgorithmwheredevicesexchangedatareachabilityandidentifypopulatecandidatesascachingnodes.Extensiveevaluationshowsthatcomparedwithexistingwirelessnetworkcachingalgorithms,ouralgorithmsimprovesthe75-percentilefairnessfrom22.8%to71.4%,whileachievingcontentionthuslatencysimilarasthebestexistingworks.

Latency-DrivenCooperativeTaskComputinginMulti-UserFog-RadioAccessNetworks Ai-ChunPang(NationalTaiwanUniversity),Wei-HoChung(AcademiaSinica),Te-ChuanChiu(NationalTaiwanUniversity),JunshanZhang(ArizonaStateUniversity)

Fogcomputingisemergingasonepromisingsolutiontomeettheincreasingdemandforultra-lowlatencyservicesinwirelessnetworks.Takingaforward-lookingperspective,weproposeaFog-RadioAccessNetwork(F-RAN)model,whichutilizestheexistinginfrastructure,e.g.,smallcellsandmacrobasestations,toachievetheultra-lowlatencybyjointcomputingacrossmultipleF-RANnodesandnear-rangecommunicationsattheedge.Wetreatthelowlatencydesignasanoptimizationproblem,whichcharacterizesthetradeoffbetweencommunicationandcomputingacrossmultipleF-RANnodes.SincethisproblemisNP-hard,weproposealatency-drivencooperativetaskcomputingalgorithmwithone-for-allconceptforsimultaneousselectionoftheF-RANnodestoservewithproperheterogeneousresourceallocationformulti-userservices.Consideringthelimitedheterogeneousresourcessharedamongallusers,weadvocatetheone-for-allstrategyforeveryusertakingotherssituationintoconsiderationandseekforawinwinsolution.Thenumericalresultsshowthatthelow-latencyservicescanbeachievedbyF-RANvialatency-drivencooperativetaskcomputing.

ApproximationandOnlineAlgorithmsforNFV-EnabledMulticastinginSDNs ZichuanXu(UniversityCollegeLondon),WeifaLiang(TheAustralianNationalUniversity),MeitianHuang(TheAustralianNationalUniversity),MikeJia(TheAustralianNationalUniversity),SongGuo(TheHongKongPolytechnicUniversity),AlexGalis(UniversityCollegeLondon)

Multicastingisafundamentalfunctionalityofnetworksformanyapplicationsincludingonlineconferencing,eventmonitoring,videostreaming,andsystemmonitoringindatacenters.Toensuremulticastingreliable,secureandscalable,aservicechainconsistingofnetworkfunctions(e.g.,firewalls,IntrusionDetectionSystems(IDSs),andtranscoders)usuallyisassociatedwitheachmulticastrequest.SuchamulticastrequestisreferredtoasanNFV-enabledmulticastrequest.InthispaperwestudyNFV-enabledmulticastinginaSoftware-DefinedNetwork(SDN)withtheaimstominimizetheimplementationcostofeachNFV-enabledmulticastrequestormaximizethenetworkthroughputforasequenceofNFV-enabledrequests,subjecttonetworkresourcecapacityconstraints.WefirstformulatenovelNFV-enabledmulticastingandonlineNFV-enabledmulticastingproblems.Wethendevisetheveryfirstapproximationalgorithmwithanapproximationratioof2KfortheNFV-enabledmulticastingproblemifthenumberofserversforimplementingthenetworkfunctionsofeachrequestisnomorethanaconstantK(1).WealsostudydynamicadmissionsofNFV-enabledmulticastrequestswithouttheknowledgeoffuturerequestarrivalswiththeobjectivetomaximizethenetworkthroughput,forwhichweproposeanonlinealgorithmwithacompetitiveratioofO(logn)whenK=1,wherenisthenumberofnodesinthenetwork.Wefinallyevaluatetheperformanceoftheproposedalgorithmsthroughexperimentalsimulations.Experimentalresultsdemonstratethattheproposedalgorithmsoutperformotherexistingheuristics.

DistributedAuctionsforTaskAssignmentandSchedulinginMobileCrowdsensingSystems ZhuojunDuan(GeorgiaStateUniversity),WeiLi(GeorgiaStateUniversity),ZhipengCai(GeorgiaStateUniversity)

WiththeemergenceofMobileCrowdsensingSystems(MCSs),manyauctionschemeshavebeenproposedtoincentivizemobileuserstoparticipateinsensingactivities.However,inmostoftheexistingwork,theheterogeneityofMCSshasnotbeenfullyexploited.Totacklethisissue,inthispaper,westudythejointproblemofsensingtaskassignmentandschedulingwhileconsideringpartialfulfillment,attributediversity,andpricediversity.Wefirstelaboratelymodeltheproblemasareverseauctionanddesignadistributedauctionframework.Then,basedonthisframework,weproposetwodistributedauctionschemes,costpreferredauctionscheme(CPAS)andtimeschedule-preferredauctionscheme(TPAS),whichdifferonthemethodsoftaskscheduling,winnerdetermination,andpaymentcomputation.WefurtherrigorouslyprovethatbothCPASandTPAScanachievecomputational-efficiency,individual-rationality,budgetbalance,andtruthfulness.Finally,thesimulationresultsvalidatetheeffectivenessofbothCPASandTPASintermsofsensingtasksallocationefficiency,mobileusersworkingtimeutilizationandutility,andtruthfulness.

EffectiveMobileDataTradinginSecondaryAd-hocMarketwithHeterogeneousandDynamicEnvironment HengkySusanto(HuaweiFutureNetworkTheoryLab),HonggangZhang(UniversityofMassachusettsBoston),ShingYipHo(ShareMedia),BenyuanLiu(UniversityofMassachusettsLowell)

Advancesinsmartphonetechnologiesenablemobiledatasubscriberstoreselltheirdataallowancetootherusers,creatingasecondarydatamarket.Thetradingenvironmentofthissecondarydatamarketisdynamicandad-hoc:buyersandsellersjoinandleavethemarketatalltimes,changingthetradinglandscapeconstantly.Theamountofdatademandedandofferedatanypointintimealsovary.Theseconditionsmakedeterminingafairtransactionprice,andmatchingbuyerstosellersdifficultinpractice.Priorschemesutilizeglobaldescriptionofthenetworkandmarketforcestoachievegoodperformance,buttheimplementationrequiresahighoverheadcost.Inthispaper,wepresentDataMart,adatapricingandusermatchingplatformfortradinginthisdynamic,ad-hocandheterogeneousmarketthatworksindistributedmannerwithoutneedingglobalinformation.Usinginsightsfromrealworldtraces,wedemonstrateviasimulationthatourpricingschemeisconvergingandconsistentwiththelawofdemandandsupply.Further,ourusermatchingschemeachievescomparableperformancetotheoptimalsolution.WeimplementaprototypeonAndroidplatform,andtheexperimentresultsconfirmtheeffectivenessofDataMart.

Research11:SecurityandPrivacyinDistributedSystemsIIKalis-ASystemforKnowledge-drivenAdaptableIntrusionDetectionfortheInternetofThings DanieleMidi(PurdueUniversity),AntoninoRullo(UniversityofCalabria),AnandMudgerikar(PurdueUniversity),ElisaBertino(PurdueUniversity)

Inthispaper,weintroduceKalis,aself-adapting,knowledge-drivenexpertIntrusionDetectionSystemabletodetectattacksinrealtimeacrossawiderangeofIoTsystems.KalisdoesnotrequirechangestoexistingIoTsoftware,canmonitorawidevarietyofprotocols,hasnoperformanceimpactonapplicationsonIoTdevices,andenablescollaborativesecurityscenarios.KalisisthefirstcomprehensiveapproachtointrusiondetectionforIoTthatdoesnottargetindividualprotocolsor

67

applications,andadaptsthedetectionstrategytothespecificnetworkfeatures.ExtensiveevaluationshowsthatKalisiseffectiveandefficientindetectingattackstoIoTsystems.

FuzzyExtractorsforBiometricIdentification NanLi(CSIRO),FuchunGuo(UniversityofWollongong),YiMu(UniversityofWollongong),WillySusilo(UniversityofWollongong),SuryaNepal(CSIRO)

Fuzzyextractorprovideskeygenerationfrombiometricsandothernoisydata.Thegeneratedkeyisseamlesslyusableforanycryptographicapplicationsbecauseitsinformationentropyissufficientforsecurity.Biometricauthenticationoffersnaturalandpasswordlessuserauthenticationinvarioussystemswherefuzzyextractorscanbeusedforbiometricinformationsecurity.Typically,abiometricsystemoperatesintwomodes:verificationandidentification.However,existingfuzzyextractorsdoesnotsupportefficientuseridentification.Inthispaper,weproposeasuccinctfuzzyextractorschemewhichenablesefficientbiometricidentificationaswellasverificationanditsatisfiessecurityrequirements.Weshowthattheproposedschemecanbeeasilyusedinbothverificationandidentificationmodes.Tothebestofourknowledge,weproposethefirstfuzzyextractorbasedbiometricidentificationprotocol.Theproposedprotocolisabletoidentifyauserwithconstantcomputationalcostratherthanlinear-timecomputationbyusingotherfuzzyextractorschemes.Biometricinformationsecurityisanimportantconcernofusingbiometricsystems,sothatwealsoprovidesecurityanalysisofproposedschemestoshowtheirsecurityboundaries.Theimplementationshowsthattheperformanceofproposedidentificationprotocolisconstantandclosetothatofverificationprotocols.

SmartphonePrivacyLeakageofSocialRelationshipsandDemographicsfromSurroundingAccessPoints ChenWang(StevensInstituteofTechnology),ChuyuWang(StevensInstituteofTechnology),YingyingChen(StevensInstituteofTechnology),LeiXie(NanjingUniversity),SangluLu(NanjingUniversity)

WhilethemobileusersenjoytheanytimeanywhereInternetaccessbyconnectingtheirmobiledevicesthroughWi-Fiservices,theincreasingdeploymentofaccesspoints(APs)haveraisedanumberofprivacyconcerns.ThispaperexploresthepotentialofsmartphoneprivacyleakagecausedbysurroundingAPs.Inparticular,westudytowhatextenttheuserspersonalinformationsuchassocialrelationshipsanddemographicscouldberevealedleveragingsimplesignalinformationfromAPswithoutexaminingtheWi-Fitraffic.OurapproachutilizesusersactivitiesatdailyvisitedplacesderivedfromthesurroundingAPstoinferuserssocialinteractionsandindividualbehaviors.Furthermore,wedeveloptwonewmechanisms:theCloseness-basedSocialRelationshipsInferencealgorithmcaptureshowcloselypeopleinteractwitheachotherbyevaluatingtheirphysicalclosenessandderivesfine-grainedsocialrelationships,whereastheBehavior-basedDemographicsInferencemethoddifferentiatesvariousindividualbehaviorsviatheextractedactivityfeatures(e.g.,activenessandtimeslots)ateachdailyplacetorevealusersdemographics.Extensiveexperimentsconductedwith21participantsrealdailylifeincluding257differentplacesinthreecitiesovera6-monthperioddemonstratethatthesimplesignalinformationfromsurroundingAPshaveahighpotentialtorevealpeoplessocialrelationshipsandinferdemographicswithanover90%accuracywhenusingourapproach.

EV-Matching:BridgingLargeVisualDataandElectronicDataforEfficientSurveillanceGangLi(TheOhioStateUniversity),FanYang(TheOhioStateUniversity),GuoxingChen(TheOhioStateUniversity),QiangZhai(TheOhioStateUniversity),XinfengLi(TheOhioStateUniversity),JinTeng(TheOhioStateUniversity),JundaZhu(UniversityofMacau),DongXuan(TheOhioStateUniversity),BiaoChen(UniversityofMacau),WeiZhao(UniversityofMacau)

Visual(V)surveillancesystemsareextensivelydeployedandbecomingthelargestsourceofbigdata.Ontheotherhand,electronic(E)dataalsoplaysanimportantroleinsurveillanceanditsamountincreasesexplosivelywiththeubiquityofmobiledevices.Oneofthemajorproblemsinsurveillanceistodeterminehumanobjectsidentitiesamongdifferentsurveillancescenes.TraditionalwayofprocessingbigVandEdatasetsseparatelydoesnotservethepurposewellbecauseVdataandEdataareimperfectaloneforinformationgatheringandretrieval.Matchinghumanobjectsinthetwodatasetscanmergethegoodofthetwoforefficientlarge-scalesurveillance.Yetsuchmatchingacrosstwoheterogeneousbigdatasetsischallenging.Inthispaper,weproposeanefficientsetofparallelalgorithms,calledEV-Matching,tobridgebigEandVdata.WematchEandVdatabasedontheirspatiotemporalcorrelation.TheEV-MatchingalgorithmsareimplementedonApacheSparktofurtheracceleratethewholeprocedure.Weconductextensiveexperimentsonalargesyntheticdatasetunderdifferentsettings.Resultsdemonstratesthefeasibilityandefficiencyofourproposedalgorithms.

AdaptiveReconnaissanceAttackswithNear-OptimalParallelBatching XiangLi(UniversityofFlorida),JohnathanSmith(UniversityofFlorida),MyThai(UniversityofFlorida)

Inassessingprivacyononlinesocialnetworks,itisimportanttoinvestigatetheirvulnerabilitytoreconnaissancestrategies,inwhichattackersluretargetsintobeingtheirfriendsbyexploitingthesocialgraphinordertoextractvictimssensitiveinformation.Asthenetworktopologyisonlypartiallyrevealedaftereachsuccessfulfriendrequest,attackersneedtoemployanadaptivestrategy.Existingworkonlyconsideredasimplestrategyinwhichattackerssequentiallyacquireonefriendatatime,whichcausestremendousdelayinwaitingforresponsesbeforesendingthenextrequest,andwhichlacktheabilitytoretryfailedrequestsafterthenetworkhaschanged.Incontrast,weinvestigateanadaptiveandparallelstrategy,ofwhichattackerscansimultaneouslysendmultiplefriendrequestsinbatchandrecoverfromfailedrequestsbyretryingaftertopologychanges,therebysignificantlyreducingthetimeofreachingthetargetsandimprovingrobustness.Wecastthisapproachasanoptimizationproblem,Max-Crawling,andshowitinapproximablewithin(1_1/e+).WefirstdesignourcorealgorithmPM-AReSTwhichhasanapproximationratioof(1_e(1/e_1))usingadaptivemonotonicsubmodularproperties.Wenextprovideanear-optimalsolution((1_1/e))viaatwostagestochasticprogrammingapproach.Wefurtherestablishthegapboundof(1_e_(1_1/e)2)betweenbatchstrategiesversustheoptimalsequentialone.Weexperimentallyvalidateourtheoreticalresults,findingthatouralgorithmperformsnearoptimallyinpracticeandthatthisisrobustunderavarietyofproblemsettings.

AchievingStrongPrivacyinOnlineSurvey YouZhou(UniversityofFlorida),YianZhou(UniversityofFlorida),ShigangChen(UniversityofFlorida),SamuelS.Wu(UniversityofFlorida)

ThankstotheproliferationofInternetaccessandmoderndigitalandmobiledevices,onlinesurveyhasbeenflourishingintodatacollectionofmarketing,social,financialandmedicalstudies.However,traditionaldatacollectionmethodsinonlinesurveysufferfromseriousprivacyissues.Existingprivacyprotectiontechniquesarenotadequateforonlinesurveyforlackofstrongprivacy.Inthispaper,weproposeapracticalstrongprivacyonlinesurveyschemeSPSbasedonanoveldatacollectiontechniquecalleddualmatrixmasking(DM2),whichguaranteesthecorrectnessofthetallyingresultswithlowcomputationoverhead,andachievesuniversalverifiability,robustnessandstrongprivacy.WealsoproposeamorerobustschemeRSPS,whichincorporatesmultipledistributedsurveymanagers.The

68

RSPSschemepreservesthenicepropertiesofSPS,andfurtherachievesrobuststrongprivacyagainstjointcollusionattack.Throughextensiveanalyses,wedemonstrateourproposedschemescanbeefficientlyappliedtoonlinesurveywithaccuracyandstrongprivacy.

Research12:CloudComputingandDistributedDataAnalyticsServiceOverlayForestEmbeddingforSoftware-DefinedCloudNetworks Jian-JhihKuo(AcademiaSinica),Shan-HsiangShen(NationalTaiwanUniversityofScienceandTechnology),Ming-HongYang(UniversityofMinnesota),De-NianYang(AcademiaSinica),Ming-JerTsai(NationalTsingHuaUniversity),Wen-TsuenChen(AcademiaSinica)

NetworkFunctionVirtualization(NFV)onSoftwareDefinedNetworks(SDN)caneffectivelyoptimizetheallocationofVirtualNetworkFunctions(VNFs)andtheroutingofnetworkflowssimultaneously.Nevertheless,mostpreviousstudiesonNFVfocusonunicastservicechainsandtherebyarenotscalabletosupportalargenumberofdestinationsinmulticast.Ontheotherhand,theallocationofVNFshasnotbeensupportedinthecurrentSDNmulticastroutingalgorithms.Inthispaper,therefore,wemakethefirstattempttotackleanewchallengingproblemforfindingaserviceforestwithmultipleservicetrees,whereeachtreecontainsmultipleVNFsrequiredbyeachdestination.Specifically,weformulateanewoptimization,namedServiceOverlayForest(SOF),tominimizethetotalcostofallallocatedVNFsandallmulticasttreesintheforest.Wedesignanew3_ST-approximationalgorithmtosolvetheproblem,where_STdenotesthebestapproximationratiooftheSteinerTreeproblem,andthedistributedimplementationofthealgorithmisalsopresented.Simulationresultsonrealnetworksfordatacentersmanifestthattheproposedalgorithmoutperformstheexistingonesbyover25%.Moreover,theimplementationofanexperimentalSDNwithHPOpenFlowswitchesindicatesthatSOFcansignificantlyimprovetheQoEoftheYoutubeservice.

JointOptimizationofChainPlacementandRequestSchedulingforNetworkFunctionVirtualization QixiaZhang(HuazhongUniversityofScience&Technology),YikaiXiao(HuazhongUniversityofScience&Technology),FangmingLiu(HuazhongUniversityofScienceandTechnology),JohnChiShingLui(ChineseUniversityofHongKong),JianGuo(HuazhongUniversityofScience&Technology),TaoWang(HuazhongUniversityofScience&Technology)

ComparedwithexecutingNetworkFunctions(NFs)ondedicatedhardwares,therecenttrendofNetworkFunctionVirtualization(NFV)holdsthepromiseforoperatorstoflexiblydeploysoftware-basedNFsoncommodityservers.However,virtualNFs(VNFs)arenormallychainedtogethertoprovideaspecificnetworkservice.Thus,anefficientschemeisneededtoplacetheVNFchainsacrossthenetworkandeffectivelyschedulerequeststoserviceinstances,whichcanmaximizetheaverageresourceutilizationofeachnodeinserviceandsimultaneouslyminimizetheaverageresponselatencyofeachrequest.Tothisend,weformulatefirstVNFchainsplacementproblemasavariantofbin-packingproblem,whichisNP-hard,andwemodelrequestschedulingproblembasedonthekeyconceptsfromopenJacksonnetwork.TojointlyoptimizetheperformanceofNFV,weproposeapriority-drivenweightedalgorithmtoimproveresourceutilizationandaheuristicalgorithmtoreduceresponselatency.Throughextensivetrace-drivensimulations,weshowthatourmethodscanindeedenhanceperformanceindiversescenarios.Inparticular,wecanimprovetheaverageresourceutilizationby24.9%andcanreducetheaveragetotallatencyby19.9%ascomparedwithotherstate-of-the-artmethods.

BIGCacheAbstractionforCacheNetworks EmanRamadan(UniversityofMinnesota),ArvindNarayanan(UniversityofMinnesota),Zhi-LiZhang(UniversityofMinnesota),RunhuiLi(HuaweiFutureNetworkTheoryLab),GongZhang(HuaweiFutureNetworkTheoryLab)

Inthispaper,weadvocatethenotionofBIGcacheasaninnovativeabstractionforeffectivelyutilizingthedistributedstorageandprocessingcapacitiesofallserversinacachenetwork.TheBIGcacheabstractionisproposedtopartlyaddresstheproblemof(cascade)thrashinginahierarchicalnetworkofcacheservers,whereithasbeenknownthatcacheresourcesatintermediateserversarepoorlyutilized,especiallyunderclassicalcachereplacementpoliciessuchasLRU.WelayouttheadvantagesofBIGcacheabstractionandmakeastrongcasebothfromatheoreticalstandpointaswellasthroughsimulationanalysis.WealsodevelopthedCLIMBcachealgorithmtominimizetheoverheadsofmovingobjectsacrossdistributedcacheboundariesandpresentasimpleyeteffectiveheuristicforaddressingthecacheallotmentprobleminthedesignofBIGcacheabstraction.

DistributedQRdecompositionframeworkfortrainingSupportVectorMachines JyotikrishnaDass(TexasA&MUniversity),V.N.S.PrithviSakuru(TexasA&MUniversity),VivekSarin(TexasA&MUniversity),RabiN.Mahapatra(TexasA&MUniversity)

SupportVectorMachines(SVM)belongtoclassofsupervisedmachinelearningalgorithmswithapplicationsinclassificationandregressionanalysis.SVMtrainingismodeledasaconvexoptimizationproblemthatiscomputationallytediousandhaslargememoryrequirements.Specifically,itisaquadraticprogrammingproblemwhichscalesrapidlywiththetrainingsetsizeratherthanthedimensionalityofthefeaturespace.Inthiswork,wefirstpresentanovelQRdecompositionframework(QRSVM)toefficientlymodelandsolvealargescaleSVMproblembycapitalizingonlow-rankrepresentationsofthefullkernelmatrixratherthansolvingtheproblemasasequenceofsmallersub-problems.Thelow-rankstructureofthekernelmatrixisleveragedtotransformthedensematrixintoonewithasparseandseparablestructure.ThemodifiedSVMproblemrequiressignificantlylessermemoryandcomputation.Ourapproachscaleslinearlywiththetrainingsetsizewhichmakesitapplicabletolargedatasets.Thismotivatestowardsouranothercontribution;exploringadistributedQRSVMframeworktosolvelarge-scaleSVMclassificationproblemsinparallelacrossaclusterofcomputingnodes.Wealsoderiveanoptimalstepsizeforfastconvergenceofthedualascentmethodwhichisusedtosolvethequadraticprogrammingproblem.

DistributivelyComputingRandomWalkBetweennessCentralityinLinearTime Qiang-ShengHua(HuazhongUniversityofScienceandTechnology),MingAi(HuazhongUniversityofScienceandTechnology),HaiJin(HuazhongUniversityofScienceandTechnology),DongxiaoYu(HuazhongUniversityofScienceandTechnology),XuanhuaShi(HuazhongUniversityofScienceandTechnology)

Betweennesscentralityofanoderepresentsitsinfluenceoverthespreadofinformationinthenetwork.Itisnormallydefinedastheratioofthenumberofshortestpathspassingthroughthenodeamongallshortestpaths.However,thespreadofinformationmaynotjustpassthroughtheshortestpathswhichiscapturedbyanewmeasureofbetweennesscentralitybasedonrandomwalks[1].Therandomwalkbetweennesscentralityofanodemeanshowoftenitistraversedbyarandomwalkbetweenallpairsofothernodes.Inthispaper,weproposeanO(nlogn)timedistributedrandomizedapproximationalgorithmforcalculatingeachnodesrandomwalkbetweennesscentralitywithanapproximationratio(1_)wherenisthenumberofnodesandisanarbitrarilysmallconstantbetween0and1.OurdistributedalgorithmisdesignedunderthewidelyusedCONGESTmodel,whereeachedgecanonlytransferO(logn)bitsineachround.Toourbest

69

knowledge,thisisthefirstdistributedalgorithmforcomputingtherandomwalkbetweennesscentrality.Moreover,wegiveanon-triviallowerboundfordistributivelycomputingtheexactrandomwalkbetweennesscentralityundertheCONGESTmodel,whichis(nlogn+D)whereDisthenetworkdiameter.Thismeansexactlycomputingrandomwalkbetweennesscannotbedoneinsublineartime.

DeGPar:LargeScaleTopicDetectionusingNode-CutPartitioningonDenseWeightedGraphs KambizGhoorchian(RoyalInstituteofTechnology(KTH)),SarunasGirdzijauskas(RoyalInstituteofTechnology(KTH)),FatemehRahimian(SwedishInstituteofComputerScience(SICS))

TopicDetection(TD)referstoautomatictechniquesforlocatingtopicallyrelatedmaterialinwebdocuments[1].Nowadays,massiveamountsofdocumentsaregeneratedbyusersofOnlineSocialNetworks(OSNs),informofveryshorttext,tweetsandsnippetsofnews.Whiletopicdetection,initstraditionalform,isappliedtoafewdocumentscontainingalotofinformation,theproblemhasnowchangedtodealingwithmassivenumberofdocumentswithverylittleinformation.Thetraditionalsolutions,thus,fallshorteitherinscalability(duetohugenumberofinputitems)orsparsity(duetoinsufficientinformationperinputitem).InthispaperweaddressthescalabilityproblembyintroducinganefficientandscalablegraphbasedalgorithmforTDonshorttexts,leveragingdimensionalityreductionandclusteringtechniques.Wefirst,compresstheinputsetofdocumentsintoadensegraph,suchthatfrequentcooccurrencepatternsinthedocumentscreatemultipledensetopologicalareasinthegraph.Then,wepartitionthegraphintomultipledensesub-graphs,eachrepresentingatopic.Wecomparetheaccuracyandscalabilityofoursolutionwithtwostate-of-the-artsolutions(includingthestandardLDA,andBiTerm).Theresultsontwowidelyusedbenchmarkdatasetsshowthatouralgorithmnotonlymaintainsasimilarorbetteraccuracy,butalsoperformsbyanorderofmagnitudefasterthanthestate-of-the-artapproaches.

Research13:DistributedAlgorithmsandTheoryIINetworkedStochasticMulti-ArmedBanditswithCombinatorialStrategies ShaojieTang(UniversityofTexasatDallas),YaqinZhou(SUTD),KaiHan(UniversityofScienceandTechnologyofChina),ZhaoZhang(ZhejiangNormalUniversity),JingYuan(UniversityofTexasatDallas),WeiliWu(UniversityofTexasatDallas)

Inthispaper,weinvestigatealargelyextendedversionofclassicalMABproblem,callednetworkedcombinatorialbanditproblems.Inparticular,weconsiderthesettingofadecisionmakeroveranetworkedbanditsasfollows:eachtimeacombinatorialstrategy,e.g.,agroupofarms,ischosen,andthedecisionmakerreceivesarewardresultingfromherstrategyandalsoreceivesasidebonusresultingfromthatstrategyforeacharmsneighbor.Thisismotivatedbymanyrealapplicationssuchason-linesocialnetworkswherefriendscanprovidetheirfeedbackonsharedcontent,thereforeifwepromoteaproducttoauser,wecanalsocollectfeedbackfromherfriendsonthatproduct.Tothisend,weconsidertwotypesofsidebonusinthisstudy:sideobservationandsidereward.Uponthenumberofarmspulledateachtimeslot,westudytwocases:single-playandcombinatorial-play.Consequently,thisleavesusfourscenariostoinvestigateinthepresenceofsidebonus:Single-playwithSideObservation,Combinatorial-playwithSideObservation,Single-playwithSideReward,andCombinatorial-playwithSideReward.Foreachcase,wepresentandanalyzeaseriesofzeroregretpoliceswheretheexpectofregretovertimeapproacheszeroastimegoestoinfinity.Extensivesimulationsvalidatetheeffectivenessofourresults.

ComputabilityofPerpetualExplorationinHighlyDynamicRings MarjorieBournat(UPMCSorbonneUniversités),SwanDubois(UPMCSorbonneUniversités),FranckPetit(UPMCSorbonneUniversités)

Weconsidersystemsmadeofautonomousmobilerobotsevolvinginhighlydynamicdiscreteenvironmenti.e.,graphswhereedgesmayappearanddisappearunpredictablywithoutanyrecurrence,stability,norperiodicityassumption.Robotsareuniform(theyexecutethesamealgorithm),theyareanonymous(theyaredevoidofanyobservableID),theyhavenomeansallowingthemtocommunicatetogether,theysharenocommonsenseofdirection,andtheyhavenoglobalknowledgerelatedtothesizeoftheenvironment.However,eachofthemisendowedwithpersistentmemoryandisabletodetectwhetheritstandsaloneatitscurrentlocation.Ahighlydynamicenvironmentismodeledbyagraphsuchthatitstopologykeepscontinuouslychangingovertime.Inthispaper,weconsideronlydynamicgraphsinwhichnodesareanonymous,eachofthemisinfinitelyoftenreachablefromanyotherone,andsuchthatitsunderlyinggraph(i.e.,thestaticgraphmadeofthesamesetofnodesandthatincludesalledgesthatarepresentatleastonceovertime)formsaringofarbitrarysize.Inthiscontext,weconsiderthefundamentalproblemofperpetualexploration:eachnodeisrequiredtobeinfinitelyoftenvisitedbyarobot.Thispaperanalyzesthecomputabilityofthisproblemin(fully)synchronoussettings,i.e.,westudythedeterministicsolvabilityoftheproblemwithrespecttothenumberofrobots.Weprovidethreealgorithmsandtwoimpossibilityresultsthatcharacterize,foranyringsize,thenecessaryandsufficientnumberofrobotstoperformperpetualexplorationofhighlydynamicrings.

LocallySelf-AdjustingSkipGraphs SikderHuq(TheUniversityofIowa),SukumarGhosh(TheUniversityofIowa)

Wepresentadistributedself-adjustingalgorithmforskipgraphsthatminimizestheaverageroutingcostsbetweenarbitrarycommunicationpairsbyperformingtopologicaladaptationtothecommunicationpattern.Ouralgorithmisfullydecentralized,conformstotheCONGESTmodel(i.e.O(logn)bitmessages),andrequiresO(logn)bitsofmemoryforeachnode,wherenisthetotalnumberofnodes.Uponeachcommunicationrequest,ouralgorithmfirstestablishescommunicationbyusingthestandardskipgraphrouting,andthenlocallyandpartiallyreconstructstheskipgraphtopologytoperformtopologicaladaptation.Weproposeacomputationalmodelforsuchalgorithms,aswellasayardstick(workingsetproperty)toevaluatethem.Ourworkingsetpropertycanalsobeusedtoevaluateself-adjustingalgorithmsforothergraphclasseswheremultipletree-likesubgraphsoverlap(e.g.hypercubenetworks).Wederivealowerboundoftheamortizedroutingcostforanyalgorithmthatfollowsourmodelandservesanunknownsequenceofcommunicationrequests.Weshowthattheroutingcostofouralgorithmisatmostaconstantfactormorethantheamortizedroutingcostofanyalgorithmconformingtoourcomputationalmodel.Wealsoshowthattheexpectedtransformationcostforouralgorithmisatmostalogarithmicfactormorethantheamortizedroutingcostofanyalgorithmconformingtoourcomputationalmodel.

OnlinetoOfflineBusiness:UrbanTaxiDispatchingwithPassenger-DriverMatchingStability HuanyangZheng(TempleUniversity),JieWu(TempleUniversity)

IntheOnlinetoOffline(O2O)taxibusiness(e.g.,Uber),theinterestsofpassengers,taxidrivers,andthecompanymaynotalignwitheachother,sincetaxisdonotbelongtothecompany.Tobalancethoseinterests,thispaperstudiesthetaxidispatchproblemfortheO2Otaxibusiness.Theinterestsofpassengersandtaxidriversaremodeled.Fornon-sharingtaxidispatches(multiplepassengerrequestscannotshareataxi),astablemarriageapproachisproposed.Itcandealwithunequalnumbersofpassengerrequestsandtaxisthroughmatchingthemtodummypartners.Theexistenceofstablematchingswithdummypartnersisproved.

70

Threerulesarepresentedtofindoutallpossiblestablematchings.Forsharingtaxidispatches(multiplepassengerrequestscouldshareataxi),passengerrequestsarepackedthroughsolvingamaximumsetpackingproblem.Packedpassengerrequestsareregardedasasinglerequestformatchingtaxis.Extensiverealdata-drivenexperimentsdemonstratetheperformanceofourapproach.Theproposedalgorithmshavealimitedperformancegaptotheliteratureintermsofthedispatchdelayandthepassengersatisfactory,butsignificantlyimprovestheexistingalgorithmsintermsofthetaxisatisfactory.IndexTermsTaxidispatchschedule,passengerrequests,taxidrivers,matchingstability,sharingandnon-sharing.

AnOptimizationFrameworkForOnlineRide-sharingMarkets YongzhengJia(TsinghuaUniversity),WeiXu(TsinghuaUniversity),XueLiu(McGillUniversity)

Taxiservicesandproductdeliveryservicesareinstrumentalforourmodernsociety.Thankstotheemergenceofsharingeconomy,ride-sharingservicessuchasUber,Didi,LyftandGooglesWazeRiderarebecomingmoreubiquitousandgrowintoanintegralpartofoureverydaylives.However,theefficiencyoftheseservicesareseverelylimitedbythesub-optimalandimbalancedmatchingbetweenthesupplyanddemand.Weneedageneralizedframeworkandcorrespondingefficientalgorithmstoaddresstheefficientmatching,andhenceoptimizetheperformanceofthesemarkets.Existingstudiesfortaxianddeliveryservicesareonlyapplicableinscenariosoftheone-sidedmarket.Incontrast,thisworkinvestigatesahighlygeneralizedmodelforthetaxianddeliveryservicesinthemarketeconomy(abbreviatedastaxianddeliverymarket)thatcanbewidelyusedintwo-sidedmarkets.Further,wepresentefficientonlineandofflinealgorithmsfordifferentapplications.Weverifyouralgorithmwiththeoreticalanalysisandtrace-drivensimulationsunderrealisticsettings.

FastandAccurateTrackingofPopulationDynamicsinRFIDSystems MuhammadShahzad(NorthCarolinaStateUniversity),AlexLiu(MichiganStateUniversity)

RFIDsystemshavebeenwidelydeployedforvariousapplicationssuchassupplychainmanagement,indoorlocalization,inventorycontrol,andaccesscontrol.ThispaperdealswiththefundamentalproblemofestimatingthenumberofarrivinganddepartingtagsbetweenanytwotimeinstantsindynamicallychangingRFIDtagpopulations,whichisneededinmanyapplicationssuchaswarehousemonitoringandprivacysensitiveRFIDsystems.Inthispaper,weproposeadynamictagestimationscheme,namelyDTE,thatcanachievearbitrarilyhighrequiredreliability,iscompliantwiththeC1G2standard,andworksinsingleaswellasmultiple-readerenvironment.DTEusesthestandardizedframeslottedAlohaprotocolandutilizesthenumberofslotsthatchangetheirvaluesincorrespondingAlohaframesatthetwotimeinstantstoestimatethenumberofarrivinganddepartingtags.Itiseasytodeploybecauseitneitherrequiresmodificationtotagsnortothecommunicationprotocolbetweentagsandreaders.WehaveextensivelyevaluatedandcomparedDTEwiththeonlypriorscheme,ZDE,thatcanestimatethenumberofarrivinganddepartingtags.Unfortunately,ZDEcannotachievearbitrarilyhighrequiredreliability.Incontrast,ourproposedschemealwaysachievestherequiredreliability.Forexample,foratagpopulationcontaining104tags,arequiredreliabilityof95%,andarequiredconfidenceintervalof5%,DTEtakes5.12secondstoachievetherequiredreliabilitywhereasZDEachievesareliabilityofonly66%inthesameamountoftime.

Research14:MobileandWirelessComputingSystemsIIRobustIndoorWirelessLocalizationUsingSparseRecovery WeiGong(SimonFraserUniversity),JiangchuanLiu(SimonFraserUniversity)

Withthemulti-antennadesignofWiFiinterfaces,phasedarrayhasbecomeapromisingmechanismforaccurateWiFilocalization.State-of-the-artWiFi-basedsolutionsusingAoA(Angle-of-Arrival),however,faceanumberofcriticalchallenges.First,theirlocalizationaccuracydegradesdramaticallywhentheSignal-to-NoiseRatio(SNR)becomeslow.Second,theydonotfullyutilizecoherentprocessingacrossallavailabledomains.Inthispaper,wepresentROArray,aRObustArraybasedsystemthataccuratelylocalizesatargetevenwithlowSNRs.First,inthespatialdomain,ROArraycanproducesharpAoAspectrumsbyparameterizingthesteeringvectorbasedonasparsegrid.Then,toexpandintothefrequencydomain,itjointlyestimatestheToAs(Time-of-Arrival)andAoAsofallthepathsusingmulti-subcarrierOFDMmeasurements.Furthermore,throughmulti-packetfusion,ROArrayisenabledtoperformcoherentestimationacrossthespatial,frequency,andtimedomains.Suchcoherentprocessingnotonlyincreasesthevirtualaperturesize,whichenlargesthenumberofmaximumresolvablepaths,butalsoimprovesthesystemrobustnesstonoises.Ourimplementationusingoff-the-shelfWiFicardsdemonstratesthat,withlowSNRs,ROArraysignificantlyoutperformsstate-ofthe-artsolutionsinlocalizationaccuracy;whenmediumorhighSNRsarepresent,itachievescomparableaccuracy.

Max-MinFairResourceAllocationinHetNets:DistributedAlgorithmsandHybridArchitecture EhsanAryafar(PortlandStateUniversity),AlirezaKeshavarz-Haddad(ShirazUniversity),CarleeJoe-Wong(CarnegieMellonUniversity),MungChiang(PrincetonUniversity)

WestudytheresourceallocationprobleminRANlevelintegratedHetNets.ThisemergingHetNetsparadigmallowsfordynamictrafficsplittingacrossradioaccesstechnologiesforeachclient,andthenforaggregatingthetrafficinsidethenetworktoimprovetheoverallresourceutilization.Wefocusonthemaxminfairservicerateallocationacrosstheclients,andstudythepropertiesoftheoptimalsolution.Basedontheanalysis,wedesignalowcomplexitydistributedalgorithmthattriestoachievemax-minfairness.Wealsodesignahybridnetworkarchitecturethatleveragesopportunisticcentralizednetworksupervisiontoaugmentthedistributedsolution.Weanalyzetheperformanceofourproposedalgorithmsandprovetheirconvergence.Wealsoderiveconditionsunderwhichtheoutcomeisoptimal.Whentheconditionsarenotsatisfied,weprovideconstantupperandlowerboundsontheoptimalitygap.Finally,westudytheconvergencetimeofourdistributedsolutionandshowthatleveragingappropriatepoliciesinitsdesignsignificantlyreducestheconvergencetime.

OptimizationofFull-ViewBarrierCoveragewithRotatableCameraSensors XiaofengGao(ShanghaiJiaoTongUniversity),RuiYang(UniversityofIllinoisUrbana-Champaign),FanWu(ShanghaiJiaoTongUniversity),GuihaiChen(ShanghaiJiaoTongUniversity),JingguangZhou(ShanghaiJiaoTongUniversity)

Inalltheresearchesinwirelesssensornetworks,camerasareincreasinglyutilizedfortheirsurveillancecapabilities.Inthispaper,weelaboratelydiscussabouttheproblemofFull-ViewBarrierCoveragewithRotatableCameraSensors(FBR),includingweaklyandstronglyconnectedversions.FBRisproventobeNP-hardinthispaperbyreducingGroupSteinerTreeproblemtoit.Ourgoalistoreducesensornumberwhenguaranteeingthesurveillancecapabilitiesatthesametime.Correspondingly,weintroduceanovelweighedgraphstructurecalledFull-ViewBarrierGraph.Wetransformweakversionproblemintoapseudoone-dimensiononeandproposeWGraProjalgorithmwiththehelpofdynamicprogramming;instrongversionproblem,weintroducetwocentralizedalgorithms(S-Dijkstra,S-Thorup),respectivelyaimingtosavesensornumberandtoreducetimecomplexity.Moreover,werigorouslyanalyzethecorrectnessandtimecomplexityforeachalgorithm.Inaddition,themassnumberofexperimentsareconductedtovalidatetheefficiencyofallalgorithms,whichprovethatourstructuresandalgorithmscanconstructafull-viewbarrierwithfewercamerasensorscomparedwithpreviousresearches.

71

CommunicationthroughSymbolSilence:TowardsFreeControlMessagesinIndoorWLANs BingFeng(UniversityofScienceandTechnologyofChina),JianqingLiu(UniversityofFlorida),ChiZhang(UniversityofScienceandTechnologyofChina),YuguangFang(UniversityofFlorida)

Efficientdesignofwirelessnetworksbenefitsfromtheexchangeofcontrolmessages.However,controlmessageitselfconsumesscarcechannelresources.Inthispaper,weproposeCoS(CommunicationthroughsymbolSilence),anovelcommunicationstrategythatconveyscontrolmessagesforfreewithoutconsumingextrachannelresources.CoSinsertssilencesymbolsindatapacketsandleveragestheintervalsbetweeninsertedsilencesymbolstoencodeinformation.Thesilencesymbolscanbelocatedbyenergydetectionatthegranularityofsymbolsandtheintervalsareinterpretedintotransmittedcontrolmessages.Basedonourkeyinsightsthatthechannelcodeisunder-utilizedincurrentwirelessnetworksandthedistributionofsymbolerrorswithinadatapacketispredictableinindoorwirelesstransmissions,thesymbolserasedbysilencesymbolsarerecoveredbythecodingredundancythatisoriginallyusedtocorrectsymbolerrors.Arateadaptationschemeisdesignedtodynamicallyadjusttherateoffreecontrolmessagesaccordingtochannelconditionssothatthetransmissionoffreecontrolmessagesdoesnotharmtheoriginaldatathroughput.WeimplementCoSonoursoftwaredefinedradioplatformtovalidatethefeasibilityofCoS.Theextensiveresultsshowthatthecontrolmessagesaredeliveredwithcloseto100%accuracyinalargeSNRrange.Inaddition,wemeasuretheachievablecapacityoffreecontrolmessagesinvariouschannelconditions.

Secureconnectivityofwirelesssensornetworksunderkeypredistributionwithon/offchannels JunZhao(CarnegieMellonUniversity)

Theq-compositekeypredistributionscheme[1]isusedprevalentlyforsecurecommunicationsinlarge-scalewirelesssensornetworks(WSNs).Priorwork[2][4]exploressecureconnectivityinWSNsemployingtheq-compositeschemeforq=1withunreliablecommunicationlinksmodeledasindependenton/offchannels.Inthispaper,weinvestigatesecureconnectivityinWSNsoperatingundertheq-compositeschemeforgeneralqandundertheon/offchannelmodel.Wepresentconditionsonhowtoscalethemodelparameterssothatthenetworkissecurelyconnectedwithhighprobabilitywhenthenumberofsensorsbecomeslarge.Theresultsaregivenintheformofzero-onelaws.Numericalexperimentsconfirmthevalidityofouranalyticalresults.

iUpdater:LowCostRSSFingerprintsUpdatingforDevice-freeLocalization LiqiongChang(NorthwestUniversity),JieXiong(SingaporeManagementUniversity),YuWang(UniversityofNorthCarolinaatCharlotte),XiaojiangChen(NorthwestUniversity),JunhaoHu(NorthwestUniversity),FangDingyi(NorthwestUniversity)

Whilemostexistingindoorlocalizationtechniquesaredevice-based,manyemergingapplicationssuchasintruderdetectionandelderlycaredrivetheneedsofdevice-freelocalization,inwhichthetargetcanbelocalizedwithoutanydeviceattached.Amongthediversetechniques,receivedsignalstrength(RSS)fingerprint-basedmethodsarepopularbecauseofthewideavailabilityofRSSreadingsinmostcommodityhardware.However,currentfingerprint-basedsystemssufferfromhighhumanlaborcosttoupdatesofthefingerprintdatabaseandlowaccuracyduetolargedegreeofRSSvariations.Inthispaper,weproposeafingerprint-baseddevice-freelocalizationsystemnamediUpdatertosignificantlyreducethelaborcostandincreasetheaccuracy.Wepresentanovelselfaugmentedregularizedsingularvaluedecomposition(RSVD)methodintegratingthesparseattributewithuniquepropertiesofthefingerprintdatabase.iUpdaterisabletoaccuratelyupdatethewholedatabasewithRSSmeasurementsatasmallnumberofreferencelocations,thusreducingthehumanlaborcost.Furthermore,iUpdaterobservesthatalthoughtheRSSreadingsvariesalot,theRSSdifferencesbetweenboththeneighboringlocationsandadjacentwirelesslinksarerelativelystable.Thisuniqueobservationisappliedtoovercometheshort-termRSSvariationstoimprovethelocalizationaccuracy.Extensiveexperimentsinthreedifferentenvironmentsover3monthsdemonstratetheeffectivenessandrobustnessofiUpdater.

Research15:SocialNetworksandCrowdsourcingInfluenceMaximizationinaManyCascadesWorldIoulianaLitou(AUEB),VanaKalogeraki(AUEB),DimitriosGunopulos(UoA)

OnlineSocialNetworks(OSNs)arewidelyutilizedinviralmarketingcampaignsexploitingtheword-of-moutheffect.VariouspropagationmodelshavebeenproposedtodescribethewaycascadesunfoldinOSNs.Basedontheexistingpropagationmodels,severalstudiesaddresstheproblemofinfluencemaximization,wheretheobjectiveistoidentifyanappropriatesubsetofuserstoinitiatethespreadofacontagion.However,existingapproachesignoreanimportantfactorinthepropagationprocess,i.e.,thecorrelationofmultiplecontagionssimultaneouslycascadinginthesocialnetworkandhowtheseaffecttheusersdecisionsregardingtheadoptionofacontagion.Althoughrecentworkslookintoeitherthecompetitionorthecomplementarityamongapairofcontagions,auniformmodelthatdescribesthepropagationofmultiplecascadeswithvaryingtypesanddegreesofcorrelationsislacking.Thisworkconstitutesthefirstattempttofillthisgap.Weformulateanovelpropagationmodel,theCorrelatedContagionsDynamicLinearThreshold(CCDLT),thatconsidersthecorrelationofmanycontagionsineithercompetitiveorcomplementarymanner.Ourproposedmodelallowsfordifferentdegreesofcompetition/complementarityamongcascades.Wefurtherconsiderthatusersmaydynamicallyswitchstatesregardingthecontagiontheypromoteduringthepropagationprocess,basedontheinfluenceoftheirneighborhoods.Wethendesignagreedyseedselectionalgorithmthatidentifiestheappropriatesubsetofuserstoparticipateinaspecificcontagioninordertomaximizeitsspreadandweformallyprovethatitapproximatesthebestsolutionataratioof1_1/e.Throughanextensiveexperimentalevaluationwedemonstratethesuperiorityofourapproachoverexistingschemes.

Expertise-AwareTruthAnalysisandTaskAllocationinMobileCrowdsourcingXiaomeiZhang(UniversityofSouthCarolinaBeaufort),YiboWu(PennsylvaniaStateUniversity),LifuHuang(RensselaerPolytechnicInstitute),HengJi(RensselaerPolytechnicInstitute),GuohongCao(PennsylvaniaStateUniversity)

Mobilecrowdsourcinghasreceivedconsiderableattentionasitenablespeopletocollectandsharelargevolumeofdatathroughtheirmobiledevices.Sincetheaccuracyofthecollecteddataisusuallyhardtoensure,researchershaveproposedtechniquestoidentifytruthfromnoisydatabyinferringandutilizingthereliabilityofusers,andallocatetaskstouserswithhigherreliability.However,theyneglectthefactthatausermayonlyhaveexpertiseonsomeproblems(insomedomains),butnotothers.Neglectingthisexpertisediversitymaycausetwoproblems:lowestimationaccuracyintruthanalysisandineffectivetaskallocation.Toaddresstheseproblems,weproposeanExpertise-awareTruthAnalysisandTaskAllocation(ETA2)approach,whichcaneffectivelyinferuserexpertiseandthenallocatetasksandestimatetruthbasedontheinferredexpertise.ETA2reliesonanovelsemanticanalysismethodtoidentifytheexpertisedomainsofthetasksanduserexpertise,anexpertiseawaretruthanalysissolutiontoestimatetruthandlearnuserexpertise,andanexpertise-awaretaskallocationmethodtomaximizethe

72

probabilitythattasksareallocatedtouserswiththerightexpertisewhileensuringtheworkloaddoesnotexceedtheprocessingcapabilityateachuser.Experimentalresultsbasedontworeal-worlddatasetsdemonstratethatETA2significantlyoutperformsexistingsolutions.

MeLoDy:ALong-termDynamicQuality-awareIncentiveMechanismforCrowdsourcing HongweiWang(ShanghaiJiaoTongUniversity),SongGuo(TheHongKongPolytechnicUniversity),JiannongCao(TheHongKongPolytechnicUniversity),MinyiGuo(ShanghaiJiaoTongUniversity)

CrowdsourcingallowsrequesterstoallocatetaskstoagroupofworkersontheInternettomakeuseoftheircollectiveintelligence.Qualitycontrolisakeydesignobjectiveinincentivemechanismsforcrowdsourcingasrequestersaimatobtaininganswersofhighqualityunderagivenbudget.However,whenmeasuringworkerslong-termquality,existingmechanismseitherfailtoutilizeworkershistoricalinformation,ortreatworkersqualityasstableandignoreitstemporalcharacteristics,henceperformingpoorlyinalongrun.InthispaperweproposeMELODY,along-termdynamicqualityawareincentivemechanismforcrowdsourcing.MELODYmodelsinteractionbetweenrequestersandworkersasreverseauctionsthatruncontinuously.IneachrunofMELODY,wedesignatruthful,individualrational,budgetfeasibleandquality-awarealgorithmfortaskallocationwithpolynomial-timecomputationcomplexityandO(1)performanceratio.Moreover,takingintoconsiderationthelong-termcharacteristicsofworkersquality,weproposeanovelframeworkinMELODYforqualityinferenceandparameterslearningbasedonLinearDynamicalSystemsattheendofeachrun,whichtakesfulladvantageofworkershistoricalinformationandpredictstheirqualityaccurately.Throughextensivesimulations,wedemonstratethatMELODYoutperformsexistingworkintermsofbothqualityestimation(reducingestimationerrorby17.6%_24.2%)andsocialperformance(increasingrequestersutilityby18.2%_46.6%)inlong-termscenarios.

TheStrongLinkGraphforEnhancingSybilDefenses SuhendryEffendy(NationalUniversityofSingapore),RolandYap(NationalUniversityofSingapore)

Thesybilproblemisafundamentalproblemindistributedsystemsandonlinesocialnetworks(OSNs).Thebasicproblemisthatanattackercaneasilycreatemultipleidentitiesinadistributedoropenonlinesystem.Popularandeffectivesybildefensesareusuallybasedonpropertiesofthenetworkstructure.However,mostdefensesassumethatitishardfortheattackertomakemanyconnectionstohonestusers.However,thisassumptioncanbeinvalidinrealOSNswhichdecreasestheeffectivenessofmanysybildefenses.Weproposeagraphtransformation,thestronglinkgraph,tomitigatesuchattacksbyreducingtheeffectofalargenumberofattackedges.Ourpreliminaryexperimentsshowindeedthatwhentheattackerhasmanyattackedges,existingalgorithmssuchasSybilLimit,SybilRankandGatekeeperareineffective.Afterthestronglinkgraphisapplied,itdeletesmanyoftheattackedges,restoringtheeffectivenessofthesybildefenses.

MechanismDesignforMobileCrowdsensingwithExecutionUncertainty ZhenzheZheng(ShanghaiJiaoTongUniversity),ZhaoxiongYang(ShanghaiJiaoTongUniversity),FanWu(ShanghaiJiaoTongUniversity),GuihaiChen(ShanghaiJiaoTongUniversity)

Mobilecrowdsensinghasemergedasapromisingparadigmfordatacollectionduetoincreasinglypervasiveandpowerfulmobiledevices.Therehavebeenextensiveresearchworksthatproposeincentivemechanismsforcrowdsensing,buttheyallmaketheassumptionthatthemobileuserwillpositivelycompletetheallocatedsensingtask.Inthispaper,weconsideranewscenarioofcrowdsensingwhereausermayfailtocompletethetask.Forexample,wesupposetheusercontinuouslycollectdatawithhisdeviceinthebackground,andhecompletesthesensingtaskonlyifhepassesthroughthelocationofinterest.Duetotheusersmobilitypattern,hemaysucceedorfailinthetask.Itisanimportantissuefortheincentivemechanismtoensurefaulttoleranceforeachsensingtask.Wedesignreverseauctionstomodeltheinteractionbetweentheplatformandmobileusers,inwhichusersprobabilityofsuccessandcosttoperformthetasksareprivateinformation,andweaimtoguaranteethetaskstobecompletedwithhighprobability,whileminimizingthesocialcost.WeprovethatminimizingthesocialcostisanNP-hardproblem,andpresentmechanismsthatachievetruthfulnessandguaranteedapproximationratio.Weperformextensivesimulationstovalidatethedesirablepropertiesofourmechanisms.

TowardsScalableandDynamicSocialSensingUsingADistributedComputingFramework DanielZhang(UniversityofNotreDame),ChaoZheng(UniversityofNotreDame),DongWang(UniversityofNotreDame),DougThain(UniversityofNotreDame),XinMu(UniversityofNotreDame),GregMadey(UniversityofNotreDame),ChaoHuang(UniversityofNotreDame)

WiththerapidgrowthofonlinesocialmediaandubiquitousInternetconnectivity,socialsensinghasemergedasanewcrowdsourcingapplicationparadigmofcollectingobservations(oftencalledclaims)aboutthephysicalenvironmentfromhumansordevicesontheirbehalf.Afundamentalprobleminsocialsensingapplicationsliesineffectivelyascertainingthecorrectnessofclaimsandthereliabilityofdatasourceswithoutknowingeitherofthemapriori,whichisreferredtoastruthdiscovery.Whilesignificantprogresshasbeenmadetosolvethetruthdiscoveryproblem,someimportantchallengeshavenotbeenwelladdressedyet.First,existingtruthdiscoverysolutionsdidnotfullysolvethedynamictruthdiscoveryproblemwherethegroundtruthofclaimschangesovertime.Second,manycurrentsolutionsarenotscalabletolarge-scalesocialsensingeventsbecauseofthecentralizednatureoftheirtruthdiscoveryalgorithms.Third,theheterogeneityandunpredictabilityofthesocialsensingdatatrafficposeadditionalchallengestotheresourceallocationandsystemresponsiveness.Inthispaper,wedevelopedaScalableStreamingTruthDiscovery(SSTD)solutiontoaddresstheabovechallenges.Inparticular,wefirstdevelopedadynamictruthdiscoveryschemebasedonHiddenMarkovModels(HMM)toeffectivelyinfertheevolvingtruthofreportedclaims.WefurtherdevelopedadistributedframeworktoimplementthedynamictruthdiscoveryschemeusingWorkQueueinHTCondorsystem.WealsointegratedtheSSTDschemewithanoptimalworkloadallocationmechanismtodynamicallyallocatetheresources(e.g.,cores,memories)tothetruthdiscoverytasksbasedontheircomputationrequirements.WeevaluatedSSTDthroughrealworldsocialsensingapplicationsusingTwitterdatafeeds.Theevaluationresultsonthreereal-worlddatatraces(i.e.,BostonBombing,ParisShootingandCollegeFootball)showthattheSSTDschemeisscalableandoutperformsthestate-of-thearttruthdiscoverymethodsintermsofbotheffectivenessandefficiency.

73

Industry and Experimentation Track Paper Abstracts

Industry1:CloudDataCentersandPerformancePhoenix:Constraintawareschedulingforheterogeneousdatacenters PrashanthThinakaran(PennsylvaniaStateUniversity),JashwantRajGunasekaran(PennsylvaniaStateUniversity),BikashSharma(MicrosoftCorp),MahmutKandemir(PennsylvaniaStateUniversity),ChitaDas(PennsylvaniaStateUniversity)

Today’sdatacentersareincreasinglybecomingdiverseregardingbothhardwareandsoftwarearchitecturesinordertosupportamyriadofapplications.Theseapplicationsarealsoheterogeneousintermsofjobresponsetimesandresourcerequirements(eg.,NumberofCores,GPUs,NetworkSpeed)andtheyareexpressedastaskconstraints.Constraintsareusedforensuringtaskperformanceguarantees/QualityofService(QoS)byenablingtheapplicationtoexpressitsspecificresourcerequirements.Whileseveralschedulershaverecentlybeenproposedthataimtoimproveoverallapplicationandsystemperformance,fewoftheseschedulersconsiderresourceconstraintsacrosstaskswhilemakingtheschedulingdecisions.Furthermore,latency-criticalworkloadsandshort-livedjobsthattypicallyconstituteabout90%ofthetotaljobsinadatacenterhavestrictQoSrequirements,whichcanbemitigatedbyminimizingthetaillatencythrougheffectivescheduling.Inthispaper,weproposePhoenix,aconstraint-awarehybridschedulertoaddressboththeseproblems(constraintawarenessandensuringlowtaillatency)byminimizingthejobresponsetimesatconstrainedworkersandproactivelyreorderingthetasks.WeuseanovelConstraintResourceVector(CRV)basedscheduling,whichinturnfacilitatesreorderingofthejobsinaqueuetominimizetaillatency.WehaveusedthepubliclyavailableGoogletracestoanalyzetheirconstraintcharacteristicsandhaveembeddedtheseconstraintsinClouderaandYahooclustertracesforstudyingtheimpactoftracesonsystemperformance.ExperimentswithGoogle,ClouderaandYahooclustertracesacross15,000workernodeclustershowsthatPhoeniximprovesthe99thpercentilejobresponsetimesonanaverageby1.9xacrossallthreetraceswhencomparedagainstastate-of-the-arthybridscheduler.Further,incomparisontootherdistributedschedulerlikeHawk,itimprovesthe90thand99thpercentilejobresponsetimesby4.5xand5xrespectively.

DualScalingVMsandQueries:Cost-effectiveLatencyCurtailment JuanPérez(UniversityofMelbourne),RobertBirke(IBMResearchZurich),MathiasBjörkqvist(IBMResearchZurich),LydiaY.Chen(IBMResearchZurich)

WimpyvirtualinstancesequippedwithsmallnumbersofcoresandRAMarepopularpublicandprivatecloudofferingsbecauseoftheirlowcostforhostingapplications.Thechallengeishowtorunlatency-sensitiveapplicationsusingsuchinstances,whichtradeoffperformanceforcost.Inthisstudy,weanalyticallyandexperimentallyshowthatsimultaneouslyscalingresourcesatcoarsegranularityandworkloads,i.e.,submittingmultiplequeryclonestodifferentservers,atfinegranularitycanovercometheperformancedisadvantagesofwimpyVMinstancesandachievestringentlatencytargetsthatareevenlowerthantheaverageexecutiontimesofwimpyservers.Tosuchanend,wefirstderiveaclosed-formanalysisforthelatencyunderanygivenVMprovisioningandqueryreplicationlevel,consideringcloningpoliciesthatcan(not)terminateoutstandingcloneswith(without)anoverhead.Validatedontrace-drivensimulations,ouranalysisisabletoaccuratelypredictthelatencyandefficientlysearchfortheoptimalnumberofVMsandclones.Secondly,wedevelopadualelasticscaler,DuoScale,thatdynamicallyscalesVMsandclonesaccordingtotheworkloaddynamicssoastoachievethetargetlatencyinacost-effectivemanner.TheeffectivenessofDuoScaleliesontheobservationthattheapplicationperformanceonlyscalessub-linearlywithincreasingverticalorhorizontalresourceprovisioning,i.e.,resourcesperVMornumberofVMs.WeevaluateDuoScaleagainstVM-onlyscalingstrategiesviaextensivetrace-drivensimulationsaswellasexperimentalresultsonacloudtest-bed.OurresultsshowthatDuoScaleisabletoachievethestringenttargetlatencybyusingclonesonwimpyVMswithcostsavingsupto50%,comparedtoscalingbrawnyVMsthathavebetterperformanceatahigherunitcost.

Aframeworkforenablingsecurityservicescollaborationacrossmultipledomains DanielMigault(EricssonSecurityResearch),MarcosSimplicioJunior(EscolaPolitécnica),BrunoBarros(EscolaPolitécnica),MakanPourzandi(EricssonSecurityResearch),ThiagoAlmeida(EscolaPolitécnica),EwertonAndrade(EscolaPolitécnica),TerezaCarvalho(EscolaPolitécnica)

CollaborationamongSecurityServiceFunctions(SSF)isexpectedtobecomeasessentialtoSECaaS(SECurityasaService)systemsaselasticityistoIaaS(InfrastructureasaService).Thevirtualizationopensnewerainnetworksecurityasnewsecurityappliancescanbecreatedondemandinappropriateplacesinthenetwork.Atthesametime,theincreasingsizeanddiversityofattacksmakeitnecessarytocomeupwithnewapproachesformoreefficientandmoreresilientsecuritymechanisms.Inthispaper,weproposeanewframeworkleveragingSDN(SoftwareDefinedNetworking)andSFC(ServiceFunctionChaining)toenhancethecollaborationamongdifferentSSFstomitigatelargescaleattacks.WedescribeaframeworkthatallowsSSFsfromdifferentdomainstonegotiateanddynamicallycontroltheamountofresourcesallocatedforcollaboration,inwhatwecalla“best-effort”collaborationmode.ThisSSFcollaborationframeworkcreatesadistributedmitigationsystemforhandlinglargescaleattacksinadynamicandscalablemanner.Theefficiencyandfeasibilityofthisframeworkisexperimentallyassessed,showingthatourapproachincurslowoverhead,increasestheamountoftraffictreatedbySSFsandreducesthedroppedtrafficduetothelackofresourcesfromthesecuritymechanisms.

GroupClusteringUsingInter-GroupDissimilarities DebessayFesehayeKassa(VMware),LeninSingaravelu(Google),Chien-ChiaChen(VMware),XiaoboHuang(VMware),AmitabhaBanerjee(VMware),RuijinZhou(VMware),RajeshSomasundaran(VMware)

Varioussystemshavenaturalgroupings.Forinstanceinlargescaledistributedsystem,wecanhavegroupsofvirtualand/orphysicaldevices.Asystemcanalsohavegroupsoftimeseriesdatasetscollectedatdifferenttimeintervals.Suchgroupsareusuallycharacterizedbymultidimensionalmetrics(features)set.Clusteringsuchgroupsusingtheirmultidimensionaldatasetshasvariousapplicationssuchasidentifyingdifferentperformancelevelsforanomalydetectionandloadbalancing.Traditionalalgorithmsfocusonclusteringasingletimeseriesdatasetandnotonsuchgroupswithmultidimensionalmetricsdatasets.Inthispaperwepresentthedesign,implementationandanalysisoftwosetsofgroupclusteringalgorithms.Thefirstsetiscalledone-to-manyasitgeneratesclustersofgroupsbycomparingeachgroupagainstallothergroups.Thesecondsetofalgorithmsiscalledpairwiseasitgeneratestheclustersofgroupsusingpairwisegroupdissimilaritymatrix.Bothsetsofalgorithmsfirstgenerategroupdissimilarityweightsusingmetricrankingalgorithms.Weimplementedthegroupclusteringalgorithmsbyextendingawellknownmachinelearningpackageandusingafront-endvisualizer.WevalidatedtheclusteringalgorithmsusingrealworlddatasetsontheVMwarevSANproduct.Experimentalresultsshowthat7outofthe8proposedalgorithmscangenerateexpectedclustersinatleast4outofthe6detailedexperiments.The3out

74

of8proposedalgorithmscangeneratetheexpectedclustersin5outofthe6experiments.Oneofthepairwisealgorithmscangeneratetheexpectedclustersinall6ofthe6experiments.

ComprehensiveMeasurementandAnalysisoftheUser-PerceivedI/OPerformanceinaProductionLeadership-ClassStorageSystemLipengWan(OakRidgeNationalLaboratory),MatthewWolf(OakRidgeNationalLaboratory),FeiyiWang(OakRidgeNationalLaboratory),JongYoulCho(OakRidgeNationalLaboratory),GeorgeOstruchov(OakRidgeNationalLaboratory),ScottKlasky(OakRidgeNationalLaboratory)

WiththeincreaseofthescaleandintensityoftheparallelI/Oworkloadsgeneratedbythosescientificapplicationsrunningonhighperformancecomputingfacilities,understandingtheI/Odynamics,especiallytherootcauseoftheI/OperformancevariabilityanddegradationinHPCenvironment,havebecomeextremelycriticaltotheHPCcommunity.Inthispaper,werunextensiveI/Omeasuringtestsonaproductionleadership-classstoragesystemtocapturetheperformancevariabilitiesoflarge-scaleparallelI/O.AnalyzingtheseresultsanditsstatisticcorrelationrevealedsomevaluableinsightsintothecharacteristicsofthestoragesystemandtherootcauseofI/Operformancevariability.Further,weleveragethesefindingsandproposeanI/OmiddlewaredesignrefactoringwhichcanimprovetheperformanceoftheparallelI/Obyoptimizingthedatastripingandplacement.Ourpreliminaryevaluationresultsdemonstratetheproposedapproachcanreducetheaverageper-processwritelatencybyatleast80%andthemaximumper-processwritelatencybyatleast20%.

Industry2:MobileComputingandInternetofThingsLocation:Charleston1

OntheLimitsofSubsamplingofLocationTraces MudhakarSrivatsa(IBMT.J.WatsonResearchCenter),RaghuGanti(IBMT.J.WatsonResearchCenter),PrasantMohapatra(UCDavis)

Locationdatacollectionatasocietalscaleisincreasinglybecomingcommon-examplesofthisarecallanddatadetailrecordsintelecommunicationcompanies,GPSsamplescollectedbycarcompanies,andGPSsamplesfrommobiledevicesinmappingcompanies(e.g.,Google,Microsoft).Suchlargescalemobilitydatasetshaveapplicationsinurbanplanning,networkplanning,surveillance,andreal-timetrafficestimations.Thispaperaddressestheproblemofsubsamplinglocationtraceswhilepreservingtheamountofinformationpresentinsuchdatasets.Wepresentanovelsubsamplingtechniquethatisbasedonahierarchicalgeographicalencodingmechanism(geohash),thatallowsforefficientspatialclustersampling.Weanalyzethissubsamplingtechniquethroughvariousinformationtheoreticmeasurestoquantifythetotal“amount”ofinformationinadatasetfromalocationtraceperspectiveandevaluatethesemetricsinthecontextoftwolargescalemobilitydatasetsfromtelecommunicationcompanies-oneisthatofcalldetailrecordsandthesecondisthatofdatadetailrecords.Weshowthatsubsamplingdatainboththesecasesbyasmuchas75%doesnotsignificantlyreducethetotalamountofinformation,i.e.thedatasetcanbeusedsimilartotheoriginalversion.ThispaveswayforthecreationofbetterspaceandCPUefficientmodelsthatcansupportvariousapplicationsreliantoncollectivelocationtraces.

SOM-TC:Self-organizingmapforHierarchicalTrajectoryClustering PranitaDewan(IBMTJWatsonResearchCenter),RaghuGanti(IBMTJWatsonResearchCenter),MudhakarSrivatsa(IBMTJWatsonResearchCenter)

Trajectoryclusteringtechniqueshelpdiscoverinterestinginsightsfrommovingobjectdata,includingcommonroutesforpeopleandvehicles,anomaloussub-trajectories,etc.Existingtrajectoryclusteringtechniquesfailtotakeintoaccounttheuncertaintypresentinlocationdata.Inthispaper,weinvestigatetheproblemofclusteringtrajectorydataandproposeanovelalgorithmforclusteringsimilarfullandsub-trajectoriestogetherwhilemodelinguncertaintyinthisdata.Wedescribethenecessarypre-processingtechniquesforclusteringtrajectorydata,namelytechniquestodiscretizerawlocationdatausingPossibleWorldsemanticstocapturetheinherentuncertaintyinlocationdata,andtosegmentfulltrajectoriesintomeaningfulsub-trajectories.Asabaseline,weextendthewellknownK-meansalgorithmtoclustertrajectorydata.Wethendescribeandevaluateanewtrajectoryclusteringalgorithm,SOM-TC(Self-OrganizingMapBasedTrajectoryClustering),thatisinspiredfromtheself-organizingmaptechniqueandisatleast4xfasterthanthebaselineK-meansandcurrentdensitybasedclusteringapproaches.

ProcessingEncryptedandCompressedTime-SeriesData MatúšHarvan(EnovosLuxembourgS.A.),SamuelKimoto(OpenSystems),ThomasLocher(ABBCorporateResearch),Yvonne-AnnePignolet(ABBCorporateResearch),JohannesSchneider(UniversityofLiechtenstein)

Numerousapplications,e.g.,intheindustrialsector,producelargeamountsoftime-seriesdata,whichmustbestoredandmadeavailablefordistributedprocessing.Whileoutsourcingdatastorageandprocessingtothird-partyserviceprovidersoffersmanybenefits,itraisesdataprivacyissues.Inlightofthisproblem,techniqueshavebeenproposedtoshareonlyencrypteddatawiththeremoteserviceprovider,yetthecapabilitytorunmeaningfulqueriesoverthedataispreserved.However,timeseriesdataistypicallycompressedattheservertosavespace,whichisnoteasilypossiblewhendealingwithencrypteddata.Moreover,datamustbecompressedinsuchawaythatqueriescanstillbeexecutedefficiently.Asafirststepinthisdirection,wepresentanapproachthatpreservesdataprivacy,enablescompressionattheserver,andsupportsqueryingofthestoreddata.Ourevaluationusingrealworldtime-seriesdatashowsthatourcompressionmechanismcanreducetherequiredspacedrastically.Moreover,themedianrunningtimeofallconsideredqueriesincreasesmarginally,implyingthatcompressioncanbeintroducedwithoutsacrificingperformanceofqueryexecution.

CalvinConstrained-AFrameworkforIoTApplicationsinHeterogeneousEnvironments AmardeepMehta(UmeåUniversity),RamiBaddour(UniversitádellaSvizzeraitaliana),FredrikSvensson(EricssonResearch),HaraldGustafsson(EricssonResearch),ErikElmroth(UmeåUniversity)

CalvinisanIoTframeworkforapplicationdevelopment,deploymentandexecutioninheterogeneousenvironments,thatincludesclouds,edgeresources,andembeddedorconstrainedresources.InsideCalvin,allthedistributedresourcesareviewedasoneenvironmentbytheapplication.Theframeworkprovidesmulti-tenancyandsimplifiesdevelopmentofIoTapplications,whicharerepresentedusingadataflowofapplicationcomponents(namedactors)andtheircommunication.TheideabehindCalvinposessimilaritywiththeserverlessarchitectureandcanbeseenasActorasaServiceinsteadofFunctionasaService.ThismakesCalvinverypowerfulasitdoesnotonlyscaleactorsquicklybutalsoprovidesaneasyactormigrationcapability.Inthiswork,weproposeCalvinConstrained,anextensiontotheCalvinframeworktocoverresource-constraineddevices.Duetolimitedmemoryandprocessingpowerofembeddeddevices,theconstrainedsideoftheframeworkcanonlysupportalimitedsubsetoftheCalvinfeatures.ThecurrentimplementationofCalvinConstrainedsupportsactorsimplementedinC

75

aswellasPython,wherethesupportforPythonactorsisenabledbyusingMicroPythonasastaticallyallocatedlibrary,bythisweenabletheautomaticmanagementofstatevariablesandenhancecodere-usability.Aswouldbeexpected,Python-codedactorsdemandmoreresourcesoverC-codedones.Weshowthattheextraresourcesneededaremanageableoncurrentoff-the-shelvemicro-controller-equippeddeviceswhenusingtheCalvinframework.

76

Applications and Experiences Track Paper Abstracts

Application1:Security,Privacy,TrustinDistributedSystemsPrivacyPreservingUser-basedRecommenderSystem ShahriarBadsha(RMITUniversity),XunYi(RMITUniversity),IbrahimKhalil(RMITUniversity),ElisaBertino(PurdueUniversity)

Withtherapiddevelopmentofthesocialnetworks,CollaborativeFiltering(CF)-basedrecommendersystemshavebeenincreasinglyprevalentandbecomewidelyacceptedbyusers.TheCF-basedtechniquesgeneraterecommendationsbycollectingprivacysensitivedatafromusers.Usually,theusersaresensitivetodisclosureofpersonalinformationand,consequently,thereareunavoidablesecurityconcernssinceprivateinformationcanbeeasilymisusedbymaliciousthirdparties.Inordertoprotectagainstbreachesofpersonalinformation,itisnecessarytoobfuscateuserinformationbymeansofanefficientencryptiontechniquewhilesimultaneouslygeneratingtherecommendationbymakingtrueinformationinaccessibletoserviceproviders.Therefore,weproposeaprivacypreservinguser-basedCFtechniquebasedonhomomorphicencryption,whichiscapableofdeterminingsimilaritiesamongusersfollowedbygeneratingrecommendationswithoutrevealinganyprivateinformation.Weintroducedifferentsemi-honestpartiestopreserveprivacyandtocarryoutintermediatecomputationsforgeneratingrecommendations.Weimplementourmethodonpubliclyavailabledatasetsandshowthatourmethodispracticalaswellasachieveshighlevelofsecurityforuserswithoutcompromisingtherecommendationaccuracy.

PrivacyPreservingOptimizationofParticipatorySensinginMobileCloudComputing YeYan(OaklandUniversity),DongHan(OaklandUniversity),TaoShu(AuburnUniversity)

Withtherapidgrowthofmobilecloudcomputing,participatorysensingemergesasanewparadigmtoexploreourphysicalworldatanunprecedentedfinegranularitybyrecruitingthepervasivesensor-enabledsmartphones.Whileextensiveoptimizationhasbeenperformedintheliteraturetocoordinatethesensingactivityofthecloud-basedsensingserver(orplatform)andtheparticipatingsmartphonessoastomaximizetheefficiencyofparticipatorysensing,theprivacyissueintheoptimizationhasbeenlargelyoverlooked.Inthispaper,weproposeanovelprivacy-preservingoptimizationframeworkthatallowsboththecloud-basedplatformandmobileuserstosharedatafortheformulationandsolutionoftheoptimization,butwithoutrevealingsensitiveinformationthatmayleadtoprivacyleakageofeachother.Ourmethodisbuiltuponaprivacy-preservingversionofthewell-knownNP-hardweightedset-coverageproblem.Toaccommodateprivacyrequirementsinthisframework,oursolutionusesamodifiedbloomfilteralongwithaDiffie-Hellman-typeexchangeprotocolamongallparticipantsfordataaggregation,sharing,andpresentation.Throughextensivesimulationweevaluatetheprivacystrengthoftheproposedapproachandalsoverifyitseffectivenessandlowoverhead.

SPHINX:APasswordStorethatPerfectlyHidesPasswordsfromItself MalihehShirvanian(UniversityofAlabamaatBirmingham),StanislawJarecki(UniversityofCaliforniaatIrvine),HugoKrawczyk(IBMResearch),NiteshSaxena(UniversityofAlabamaatBirmingham)

Passwordmanagers(akastoresorvaults)allowausertostoreandretrieve(usuallyhigh-entropy)passwordsforhermultiplepassword-protectedservicesbyinteractingwitha“device”servingtheroleofthemanager(e.g.,asmartphoneoranonlinethird-partyservice)onthebasisofasinglememorable(low-entropy)masterpassword.Existingpasswordmanagersworkwelltodefeatofflinedictionaryattacksuponwebservicecompromise,assumingtheuseofhigh-entropypasswordsisenforced.However,theyarevulnerabletoleakageofallpasswordsintheeventthedeviceiscompromised,duetotheneedtostorethepasswordsencryptedunderthemasterpasswordand/ortheneedtoinputthemasterpasswordtothedevice(asinsmartphonemanagers).Evidenceexiststhatpasswordmanagerscanbeattractiveattacktargets.Inthispaper,weintroduceanovelapproachtopasswordmanagement,calledSPHINX,whichremainssecureevenwhenthepasswordmanageritselfhasbeencompromised.InSPHINX,theinformationstoredonthedeviceisinformationtheoreticallyindependentoftheuser’smasterpassword—anattackerbreakingintothedevicelearnsnoinformationaboutthemasterpasswordortheuser’ssite-specificpasswords.Moreover,anattackerwithfullcontrolofthedevice,evenatthetimetheuserinteractswithit,learnsnothingaboutthemasterpassword—thepasswordisnotenteredintothedeviceinplaintextformorinanyotherwaythatmayleakinformationonit.Unlikeexistingmanagers,SPHINXproducesstrictlyhigh-entropypasswordsandmakesitcompulsoryfortheuserstoregistertheserandomizedpasswordswiththewebservices,hencefullydefeatingofflinedictionaryattackuponservicecompromise.ThedesignandsecurityofSPHINXisbasedonthedevice-enhancedPAKEmodelofJareckietal.thatprovidesthetheoreticalbasisforthisconstructionandisbackedbyrigorouscryptographicproofsofsecurity.WhileSPHINXissuitablefordifferentdeviceandonlineplatforms,inthispaper,wereportonitsconcreteinstantiationonsmartphonesgiventheirpopularityandtrustworthinessaspasswordmanagers(oreventwo-factorauthentication).Wepresentthedesign,implementationandperformanceevaluationofSPHINX,offeringprototypebrowserplugins,smartphoneappsandtransparentdevice-clientcommunication.Basedonourinspectionanalysis,theoveralluserexperienceofSPHINXimprovesuponcurrentmanagers.Wealsoreportonalab-basedusabilitystudyofSPHINX,whichindicatesthatusers’perceptionofSPHINXsecurityandusabilityishighandsatisfactorywhencomparedtoregularpassword-basedauthentication.Finally,wediscusshowSPHINXmaybeextendedtoanonlineserviceforthepurposeofback-uporasanindependentpasswordmanager.

WhenSmartTVMeetsCRN:Privacy-preservingFine-grainedSpectrumAccess ChaowenGuan(StateUniversityofNewYorkatBuffalo),AzizMohaisen(StateUniversityofNewYorkatBuffalo),ZhiSun(StateUniversityofNewYorkatBuffalo),LuSu(StateUniversityofNewYorkatBuffalo),KuiRen(StateUniversityofNewYorkatBuffalo),YalingYang(VirginiaTech)

DynamicspectrumsharingtechniquesappliedintheUHFTVbandhavebeendevelopedtoallowsecondaryWiFitransmissioninareaswithactiveTVusers.Thistechniqueofdynamicallycontrollingtheexclusionzoneenablesvastlyincreasingsecondaryspectrumre-use,comparedtothe``TVwhitespace''modelwhereTVtransmittersdeterminetheexclusionzoneandonly"idle"channelscanbere-purposed.However,incurrentsuchdynamicspectrumsharingsystems,thesensitiveoperationparametersofbothprimaryTVusers(PUs)andsecondaryusers(SUs)needtobesharedwiththespectrumdatabasecontroller(SDC)forthepurposeofrealizingefficientspectrumallocation.SincesuchSDCserverisnotnecessarilyoperatedbyatrustedthirdparty,thosecurrentsystemsmightcauseessentialthreatenstotheprivacyrequirementfrombothPUsandSUs.Toaddressthisprivacyissue,thispaperproposesaprivacy-preservingspectrumsharingsystembetweenPUsandSUs,whichrealizesthespectrumallocationdecisionprocessusingefficientmulti-partycomputation(MPC)technique.Inthisdesign,theSDConlyperformssecurecomputationoverencryptedinputfromPUsandSUssuchthatnoneofthePUorSUoperationparameterswillberevealedtoSDC.TheevaluationofitsperformanceillustratesthatourproposedsystembasedonefficientMPCtechniquescanperformdynamicspectrumallocationprocessbetweenPUsandSUsefficientlywhilepreservingusers'privacy.

77

RevisitingSecurityRisksofAsymmetricScalarProductPreservingEncryptionandItsVariants WeipengLin(SimonFraserUniveristy),KeWang(SimonFraserUniversity),ZhilinZhang(SimonFraserUniversity),HongChen(RenminUniversityofChina)

Cloudcomputinghasemergedasacompellingvisionformanagingdataanddeliveringqueryansweringcapabilityovertheinternet.Thisnewwayofcomputingalsoposesarealriskofdisclosingconfidentialinformationtothecloud.Searchableencryptionaddressesthisissuebyallowingthecloudtocomputetheanswertoaquerybasedontheciphertextsofdataandqueries.Thankstoitsinnerproductpreservationproperty,theasymmetricscalar-product-preservingencryption(ASPE)hasbeenadoptedandenhancedinagrowingnumberofworkstoperformavarietyofqueriesandtasksinthecloudcomputingsetting.However,thesecuritypropertyofASPEanditsenhancedschemeshasnotbeenstudiedcarefully.Inthispaper,weshowacompletedisclosureofASPEandseveralpreviouslyunknownsecurityrisksofitsenhancedschemes.Meanwhile,efficientalgorithmsareproposedtolearntheplaintextofdataandqueriesencryptedbytheseschemeswithlittleornoknowledgebeyondtheciphertexts.Wedemonstratetheserisksonrealdatasets.

AnAdversary-CentricBehaviorModelingofDDoSAttacks AnWang(GeorgeMasonUniversity),AzizMohaisen(SUNYBuffalo),SongqingChen(GeorgeMasonUniversity)

DistributedDenialofService(DDoS)attacksaresomeofthemostpersistentthreatsontheInternettoday.TheevolutionofDDoSattackscallsforanin-depthanalysisofthoseattacks.Abetterunderstandingoftheattackers’behaviorcanprovideinsightstounveilpatternsandstrategiesutilizedbyattackers.Thepriorartontheattackers’behavioranalysisoftenfallsintwoaspects:itassumesthatadversariesarestatic,andmakescertainsimplifyingassumptionsontheirbehavior,whichoftenarenotsupportedbyrealattackdata.Inthispaper,wetakeadata-drivenapproachtodesigningandvalidatingthreeDDoSattackmodelsfromtemporal(e.g.,attackmagnitudes),spatial(e.g.,attackerorigin),andpatiotemporal(e.g.,attackinter-launchingtime)perspectives.Wedesignthesemodelsbasedontheanalysisoftracesconsistingofmorethan50,000verifiedDDoSattacksfromindustrialmitigationoperations.EachmodelisalsovalidatedbytestingitseffectivenessinaccuratelypredictingfutureDDoSattacks.ComparisonsagainstsimpleintuitivemodelsfurthershowthatourmodelscanmoreaccuratelycapturetheessentialfeaturesofDDoSattacks.

Application2:SocialNetworksandCrowdsourcingAnti-MaliciousCrowdsourcingUsingtheZero-DeterminantStrategy QinHu(BeijingNormalUniversity),ShenglingWang(BeijingNormalUniversity),LiranMa(TexasChristianUniversity),RongfangBie(BeijingNormalUniversity),XiuzhenCheng(GeorgeWashingtonUniversity)

Crowdsourcingisapromisingparadigmtoaccomplishacomplextaskviaelicitingservicesfromalargegroupofcontributors.However,recentobservationsindicatethatthesuccessofcrowdsourcingisbeingthreatenedbythemaliciousbehaviorsofthecontributors.Inthispaper,weanalyzethemaliciousattackproblemusinganiteratedprisoner’sdilemma(IPD)gameandproposeazero-determinant(ZD)strategybasedschemebyrewardingaworker’scooperationorpenalizingthedefectionforenticinghisfinalcooperation.Boththeoreticalanalysisandsimulationstudyindicatethattheproposedalgorithmhastwoattractivecharacteristics:1)therequestorcanincentivizetheworkertokeeponcooperatingbyonlyincreasingtheshort-termpayment;and2)theproposedalgorithmisfair,sotherequestorcannotarbitrarilypenalizeaninnocentworkertoincreaseherpayoffeventhoughshecandominatethegame.Tothebestofourknowledge,wearethefirsttousetheZDstrategytostimulatebothplayerstocooperateinanIPDgame.Moreover,ourproposedalgorithmisnotrestrictedtosolvetheproblemofthemaliciouscrowdsourcing-itcanbeemployedtotackleanyproblemthatcanbeformulatedbyanIPDgame.

JPR:ExploringJointPartitioningandReplicationforTrafficMinimizationinOnlineSocialNetworks JingyaZhou(SoochowUniversity),JianxiFan(SoochowUniversity)

Ascalablestoragesystembecomesmoreimportanttodayforonlinesocialnetworks(OSNs)asthevolumeofuserdataincreasesrapidly.Key-valuestoreusesconsistenthashingtosavedatainadistributedmanner.Asadefactostandard,ithasbeenwidelyusedinproductionenvironmentsofmanyOSNs.However,therandomnatureofhashingalwaysleadstohighinter-servertraffic.Recently,partitioningandreplicationarerespectivelyproposedinmanyexistingworkswheretheformeraimstominimizetheinter-serverreadtrafficandthelatteraimstooptimizetheinter-serverwritetraffic.Nevertheless,theseparatedmannersofoptimizationcannotefficientlyreducethetraffic.Becausetheinter-serverreadtrafficischangedduringreplication.Inthispaper,wesuggestthatperformingpartitioningandreplicationsimultaneouslycouldprovideprobabilitytofurtheroptimizetraffic.Thenweformulatetheproblemasarevisedgraphpartitioningwithoverlaps,sinceoverlapspartitioningnaturallycorrespondstoreplication.Tosolvetheproblem,weproposeaJointPartitioningandReplication(JPR)scheme.ThroughextensiveexperimentswitharealworldFacebooktrace,weevaluatethatJPRsignificantlyreducesinter-servertrafficwithslightlysacrificingstoragecostcomparedtohashing,andpreservesagoodloadbalancingacrossserversaswell.

OptimizingSourceSelectioninSocialSensinginthePresenceofInfluenceGraphs HuajieShao(UIUC),ShiguangWang(UIUC),ShenLi(UIUC),ShuochaoYao(UIUC),YiranZhao(UIUC),MdTanvirAlAmin(UIUC),TarekAbdelzaher(UIUC),LanceKaplan(UIUC)

Thispaperaddressestheproblemofchoosingtherightsourcestosolicitdatafrominsensingapplicationsinvolvingbroadcastchannels,suchasthosecrowdsensingapplicationswheresourcessharetheirobservationsonsocialmedia.Thegoalistoselectsourcessuchthatexpectedfusionerrorisminimized.Weassumethatsolicitingdatafromasourceincursacostandthatthecostbudgetislimited.Contrarytootherformulationsofthisproblem,wefocusonthecasewheresomesourcesinfluenceothers.Hence,askingasourcetomakeaclaimaffectsthebehaviorofothersourcesaswell,accordingtoaninfluencemodel.Thepapermakestwocontributions.First,wedevelopananalyticmodelforestimatingexpectedfusionerror,givenaparticularinfluencegraphandsolutiontothesourceselectionproblem.Second,weusethatmodeltosearchforasolutionthatminimizesexpectedfusionerror,formulatingitasazero-oneintegernon-linearprogramming(INLP)problem.Toscaletheapproach,thepaperfurtherproposesanovelreliability-basedpruningheuristic(RPH)andasimilarity-basedlossyestimation(SLE)algorithmthatsignificantlyreducethecomplexityoftheINLPalgorithmatthecostofamodestapproximation.Theanalyticallycomputedexpectedfusionerrorisvalidatedusingbothsimulationsandreal-worlddatafromTwitter,demonstratingagoodmatchbetweenanalyticpredictionsandempiricalmeasurements.Itisalsoshownthatourmethodoutperformsbaselinesintermsofresultingfusionerror.

DynamicContractDesignforHeterogenousWorkersinCrowdsourcingforQualityControl ChenxiQiu(PennsylvaniaStateUniversity),AnnaSquicciarini(PennsylvaniaStateUniversity),SarahRajtmajer(PennsylvaniaStateUniversity),JamesCaverlee(TexasA&MUniversity)

78

Crowdsourcingsitesheavilyrelyonpaidworkerstoensurecompletionoftasks.Yet,designingapricingstrategiesabletoincentivizeusers’qualityandretentionisnontrivial.Existingpaymentstrategieseithersimplysetafixedpaymentpertaskwithoutconsideringchangesinworkers’behaviors,orruleoutpoorqualityresponsesandworkersbasedoncoarsecriteria.Hence,taskrequestersmaybeinvestingsignificantlyinworkthatisinaccurateorevenmisleading.Inthispaper,wedesignadynamiccontracttoincentivizehigh-qualitywork.Ourproposedapproachoffersatheoreticallyprovenalgorithmtocalculatethecontractforeachworkerinacost-efficientmanner.Incontrasttoexistingwork,ourcontractdesignisnotonlyadaptivetochangesinworkers’behavior,butalsoadjustspricingpolicyinthepresenceofmaliciousbehavior.BoththeoreticalandexperimentalanalysisoverrealAmazonreviewtracesshowthatourcontractdesigncanachieveanearoptimalsolution.Furthermore,experimentalresultsdemonstratethatourcontractdesign1)canpromotehigh-qualityworkandpreventmaliciousbehavior,and2)outperformstheintuitivestrategyofexcludingallmaliciousworkersintermsoftherequester’sutility.

JointRequestBalancingandContentAggregationinCrowdsourcedCDN MingMa(TsinghuaUniversity),ZhiWang(TsinghuaUniversity),KunYi(TsinghuaUniversity),JiangchuanLiu(SouthChinaAgriculturalUniversity),LifengSun(TsinghuaUniversity)

RecentyearshavewitnessedanewcontentdeliveryparadigmnamedcrowdsourcedCDN,inwhichdevicesdeployedatedgenetworkcanprefetchcontentsandprovidecontentdeliveryservice.CrowdsourcedCDNoffershigh-qualityexperiencetoend-usersbyreducingtheircontentaccesslatencyandalleviatestheloadofnetworkbackbonebymakinguseofnetworkandstorageresourcesatmillionsofedgedevices.Insuchparadigm,redirectingcontentrequeststoproperdevicesiscriticalforuserexperience.TheuniquenessofrequestredirectioninsuchcrowdsourcedCDNliesthat:ononehand,thebandwidthcapacityofthecrowdsourcedCDNdevicesislimit,hencedeviceslocatedatacrowdedplacecanbeeasilyoverwhelmedwhenservingnearbyuserrequests;ontheotherhand,contentsrequestedinonedevicecanbesignificantlydifferentfromanotherone,makingrequestredirectionstrategiesusedinconventionalCDNswhichonlyaimtobalancerequestloadsineffective.Inthispaper,weexplorerequestredirectionstrategiesthattakebothworkloadbalanceofdevicesandcontentrequestedbyusersintoconsideration.Ourcontributionsareasfollows.First,weconductmeasurementstudies,coving1.8Muserswatching0.4Mvideos,tounderstandrequestpatternsincrowdsourcedCDN.Weobservethattheloadsofnearbydevicescanbeverydifferentandthecontentsrequestedatnearbydevicescanalsobesignificantlydifferent.Theseobservationsleadtoourdesignforrequestbalancingatnearbydevices.Second,weformulatetherequestredirectionproblembytakingboththecontentaccesslatencyandthecontentreplicationcostintoconsideration,andproposearequestbalancingandcontentaggregationsolution.Finally,weevaluatetheperformanceofourdesignusingtrace-drivensimulations,andobserveourschemeoutperformsthetraditionalstrategyintermsofmanymetrics,e.g.,weobserveacontentaccesslatencyreductionby50%overtraditionalmechanismssuchastheNearest/Randomrequestroutingscheme.

Shrink:ABreastCancerRiskAssessmentModelBasedonMedicalSocialNetwork AliLi(UniversityofScienceandTechnologyBeijing),RuiWang(UniversityofScienceandTechnologyBeijing),LeiXu(UniversityofScienceandTechnologyBeijing)

Breastcancerriskassessmentmodelcanassesswhetherapeopleisatahighriskofdevelopingbreastcancerdiseaseornotandconfirmabreastcancerhigh-riskgroup.Becausetheetiologyofbreastcancerdiseaseisdifferentindifferentcountryandregion,theexistingriskassessmentmodelisonlyadaptivetocertaincountriesandregions.Andtheparametersofthesemodelsarefixed,sothesemodelshavepoorgenerality.Aimingattheseproblems,thepaperputsforwardanewbreastcancerriskassessmentmodelnamedasShrink.Usingtheideaofsocialnetwork,Shrinkconstructsamedicalsocialnetworktoshowthesimilarityamongpeople,andusesgroupdivisionalgorithmtodividethenetworkintobreastcancerhigh-riskgroupandlow-riskgroup.Theparametersofthismodelcanbesetaccordingtotheneedsofthebreastcensus,andtheseparameterscanbedirectlyacquiredthroughquestionnaire,thereforeShrinkhasgoodgenerality.Moreover,undertheuncertainclassificationstandard,Shrinkadoptsanewclassificationmethodtodiscoverbreastcancerhigh-riskgroup.Basedontherealdatafromquestionnaires,wemakeexperimentsinMatlab,andobtaintheevaluationindexofthemodel.TheexperimentprovesthatthemodelitselfhasgoodevaluationresultandisbetterthanclassicGailmodel.

Application3:InternetofThings,SmartCities,andCyber-PhysicalSystemsOpportunisticEnergySharingBetweenPowerGridandElectricVehicles:AGameTheory-BasedPricingPolicy AnkurSarker(UniversityofVirginia),ZhuozhaoLi(UniversityofVirginia),WilliamKolodzey(ClemsonUniversity),HaiyingShen(UniversityofVirginia)

Electricvehicles(EVs)havegreatpotentialtoreducedependencyonfossilfuels.TherecentsurgeinthedevelopmentofonlineEV(OLEV)willhelptoaddressthedrawbacksassociatedwithcurrentgenerationEVs,suchastheheavyandexpensivebatteries.OLEVsareintegratedwiththesmartgridofpowerinfrastructurethroughawirelesspowertransfersystem(WPT)toincreasethedrivingrangeoftheOLEV.However,theintegrationofOLEVswiththegridcreatesatremendousloadforthesmartgrid.Thedemandofapowergridchangesovertimeandthepriceofpowerisnotfixedthroughouttheday.ThereshouldbesomecongestionavoidanceandloadbalancingpolicyimplicationstoensurequalityofservicesforOLEVs.Inthispaper,first,weconductananalysistoshowtheexistenceofunpredictablepowerloadandcongestionbecauseofOLEVs.WeusetheSimulationforUrbanMObilitytoolandhourlytrafficcountsofaroadsectionoftheNewYorkCitytoanalyzetheamountofenergyOLEVscanreceiveatdifferenttimesoftheday.Then,wepresentagametheorybasedonadistributedpowerscheduleframeworktofindtheoptimalschedulebetweenOLEVsandsmartgrid.Intheproposedframework,OLEVsreceivetheamountofpowerchargingfromthesmartgridbasedonapowerpaymentfunctionwhichisupdatedusingbestresponsestrategy.Weprovethattheupdatedpowerrequestsconvergetotheoptimalpowerschedule.Inthisway,thesmartgridmaximizesthesocialwelfareofOLEVs,whichisdefinedasmixedconsiderationoftotalsatisfactionanditspowerchargingcost.Finally,weverifytheperformanceofourproposedpricingpolicyunderdifferentscenariosinasimulationstudy.

EnergyEfficientObjectDetectioninCameraSensorNetworks TuanDao(UCRiverside),KarimKhalil(UCRiverside),AmitRoy-Chowdhury(UCRiverside),SrikanthKrishnamurthy(UCRiverside),LanceKaplan(U.S.ArmyResearchLaboratory)

Awirelesscameranetworkcanprovidesituationawarenessinformation(e.g.,humansindistress)inscenariossuchasdisasterrecovery.Ifsuchcamerasensorsarebatteryoperated,sendingrawvideofeedsbacktoacentralcontrollercanbeexpensiveintermsofenergyconsumption.Further,ifallcamerasweretousetheoptimalprocessingalgorithmforobjectdecision,theymayalsoexpendunnecessaryenergy.Statedotherwise,camerasthatcapturethesameobjectsmaynotallhavetousetheoptimalalgorithmtoachieveadesiredaccuracy,andthiscansaveprocessingenergycosts.Inthispaper,ourobjectiveistodesignandimplementaframeworkthatcansupportcoordinationamongcamerastodeliverhighlyaccuratedetectionofobjectsinanenergyefficientway.Theframework,whichwecallEECS(forenergyefficientcamerasensors),estimatesthedetectionaccuracyandenergycostsincurred(boththeprocessingandcommunicationcostsaretakeninto

79

account)witheachdetectionalgorithmforeachcamera,andcomesupwithachoiceofcamerasforsendinginformationpertainingtotheobjectofinterest.Thissetofcamerasandthevideoprocessingalgorithmsthattheymustuse,arechosensoastominimizetheenergyexpenditures,givenadesireddetectionaccuracy.WeimplementEECSonacameranetworkbuiltwithsmartphones,anddemonstratethatitreducestheenergyconsumptionbyupto40%whileensuringaobjectdetectionaccuracyofover86%.

DeepOpp:Context-awareMobileAccesstoSocialMediaContentonUndergroundMetroSystems DiWu(HunanUniversity&ImperialCollegeLondon),DmitriArkhipov(UniversityofCaliforniaIrvine),ThomasPrzepiorka(ImperialCollegeLondon),QiangLiu(DartmouthCollege),JulieMcCann(ImperialCollegeLondon),AmeliaRegan(UniversityofCaliforniaIrvine)

Accessingonlinesocialmediacontentonundergroundmetrosystemsisachallengeduetothefactthatpassengersoftenloseconnectivityforlargepartsoftheircommute.Astheoldestmetrosystemintheworld,theLondonundergroundrepresentsatypicaltransportationnetworkwithintermittentInternetconnectivity.Todealwithdisruptioninconnectivityalongthesub-surfaceanddeep-levelundergroundlinesontheLondonunderground,wehavedesignedacontext-awaremobilesystemcalledDeepOppthatenablesefficientofflineaccesstoonlinesocialmediabyprefetchingandcachingcontentopportunisticallywhensignalavailabilityisdetected.DeepOppcanmeasure,crowdsourceandpredictsignalcharacteristicssuchasstrength,bandwidthandlatency;itcanusethesepredictionsofmobilenetworksignaltoactivateprefetching,andthenemployanoptimizationroutinetodeterminewhichsocialcontentshouldbecachedinthesystemgivenreal-timenetworkconditionsanddevicecapacities.DeepOpphasbeenimplementedasanAndroidapplicationandtestedontheLondonUnderground;itshowssignificantimprovementoverexistingapproaches,e.g.reducingtheamountofpowerneededtoprefetchsocialmediaitemsby2.5times.WhileweusetheLondonUndergroundtotestoursystem,itisequallyapplicableinNewYork,Paris,Madrid,Shanghai,oranyotherurbanundergroundmetrosystem,orindeedinanysituationinwhichusersexperiencelongbreaksinconnectivity.

PhaseBeat:ExploitingCSIPhaseDataforVitalSignMonitoringwithCommodityWiFiDevices XuyuWang(AuburnUniversity),ChaoYang(AuburnUniversity),ShiwenMao(AuburnUniversity)

Vitalsigns,suchasrespirationandheartbeat,areusefultohealthmonitoringsincesuchsignalsprovideimportantcluesofmedicalconditions.Effectivesolutionsareneededtoprovidecontact-free,easydeployment,low-cost,andlong-termvitalsignmonitoring.Inthispaper,wepresentPhaseBeattoexploitchannelstateinformation(CSI)phasedifferencedatatomonitorbreathingandheartbeatwithcommodityWiFidevices.WeprovidearigorousanalysisoftheCSIphasedifferencedatawithrespecttoitsstabilityandperiodicity.Basedontheanalysis,wedesignandimplementthePhaseBeatsystemwithoff-the-shelfWiFidevices,andconductanextensiveexperimentalstudytovalidateitsperformance.OurexperimentalresultsdemonstratethesuperiorperformanceofPhaseBeatoverexistingapproachesinvariousindoorenvironments.

REX:RapidEnsembleClassificationSystemforLandslideDetectionusingSocialMediaAibekMusaev(UniversityofAlabama),DeWang(GeorgiaInstituteofTechnology),JiatengXie(GeorgiaInstituteofTechnology),CaltonPu(GeorgiaInstituteofTechnology)

WestudytheproblemofusingSocialMediatodetectnaturaldisasters,ofwhichweareinterestedinaspecialkind,namelylandslides.EmployinginformationfromSocialMediapresentsuniqueresearchchallenges,asthereexistsaconsiderableamountofnoiseduetomultiplemeaningsofthesearchkeywords,suchas``landslide"and``mudslide".Totacklethesechallenges,weproposeREX,arapidensembleclassificationsystemwhichcanfilteroutnoisyinformationbyimplementingtwokeyideas:(I)anewmethodforconstructingindependentclassifiersthatcanbeusedforrapidensembleclassificationofSocialMediatexts,whereeachclassifierisbuiltusingrandomizedExplicitSemanticAnalysis;and(II)aself-correctionapproachwhichtakesadvantageoftheobservationthatthemajoritylabelassignedtoSocialMediatextsbelongingtoalargeeventishighlyaccurate.WeperformexperimentsusingrealdatafromTwitterover1.5yearstoshowthatREXclassificationachieves0.98inF-measure,whichoutperformsthestandardBag-of-Wordsalgorithmbyanaverageof0.14andthestate-of-the-artWord2Vecalgorithmby0.04.Wealsoreleasetheannotateddatasetsusedintheexperimentsasacontributiontotheresearchcommunitycontaining282klabeleditems.

TowardAnIntegratedApproachtoLocalizingFailuresinCommunityWaterNetworksQingHan(UCIrvine),PhuNguyen(UCIrvine),RonaldT.Eguchi(ImageCat),Kuo-LinHsu(UCIrvine),NaliniVenkatasubramanian(UCIrvine)

Wepresentacyber-physical-humandistributedcomputingframework,AquaSCALE,forgathering,analyzingandlocalizinganomalousoperationsofincreasinglyfailure-pronecommunitywaterservices.Today,detectionofpipebreaks/leaksinwaternetworkstakeshourstodays.AquaSCALEleveragesdynamicdatafrommultipleinformationsourcesincludingIoT(InternetofThings)sensingdata,geophysicaldata,humaninput,andsimulation/modelingenginestocreateasensor-simulation-dataintegrationplatformthatcanaccuratelyandquicklyidentifyvulnerablespots.Weproposeatwo-phaseworkflowthatbeginswithrobustsimulationmethodsusingacommercialgradehydraulicsimulator-EPANET,enhancedwiththesupportforIoTsensorandpipefailuremodelings.Itgeneratesaprofileofanomalouseventsusingdiverseplug-and-playmachinelearningtechniques.Theprofilethenincorporateswithexternalobservations(NOAAweatherreportsandtwitterfeeds)torapidlyandreliablyisolatebrokenwaterpipes.Weevaluatethetwo-phasemechanismincanonicalandreal-worldwaternetworksunderdifferentfailurescenarios.Ourresultsindicatethattheproposedapproachwithofflinelearningandonlineinferencecanlocatemultiplesimultaneouspipefailuresatfinelevelofgranularity(individualpipelinelevel)withhighlevelofaccuracywithdetectiontimereducedbyordersofmagnitude(fromhours/daystominutes).

Application4:Mobile,Wireless,andEdgeComputingMobiQoR:PushingtheEnvelopeofMobileEdgeComputingviaQuality-of-ResultOptimizationYongboLi(GeorgeWashingtonUniversity),YurongChen(GeorgeWashingtonUniversity),TianLan(GeorgeWashingtonUniversity),GuruVenkataramani(GeorgeWashingtonUniversity)

Mobileedgecomputingaimsatimprovingapplicationresponsetimeandenergyefficiencybydeployingdataprocessingattheedgeofthenetwork.DuetotheproliferationofInternetofThingsandinteractiveapplications,theever-increasingdemandforlowlatencycallsfornovelapproachestofurtherpushingtheenvelopeofmobileedgecomputingbeyondexistingtaskoffloadinganddistributedprocessingmechanisms.Inthispaper,weidentifyanewtradeoffbetweenQuality-of-Result(QoR)andserviceresponsetimeinmobileedgecomputing.Ourkeyideaismotivatedbytheobservationthatagrowingsetofedgeapplicationsinvolvingmediaprocessing,machinelearning,anddataminingcantoleratesomelevelofqualitylossinthecomputedresult.ByrelaxingtheneedforhighestQoR,significantimprovementinserviceresponsetimecanbeachieved.Towardthisend,wepresentanoveloptimizationframework,MobiQoR,whichminimizesserviceresponsetimeandappenergyconsumptionbyjointlyoptimizingtheQoRofalledgenodesandtheoffloadingstrategy.TheproposedMobiQoRisprototypedusing

80

Parse,anopensourcemobileback-endtool,onAndroidsmartphones.Usingrepresentativeapplicationsincludingfacerecognitionandmovierecommendation,ourevaluationwithreal-worlddatasetsshowsthatMobiQoRreducesresponsetimeandenergyconsumptionbyupto77%(infacerecognition)and189.3%(inmovierecommendation)overexistingstrategiesunderthesamelevelofQoRrelaxation.

TruthfulAuctionsforUserDataAllowanceTradinginMobileNetworks ZhongxingMing(TsinghuaUniversity),MingweiXu(TsinghuaUniversity),NingWang(SurreyUniversity),BeijeGao(TsinghuaUniversity),QiLi(TsinghuaUniversity)

Userdataallowancetradingemergesasapromisingpracticeinmobiledatanetworkssinceitcanhelpmobilenetworkstoattractmoreusers.However,todate,thereisnostudyonuserdataallowancetradinginmobilenetworks.Inthispaper,wedevelopatruthfulframeworkthatallowsuserstobidfordataallowance.Wefocusonpreventingpricecheating,guaranteeingfairness,andminimizingtradingmaintenancecostintrading.Weformulatethedatatradingprocessasadoubleauctionproblemanddevelopalgorithmstosolvetheproblem.Inparticular,weuseauniformpriceauctionbasedonacompetitiveequilibriumtodefendagainstpricecheatingandprovidefairness.Meanwhile,weleveragelinearprogrammingtominimizetradingmaintenancecost.Weconductextensivesimulationstodemonstratetheperformanceoftheproposedmechanism.Thesimulationresultsshowthatourtradingmechanismistruthfulandfair,whileincurringaminimizedmaintenancecost.

OnlineResourceAllocationforArbitraryUserMobilityinDistributedEdgeClouds LinWang(TUDarmstadt),LeiJiao(UniversityofOregon),JunLi(UniversityofOregon),MaxMühlhäuser(TUDarmstadt)

Ascloudsmovetothenetworkedgetofacilitatemobileapplications,edgecloudprovidersarefacingnewchallengesonresourceallocation.Asusersmaymoveandresourcepricesmayvaryarbitrarily,andservicedelaysareheterogeneous,resourcesinedgecloudsmustbeallocatedandadaptedcontinuouslyinordertoaccommodatesuchdynamics.Inthispaper,wefirstformulatethisproblemwithacomprehensivemodelthatcapturesthekeychallenges,thenintroduceagap-preservingtransformationoftheproblem,andproposeanovelonlinealgorithmthatoptimallysolvesaseriesofsubproblemswithacarefullydesignedlogarithmicobjective,finallyproducingfeasiblesolutionsforedgecloudresourceallocationovertime.Wefurtherproveviarigorousanalysisthatouronlinealgorithmcanprovideaparameterizedcompetitiveratio,withoutrequiringanyaprioriknowledgeoneithertheresourcepriceortheusermobility.Throughextensiveexperimentswithbothreal-worldandsyntheticdata,wefurtherconfirmtheeffectivenessoftheproposedalgorithm.Weshowthattheproposedalgorithmachievesnear-optimalresultswithanempiricalcompetitiveratioofabout1.1,reducesthetotalcostbyupto4xcomparedtostaticapproaches,andoutperformstheonlinegreedyone-shotoptimizationsbyupto70%.

LeveragingTargetk-CoverageinWirelessRechargeableSensorNetworks PengzhanZhou(StonyBrookUniversity),CongWang(StonyBrookUniversity),YuanyuanYang(StonyBrookUniversity)

Energyremainsamajorhurdleinrunningcomputation-intensivetasksonwirelesssensors.RecenteffortshavebeenmadetoemployaMobileCharger(MC)todeliverwirelesspowertosensors,whichprovidesapromisingsolutiontotheenergyproblem.MostofpreviousworksinthisareaaimatmaintainingperpetualnetworkoperationattheexpenseofhighoperatingcostofMC.Inthemeanwhile,itisobservedthatduetolowcostofwirelesssensors,theyareusuallydeployedathighdensitysothereisabundantredundancyintheircoverageinthenetwork.Forsuchnetworks,itispossibletotakeadvantageoftheredundancytoreducetheenergycost.Inthispaper,werelaxthestrictnessofperpetualoperationbyallowingsomesensorstotemporarilyrunoutofenergywhilestillmaintainingtargetk-coverageinthenetworkatlowercostofMC.Wefirstestablishatheoreticalmodeltoanalyzetheperformanceimprovementsunderthisnewstrategy.Thenweorganizesensorsintoload-balancedclustersfortargetmonitoringbyadistributedalgorithm.Next,weproposeachargingalgorithmnamedλ-GTSPChargingAlgorithmtodeterminetheoptimalnumberofsensorstobechargedineachclustertomaintaink-coverageinthenetworkandderivetherouteforMCtochargethem.Wefurthergeneralizethealgorithmtoencompassmobiletargetsaswell.OurextensivesimulationresultsdemonstratesignificantimprovementsofnetworkscalabilityandcostsavingthatMCcanextendchargingcapabilityover2-3timeswithareductionof40%ofmovingcostwithoutsacrificingthenetworkperformance.

ReducingCellularSignalingTrafficforHeartbeatMessagesviaEnergy-EfficientD2DForwarding YanqiJin(HuazhongUniversityofScience&Technology),FangmingLiu(HuazhongUniversityofScienceandTechnology),XiaomengYi(HuazhongUniversityofScience&Technology),MinghuaChen(TheChineseUniversityofHongKong)

MobileInstantMessaging(IM)apps,suchasWhatsAppandWeChat,frequentlysendheartbeatmessagestoremoteserverstomaintainalways-onlinestatus.Periodicheartbeatmessagesaresmallinsize,buttheirtransmissionsincurheavysignalingtraffictofrequentlyestablishandreleasecommunicationchannelsbetweenbasestationsandsmartphones,knownassignalingstorm.Meanwhile,smartphonesalsoneedtoactivatecellulardatacommunicationmodulefrequentlyfortransmittingshortheartbeatmessages,resultinginsubstantialenergyconsumption.Toaddresstheseissues,weproposeaDevice-to-Device(D2D)basedheartbeatrelayingframework,inordertoreducesignalingtrafficandenergyconsumptioninheartbeattransmission.Theframeworkselectsthesmartphonesasrelaystoopportunisticallycollectheartbeatmessagesfromnearbysmartphonesusingenergy-efficientD2Dcommunication.ThecollectedheartbeatmessagesaretransmittedtotheBSinanaggregatedmannertoreducecellularsignalingtraffic.Basedontheperiodsandtheexpirationtimeofthecollectedheartbeatmessages,theframeworkschedulesthetransmissionsofcollectedheartbeatmessagestominimizesignalingandenergyconsumptionwhilesatisfyingtimeconstrains.WeimplementandevaluateoursolutiononAndroidsmartphones.Theresultsfromreal-worldexperimentsshowthatoursolutionachievesmorethan50%signalingtrafficreductionandupto36%energysaving.

k-ProtectedRoutingProtocolinMulti-hopCognitiveRadioNetworks Chin-JungLiu(MichiganStateUniversity),LiXiao(MichiganStateUniversity)

Incognitiveradionetworks(CRNs),theestablishedcommunicationsessionsbetweensecondaryusers(SUs)maybeaffectedorevengetinterruptedbecausetheSUsneedtorelinquishthespectrumwhenthelicensedusers(PUs)appearandreclaimthespectrum/channel.OndetectingPUactivities,theSUsontheaffectedlinkseitherswitchtoanotheravailableidlespectrumusingthesamelinkortheSUsseekforanalternativepath/link.Ineitherapproach,theongoingsessionisdestinedtoexperiencedelayorevengetsinterrupted,whichisintolerabletoqualityofservice-sensitiveapplicationssuchasmultimediastreamingoraudio/videoconferencing.Inthispaper,westudytheproblemofestablishingk-protectedroutesinCRNs.Ak-protectedrouteconsistsofasetofmainlinkswithpreassignedbackupspectrumandbackuppathsandisguaranteedtosustainfromkPUappearanceswithoutbeinginterrupted.ForaCRN,wefindak-protectedrouteforeachsessionrequestandmaximizethenumberofsessionsthatcanbesupported.Weproposebothcentralizedanddistributedk-protectedroutingalgorithmsforthis

81

problem.Simulationresultsshowthatourk-protectedroutingprotocoloutperformsexistingopportunisticspectrumswitchingapproachesintermsofdelayandinterruptionrate.

Application5:CloudComputingandDataCenterSystemsMulti-ResourceLoadBalancingforVirtualNetworkFunctions TaoWang(HuazhongUniversityofScience&Technology),HongXu(CityUniversityofHongKong),FangmingLiu(HuazhongUniversityofScienceandTechnology)

Middleboxesarewidelydeployedtoperformvariousnetworkfunctionstoensuresecurityandimproveperformance.TherecenttrendofNetworkFunctionVirtualization(NFV)makesiteasyforoperatorstodeploysoftwareimplementationsofthesenetworkfunctionsoncommodityservers.However,virtualnetworkfunctionsconsumedifferentamountsofresourceswhenprocessingpackets.Thusamulti-resourceloadbalancing(MRLB)mechanismisneededtoefficientlyutilizeserverresources.MRLBprobleminthecontextofNFVisfundamentallydifferentfrommulti-resourceallocationproblems,aswellastraditionalsingle-resourceloadbalancingandmulti-resourceloadbalancingproblemsintaskscheduling.Inthispaper,wetackletheMRLBprobleminNFVbyfirstproposingdominantload—theloadofthemoststressedresourceonaserver—astheloadbalancingmetric.WethenformulatetheMRLBproblemasanoptimizationtominimizethemaximumdominantloadofallNFVserversgiventhedemand.BasedonproximalJacobianADMM,weproposeanefficientalgorithmtosolvetheprobleminlargescalesettings.Throughextensivetrace-drivensimulationsandprototypeexperimentsonatestbed,weshowthatourMRLBalgorithmwithdominantloadperformssignificantlybetterandfasterthanbenchmarkingalgorithms.

Learningfromfailureacrossmultipleclusters:Atrace-drivenapproachtounderstanding,predicting,andmitigatingjobterminations NosaybaEl-Sayed(MIT),HongyuZhu(UniversityofToronto),BiancaSchroeder(UniversityofToronto)

Inlarge-scalecomputingplatforms,jobsarepronetointerruptionsandprematureterminations,limitingtheirusabilityandleadingtosignificantwasteinclusterresources.Inthispaper,wetacklethisprobleminthreesteps.First,weprovideacomprehensivestudybasedonlogdatafrommultiplelarge-scaleproductionsystemstoidentifypatternsinthebehaviourofunsuccessfuljobsacrossdifferentclustersandinvestigatepossiblerootcausesbehindjobtermination.Ourresultsrevealseveralinterestingpropertiesthatdistinguishunsuccessfuljobsfromothers,particularlyw.r.t.resourceconsumptionpatternsandjobconfigurationsettings.Secondly,wedesignamachinelearning-basedframeworkforpredictingjobandtaskterminations.Weshowthatjobfailurescanbepredictedrelativelyearlywithhighprecisionandrecall,andalsoidentifyattributesthathavestrongpredictivepowerofjobfailure.Finally,wedemonstrateinaconcreteusecasehowourpredictionframeworkcanbeusedtomitigatetheeffectofunsuccessfulexecutionusinganeffectivetask-cloningpolicythatwepropose.

RBAY:AScalableandExtensibleInformationPlaneforFederatingDistributedDatacenterResources XinChen(GeorgiaInstituteofTechnology),LitingHu(FloridaInternationalUniversity),DouglasM.Blough(GeorgiaInstituteofTechnology),MichaelA.Kozuch(IntelLabsPittsburgh),MatthewWolf(OakRidgeNationalLaboratory)

Whilemanyinstitutions,whetherindustrial,academic,orgovernmental,satisfytheircomputingneedsthroughpubliccloudproviders,manyothersstillmanagetheirownresources,oftenasgeographicallydistributeddatacenters.Sparecapacityfromthesegeographicallydistributeddatacenterscouldbeofferedtoothers,providedtherewereamechanismtodiscover,andthenrequesttheseresources.Unfortunately,singledatacenteradministratorstendnottocooperateduetoissuesofscalability,diverseadministrativepolicies,andsite-specificmonitoringinfrastructure.ThispaperdescribesRBAY,anintegratedinformationplanethatenablessecureandscalablesharingbetweengeographicallydistributeddatacenters.RBAY'skeydesignfeaturesaretwofold.First,RBAYemploysadecentralized`hierarchicalaggregationtree'structuretoseamlesslyaggregatespareresourcesfromgeographicallydistributeddatacenterstoaglobalinformationplane.Second,RBAYattachestoeachparticipatingservera`admin-customized'handler,whichfollowssite-specificpolicytoexpose,hide,add,removeresourcestoRBAY,andthusfulfillthetaskof`whichresourcetoexposetowhom,when,andhow'.Anexperimentalevaluationoneightreal-worldgeo-distributedsitesdemonstratesRBAY'srapidresponsetocompositequeries,aswellasitsextensible,scalable,andlightweightnature.

Task-awareTCPinDataCenterNetworks SenLiu(CentralSouthUniversity),JiaweiHuang(CentralSouthUniversity),YutaoZhou(CentralSouthUniversity),JianxinWang(CentralSouthUniversity),TianHe(UniversityofMinnesota)

Inmoderndatacenters,manyflow-basedandtask-basedschemeshavebeenproposedtospeedupthedatatransmissioninordertoprovidefast,reliableservicesformillionsofusers.However,existingflow-basedschemestreatallflowsinisolation,contributinglesstoorevenhurtinguserexperienceduetothestalledflows.Otherprevalenttask-basedapproaches,suchascentralizedanddecentralizedscheduling,aresophisticatedorunabletosharetaskinformation.Inthiswork,wefirstrevealthatrelinquishingbandwidthofleadingflowstothestalledoneseffectivelyreducesthetaskcompletiontime.Wefurtherpresentthedesignandimplementationofageneralsupportingschemethatsharestheflow-tardinessinformationthroughareceiver-drivencoordination.Ourschemecanbeflexiblyandwidelyintegratedwiththestate-of-the-artTCPprotocolsdesignedfordatacenters,whilemakingnomodificationonswitches.Throughthetestbedexperimentsandsimulationsoftypicaldatacenterapplications,weshowthatourschemereducesthetaskcompletiontimeby70%and50%comparedwiththeflow-basedprotocols(e.g.DCTCP,L2DCT)andtask-basedscheduling(e.g.Baraat),respectively.Moreover,ourschemealsooutperformsotherapproachesby18%to25%inprevalenttopologiesofdatacenter.

LimitationsofLoadBalancingMechanismsforN-TierSystemsinthePresenceofMillibottlenecks TaoZhu(GeorgiaInstituteofTechnology),JackLi(GeorgiaInstituteofTechnology),JoshKimball(GeorgiaInstituteofTechnology),JunheePark(IndianaUniversity),Chien-AnLai(GeorgiaInstituteofTechnology),CaltonPu(GeorgiaInstituteofTechnology),QingyangWang(LouisianaStateUniversity)

Thescalabilityofn-tiersystemsreliesoneffectiveloadbalancingtodistributeloadamongtheserversofthesametier.Wefoundthatloadbalancingmechanisms(andsomepolicies)inserversusedintypicaln-tiersystems(e.g.,ApacheandTomcat)haveissuesofinstabilitywhenverylongresponsetime(VLRT)requestsappearduetomillibottlenecks,veryshortbottlenecksthatlastonlytenstohundredsofmilliseconds.Experimentswithstandardn-tierbenchmarksshowthatduringmillibottlenecks,someloadbalancingpolicy/mechanismcombinationsmakethemistakeofsendingnewrequeststothenode(s)sufferingfrommillibottlenecks,insteadoftheidlenodesasloadbalancersaresupposedtodo.Severalofthesemistakesareduetotheimplicitassumptionsmadebyloadbalancingpoliciesand

82

mechanismsonthestabilityofsystemstate.OurstudyshowsthatappropriateremediesatpolicyandmechanismlevelscanavoidthesemistakesduringmillibottlenecksandremovetheVLRTrequests,thusimprovingtheaverageresponsetimebyafactorof12.

PerformanceAnalysisofCloudComputingCentersServingParallelizableRenderingJobsUsingM/M/c/rQueuingSystems XiulinLi(ShandongUniversity),LiPan(ShandongUniversity),JiweiHuang(BeijingUniversityofPostsandTelecommunications),ShijunLiu(ShandongUniversity),YuliangShi(ShandongUniversity),CaltonPu(GeorgiaInstituteofTechnology)

Performanceanalysisiscrucialtothesuccessfuldevelopmentofcloudcomputingparadigm.Anditisespeciallyimportantforacloudcomputingcenterservingparallelizableapplicationjobs,fordeterminingaproperdegreeofparallelismcouldreducethemeanserviceresponsetimeandthusimprovetheperformanceofcloudcomputingobviously.Inthispaper,takingthecloudbasedrenderingserviceplatformasanexampleapplication,weproposeanapproximateanalyticalmodelforcloudcomputingcentersservingparallelizablejobsusingM/M/c/rqueuingsystems,bymodelingtherenderingserviceplatformasamulti-stationmulti-serversystem.Wesolvetheproposedanalyticalmodeltoobtainacompleteprobabilitydistributionofresponsetime,blockingprobabilityandotherimportantperformancemetricsforgivencloudsystemsettings.Thusthismodelcanguidecloudoperatorstodetermineapropersetting,suchasthenumberofservers,thebuffersizeandthedegreeofparallelism,forachievingspecificperformancelevels.Throughextensivesimulationsbasedonbothsyntheticdataandreal-worldworkloadtraces,weshowthatourproposedanalyticalmodelcanprovideapproximateperformancepredictionresultsforcloudcomputingcentersservingparallelizablejobs,eventhosejobarrivalsfollowdifferentdistributions.

Application6:BigDataSystemsandDistributedDataManagementandAnalyticsEvaluationofDeepLearningFrameworksoverDifferentHPCArchitectures ShayanShams(LouisianaStateUniversity),RichardPlatania(LouisianaStateuniversity),KisungLee(LouisianaStateUniversity),Seung-JongPark(LouisianaStateUniversity)

Recentadvancesindeeplearninghaveenabledresearchersacrossmanydisciplinestouncovernewinsightsaboutlargedatasets.Deepneuralnetworkshaveshownapplicabilitytoimage,time-series,textual,andotherdata,allofwhichareavailableinaplethoraofresearchfields.However,theircomputationalcomplexityandlargememoryoverheadrequiresadvancedsoftwareandhardwaretechnologiestotrainneuralnetworksinareasonableamountoftime.Tomakethispossible,therehasbeenaninfluxindevelopmentofdeeplearningsoftwarethataimtoleverageadvancedhardwareresources.Inordertobetterunderstandtheperformanceimplicationsofdeeplearningframeworksoverthesedifferentresources,weanalyzetheperformanceofthreedifferentframeworks,Caffe,TensorFlow,andApacheSINGA,overseveralhardwareenvironments.Thisincludesscalingupandoutwithsingle-andmulti-nodesetupsusingdifferentCPUandGPUtechnologies.Notably,weinvestigatetheperformancecharacteristicsofNVIDIA'sstate-of-the-arthardwaretechnology,NVLink,andalsoIntel'sKnightsLanding,themostadvancedIntelproductfordeeplearning,withrespecttotrainingtimeandutilization.Toourbestknowledge,thisisthefirstworkconcerningdeeplearningbench-markingwithNVLinkandKnightsLanding.Throughtheseexperiments,weprovideanalysisoftheframeworks'performanceoverdifferenthardwareenvironmentsintermsofspeedandscaling.Asaresultofthiswork,betterinsightisgiventowardsbothusinganddevelopingdeeplearningtoolsthatcatertocurrentandupcominghardwaretechnologies.

OnAchievingEfficientDataTransferforGraphProcessinginGeo-DistributedDatacenters AmelieChiZhou(InriaRennes),ShadiIbrahim(InriaRennes),BingshengHe(NationalUniversityofSingapore)

Graphpartitioningisimportantforoptimizingtheperformanceandcommunicationcostoflargegraphprocessingjobs.Recently,manygraphapplicationssuchassocialnetworksstoretheirdataongeo-distributeddatacenters(DCs)toprovideservicesworldwidewithlowlatency.Thisraisesnewchallengestoexistinggraphpartitioningmethods,duetothecostlyWideAreaNetwork(WAN)usageandthemulti-levelsofnetworkheterogeneitiesingeo-distributedDCs.Inthispaper,weproposeageo-awaregraphpartitioningmethodnamedG-Cut,whichaimsatminimizingtheinter-DCdatatransfertimeofgraphprocessingjobsingeo-distributedDCswhilesatisfyingtheWANusagebudget.G-CutadoptstwonoveloptimizationphaseswhichaddressthetwochallengesinWANusageandnetworkheterogeneitiesseparately.G-Cutcanbealsoappliedtopartitiondynamicgraphsthankstoitslight-weightruntimeoverhead.WeevaluatetheeffectivenessandefficiencyofG-Cutusingrealworldgraphswithbothrealgeo-distributedDCsandsimulations.EvaluationresultsshowthatG-Cutcanreducetheinter-DCdatatransfertimebyupto58%andreducetheWANusagebyupto70%comparedtostate-of-the-artgraphpartitioningmethodswithalowruntimeoverhead.

GBooster:TowardsAccelerationofGPU-intensiveMobileApplications ElliottWen(VictoriaUniversityofWellington),BryanNg(VictoriaUniversityofWellington),WinstonSeah(VictoriaUniversityofWellington),XueLiu(McGillUniversity),JiannongCao(TheHongKongPolytechnicUniversity),XuefengLiu(HuangzhongUniversityofScienceandTechnology)

TheperformanceofGPUsonmobiledevicesisgenerallythebottleneckofmultimediamobileapplications(e.g.,3Dgamesandvirtualreality).PreviousattemptstotackletheissuemainlymigrateGPUcomputationtoserversresidinginremotecloudcenters.However,thecostlynetworkdelayisespeciallyundesirableforhighly-interactivemultimediaapplicationssinceafastresponsetimeiscriticalforuserexperience.Inthispaper,weproposeGBooster,asystemthatacceleratesmultimediamobileapplicationsbytransparentlyoffloadingGPUtasksontoneighboringmultimediadevicessuchasSmartTVsandGamingConsoles.Specifically,GBoosterinterceptsandredirectssystemgraphicscallsbyutilizingtheDynamicLinkerHookingtechnique,whichrequiresnomodificationoftheapplicationsandthemobilesystems.Inaddition,amajorconcernforoffloadingisthehighenergyconsumptionincurredbynetworktransmissions.Toaddressthisconcern,GBoosterisdesignedtointelligentlyswitchbetweenthelow-powerBluetoothandthehigh-throughputWiFibasedonthetrafficdemand.WeimplementGBoosterontheAndroidsystemandevaluateitsperformance.Theresultsdemonstratethatitcanboostapplications'frameratesbyupto85%.Intermsofpowerconsumption,GBoostercanpreserveupto70%energycomparedwithlocalexecution.

Scalingk-NearestNeighborsQueries(Therightway) AtoshumSamuelCahsai(UniversityOfGlasgow),NikosNtarmos(UniversityOfGlasgow),ChristosAnagnostopoulos(UniversityofGlasgow),PeterTriantafillou(UniversityOfGlasgow)

Recentlyparallel/distributedprocessingapproacheshavebeenproposedforprocessingk-NearestNeighbours(kNN)queriesoververylarge(multidimensional)datasetsaimingtoensurescalability.However,thisistypicallyachievedattheexpenseofefficiency.Withthispaperweofferanovelapproachthatalleviatestheperformanceproblemsassociatedwithstateoftheartmethods.Theessenceofourapproach,whichdifferentiatesitfromrelatedresearch,restson(i)adoptingacoordinator-baseddistributedprocessingalgorithm,insteadofthoseemployedoverdata-parallelexecutionengines(suchasHadoop/MapReduceorSpark),and(ii)onawaytoorganizedata,tostructurecomputation,andtoindexthestoreddatasetsthatensuresthatonlyaverysmallnumberofdataitemsareretrievedfrom

83

theunderlyingdatastore,communicatedoverthenetwork,andprocessedbythecoordinatorforeverykNNquery.Ourapproachalsopaysspecialattentiontoensuringscalabilityinadditiontolowqueryprocessingtimes.Overall,kNNqueriescanbeprocessedinjusttensofmilliseconds(asopposedtothe(tensof)secondsrequiredbystateoftheart.Wehaveimplementedourapproach,usingaNoSQLDB(HBase)asthedatastore,andwecompareitagainstthestate-of-the-art:theHadoop-basedSpatialHadoop(SHadoop)andtheSpark-basedSimbamethods.Weemploydifferentdatasetsofvarioussizes,showcasingthecontributedperformanceadvantages.Ourapproachoutperformsthestateoftheart,by2-3ordersofmagnitude,andconsistentlyfordatasetsizesrangingfromhundredsofmillionstohundredsofbillionsofdatapoints.Wealsoshowthatthekeyconstituentperformanceoverheadsincurredduringqueryprocessing(suchasthenumberofdataitemsretrievedfromthedatastore,therequirednetworkbandwidth,andtheprocessingtimeatthecoordinator)scaleverywell,ensuringtheoverallscalabilityoftheapproach.

ParallelizingBigDeBruijnGraphConstructiononHeterogeneousProcessors ShuangQiu(TheHongKongUniversityofScienceandTechnology),QiongLuo(TheHongKongUniversityofScienceandTechnology)

DeBruijngraphconstructionisthefirststepindenovoassemblerstoconnectinputreadsintoacompletesequencewithoutareferencegenome.Thisstepisbothtimeandmemoryspaceconsuming.Toaddressthisproblem,wedevelopParaHash,asystemthatpartitionstheinputdatainacompactformat,parallelizesthecomputationonboththeCPUsandtheGPUsinasinglecomputer,andperformshash-basedDeBruijngraphconstruction.Thisway,ParaHashutilizesallavailableprocessorstoassemblebiggenomesthatcannotfitintomemory.Furthermore,weanalyzethecharacteristicsofgenomedatatosetthehashtablesize,designconcurrenthashingalgorithmstohandletheinherentmultiplicity,andpipelinethedatatransferandthecomputationforfurtherefficiency.Ourexperimentsonreal-worldgenomedatasetsshowthattheworkloadwasbalancedacrossheterogeneousprocessors,andthatParaHashwasabletoconstructbillion-nodegraphsonasinglemachinewithanoverallperformanceupto20timesfasterthanthestate-of-the-artshared-memoryassemblers.

Private,yetPractical,MultipartyDeepLearning XinyangZhang(LehighUniversity),ShoulingJi(ZhejiangUniversity),HuiWang(StevensInstituteofTechnology),TingWang(LehighUniversity)

Inthispaper,weconsidertheproblemofmultipartydeeplearning(MDL),whereinautonomousdataownersjointlytrainaccuratedeepneuralnetworkmodelswithoutsharingtheirprivatedata.Wedesign,implement,andevaluate$\propto$MDL,anewMDLparadigmbuiltuponthreeprimitives:asynchronousoptimization,lightweighthomomorphicencryption,andthresholdsecretsharing.Comparedwithpriorwork,$\propto$MDLdepartsinsignificantways:a)besidesprovidingexplicitprivacyguarantee,itretainsdesirablemodelutility,whichisparamountforaccuracy-criticaldomains;b)itprovidesanintuitivehandlefortheoperatortogracefullybalancemodelutilityandtrainingefficiency;c)moreover,itsupportsdelicatecontrolovercommunicationandcomputationalcostsbyofferingtwovariants,operatingunderlooseandtightcoordinationrespectively,thusoptimizableforgivensystemsettings(e.g.,limitedversussufficientnetworkbandwidth).Throughextensiveempiricalevaluationusingbenchmarkdatasetsanddeeplearningarchitectures,wedemonstratetheefficacyof$\propto$MDL.

Application7:DistributedMiddlewareSystemsFastandFlexibleNetworkingforMessage-orientedMiddleware LarsKroll(KTHRoyalInstituteofTechnology),AlexandruA.Ormenisan(KTHRoyalInstituteofTechnology),JimDowling(KTHRoyalInstituteofTechnology)

Distributedapplicationsdeployedinmulti-datacenterenvironmentsneedtodealwithnetworkconnectionsofvaryingquality,includinghighbandwidthandlowlatencywithinadatacenterand,morerecently,highbandwidthandhighlatencybetweendatacentres.Inprinciple,foragivennetworkconnection,eachmessageshouldbesentoverthebestavailablenetworkprotocol,butexistingmiddlewaresdonotprovidethisfunctionality.Inthispaper,wepresentKompicsMessaging,amessagingmiddlewarethatallowsforfine-grainedcontrolofthenetworkprotocolusedonaper-messagebasis.Ratherthanalwaysrequiringapplicationdeveloperstospecifytheappropriateprotocolforeachmessage,wealsoprovideanonlinereinforcementlearnerthatoptimisestheselectionofthenetworkprotocolforthecurrentnetworkenvironment.Inexperiments,weshowhowconnectionproperties,suchasthevaryinground-triptime,influencetheperformanceoftheapplicationandweshowhowthroughputandlatencycanbeimprovedbypickingtherightprotocolattherighttime.

TailCut:PowerReductionunderQualityandLatencyConstraintsinDistributedSearchSystems Chih-HsunChou(UniversityofCalifornia,Riverside),LaxmiBhuyan(UniversityofCalifornia,Riverside),ShaoleiRen(UniversityofCalifornia,Riverside)

Websearchconstitutesanimportantclassofdataintensiveonlineservicesindatacenters.Optimizingsearchsystemsforenergyefficiency,timelyresponseandhighsearchquality(i.e.,howrelevantthereturnedresultsaretoasearchquery),however,isverychallenging,asasearchsysteminvolvesadistributedarchitecturewithhundredsofthousandsofindexservingnodes(ISNs)thatreturnsearchingresultstoanaggregatorthroughmultipleinterdependentretrievalstagesinapartition-aggregatefashion.Inthispaper,wediscoverthroughexperimentstwoimportantcharacteristicsthatcanaffectthesystemperformance:(1)responsetimeandenergyconsumptionaregreatlyimpactedbyasmallfractionofquerieswithlongprocessingtimes;(2)thequalitycontributionoftheISNisindependentofthequeryprocessingtime.Basedonourobservation,weproposeTailCut,whichjudiciouslydiscardslongqueryexecutionsandenablesISN-aggregatorcoordinationtominimizeenergyconsumptionsubjecttolatencyandqualityconstraints.OurexperimentalresultsshowthatTailCutcanachieveupto39%powersaving,whilesatisfyingthetaillatencyandqualityconstraint.

StoArranger:EnablingEfficientUsageofCloudStorageServicesonMobileDevices YongshuBai(SUNYBinghamton),YifanZhang(SUNYBinghamton)

Cloudstorageusagesarebecomingincreasinglypopularonmobiledevices.Throughanextensivemotivationstudy,wefindthatcloudstorageaccessesfrommobileappssufferfromseveralnotableproblemsthatundermineusageexperiences.Therootcauseisthatthewayofcloudstorageprovidersdeployingtheirservicesontomobiledevicesreliesonappdevelopersforthecorrectandappropriateimplementationsandlackstheabilityofmonitoringandservicingclient-sidecloudstorageaccesses.WeproposeStoArranger,apracticalsystemframeworkthatsolvestheproblemsbycoordinating,rearranging,andtransformingcloudstoragecommunicationsonmobiledevices.Wehaveprototypedtheproposedsystemusingtwodifferentimplementationapproaches.Wediscussourexperiencesoftheimplementationsinthepaper.Thereal-appevaluationexperimentsshowthatStoArrangercansignificantlyimprovemobilecloudstorageaccessefficiencywithlittleoverheads.

CharacterizingPerformanceandEnergy-efficiencyofTheRAMCloudStorageSystem

84

YacineTaleb(Inria),ShadiIbrahim(Inria),GabrielAntoniu(Inria),ToniCortes(BarcelonaSupercomputingCenter)

Mostlargepopularwebapplications,likeFacebookandTwitter,havebeenrelyingonlargeamountsofin-memorystoragetocachedataandofferalowresponsetime.Asthemainmemorycapacityofclustersandcloudsincreases,itbecomespossibletokeepmostofthedatainthemainmemory.Thismotivatestheintroductionofin-memorystoragesystems.Whilepriorworkhasfocusedonhowtoexploitthelow-latencyofin-memoryaccessatscale,thereisverylittlevisibilityintotheenergy-efficiencyofin-memorystoragesystems.Eventhoughitisknownthatmainmemoryisafundamentalenergybottleneckincomputingsystems(i.e.,DRAMconsumesupto40%ofaserver’spower).Inthispaper,bythemeansofexperimentalevaluation,wehavestudiedtheperformanceandenergy-efficiencyofRAMCloud—awell-knownin-memorystoragesystem.WerevealthatalthoughRAMCloudisscalableforread-onlyapplications,itexhibitsnon-proportionalpowerconsumption.WealsofindthatthecurrentreplicationschemeimplementedinRAMCloudlimitstheperformanceandresultsinhighenergyconsumption.Surprisingly,weshowthatreplicationcanalsoplayanegativeroleincrash-recovery.

ProactivelySecureCloud-EnabledStorageKarimEldefrawy(HughesResearchLab),TylerKaczmarek(UniversityofCalifornia,Irvine),SkyFaber(UniversityofCalifornia,Irvine)

Attackingcloud-enabledstorageisbecomingincreasinglylucrativeasmorepersonalandenterprisedatamovestothecloud.Traditionalsecuritymechanismstemporarilylimitsuchattacks,butoveralongperiodoftimeattackerswilleventuallyfindvulnerabilities;thiscanleadtocompromisinglargeamountsofvaluabledataandleadtolarge-scaleprivacybreaches.Thispaperaddressesthisproblembyincorporatingproactivesecurityguaranteesintocloud-enabledstorage.Proactivesecuritydealswithanadversary’sabilitytoeventuallycompromiseallinvolvedserversinadistributedstorageorcomputationsystem.Whilethereareseveralproactivelysecuresecretsharingprotocolsthatcanbeusedtoimproveconfidentialityofdatastoredinthecloud,theirhighoverheadhastraditionallylimitedthemtolessthantenpartiesandtoonly100sofbytestypicalforcryptographickeys.Realizingproactivelysecurecloudstorageforlargerdata(e.g,MBs)requirescarefuldesignandcalibrationofsystemparameters,andfacesseveralchallenges.Inthispaperwedesign,implementandassessperformanceofthefirstsystemforProactivelySecureCloud-EnabledStorage(PiSCES)ofdatalargerthancryptographickeys.Basedonourpracticalperformanceresultsweadvocatethatthehighlevelofresilienceandlong-termsecurityandconfidentialityguaranteesenabledbyproactivesecurityshouldbeconsideredinfuturedistributedandcloud-basedstorageandcomputingservices.

BEES:Bandwidth-andEnergy-EfficientImageSharingforReal-timeSituationAwareness PengfeiZuo(HuazhongUniversityofScienceandTechnology),YuHua(HuazhongUniversityofScienceandTechnology),XueLiu(McGillUniverisity),DanFeng(HuazhongUniversityofScienceandTechnology),WenXia(HuazhongUniversityofScienceandTechnology),ShundeCao(HuazhongUniversityofScienceandTechnology),JieWu(HuazhongUniversityofScienceandTechnology),YuanyuanSun(HuazhongUniversityofScienceandTechnology),YunchengGuo(HuazhongUniversityofScienceandTechnology)

Inordertosavehumanlivesandreduceinjuryandpropertyloss,SituationAwareness(SA)informationisessentialandimportantforrescueworkerstoperformtheeffectiveandtimelydisasterrelief.Theinformationisgenerallyderivedfromthesharedimagesviawidelyusedsmartphones.However,conventionalsmartphone-basedimagesharingschemesfailtoefficientlymeettheneedsofSAapplicationsduetotwomainreasons,i.e.,real-timetransmissionrequirementandapplication-levelimageredundancy,whichisexacerbatedbylimitedbandwidthandenergyavailability.Inordertoprovideefficientimagesharingindisasters,weproposeabandwidth-andenergy-efficientimagesharingsystem,calledBEES.ThesalientfeaturebehindBEESistoproposetheconceptofApproximateImageSharing(AIS),whichexploresandexploitsapproximatefeatureextraction,redundancydetection,andimageuploadingtotradetheslightlylowqualityofcomputationresultsincontent-basedredundancyeliminationforhigherbandwidthandenergyefficiency.Nevertheless,theboundariesofthetradeoffsbetweenthequalityofcomputationresultsandefficiencyaregenerallysubjectiveandqualitative.Wehenceproposetheenergy-awareadaptiveschemesinAIStoleveragethephysicalenergyavailabilitytoobjectivelyandquantitativelydeterminethetradeoffsbetweenthequalityofcomputationresultsandefficiency.Moreover,unlikeexistingworkonlyforcross-batchsimilarimages,BEESfurthereliminatesin-batchonesviaasimilarity-awaresubmodularmaximizationmodel.WehaveimplementedtheBEESprototypewhichisevaluatedviathreereal-worldimagedatasets.ExtensiveexperimentalresultsdemonstratetheefficacyandefficiencyofBEES.

Application8:DistributedSystemsandOptimizationsTransparentFault-ToleranceusingIntra-MachineFull-Software-StackReplication GiulianoLosa(VirginiaTech),AntonioBarbalace(VirginiaTech),YuzhongWen(VirginiaTech),MarinaSadini(VirginiaTech),Ho-RenChuang(VirginiaTech),BinoyRavindran(VirginiaTech)

Asthenumberofprocessorsandthesizeofthememoryofcomputingsystemskeepincreasing,thelikelihoodofCPUcorefailures,memoryerrors,andbusfailuresincreasesandcanthreatensystemavailability.SoftwarecomponentscanbehardenedagainstsuchfailuresbyrunningseveralreplicasofacomponentonhardwarereplicasthatfailindependentlyandthatarecoordinatedbyaState-MachineReplicationprotocol.Onecommonsolutionistoreplicatethephysicalmachinetoprovideredundancy,andtorewritethesoftwaretoaddresscoordination.However,aCPUcorefailure,amemoryerror,orabuserrorisunlikelytoalwayscrashanentiremachine.Thus,fullmachinereplicationmaysometimesbeanoverkill,increasingresourcecosts.Inthispaper,weintroducefullsoftwarestackreplicationwithinasinglecommoditymachine.Ourapproachrunsreplicasonfault-independenthardwarepartitions(e.g.,NUMAnodes),whereineachpartitionissoftware-isolatedfromtheothersandhasitsownCPUcores,memory,andfullsoftwarestack.Ahardwarefailureinonepartitioncanberecoveredbyanotherpartitiontakingoveritsfunctionality.WehaverealizedthisvisionbyimplementingFT-Linux,aLinux-basedoperatingsystemthattransparentlyreplicatesrace-free,multithreadedPOSIXapplicationsondifferenthardwarepartitionsofasinglemachine.OurevaluationsofFT-LinuxonseveralpopularLinuxapplicationsshowaworstcaseslowdown(duetoreplication)by~20%.

Apreventiveauto-parallelizationapproachforelasticstreamprocessing RolandKottoKombi(UniversityClaudeBernard),NicolasLumineau(UniversitédeLyon),PhilippeLamarre(INSALyon)

Nowadays,moreandmoresources(connecteddevices,socialnetworks,etc.)emitreal-timedatawithfluctuatingratesovertime.Existingdistributedstreamprocessingengines(SPE)havetoresolveadifficultproblem:deliverresultssatisfyingend-usersintermsofqualityandlatencywithoutover-consumingresources.Thispaperfocusesonparallelizationofoperatorstoadapttheirthroughputtotheirinputrate.Wesuggestanapproachwhichpreventsoperatorcongestioninordertolimitdegradationofresultsquality.Thisapproachreliesonanautomaticanddynamicadaptationofresourceconsumptionforeachcontinuousquery.Thissolutiontakesadvantageofi)ametricestimatingtheactivitylevelofoperatorsinthenearfutureii)theAUTOSCALEapproachwhichevaluatestheneedtomodifyparallelismdegreesatlocalandglobalscopeiii)anintegrationintotheApacheStormsolution.WeshowperformancetestscomparingourapproachtothenativesolutionofthisSPE.

85

DependableCloudResourceswithGuardian BaraAbusalah(PurdueUniversity),DerekSchatzlein(PurdueUniversity),JulianJamesStephen(PurdueUniversity),MasoudSaeidaArdekani(PurdueUniversity),PatrickEugster(PurdueUniversity)

Despiteadvancesinmakingdatacentersdependable,failuresstillhappen.Thisisparticularlyonerousforlong-running“bigdata”applications,wherepartialfailurescanleadtosignificantlossesandlengthyrecomputations.BigdataprocessingframeworkslikeHadoopMapReduceincludefaulttolerance(FT)mechanisms,butthesearecommonlytargetedatspecificsystem/failuremodels,andareoftenredundantbetweenframeworks.Thispaperproposestheparadigmofdependableresources:bigdataprocessingframeworksaretypicallybuiltontopofresourcemanagementsystems(RMSs),andproposingFTsupportatthelevelofsuchanRMSyieldsgenericFTmechanisms,whichcanbeprovidedwithlowoverheadbyleveragingconstraintsonresources.WedemonstrateourconceptsthroughGuardian,arobustRMSbasedonYARN.GuardianallowsframeworkstoruntheirapplicationswithindividuallyconfigurableFTgranularityanddegree,withonlyminorchangestotheirimplementation.WedemonstratethebenefitsofourapproachbyevaluatingHadoop,Tez,SparkandPigonGuardianinAmazon-EC2,improvingcompletiontimebyaround68%inthepresenceoffailures,whilemaintainingaround6%overhead.

ACommunication-awareContainerRe-distributionApproachforHighPerformanceVNFs YuchaoZhang(TsinghuaUniversity),YusenLi(NankaiUniversity),KeXu(TsinghuaUniversity),DanWang(HongKongPolytechnicUniversity),MinghuiLi(Baidu),XuanCao(Baidu),QingqingLiang(Baidu)

Containershavebeenusedinmanyapplicationsforisolationpurposesduetothelightweight,scalableandhighlyportableproperties.However,toapplycontainersinvirtualnetworkfunctions(VNFs)facesabigchallengebecausehigh-performanceVNFsoftengeneratefrequentcommunicationworkloadsamongcontainerswhilethecontainercommunicationsaregenerallynotefficient.Comparedwithhardwaremodificationsolutions,properlydistributingcontainersamonghostsisanefficientandlow-costwaytoreducecommunicationoverhead.However,weobservethatthisapproachyieldsatrade-offbetweenthecommunicationoverheadandtheoverallthroughputofthecluster.Inthispaper,wefocusonthecommunication-awarecontainerredistributionproblemtooptimizethecommunicationoverheadandtheoverallthroughputjointlyforVNFclusters.WeproposeasolutioncalledFreeContainerwhichutilizesanoveltwo-stagealgorithmtore-distributecontainersamonghosts.WeimplementFreeContainerinBaiduclusterswith6000serversand35servicesdeployed.Extensiveexperimentsonrealnetworksareconductedtoevaluatetheperformanceoftheproposedapproach.TheresultsshowthatFreeContainercanincreasetheoverallthroughputupto90%withsignificantreductiononcommunicationoverhead.

MinimizingCostinIaaSCloudsviaScheduledInstanceReservation QiushiWang(NanyangTechnologicalUniversity),MingMingTan(NanyangTechnologicalUniversity),XueyanTang(NanyangTechnologicalUniversity),WentongCai(NanyangTechnologicalUniversity)

Regulardiurnalpatternsareoftenseenintheworkloadsofcloud-basedonlineapplications.Thiskindofnon-stationaryworkloadschangestheprocessingdemandsovertime.Torunapplicationserviceswithminimumcosts,thenumberofcloudinstancescanbedynamicallyadjustedaccordingtotheworkloadvariations.Recently,anewtypeofscheduledinstanceshasemergedintheInfrastructure-as-a-Servicemarkettofacilitatesuchconfigurations.Scheduledinstancescanbereservedbasedonarecurringscheduleandtheyofferpricediscounts.Meanwhile,cloudvendorsrequireminimumscheduleddurationstoavoidtheoverheadoffrequentlylaunchingandterminatingcloudinstances.Coupledwithtraditionalon-demandandreservedinstances,itbecomesmorecomplicatedforuserstofindtheoptimalcombinationofthesethreepricingoptionstominimizetheirmonetarycosts.Forthenewscheduledinstances,notonlythenumberofinstancesbutalsotheirstartandstoptimeshavetobedecided.Inthispaper,wedevelopafastandeffectivestrategytosolvethisproblem.Basedonthehourlyworkloaddistributions,wefirstcomputetheoptimalnumberofinstancestoacquireforeachpricingoption.Then,wedesignaschedulingalgorithmtoarrangethescheduledinstancesincompliancewiththerestrictionoftheirscheduleddurations.UsingtheworkloadsoftheLOLonlinegameandtheWikipediaMobileserviceastwocasestudies,theefficacyofourstrategyisdemonstrated.

EfficientDistributedCoordinationatWAN-scale AilidaniAilijiang(SUNYBuffalo),AlekseyCharapko(SUNYBuffalo),MuratDemirbas(SUNYBuffalo),BekirOguzTurkkan(SUNYBuffalo),TevfikKosar(SUNYBuffalo)

Traditionalcoordinationservicesfordistributedapplicationsdonotscalewelloverwide-areanetworks(WAN):centralizedcoordinationfailstoscalewithrespecttotheincreasingdistancesintheWAN,anddistributedcoordinationfailstoscalewithrespecttothenumberofnodesinvolved.WearguethatitispossibletoachievescalabilityoverWANusingahierarchicalcoordinationarchitectureandasmarttokenmigrationmechanism,andlaydownthefoundationofanoveldesignforaflexible-consistentcoordinationframework,calledWanKeeper.WeimplementedWanKeeperbasedontheZooKeeperAPIanddeployeditoverWANasaproofofconcept.OurexperimentalresultsbasedontheYahoo!CloudServingBenchmark(YCSB),ApacheBookKeeperreplicatedlogservice,andtheSharedCloud-backedFileSystem(SCFS)showthatWanKeeperprovidesmultiplefoldsimprovementinwrite/updateperformanceinWANcomparedtoZooKeeper,whilekeepingthesamereadperformance.

Application9:DistributedSystemsandApplicationsSpecifyingaDistributedSnapshotAlgorithmasaMeta-programandModelCheckingitatMeta-level HaThiThuDoan(JapanAdvancedInstituteofScienceandTechnology),FrancoisBonnet(OsakaUniversity),KazuhiroOgata(JapanAdvancedInstituteofScienceandTechnology)

ThepaperproposesanewapproachtomodelcheckingChandy-LamportDistributedSnapshotAlgorithm(CLDSA).TheessentialoftheapproachisthatCLDSAisspecifiedasameta-programinMaudesuchthatthemeta-programtakesaspecificationofanunderlyingdistributedsystem(UDS)andgeneratesthespecificationoftheUDSonwhichCLDSAissuperimposed(UDS-CLDSA).TomodelcheckthataUDS-CLDSAenjoysadesiredproperty,itsufficesthathumanusersspecifytheUDSfortheproposedapproach,whilehumanusersneedtospecifytheUDS-CLDSAfortheexistingapproachforeachUDS.Sincetheproposedapproachconductsmodelcheckingatmeta-level,itproducesacounterexampleifaUDS-CLDSAdoesnotenjoytheproperty,whiletheexistingapproachdoesnot.OurmethodspecifyingCLDSAasameta-programcanbeappliedtoformalspecificationoftheclassofdistributedalgorithmsthataresuperimposedonUDSs.

Self-EvolvingSubscriptionsforContent-BasedPublish/SubscribeSystems

86

CesarCañas(McGillUniversity),KaiwenZhang(TechnicalUniversityofMunich),BettinaKemme(McGillUniversity),JörgKienzle(McGillUniversity),Hans-ArnoJacobsen(TechnicalUniversityofMunich)

Traditionalpub/subsystemscannotadequatelyhandleworkloadsofapplicationswithdynamic,short-livedsubscriptionssuchaslocation-basedsocialnetworks,predictivestocktrading,andonlinegames.Subscribersmustcontinuouslyinteractwiththepub/subsystemtoremoveandinsertsubscriptions,therebyinefficientlyconsumingnetworkandcomputingresources,andsacrificingconsistency.Intheaforementionedapplications,werecognizethatthechangesinthesubscriptionscanfollowapredictablepatternoversomevariable(e.g.,time).Inthispaper,wepresentanewtypeofsubscription,calledevolvingsubscription,whichencapsulatesthesepatternsandallowthepub/subsystemtoautonomouslyadapttothedynamicinterestsofthesubscriberswithoutincurringanexpensivere-subscriptionoverhead.Weproposeageneralmodelforexpressingevolvingsubscriptionsandaframeworkforsupportingtheminapub/subsystem.Tothisend,weproposethreedifferentdesignstosupportevolvingsubscriptions,whichareevaluatedandcomparedtothetraditionalresubscriptionapproachinthecontextoftwousecases:onlinegamesandhigh-frequencytrading.Ourevaluationshowsthatoursolutionscanreducesubscriptiontrafficby96.8%andimprovedeliveryaccuracywhencomparedtothebaselineresubscriptionmechanism.

ScalableRoutingforTopic-basedPublish/SubscribeSystemsunderFluctuations VolkerTurau(HamburgUniversityofTechnology),GerrySiegemund(HamburgUniversityofTechnology)

Theloosecouplingandtheinherentscalabilitymakepublish/subscribesystemsanidealcandidateforevent-drivenservicesforwirelessnetworksusinglowpowerprotocolssuchasIEEE802.15.4.Thisworkintroducesadistributedalgorithmtobuildandmaintainaroutingstructureforsuchnetworks.Thealgorithmdynamicallymaintainsamulticasttreeforeachnode.Whilepreviousworkfocusedonminimizingthesetreesweaimtokeeptheefforttomaintainthemincaseoffluctuationsofsubscriberslow.Themulticasttreesareimplicitlydefinedbyanovelstructurecalledaugmentedvirtualring.Themaincontributionisadistributedalgorithmtobuildandmaintainthisaugmentedvirtualring.Maintenanceoperationsaftersub-andunsubscriptionsrequiremessageexchangeinalimitedregiononly.Wecomparetheaveragelengthsoftheconstructedforwardingpathswithanalmostidealapproach.AsaresultofindependentinterestwepresentadistributedalgorithmusingmessagesofsizeO(logn)forconstructingvirtualringsofgraphsthatareonaverageshorterthanringsbasedondepthfirstsearch.

OPPay:DesignandImplementationofAPaymentSystemforOpportunisticDataServices FengruiShi(ImperialCollegeLondon),ZhijinQin(ImperialCollegeLondon),JulieMcCann(ImperialCollegeLondon)

Thelargenumberofpersonalwirelessdevicesintheurbanareascouldbeusedtoprovidevariousopportunisticdataservices,suchasWiFisharing,content-basedfilesharingandopportunisticnetworking.Inordertofacilitatetheseservices,itisessentialtoincentivisethedeviceownerstobecomeserviceproviders.However,previousresearchfailedtodeliveranypracticalpaymentsystemsforopportunisticdataservices.Inspiredbysmartcontractsfunctionalitiesofbitcoin,thispaperproposesapaymentsystemnamedOPPayforopportunisticdataservices,whichimplementsamicropaymentcommunicationprotocolformobiledevicestoperformdatatransactionsandmakepaymentsusingbitcoin.Thesystemisdesignedtomakeincrementalpaymentsandthusresilienttointerruptedcommunicationscausedbyhumanmobilityinthemobilenetwork.Byimplementingandevaluatingthesystemforthreedifferentapplications,weshowthatthesystemisabletoworkinheterogeneoushardwareandsoftwareenvironmentsandcanachievefasttransactionsconfirmationwithsmallfeeoverheadandlowfaultypaymentvalue.

OptimalResourceAllocationforMulti-userVideoStreamingovermmWaveNetworksZhifengHe(AuburnUniversity),ShiwenMao(AuburnUniversity)

Weinvestigatetheresourceallocationproblem,includingtimeslotallocation,channelallocation,andpoweradaptation,inamillimeterWave(mmWave)networkwithmultipletransmissionlinks,multiplechannels,andaPicoNetCoordinator(PNC).Eachlinkhasavideosessiontotransmitfromthetransmittertothereceiver.Theobjectiveistominimizethenumberoftimeslotstofinishthevideosessionsofalllinksbyjointlyoptimizingchannelallocationandtimeslotallocationforlinks,whileconsideringthepossibleinterferencebetweendifferentlinksonthesamechannel.Theoptimalsolutionfortheformulatedproblemiscomputationallyprohibitivetoobtainduetotheexponentialcomplexity.Wedevelopedacolumngenerationbasedmethodtoreformulatetheoriginalproblemintoamainproblemalongwithaseriesofsub-problems,withgreatlyreducedcomplexity.Weprovethattheoptimalsolutionforthereformulatedproblemconvergestotheoptimalsolutionoftheoriginalproblem,andwederivedalowerboundfortheperformanceofthereformulatedproblemateachiteration,whichwillfinallyconvergetotheglobaloptimalsolution.Theproposedschemeisvalidatedwithsimulationswithitssuperiorperformanceoverexistingworkisobserved.

AMulti-AgentParallelApporachtoAnalyzingLargeClimateDataSets JasonWoodring(UniversityofWashingtonBothell),MatthewSell(UniversityofWashingtonBothell),MunehiroFukuda(UniversityofWashingtonBothell),HazelineAsuncion(UniversityofWashingtonBothell),EricSalathe(UniversityofWashingtonBothell)

Despitevariouscloudtechnologiesthathaveparallelizedandscaledupbigdataanalysis,theytargetdatamostlyintextswhichareeasytopartitionandthuseasytomapoveraclustersystem.Therefore,theirparallelizationdonotnecessarilycoverscientificstructureddatasuchasNetCDForneedadditional,user-providedtoolstoconverttheoriginaldataintospecificformats.Tofacilitateuser-intuitiveparallelizationofsuchscientificdataanalysis,thispaperpresentsanagent-basedapproachthatinstantiatesdistributedarraysoveraclustersystem,maintainsstructuredscientificdatainthesearrays,deploysmanymobileagentsoverthearraystoperformcomputationalactionsondata,andcollectsnecessaryresults.Todemonstratethepracticabilityofouragent-basedapproach,wefocusedonclimatechangeresearchandimplementedaweb-interfacedclimateanalysis,usingtheMASS(multi-agentspatialsimulation)library.Inthispaper,weshowpracticaladvantagesof,performanceimprovementsby,andchallengesforouragent-basedapproachinstructureddataanalysis.

Application10:DistributedSystemsandServicesEnergyProportionalServers:WhereAreWein2016? CongfengJiang(HangzhouDianziUniversity),YumeiWang(HangzhouDianziUniversity),DongyangOu(HangzhouDianziUniversity),BingLuo(WayneStateUniversity),WeisongShi(WayneStateUniversity)

Thehugeenergyconsumptionindatacentersproducesnotonlyhighelectricitybillbutalsotremendouscarbonfootprints.Althoughtoday’sserversanddatacentersofleadinginternetcompaniesaremoreenergyefficientthaneverbefore,thefluctuationsinexternalworkloadandinternalresourceutilizationcallsforenergyproportionalcomputing.Insightintoserverenergyproportionalitycanhelpimproveworkloadplacementwhilealsoreducingenergyconsumption.Inthispaper,weinvestigateall477validpublishedresultsofSPECpower_ssjbenchmarkfrom2007to2016Q3andreorganizethembyhardwareavailabilityyearformoreaccurateanalysisonproductionservers.Throughcomprehensiveanalysiswefindthat:(1)Thespeciousstagnationofenergyproportionalityinrecentyearsis

87

mainlycausedbytheadoptionofprocessorsofspecificmicroarchitectureandisnottheindicativetrendofenergyproportionalityimprovement.(2)Microarchitectureevolutionhasmoreinfluenceonenergyefficiencyimprovementthanenergyproportionality.(3)Today’sservers’peakenergyefficienciesareshiftingfrom100%resourceutilizationto80%or70%utilizationandserverenergyproportionalityimproveswithsuchshifting.Wethenconductextensiveexperimentson4rackserverstoinvestigatetheenergyefficiencyvariationsunderdifferenthardwareconfigurations,includingmemorypercoreinstallationandprocessorfrequencyscaling.Ourexperimentsshowthathardwareconfigurationhassignificantimpactonserver’senergyefficiency.Ourfindingspresentedinthispaperprovideusefulinsightsandguidancetosystemdesigners,aswellasdatacenteroperatorsforenergyproportionalityawareworkloadplacementandenergysavings.

AreHTTP/2ServersReadyYet? MuhuiJiang(TheHongKongPolytechnicUniversity),XiapuLuo(TheHongKongPolytechnicUniversity),TungngaiMiu(NexusguardLimited),ShengtuoHu(TheHongKongPolytechnicUniversity),WeixiongRao(TongjiUniversity)

SupersedingHTTP/1.1,thedominatingwebprotocol,HTTP/2promisestomakewebapplicationsfasterandsaferbyintroducingmanynewfeatures,suchasmultiplexing,headercompression,requestpriority,serverpush,etc.AlthoughafewrecentstudiesexaminedtheadoptionofHTTP/2andevaluateditsimpacts,littleisknownaboutwhetherthepopularHTTP/2servershavecorrectlyrealizedthenewfeaturesandhowthedeployedserversusethesefeatures.Tofillinthegap,inthispaper,weconductthefirstsystematicinvestigationbyinspectingsixpopularimplementationsofHTTP/2servers(i.e.,Nginx,Apache,H2O,Lightspeed,nghttpdandTengine)andmeasuringthetop1millionAlexawebsites.Inparticular,weproposenewmethodsanddevelopatoolnamedH2Scopetoassessthenewfeaturesinthoseservers.Theresultsofthelarge-scalemeasurementonHTTP/2websitesrevealnewobservationsandinsights.ThisstudyshedslightonthecurrentstatusandthefutureresearchofHTTP/2.

DataIntegrityforCollaborativeApplicationsoverHostedServices ErtemEsiner(NanyangTechnologicalUniversity),AnwitamanDatta(NanyangTechnologicalUniversity)

Inthisworkwefocusonintegrityandconsistencyofdataaccessedandmanipulatedbymultiplecollaboratingusers,andstoredinan(untrusted)hostedservice.Thisisaproblem,aspectsofwhichhavebeenstudiedinisolationinhithertodistinctcommunities.Consistencyisoneofthecardinalproblemsofdistributedcomputing.Integrityofhosteddatahasbeenstudiedoverthelastdecade,andnumeroustechniquesforproofofdatapossessionand/orretrievabilityhavebeenexplored.Thelatterlineofworkhoweverhaveoftenassumedstaticdata,andtechniquestohandledynamicorversioneddatahaveonlyveryrecentlybeenproposed.Yet,eventheexistingsolutionsthathandlemutablecontentdosoundertheassumptionthatonlyasingledataowner(usingasingleclient)manipulateandverifysaiddata.Thisisaseriouslimitationintermsofthevarietyofapplicationsthatcanbenefitfromsuchmechanismsforproofofdatapossession.Thenovelty,andprimarycontributionofthisworkisinfillingthisgap.Specifically,weextendtheexistingideasofproofofpossessionofdynamicdata,inordertosupportmultipleuserswhomaycollaborateinrealtimeorasynchronously.Incontrast(andaddition)tothechallengeofanuntrustedstorageserverthatexistingtechniquesforproofofdatapossessionneedtoovercome,wehadto,simultaneouslyaccountfordataintegrityviolationsthatmaybeincurredduetoalltheusualchallengesofmaintainingconsistencyofcollaborativedata(evenifthestorageserverwastrusted).

VirtualMachinePowerAccountingwithShapleyValue WeixiangJiang(HuazhongUniversityofScience&Technology),FangmingLiu(HuazhongUniversityofScienceandTechnology),GuomingTang(UniversityofVictoria),KuiWu(UniversityofVictoria),HaiJin(HuazhongUniversityofScience&Technology)

Theever-increasingpowerconsumptionofdatacentershaseatenupalargeportionoftheirprofit.Onepossiblesolutionistochargedatacenterusersfortheiractualpowerusage.However,itposesagreattechnicalchallengeasthepowerofVMsco-existinginaphysicalmachinecannotbemeasureddirectly.ItisthuscriticaltodevelopafairmethodtodisaggregatethepowerofaphysicalmachinetoindividualVMs.Wetackletheabovechallengebymodelingthepowerdisaggregationproblemasacooperativegameandproposenon-deterministicShapleyvaluetodiscoverthefairpowershareofVMs(inthesenseofsatisfyingfourdesiredaxiomaticprinciples),whilecompensatingthenegativeimpactofVMpowervariation.Wedemonstratethattheresultsfromexistingpowermodel-basedsolutioncandeviatefromthe“groundtruth”by25.22%-46.15%.AndcomparedwiththeexactShapleyvalue,ournon-deterministicShapleyvaluecanachievelessthan5%errorfor90%ofthetime.

AVersatilePlatformforMobileDataGatheringExperimentsinWirelessSensorNetworks JiLi(StonyBrookUniversity),CongWang(StonyBrookUniversity),YuanyuanYang(StonyBrookUniversity)

Inrecentyears,mobiledatagatheringinwirelesssensornetworkshasattractedmuchinterestsintheresearchcommunity.However,despiteextensiveefforts,manyofpreviousworkinthisarealiesonlyintheoryandevaluatesnetworkperformancewithcomputersimulations,whichleavesalargegapfromreality.Inthispaper,wepresentthedesignandimplementationofageneralpurpose,flexibleplatformformobiledatagatheringinwirelesssensornetworkstoevaluatenetworkperformanceandalgorithmsinapracticalsetting.Insteadofrelyingonhand-craftedtheoreticalmodels,ourplatformintegratesbothmobiledatacollectorandsensornodestoproviderealisticperformanceevaluations.Inaddition,theplatformadoptsamodulardesigninmobiledatacollectorandsensornodes,andequipsthemobiledatacollectorwithadvancedcomputingcapability,whichmakesitversatileforevaluatingtheperformanceofawide-rangeofapplications.Finally,asacasestudy,weimplementawildlifemonitoringsystemonourplatform.Ourexperimentalresultsdemonstratethatrealimplementationscanevaluatemanypracticalperformancefactorswhichwouldhaveagreatimpactonthesensingresultsandareverydifficulttofullycapturebytheoreticalmodelsandsimulations.Weexpectthatthisplatformcanbecomeaverypowerfulgeneraltoolformoreaccuratenetworksimulationsandfacilitateperformanceoptimizationinwirelesssensornetworks.

OnDirectionalNeighborDiscoveryinmmWaveNetworks YuWang(AuburnUniversity),ShiwenMao(AuburnUniversity),TheodoreS.Rappaport(NewYorkUniversity)

Thedirectionalneighbordiscoveryproblem,i.e.,spatialrendezvous,isafundamentalprobleminmillimeterwave(mmWave)networks.Thechallengeishowtoletthetransmitterandreceiverbeamsmeetinspaceunderdeafnesscausedbydirectionaltransmissionandreception.Inthispaper,wepresentaHunting-basedDirectionalNeighborDiscovery(HDND)scheme,whereanodecontinuouslyrotatesitsdirectionalbeamtoscanitsneighborhoodforneighbors.Througharigorousanalysis,wederivetheconditionsforensuredneighbordiscovery,aswellasaboundfortheworstcasediscoverytime.Wevalidatetheanalysiswithextensivesimulations,anddemonstratethesuperiorperformanceoftheproposedschemeovertwobenchmarkschemes.

88

Vision/Blue Sky Thinking Track Paper Abstracts

Vision1:InternetofThings,SmartCitiesandCyber-PhysicalSystemsObservable-by-Design MasaruKitsuregawa(NationalInstituteofInformatics(NII)/InstituteofIndustrialScience,UniversityofTokyo)

Wepresenttheobservable-by-designprinciple.Webelieve,thatthenewgenerationofservices,products,andenvironment,managementsystemsshouldbedesignedtoadapttochanges.,Therefore,theyshouldbedesignedtobeobservable,andtheirdesign,shouldproactivelyandreactivelyadapttothechangesobserved,bothinternallyandexternally.Twoconcreteexamplesillustrate,theapplicationofobservable-by-designprinciple:(1)ship,buildingandmanagement,and(2)riverdamwaterflowmanagement.,Webelievethattheobservable-by-designprinciplecanbe,appliedinalargescale.Inthelongterm,anewgenerationofobservable-by-design,infrastructurescanbebuiltthatincorporates,thesensingandadaptingcapabilitiesintheirconstruction.

AnArchitecturalVisionforaData-CentricIoT:RethinkingThings,TrustandClouds EveM.Schooler(Intel),DavidZage(Intel),JeffSedayao(Intel),HassnaaMoustafa(Intel),AndrewBrown(Intel),MorenoAmbrosin(UniversityofPadua)

TheInternetofThings(IoT)isproducingatidalwaveofdata,muchofitoriginatingatthenetworkedgeandoriginatingfromapplicationswithrequirementsunmetbythetraditionalback-endCloudarchitecture.Toaddressthedisruptioncausedbytheoceanofdata,thispaperoffersaholisticdata-centricarchitecturalvisionforthedata-centricIoT.Itadvocatesthatwerethinkourapproachtothedesignanddefinitionofkeyelements:thatweshiftourfocusfromThingstoSmartObjects;growTrustorganically;andevolveback-endCloudstowardEdgeandFogclouds,whichleveragedata-centricnetworksandenableoptimalhandlingofupstreamdataflows.Alongtheway,wewaxpoeticaboutseveralblue-skytopics,assessthestatusoftheseelementsinthecontextofrelatedwork,andidentifyknowngapsinmeetingthisvision.

EdgeComputingandIoTBasedResearchforBuildingSafeSmartCitiesResistanttoDisasters TeruoHigashino(OsakaUniversity),HirozumiYamaguchi(OsakaUniversity),AkihitoHiromori(OsakaUniversity),AkiraUchiyama(OsakaUniversity),KeiichiYasumoto(NaraInstituteofScienceandTechnology)

Recently,severalresearchesconcerningwithsmartandconnectedcommunitieshavebeenstudied.Soonthe4G/5Gtechnologybecomespopular,andcellularbasestationswillbedenselylocatedintheurbanspace.Theymayofferintelligentservicesforautonomousdriving,urbanenvironmentimprovement,disastermitigation,elderly/disabledpeoplesupportandsoon.Suchinfrastructuremightfunctionasedgeserversfordisastersupportbase.Inthispaper,weenumerateseveralresearchissuestobedevelopedintheICDCScommunityinthenextdecadeinorderforbuildingsafesmartcitiesresistanttodisasters.Inparticular,wefocuson(A)up-to-dateurbancrowdmobilitypredictionand(B)resilientdisasterinformationgatheringmechanismsbasedontheedgecomputingparadigm.Weinvestigaterecentrelatedworksandprojects,andintroduceouron-goingresearchworkandinsightfordisastermitigation.

TheInternetofThingsandMultiagentSystems:DecentralizedIntelligenceinDistributedComputing MunindarSingh(NorthCarolinaStateUniversity),AmitChopra(LancasterUniversity)

Traditionally,distributedcomputingconcentratesoncomputationunderstoodatthelevelofinformationexchangeandsetsasidehumanandorganizationalconcernsaslargelytobehandledinanadhocmanner.Increasingly,however,distributedapplicationsinvolvemultiplelociofautonomy.Researchinmultiagentsystems(MAS)addressesautonomybydrawingonconceptsandtechniquesfromartificialintelligence.However,MASresearchgenerallylacksanadequateunderstandingofmoderndistributedcomputing.InthisBlueSkypaper,weenvisiondecentralizedmultiagentsystemsasawaytoplacedecentralizedintelligenceindistributedcomputing,specifically,bysupportingcomputationatthelevelofsocialmeanings.WemotivateourproposalsforresearchinthecontextoftheInternetofThings(IoT),whichhasbecomeamajorthrustindistributedcomputing.FromtheIoTsrepresentativeapplications,weabstractoutthemajorchallengesofrelevancetodecentralizedintelligence.TheseincludetheheterogeneityofIoTcomponents;asynchronousanddelay-tolerantcommunicationanddecoupledenactment;andmultiplestakeholderswithsubtlerequirementsforgovernance,incorporatingresourceusage,cooperation,andprivacy.TheIoTyieldshigh-impactproblemsthatrequiresolutionsthatgobeyondtraditionalwaysofthinking.Weconcludewithhighlightsofsomepossibleresearchdirectionsindecentralizedmultiagentsystems,includingprogrammingmodels;interaction-orientedsoftwareengineering;andwhatwetermenlightenedgovernance.

InternetofThings:FromSmall-toLarge-ScaleOrchestration CharlesConsel(Inria/BordeauxINP),MilanKabac(ImperialCollege)

ThedomainofInternetofThings(IoT)israpidly,expandingbeyondresearch,andbecomingamajorindustrial,marketwithsuchstakeholdersasmajormanufacturersofchips,andconnectedentities(i.e.,things),andfast-growingoperators,ofwide-areanetworks.Importantly,thisemergingdomainis,drivenbyapplicationsthatleverageanIoTinfrastructureto,provideuserswithinnovative,high-valueservices.IoTinfrastructures,rangefromsmallscale(e.g.,homesandpersonal,health)tolargescale(e.g.,citiesandtransportationsystems).Inthispaper,wearguethatthereisacontinuumbetweenorchestrating,connectedentitiesinthesmallandinthelarge.We,proposeaunifiedapproachtoapplicationdevelopment,which,coversthisspectrum.Todoso,weexaminetherequirementsfor,orchestratingconnectedentitiesandaddressthemwithdomainspecific,designconcepts.Wethenshowhowtomapthesedesign,conceptsintodedicatedprogrammingpatternsandruntime,mechanisms.Ourworkrevolvesarounddomain-specificconceptsand,notations,integratedintoatool-baseddesignmethodologyand,dedicatedtodevelopIoTapplications.Wehaveappliedour,workacrossaspectrumofinfrastructuresizes,rangingfrom,anautomatedpilotinavionics,toanassistedlivingplatform,forthehomeofseniors,toaparkingmanagementsystemin,asmartcity.

EdgeOS_H:AHomeOperatingSystemforInternetofEverything JieCao(WayneStateUniversity),LanyuXu(WayneStateUniversity),RaefAbdallah(WayneStateUniversity),WeisongShi(WayneStateUniversity)

TheproliferationofInternetofEverything(IoE)andthesuccessofrichCloudserviceshavepushedthehorizonofanewcomputingparadigm,EdgeComputing,whichcallsforprocessingthedataattheedgeofthenetwork.SmarthomeasatypicalIoEapplicationisbeingwidelyadaptedintopeopleslife.EdgeComputinghasthepotentialtoempowerthesmarthome,butitneedsmorecontributionfromthecommunitybeforeittrulybenefitsourlives.Inthispaper,wefirstpresentthe

89

visionofEdgeOSH,ahomeoperatingsystemforInternetofEverything,followedbythechallengesinEdgeOSH,namelyprogramminginterface,self-management,datamanagement,security&privacy,andnaming.Withineachchallengewealsodiscussthepotentialdirectionsthatareworthfurtherinvestigation.

Vision2:FutureNetworkingandCyberinfrastructureAVisionforZero-HopNetworking(ZeN) MostafaAmmar(SchoolofComputerScience,GeorgiaTech),EllenZegura(SchoolofComputerScience,GeorgiaTech),YimengZhao(SchoolofComputerScience,GeorgiaTech)

Ithasbecomeincreasinglyimportantforcontentproviders(CPs)toreachconsumerswithlowlatency.PeeringlinksthatconnectCPsdirectlytoaccessInternetserviceproviders(accessISPs)havebeenusedforthispurposethusprovidingone-hopASpathsfromCPstousers.Whileprovidingimprovedlatency,thesepeeringlinksstilldonotgiveCPscontrolovertheentireend-to-endpathtotheirusers.ThishasmadeitdifficultforCPstocompletelymanageuserexperience.Motivatedbythis,weproposethedeploymentofZero-HopNetworks(ZeN),whereaCP'sentireend-to-endpathtousersisunderitscontrol.WebelieveitisimportanttorespondtothecompellingdemandforZeNandenableitsprovisionoverthesharedInternetinfrastructuresothatallmaycontinuetoreapitsbenefits.InthispaperwelayoutthevisionforZeN,describingitsgoalsandchallenges.WeproposetodeployZeNbyallowingCPstoextendtheirnetwork'scontrolovertheaccessISPsubstrateinawaythatallowstheCPtocontroltheentireend-to-endpath.WedeveloptwostrawmanarchitecturesbasedonSoftware-DefinedNetworkingideas:onebasedonresourcereservationandtheotherbasedonnetworkvirtualization.WealsodiscusssomeelementsofaresearchagendathatisneededtobringZeNdeploymentstorealization.

StructuredOverlayNetworksforaNewGenerationofInternetServices AmyBabay(JohnsHopkinsUniversity),ClaudiuDanilov(BoeingResearchandTechnology),JohnLane(LTNGLobalCommunications),MichalMiskin-Amir(LTNGlobalCommunications,SpreadConceptsLLC),DanielObenshain(JohnsHopkinsUniversity),JohnSchultz(LTNGlobalCommunications,SpreadConceptsLLC),JonathanStanton(LTNGlobalCommunications,SpreadConceptsLLC),ThomasTantillo(JohnsHopkinsUniversity),YairAmir(JohnsHopkinsUniversity,LTNGlobalCommunications,SpreadConceptsLLC)

ThedramaticsuccessandscalingoftheInternetwasmadepossiblebythecoreprincipleofkeepingitsimpleinthemiddleandsmartattheedge(ortheend-to-endprinciple).However,newapplicationsbringnewdemands,andformanyemergingapplications,theInternetparadigmpresentslimitations.ForapplicationsinthisnewgenerationofInternetservices,structuredoverlaynetworksofferapowerfulframeworkfordeployingspecializedprotocolsthatcanprovidenewcapabilitiesbeyondwhattheInternetnativelysupportsbyleveragingglobalstateandin-networkprocessing.Thestructuredoverlayconceptincludesthreeprinciples:Aresilientnetworkarchitecture,aflexibleoverlaynodesoftwarearchitecturethatexploitsglobalstateandunlimitedprogrammability,andflow-basedprocessing.Wedemonstratetheeffectivenessofstructuredoverlaynetworksinsupportingtodaysdemandingapplicationsandproposeforward-lookingideasforleveragingtheframeworktodevelopprotocolsthatpushtheboundariesofwhatispossibleintermsofperformanceandresilience.

EnsuringNetworkNeutralityforFutureDistributedSystems ThiagoGarrett(FederalUniversityofParana),SchahramDustdar(TUWien),LuisC.E.Bona(FederalUniversityofParana),EliasP.DuarteJr.(FederalUniversityofParana)

NetworkNeutralityisessentialforensuringalevelplayingfieldforthedevelopmentofnewapplicationsandservicesontheInternet.Lawsandrulesalonemightnotbeenoughtoprotectinnovation,faircompetitionandconsumersfreedomofchoiceonline.TheresearchcommunityhastheresponsibilitytoproposesolutionsthatrevealdiscriminatorytrafficmanagementmechanismsontheInternet.Wepresentthepotentialrisksofanon-neutralInternet,identifyseveralopenchallengesfordesigningsolutionsthatdetecttrafficdifferentiation,andproposeamodelthataddressessuchchallengesbytakingadvantageofdistributedsystemstechnologies.

UncoveringtheUsefulStructuresofComplexNetworksinSocially-RichandDynamicEnvironments JieWu(TempleUniversity)

Manygroupactivitiescanberepresentedasacomplexnetworkwhereentities(vertices)areconnectedinpairsbylines(edges).Uncoveringausefulglobalstructureofcomplexnetworksisimportantforunderstandingsystembehaviorsandinprovidingglobalguidanceforapplicationdesigns.Webrieflyreviewexistingnetworkmodels,discussseveraltoolsusedinthetraditionalgraphtheory,distributedcomputing,distributedsystems,andsocialnetworkcommunities,andpointouttheirlimitations.Wediscussopportunitiestouncoverthestructuralpropertiesofcomplexnetworks,especiallyinamobileenvironment,andwesummarizethreepromisingapproachesforuncoveringusefulstructures:trimming,layering,andremapping.Finally,wepresentsomechallengesinalgorithmictechniques,withafocusondistributedandlocalizedsolutions,torepresentvariousstructures.

FutureNetworkingChallenges:TheCaseofMobileAugmentedReality TristanBraud(TheHongKongUniversityofScienceandTechnology),FarshidHassaniBijarbooneh(TheHongKongUniversityofScienceandTechnology),DimitrisChatzopoulos(TheHongKongUniversityofScienceandTechnology),PanHui(TheHongKongUniversityofScienceandTechnology)

Mobileaugmentedreality(MAR)applicationsaregainingpopularityduetothewideadoptionofmobileandespeciallywearabledevices.SuchdevicesoftenpresentlimitedhardwarecapabilitieswhileMARapplicationsoftenrelyoncomputationallyintensivecomputervisionalgorithmswithextremelatencyrequirements.Tocompensateforthelackofcomputingpower,offloadingdataprocessingtoadistantmachineisoftendesired.However,thisprocessintroducesnewconstrainsintheapplication,especiallyintermsoflatencyandbandwidth.Ifcurrentnetworkinfrastructuresarenotreadyforsuchtraffic,weenvisionthatfuturewirelessnetworkssuchas5GwillrapidlybesaturatedbyresourcehungryMARapplications.Moreover,duetothehighvarianceofwirelessnetworks,MARapplicationsshouldnotrelyonlyontheevolutionofinfrastructures.Inthisarticle,weanalyzeMARapplicationsandjustifytheirneedforaccessingexternalinfrastructure.Afterareviewoftheexistingnetworkinfrastructuresandprotocols,wedefineguidelinesforfuturereal-timeandmultimediatransportprotocols,withafocusonMARoffloading.

SoftwareDefinedCyberinfrastructure IanFoster(ArgonneNationalLaboratoryandTheUniversityofChicago),BenBlaiszik(TheUniversityofChicago),KyleChard(ComputationInstitute,UniversityofChicagoandArgonneNationalLab),RyanChard(VictoriaUniversityofWellington)

90

Withinandacrossthousandsofsciencelabs,researchersandstudentsstruggletomanagedataproducedinexperiments,simulations,andanalyses.Largelymanualresearchdatalifecyclemanagementprocessesmeanthatmuchtimeiswasted,researchresultsareoftenirreproducible,anddatasharingandreuseremainrare.Inresponse,weproposeanewapproachtodatalifecyclemanagementinwhichresearchersareempoweredtodefinetheactionstobeperformedatindividualstoragesystemswhendataarecreatedormodified:actionssuchasanalysis,transformation,copying,andpublication.Wetermthisapproachsoftware-definedcyberinfrastructurebecauseuserscanimplementpowerfuldatamanagementpoliciesbydeployingrulestolocalstoragesystems,muchassoftware-definednetworkingallowsuserstoconfigurenetworksbydeployingrulestoswitches.Wearguethatthisapproachcanenableanewclassofresponsivedistributedstorageinfrastructurethatwillaccelerateresearchinnovationbyallowinganyresearchertoassociatedataworkflowswithdatasources,whetherlocalorremote,forsuchpurposesasdataingest,characterization,indexing,andsharing.Wereportonearlyexperimentswiththisapproachinthecontextofexperimentalscience,inwhichasimpleif-trigger-then-action(IFTA)notationisusedtodefinerules.

Vision3:NextGenerationCloudandEdgeServicesComputingintheContinuum:CombiningPervasiveDevicesandServicestoSupportData-drivenApplications ManishParashar(RutgersUniversity),MoustafaAbdelbaky(RutgersUniversity),MengsongZou(RutgersUniversity),AliRezaZamani(RutgersUniversity),EduardRenart(RutgersUniversity),JavierDiaz-Montes(RutgersUniversity)

Theexponentialgrowthofdigitaldatasourceshas,thepotentialtotransformallaspectsofsocietyandourlives.,However,toachievethisimpactthedatahastobeprocessed,inatimelymannertoextractcriticalinsightsthatcandrive,decisionmaking.Further,traditionalapproachesthatrelyon,movingdatatoremotedatacentersforprocessingarenolonger,feasible.Instead,newapproachesthateffectivelyleveragedistributed,computationalinfrastructureandservicesarenecessary.,Specifically,theseapproachesmustseamlesslycombineresources,andservicesattheedge,inthecore,andalongthedata,pathasneeded.Thispaperpresentsourvisionforenabling,anapproachforcomputinginthecontinuum,i.e.,realizinga,fluidecosystemwheredistributedresourcesandservicesare,programmaticallyaggregatedon-demandtosupportemerging,data-drivenapplicationworkflows.Thisvisioncallsfornovel,solutionsforfederatinginfrastructure,programmingapplications,andservices,andcomposingdynamicworkflows,whichare,capableofreactinginreal-timetounpredictabledatasizes,,availabilities,locations,andrates.

Decision-drivenExecution:ADistributedResourceManagementParadigmfortheAgeofIoT TarekAbdelzaher(UIUC),TanvirAlAmin(UIUC),AmotzBar-Noy(UIUC),WilliamDron(BBN),RameshGovindan(USC),ReginaldHobbs(ARL),ShaohanHu(IBM),Jung-EunKim(UIUC),ShuochaoYao(UIUC),YiranZhao(UIUC)

Thispaperintroducesanovelparadigmforresourcemanagementindistributedsystems,calleddecision-drivenexecution.Theparadigmisappropriateformission-drivensystems,wherethegoalistoenablefaster,leaner,andmoreeffectivedecisionmaking.Allresourceconsumption,inthisparadigm,istiedtotheneedsofmakingdecisionsonalternativecoursesofaction.Apointofdeparturefromtraditionalarchitecturesliesininterfacesthatallowapplicationstospecifytheirunderlyingdecisionlogic.Thisspecification,inturn,allowsthesystemtoreasonaboutmosteffectivemeanstomeetinformationneedsofdecisions,resultinginsimulataneousoptimizationofdecisionaccuracy,cost,andspeed.Thepaperdiscussestheoverallvisionofdecision-drivenexecution,outliningpreliminaryworkandnovelchallenges.

ACTiCLOUD:EnablingtheNextGenerationofCloudApplications GeorgiosGoumas(NationalTechnicalUniversityofAthens),KonstantinosNikas(ComputingSystemsLaboratory,NTUA),EwnetuBayuhLakew(Dept.ofComputingScience,UmeaUniversity),ChristosKotselidis(TheUniversityofManchester),VasileiosKarakostas(ComputingSystemsLaboratory,NTUA),AtleVesterkjaer(Numascale),EinarRustad(Numascale),JohnGoodacre(Kaleao),AndrewAttwood(Kaleao),MichailFlouris(OnApp),JohnThomson(OnApp),NikosFoutris(TheUniversityofManchester),MikelLujan(TheUniversityofManchester),YingZhang(MonetDBSolutions),PanagiotisKoutsourakis(MonetDBSolutions),MartinKersten(MonetDBSolutions),JimWebber(NeoTechnology),DavideGrohmann(NeoTechnology),ErikElmroth(Dept.ofComputingScience,UmeaUniversity),LuisTomas(Dept.ofComputingScience,UmeaUniversity),NectariosKoziris(NationalTechnicalUniversityofAthens)

Despitetheirproliferationasadominantcomputingparadigm,cloudcomputingsystemslackeffectivemechanismstomanagetheirvastamountsofresourcesefficiently.Resourcesarestrandedandfragmented,ultimatelylimitingcloudsystemsapplicabilitytolargeclassesofcriticalapplicationsthatposenon-moderateresourcedemands.Eliminatingcurrenttechnologicalbarriersofactualfluidityandscalabilityofcloudresourcesisessentialtostrengthencloudcomputingsroleasacriticalcornerstoneforthedigitaleconomy.ACTiCLOUDproposesanovelcloudarchitecturethatbreakstheexistingscale-upandshare-nothingbarriersandenablestheholisticmanagementofphysicalresourcesbothatthelocalcloudsiteandatdistributedlevels.Specifically,itmakesadvancementsinthecloudresourcemanagementstacksbyextendingstate-of-the-arthypervisortechnologybeyondthephysicalserverboundaryandlocalizedcloudmanagementsystemtoprovideanholisticresourcemanagementwithinarack,withinasite,andacrossdistributedcloudsites.Ontopofthis,ACTiCLOUDwilladaptandoptimizesystemlibrariesandruntimes(e.g.,JVM)aswellasACTiCLOUD-nativeapplications,whichareextremelydemanding,andcriticalclassesofapplicationsthatcurrentlyfaceseveredifficultiesinmatchingtheirresourcerequirementstostate-of-the-artcloudofferings.

JointCloud:ACross-CloudCooperationArchitectureforIntegratedInternetServiceCustomization HuaiminWang(NationalUniversityofDefenseTechnology),PeichangShi(NationalUniversityofDefenseTechnology),YimingZhang(NationalUniversityofDefenseTechnology)

CloudcomputinghascompletelychangedtheeconomicsofITindustry.Recently,thenewformofsharedglobaleconomyrequirescloudservicestobecollaborativelyprovisionedbydifferentcloudprovidersinaGeo-distributedmanner,whichbringsseverechallengesinserviceperformanceandcost.Toaddressthisproblem,inthispaperweproposeJointCloud,across-cloudcooperationarchitectureforintegratedInternetservicecustomization.JointCloudborrowstheideafromairlinealliancesandaimsatempoweringthecooperationamongmultiplecloudstoprovideefficientcross-cloudservices.JointCloudfocusesnotonlyontheverticalintegrationofcloudresourcesbutalsoonthehorizontalcooperationamongdifferentcloudvendors.ThispaperdescribestheconceptandarchitectureofJointCloud,aswellastheinitialdesignsofJointCloudskeycomponents,namely,communication,storage,andcomputation.

SupportingDataAnalyticsApplicationsWhichUtilizeCognitiveServices ArunIyengar(IBMResearch)

91

AwidevarietyofservicesareavailableovertheWebwhichcandramaticallyimprovethefunctionalityofapplications.Theseservicesincludeinformationretrieval(includingdatalookupsfromavarietyofsourcesandWebsearches),naturallanguageunderstanding,visualrecognition,anddatastorage.Akeyproblemishowtoprovidesupportforapplicationswhichusetheseservices.Thispaperpresentsarichsoftwaredevelopmentkit(SDK)whichaccessestheseservicesandprovidesavarietyoffeaturesapplicationsneedtousetheseservices,optimizeperformance,andcomparethem.AkeyaspectofourSDKisitssupportfornaturallanguageunderstandingservices.WealsopresentapersonalizedknowledgebasebuiltontopofourrichSDKthatusespublicallyavailabledatasourcesaswellasprivateinformation.Theknowledgebasesupportsdataanalysisandreasoningoverdata.

TrillionOperationsKey-ValueStorageEngine:RevisitingtheMissionCriticalAnalyticsStorageSoftwareStack SangeethaSeshadri(IBMAlmadenResearchCenter),LawrenceChiu(IBMAlmadenResearchCenter),PaulMuench(IBMAlmadenResearchCenter)

Dataisthenewnaturalresourceofthiscentury.Asdatavolumesgrowandapplicationsaimedatmonetizingthedatacontinuetoevolve,dataprocessingplatformsareexpectedtomeetnewscale,performance,reliabilityanddataretentionrequirements.Atthesametime,storagehardwarecontinuestoimproveinperformanceandprice-performance.Inthispaper,wepresentTOKVS-TrillionOperationKey-ValueStore,aNoSQLstorageenginethatredefinesthestoragesoftwarestacktomeettherequirementsofnext-generationapplicationsonnext-generationhardware.

Vision4:SecurityandTrustinFutureSystemsHowComputerScienceRiskstoLoseItsInnocence,andShouldAttempttoTakeResponsibilityKarlAberer(EPFL)

Computerscienceisplayingadrivingroleintransformingtoday’ssocietythroughinformationtechnology.Inthistransformationweobservepowershiftsincreasinglystrengtheningcentralisedorganisations,whicharenegativelyperceivedbymanypeople.Weoutlinetechnicalquestionsthatcomputerscienceshouldpayattentiontoinordertoenableindividualsinpreservingtheirinterestandtotakemeaningfuldecisionsbasedonreliableinformation.

ACognitivePolicyFrameworkforNext-GenerationDistributedFederatedSystems-ConceptsandResearchDirections ElisaBertino(PurdueUniversity),SeraphinCalo(IBM),MarounTouma(IBM),DineshVerma(IBM),ChristopherWilliams(UKDSTL),BrianRivera(ArmyResearchLabs)

Next-generationcollaborativeactivitiesandmissionswillbecarriedoutbyautonomousgroupsofdeviceswithalargevarietyofcognitivecapabilities.Thesedeviceswillhavetooperateinenvironmentscharacterizedbyuncertainty,insecurity(bothphysicalandcyber),andinstability.Insuchenvironments,communicationsmaybefragmented.Properpolicy-basedmanagementofsuchautonomousdevicegroupsisthuscritical.Howevercurrentpolicymanagementsystemshavemanylimitations,includinglackofflexibility.Inthispaper,wearticulatenovelarchitecturalapproachesaddressingtherequirementsfortheeffectivemanagementofautonomousgroupsofdevicesanddiscussthenotionofgenerativepoliciesanovelparadigmthatenhancestheflexibilityofpolicy-basedapproachestomanagement.Inthispaper,wealsosurveytypesofpolicythatareessentialformanagingdevicegroups.Eventhoughmanysuchpolicytypesexistinconventionalsettings,theiruseinourcontextposesnovelchallengesthatwearticulateinthepaper.Wealsointroducearesearchroadmapdiscussingseveralresearchdirectionstowardsthedevelopmentofacognitiveandflexiblepolicy-basedapproachtothemanagementofautonomousgroupsofdevicesforcollaborativemissions.Finally,asourproposedpolicyparadigmisdata-intensive,wediscusstheproblemofsupplyingthedatarequiredforpolicydecisionsinenvironmentscharacterizedbymobility,uncertainly,andfragmentedcommunications.

MachinetoMachineTrustinSmartCities MargaretLoper(GeorgiaTechResearchInstitute),BrianSwenson(GeorgiaInstituteofTechnology)

Inthecomingdecades,wewillliveinaworldsurroundedbytensofbillionsofdevicesthatwillinteroperateandcollaborateinanefforttodeliverpersonalizedandautonomicservices.ThisparadigmofsmartobjectsandsmartthingsinterconnectedandubiquitouslysurroundingusiscalledtheInternetofThings(IoT).CitiesmaybethefirsttobenefitfromtheIoT,butrelianceonthesemachinestomakedecisionshasprofoundimplicationsfortrust,andmakesmechanismsforexpressingandreasoningabouttrustessential.ThispaperintroducestheprojectfundedbytheGeorgiaTechResearchInstitutetolookatseveraldimensionsofMachinetoMachineTrustinthecontextofSmartCities.

LateralThinkingforTrustworthyApps HermannHärtig(TechnischeUniversitätDresden),MichaelRoitzsch(TechnischeUniversitätDresden),CarstenWeinhold(TechnischeUniversitätDresden),AdamLackorzynski(TechnischeUniversitätDresden)

Thegrowingcomputerizationofcriticalinfrastructureaswellasthepervasivenessofcomputingineverydaylifehasledtoincreasedinterestinsecureapplicationdevelopment.ExemplifiedbyARMTrustZoneandIntelSGX,weobserveaflurryofnewsecuritytechnologies,butalackofanarchitecturalvision.Weareconvincedthatpointsolutionsarenotsufficienttoaddresstheoverallchallengeofsecuresystemdesign.Inthispaper,wesketchourtakeonatrustedcomponentecosystemofsmallindividualbuildingblockswithstrongisolation.Inourview,applicationsshouldnolongerbedesignedasmassivestacksofverticallylayeredframeworks,butinsteadashorizontalaggregatesofmutuallyisolatedcomponentsthatcollaborateacrossmachineboundariestoprovideaservice.Lateralthinkingisneededtocreatesecuresystemsgoingforward.

RumorInitiatorDetectioninInfectedSignedNetworks JiaweiZhang(UniversityofIllinoisatChicago),CharuC.Aggarwal(IBMT.J.WatsonResearchCenter),PhilipS.Yu(UniversityofIllinoisatChicago)

Inmanycases,theinformationspreadinanonlinenetworkmaynotalwaysbetruthfulorcorrect;suchinformationcorrespondstorumors.Inrecentyears,signednetworkshavebecomeincreasinglypopularbecauseoftheirabilitytorepresentdiverserelationshipssuchasfriends,enemies,trust,anddistrust.Signednetworksareidealforinformationflowinanetworkwithvaryingbeliefs(trustordistrust)aboutfacts.Inthispaper,wewillstudytheproblemofinfluenceanalysisanddiffusionmodelsinsignednetworksandinvestigatetheproblemofrumorinitiatordetection,giventhestateofthenetworkatagivenmomentintime.Conventionalinformationdiffusionmodelsforunsignednetworkscannotbeappliedtosignednetworksdirectly,andweshowthattherumorinitiatordetectionproblemisNP-hard.Weproposeanewinformationdiffusionmodel,referredtoasasyMmetricFlippingCascade(MFC),tomodelthepropagationofinformationinsignednetworks.BasedonMFC,anovelframework,RumorInitiatorDetector(RID),isintroducedtodeterminethepotentialnumberandtheidentityoftherumorinitiatorsfromthestateofthenetworkatagiventime.Extensiveexperimentsconductedonreal-worldsignednetworksdemonstratethatMFCworksverywellinmodelinginformationdiffusioninsignednetworksandRIDcansignificantlyoutperformothercomparisonmethodsinidentifyingrumorinitiators.

92

AddressingSmartphone-basedMulti-factorAuthenticationviaHardware-rootedTechnologiesZhongjieBa(TheStateUniversityofNewYorkatBuffalo),KuiRen(TheStateUniversityofNewYorkatBuffalo)

Multi-factorauthenticationisawell-recognizedaccesscontrolmethodthatenhancesthesecurityofuserssensitivedataandidentities.Asuccessfulauthenticationattemptrequiresausertocorrectlypresenttwoormoreauthenticationfactorssuchasknowledgefactors,possessionfactorsandinherencefactors.Forsmartphone-basedmulti-factorauthentication,apromisingwaytoauthenticateauseristoverifyhispossessionofalegitimatesmartphone,whichcallsforsecureandusabledeviceauthenticationschemes.Inthisarticle,weproposetoauthenticateadevicethroughtrackingthehardwarefingerprintofitsbuilt-insensor.Wefirstreviewtheexistinghardwarerootedidentificationmethodsanddiscussthemeritsofapplyingahardwarefingerprintasasmartphonesuniqueidentity.Then,weanalyzethesecurityissuesunderlyingthesemethodsandidentifytwosecurityrequirementsfortheidentificationmethodstobeusedinanauthenticationscheme:FingerprintLeakageResilienceandFingerprintForgeryResilience.Finally,welookintoaspecifichardwarefingerprintoriginallyusedfordigitalcameras.Weanalyzethefeasibilityofapplyingthisfingerprinttodifferentiateoff-the-shelfsmartphonesandlistseveralchallengingpracticalissuesunderlyingthismethod.

Vision5:FutureDistributedSystemsEnablingwideareadataanalyticswithCollaborativeDistributedProcessingPipes(CDPPs) AnjaFeldmann(TUBerlin),ManfredHauswirth(TUBerlin),VolkerMarkl(TUBerlin)

TheMillibottleneckTheoryofPerformanceBugs,andItsExperimentalVerification CaltonPu(GeorgiaInstituteofTechnology),JoshuaKimball(GeorgiaInstituteofTechnology),Chien-AnLai(GeorgiaInstituteofTechnology),TaoZhu(GeorgiaInstituteofTechnology),JackLi,JunheePark,QingyangWang,DeepalJayasinghe,PengchengXiong,SimonMalkowski,QinyiWu,GueyoungJung,YounggyunKoh,GalenSwint

Theperformanceofn-tierweb-facingapplicationsoftensufferfromresponsetimelong-tailproblem.Withrelativelylowresourceutilization(lessthan50%)andthevastmajorityofrequestsreturningwithinafewmilliseconds,anon-negligiblenumberofnormallyshortrequestsmaytakesecondstoreturn.Weproposethemillibottlenecktheoryofperformancebugs(thatleadtolong-tailproblems).Severalcasestudieshaveconfirmedthemillibottlenecks(thatlastafewtenstohundredsofmilliseconds)ascausalagentsoflongrequests.Aconcreteexample(garbagecollection)illustratestheexperimentalverificationofmillibottlenecks.Anopensourcefine-grainmonitoringtoolkitisbeingdevelopedtofacilitatetheexperimentalresearchonmillibottlenecks.

Exacution:EnhancingScientificDataManagementforExascale ScottKlasky(OakRidgeNationalLaboratory),EricSuchyta(OakRidgeNationalLab),MarkAinsworth(BrownUniversity),QingLiu(NewJerseyInstituteofTechnology),BenWhitney(BrownUniversity),MatthewWolf(OakRidgeNationalLaboratory),JongChoi(OakRidgeNationalLaboratory),IanFoster(ArgonneNationalLaboratory),MarkKim(OakRidgeNationalLaboratory),JeremyLogan(UniversityOfTennesseeKnoxville),KshitijMehta(OakRidgeNationalLaboratory),ToddMunson(ArgonneNationalLaboratory),GeorgeOstrouchov(OakRidgeNationalLaboratory),ManishParashar(RutgersUniversity),NorbertPodhorszk(OakRidgeNationalLaboratory),DavidPugmire(OakRidgeNationalLaboratory),LipengWan(OakRidgeNationalLaboratory)

Aswecontinuetowardexascale,scientificdatavolumeiscontinuingtoscaleandbecomingmoreburdensometomanage.Inthispaper,welayoutopportunitiestoenhancestateoftheartdatamanagementtechniques.Weemphasizewell-principleddatacompression,andusingittoachieveprogressiverefinement.ThiscanbothaccelerateI/Oandaffordtheuserincreasedflexibilitywhensheinteractswiththedata.Theformulationnaturallymapsontoenablingonetopartitiontheprogressivelyimprovingqualityrepresentationsofthesamedataquantityintodifferentmedia-typedestinations,tokeepthehighestpriorityinformationascloseaspossibletothecomputation,andtakeadvantageofdeepeningmemory/storagehierarchiesinwaysnotpreviouslypossible.Carefulmonitoringisrequisitetoourvision,notonlytoverifythatcompressionhasnoteliminatedsalientfeaturesinthedata,butalsotobetterunderstandtheperformanceofhighperformancescientificapplications.Increasedmathematicalrigorwouldideal,tohelpbringcompressiononabetter-understoodtheoreticalfooting,closertotherelevantscientifictheory,moreawareofconstraintsimposedbythescience,andmoretightlyerrorcontrolled.Throughout,wehighlightpathfindingresearchwehavebegunexploringrelatedthesetopics,andcommenttowardfutureworkthatwillbeneeded.

HardwareAccelerationLandscapeforDistributedReal-timeAnalytics:VirtuesandLimitations MohammadrezaNajafi(TechnischeUniversitatMunchen),KaiwenZhang(TechnischeUniversitatMunchen),Hans-ArnoJacobsen(UniversityofToronto),MohammadSadoghi(PurdueUniversity)

Arguably,wearenowwitnessinganewtechnologicalrevolutionwiththepotentialthatrangesfromtransformingourday-to-daylifeexperiences(e.g.,personalizedmedicineandeducation)totransformingeverysingleindustry(e.g.,data-drivenhealthcare,commerce,agriculture,andmining).Atthecoreofthisrevolutionliesdata.Thistransformationisfacilitatedbysensing,gathering,andconnectingallphysicalentitiestoconstructarichanddynamiccomputationalmodelofrealityinreal-time.Everyprocedureandeverydecisionneededinthephysicalworldwillsoonbeoptimizedinreal-timebyingestingandanalyzingmassivevolumeofpresentandpastdataatanunprecedentedvelocity.Tocopewithsuchextremescale,wearguetheneedtorevisitthehardwareandsoftwareco-designinlightoftwokeytechnologicaladvancements.Firstisthevirtualizationofcomputationandstorageoverhighlydistributeddatacentersspanningacrosscontinents.Secondistheemergenceofavarietyofspecializedhardwareacceleratorsthatcomplementthetraditionalgeneral-purposeprocessors.Wearguethereisanimminentneedtoexploitandunifythesetwotrendsinordertounleashandharnessthepowerofdatainreal-time.Inthispaper,wefocusonpresentingaformulationandcharacterizationofhardwareaccelerationlandscapegearedtowardsreal-timeanalyticsinthecloudenvironment.Ourgoalistoassistbothresearchersandpractitionersnavigatingthenewlyrevivedfieldofsoftwareandhardwareco-designforbuildingnextgenerationdistributedsystems.Wefurtherpresentacasestudytoexploresoftwareandhardwareinterplayfordesigningdistributedrealtimestreamprocessing.

CoordinatingDistributedSpeakingObjects MarcoLippi(DISMI–UniversitàdiModenaeReggioEmilia),MarcoMamei(DISMI–UniversitàdiModenaeReggioEmilia),StefanoMariani(DISMI–UniversitàdiModenaeReggioEmilia),FrancoZambonelli(DISMI–UniversitàdiModenaeReggioEmilia)

93

Inthispaperwesketchavisionoffutureenvironmentsdenselypopulatedbysmartsensorsandactuatorspossiblyembeddedineverydayobjectsthat,ratherthansimplyproducingstreamsofdata,arecapableofunderstandingandreporting,viafactualassertionsandarguments,aboutwhatishappening(forsensors)andaboutwhattheycanmakepossiblyhappen(foractuators).Thesespeakingobjectsformthenodesofadensedistributedcomputinginfrastructurethatcanbeexploitedtomonitorandcontrolactivitiesinoureverydayenvironment.However,thenatureofspeakingobjectswilldramaticallychangetheapproachestoimplementingandcoordinatingtheactivitiesofdistributedprocesses.Infact,distributedcoordinationislikelytobecomeassociatedwiththecapabilityofargumentingaboutsituationsandaboutthecurrentstateoftheaffairs,withtheaimoftriggeringanddirectingproperdistributedconversationstocollectivelyreachafuturedesirablestateoftheaffairs.Inthispaperwediscusshowsuchanovelvisioncanbuilduponsomereadilyavailabletechnologies,andwehighlighttheresearchchallengesthatitposes.Twocasestudiesareusedthroughoutthepaperasexemplaryscenarios.

Model-DrivenDomain-SpecificMiddleware FabioCosta(FederalUniversityofGoias),KarlMorris(TempleUniversity),FabioKon(UniversityofSãoPaulo),PeterClarke(FloridaInternationalUniversity)

Middlewarewasintroducedtofacilitatethedevelopmentofsophisticatedapplicationsbasedonauniformmethodologyandindustrystandards.However,earlyresearchandpracticesuggestedthatnoone-size-fits-allapproachwassuitableforallapplicationdomainsandscenarios.Thisgaverisetoindustryinitiativestostandardizedomain-specificmiddlewareservicesandprofiles,aswellasresearcheffortsonconfigurable,reflective,andadaptivemiddleware.Theindustrysapproachledtoeasydeployment,althoughwithalevelofflexibilitylimitedbytheextentofexistingprofiles.Theapproachoftheresearchcommunity,ontheotherhand,enabledhighflexibility,allowinganymiddlewareconfigurationtobedefined.Nevertheless,creatingsoundconfigurationsusingthisapproachisachallengingtask,limitingthetargetaudiencetoexpertengineers.Asaconsequence,bothinitiativesdonotscalewiththecurrentproliferationofspecializedapplicationdomains.Inthispaper,wetargetthisproblemwithanapproachthatleveragesmodel-drivenengineeringfortheconstructionofdomain-specificmiddlewareplatforms.Asetofhigh-level,yetexpressive,buildingblocksisdefinedintheformofametamodel,whichisusedtocreatemodelsthatspecifythedesiredmiddlewareconfiguration.Wearguethatthisapproachenablestherapiddevelopmentofmiddlewareplatformstomatchtheproliferationofapplicationdomains,atthesametimeasitdoesnotrequireper-applicationmiddlewareconstructionorevenhighlyskilledmiddlewareengineers.Wepresentthecurrentstateofourresearchanddiscussresearchdirectionstofullyrealizetheapproach.

Vision6:InnovationinBigDataSystemsOntheDesignofaBlockchainPlatformforClinicalTrialandPrecisionMedicine ZonyinShae(ASIAUniversity,Taiwan),JeffreyTsai(ASIAUniversity,Taiwan)

Thispaperproposesablockchainplatformarchitectureforclinicaltrialandprecisionmedicineanddiscussesvariousdesignaspectsandprovidessomeinsightsinthetechnologyrequirementsandchallenges.Weidentify4newsystemarchitecturecomponentsthatarerequiredtobebuiltontopoftraditionalblockchainanddiscusstheirtechnologychallengesinourblockchainplatform:(a)anewblockchainbasedgeneraldistributedandparallelcomputingparadigmcomponenttodeviseandstudyparallelcomputingmethodologyforbigdataanalytics,(b)blockchainapplicationdatamanagementcomponentfordataintegrity,bigdataintegration,andintegratingdisparityofmedicalrelateddata,(c)verifiableanonymousidentitymanagementcomponentforidentityprivacyforbothpersonandInternetofThings(IoT)devicesandsecuredataaccesstomakepossibleofthepatientcentricmedicine,and(d)trustdatasharingmanagementcomponenttoenableatrustmedicaldataecosystemforcollaborativeresearch.

TowardsDataflow-basedGraphAccelerator HaiJin(HuazhongUniversityofScienceandTechnology),PengchengYao(HuazhongUniversityofScienceandTechnology),XiaofeiLiao(HuazhongUniversityofScienceandTechnology),LongZheng(HuazhongUniversityofScienceandTechnology),XianliangLi(HuazhongUniversityofScienceandTechnology)

Existinggraphprocessingframeworksgreatlyimprovetheperformanceofmemorysubsystem,buttheyarestillsubjecttotheunderlyingmodernprocessor,resultinginthepotentialinefficienciesforgraphprocessinginthesenseoflowinstructionlevelparallelismandhighbranchmisprediction.Theseinefficiencies,inaccordancewithourcomprehensivemicro-architecturalstudy,mainlyariseoutofawealthofdatadependencies,serialsemanticofinstructionstreams,andcomplexconditionalinstructionsingraphprocessing.Inthispaper,weproposethatafundamentalshiftofapproachisnecessarytobreakthroughtheinefficienciesoftheunderlyingprocessorviathedataflowparadigm.Itisverifiedthattheideaofapplyingdataflowapproachintographprocessingisextremelyappealingforthefollowingtworeasons.First,astheexecutionandretirementofinstructionsonlydependontheavailabilityofinputdataindataflowmodel,ahighdegreeofparallelismcanbethereforeprovidedtorelaxtheheavydependencyandserialsemantic.Second,dataflowisguaranteedtomakeitpossibletoreducethecostsofbranchmispredictionbysimultaneouslyexecutingallbranchesofaconditionalinstruction.Consequently,wemakethepreliminaryattempttodevelopthedataflowinsightintoaspecializedgraphaccelerator.Webelievethatourworkwouldopenawiderangeofopportunitiestoimproveperformanceofcomputationandmemoryaccessforlarge-scalegraphprocessing.

TowardsaRISCFrameworkforEfficientContextualizationinIoT DimitriosGeorgakopoulos(SwinburneUniversity),AliYavari(RMITUniversity),PremPrakashJayaraman(SwinburneUniversity),RajivRanjan(NewcastleUniversity)

TheInternetofThings(IoT)isanewinternetevolutionthatinvolvesconnectingbillionsofinternet-connecteddeviceswerefertoasIoTthings.ThesedevicescancommunicatedirectlyandintelligentlyovertheInternet,andgenerateamassiveamountofdatathatneedstobebyavarietyofIoTapplications.ThispaperfocusesontheautomaticcontextualisationofIoTdata,whichalsoinvolvesdistillinginformationandknowledgefromIoTaimingtosimplifyansweringthefollowingfundamentalquestionsthatoftenariseinIoTapplications:WhichdatacollectedbyIoTarerelevanttomyselfandtheIoTThingsIcarefor?Relatedworkaroundcontextmanagementandcontextualisationrangesfromdatabasetechniquesthatinvolvequeryre-writing,tosemanticwebandrule-basedcontextmanagementapproaches,tomachinelearninganddatascience-basedsolutionsinmobileandambientcomputing.Allsuchexistingapproacheshavetwomainaspectsincommon:Theyarehighlyincompatibleandhorriblyinefficientfromascalabilityandperformanceperspective.Inthispaper,wediscussanewRISCContextualisationFramework(RCF)wehavedeveloped,implementedkeyaspectoff,andassessesitsscalability.RCFprovidesfundamentalcontextualisationconceptsthatcanbemappedtoallexistingcontextualisationapproachesforIoTdata(andinthissense,itprovidesacommondenominatorthatunifiesthecontextualisationspace).RCFcanbeeasilyimplementedasacloud-basedservice,andprovidesbetterscalabilityandperformancethatanyoftheexistingcontentmanagementandcontextualisationapproachintheIoTspace.

94

TheFutureoftheSemanticWeb:PrototypesonaGlobalDistributedFilesystem MichaelCochez(Fraunhofer-FIT),DominikHüser(RWTHAachenUniversity),StefanDecker(RWTHAachen)

Recently,prototypes(inthemeaningfamiliarfromprogramminglanguagessuchasJavascript)were(re-)introducedforknowledgerepresentationontheweb.However,thatworkhasaverytheoreticalfocusandamorepracticalsystemisindemand.Inthisvisionpaperwedescribehowadistributedfilesystemformsanaturalhabitatfortheprototypeknowledgerepresentation.Inparticular,wedescribehowweenvisiondeploymentofLinkedDataandPrototypeKnowledgebasesatopoftheInterPlanetaryFileSystem(IPFS),whichhasseveralusefulfeaturesmatchingtheneedsfortheprototypesystem.

OnBroadBigData SteffenStaab(InstitutWeST,UniversityKoblenz-LandauandWAIS,UniversityofSouthampton)

Abroaddatasystemexplicitlyrepresentsalargenumberofconceptsandpropertiestogetherwithitscorrespondingdataproper.Weobservethecharacteristicsofseveralbroaddatasystemsandelicitthreechallengeswewillneedtoresearchwhenscalingthesebroaddatasystemstobecomebigdatasystems,too.

95

Short Paper Abstracts

ShortPaper1:DistributedOperatingSystems,Middleware,andAlgorithmsSRLB:ThePowerofChoicesinLoadBalancingwithSegmentRoutingYoannDesmouceaux(ÉcolePolytechnique),PierrePfister(CiscoSystems),JérômeTollet(CiscoSystems),MarkTownsley(CiscoSystems),ThomasClausen(ÉcolePolytechnique)

Networkload-balancersgenerallyeitherdonottakeapplicationstateintoaccount,ordosoatthecostofacentralizedmonitoringsystem.Thispaperintroducesaload-balancerrunningexclusivelywithintheIPforwardingplane,i.e.inanapplicationprotocolagnosticfashion–yetwhichstillprovidesapplication-awarenessandmakesreal-time,decentralizeddecisions.Tothatend,IPv6SegmentRoutingisusedtodirectdatapacketsfromanewflowthroughachainofcandidateservers,untilonedecidestoaccepttheconnection,basedonitslocalstate.Thisway,applicationsthemselvesnaturallydecideonhowtoshareincomingconnections,whileincurringminimalnetworkoverhead,andnoout-of-bandsignaling.Testsondifferentworkloads–includingrealisticworkloadssuchasreplayingactualWikipediaaccesstraffictowardsasetofreplicaWikipediainstances–showsignificantperformancebenefits,intermsofshorterresponsetimes,whencomparedtoatraditionalrandomload-balancer.

ImprovingEfficiencyofLinkClusteringonMulti-CoreMachines GuanhuaYan(BinghamtonUniversity)

Linkclusteringgroupsdifferentedgesinagraphaccordingtotheirsimilarities.Linkclusteringcanrevealtheoverlappingandhierarchicalorganizationsinawidespectrumofnetworks.Thisworkstudieshowtoimproveefficiencyoflinkclusteringalongthreedimensions,algorithm,modeling,andparallelization,onmulti-coremachines.Weevaluatetheefficiencyimprovedduetoeachofthethreedimensionsusingwordassociationgraphsextractedfromatwitterdataset.

S3:JointSchedulingandSourceSelectionforBackgroundTrafficinErasure-CodedStorage ShijingLi(GeorgeWashingtonUniversity),TianLan(GeorgeWashingtonUniversity),Moo-RyongRa(AT&TLabsResearch),RajeshPanta(AT&TLabsResearch)

Erasure-codedstoragesystemshavegainedconsiderableadoptionrecentlysincetheycanprovidethesamelevelofreliabilitywithsignificantlylowerstorageoverheadcomparedtoreplicatedsystems.However,backgroundtrafficofsuchsystems–e.g.repair,rebalance,backupandrecoverytraffic–oftenhaslargevolumeandconsumessignificantnetworkresources.Independentlyschedulingsuchtasksandselectingtheirsourcescaneasilycreateinterferenceamongdataflows,causingseveredeadlineviolation.Weshowthatthewell-knownheuristicschedulingalgorithmsfailtoconsiderimportantconstraints,thusresultinginunsatisfactoryperformance.Inthispaper,weclaimthatanoptimalschedulingalgorithmthataimstomaximizethenumberofbackgroundtaskscompletedbeforedeadlinesmustsimultaneouslyconsiderdeadline-awarescheduling,networktopology,chunkplacement,andtime-varyingresourceavailability.Tosolvethisproblem,weproposeanovelalgorithm,calledLinearProgrammingforSelectedTasks(LPST)tomaximizethenumberofsuccessfultasksandimproveoverallutilizationofthedatacenternetwork.ItjointlyschedulestasksandselectstheirsourcesbasedonanotionofRemainingTimeFlexibility,whichmeasurestheslacknessofthestartingtimeofatask.Weevaluatedtheefficacyofouralgorithmusingextensivesimulations.Ourresultsshowthat,undercertainscenarios,LPSTcanperform7x∼70xbetterthantheheuristicswhichblindlytreattheinfrastructureasacollectionofhomogeneousresources,and46.6%∼65.9%betterthanthealgorithmsthattakeintoaccountthenetworktopology.

OntheFeasibilityofInter-domainRoutingviaaSmallBrokerSet DongLin(HuaweiTechnologiesLtdCo.),DavidHui(HuaweiTechnologiesLtdCo.),WeijieWu(HuaweiTechnologiesLtdCo.),TingweiLiu(TheChineseUniversityofHongKong),YatingYang(BeijingInstituteofTechnology),YiWang(TsinghuaUniversity),JohnChi-ShingLui(ChineseUniversityofHongKong),GongZhang(HuaweiTechnologiesLtdCo.),YingtaoLi(HuaweiTechnologiesLtdCo.)

Thecurrentinter-domainroutingprotocol,namely,theBorderGatewayProtocol(BGP),cannotprovideend-to-end(E2E)quality-of-service(QoS)guarantees.Themainreasonisthatanautonomoussystem(AS)canonlyreceiveguaranteesfromitsfirsthopASesviaservicelevelagreements(SLAs).Butbeyondthefirsthop,QoSalongthepathfromsourcetodestinationASisnotwithinthesourceAS’scontrolregime.Inthispaper,weinvestigatethefeasibilityofprovidinghighQoS-guaranteedE2Etransitservicesbyutilizinga(small)setofASes/IXPstoserveas“brokers”toprovidesupervision,controlandresourcenegotiation.FindinganoptimalsetofASesasbrokerscanbeformulatedasaMaximumCoveragewithB-dominatingpathGuarantee(MCBG)problem,whichweprovetobeNP-hard.Toaddressthisproblem,wedesigna(1-e-1/4)-approximationalgorithmandalsoanefficientheuristicalgorithmwhenconsideringadditionalconstraints(e.g.,pathlength).BasedonthecurrentInternettopology,wediscovera“3540-alliance”subset(accountingonly6.8%)of52,079ASes/IXPs,whichcanprovidehighQoSguaranteesfor99.29%E2Econnections.

SubscriptionCoveringforRelevance-basedFilteringinContent-BasedPublish/SubscribeSystems KaiwenZhang(TechnischeUniversitatMunchen),VinodMuthusamy(IBMResearch),MohammadSadoghi(PurdueUniversity),Hans-ArnoJacobsen(UniversityofToronto)

Large-scaleapplicationsrequireascalabledatadisseminationservicewithadvancedfilteringcapabilities.Weproposetheuseofacontent-basedpublish/subscribesystemwithsupportfortop-kfilteringinthecontextofsuchapplications.Wefocusontheproblemoftop-ksubscriptionfiltering,whereapublicationisdeliveredonlytothekhighestscoringsubscribers.Thenaiveapproachtoperformfilteringearlyatthepublisheredgeworksonlyifcompleteknowledgeofthesubscriptionsisavailable,whichisnotcompatiblewiththewell-establishedcoveringoptimizationinscalablecontent-basedpublish/subscribesystems.Weproposeanefficientrank-covertechniquetoreconciletop-ksubscriptionfilteringwithcovering.Weextendthecoveringmodeltosupporttop-kanddescribeanovelalgorithmforforwardingsubscriptionstopublisherswhilemaintainingcorrectness.Finally,wecompareoursolutionstoabaselinecoveringsystem.Inatypicalsetting,ouroptimizedsolutionisscalableandprovidesover81%ofthecoveringbenefit.

WorkflowOptimizationinPAW MaximFilatov(UNIGE),VerenaKantere(UniversityofGeneva)

96

Manyindustrialapplications,fromdomainssuchastelecommunication,webandsales,requiretoperformcomplexanalyticsacrossseveraldataprocessingsystems.Theperformanceofsuchanalyticsisusuallyexpressedinworkflows,anditisataskthatisbothlabor-intensiveandtime-consuming.Atthesametime,withincreasingamountsofdatatobeanalysed,theoptimizationofanalyticsworkflowsbecomescrucialforsatisfyingbusinessobjectives.Thispaperfocusesonworkflowoptimizationwithrespecttotimeefficiency,overmultipleexecutionengines,suchasatraditionalDBMS,aMapReduceengine,andascriptingengine.Thisconfigurationisemergingasacommonparadigmusedtocombineanalysisofunstructuredandstructureddata.WeproposeanoveloptimizationtechniqueaspartofoursystemcalledPAW(PlatformforAnalyticsWorkflows).Thistechniquecreatesalternativeworkflowstructuresandtheirexecutionplansbasedonequivalentcombinationsandordersofoperators.Thetechniqueemploysanexhaustiveandaheuristicalgorithmtosearchefficientlythespaceofequivalentworkflowstructuresandselecttheonewiththeoptimalexecutionplan.Wepresentathoroughexperimentalstudyandweshowcasetheefficiencyoftheproposedoptimizationtechniqueinafullyfledgedmulti-enginesystem,appliedonthreereal-worldapplicationsandtheirdata,aswellasonasyntheticbenchmark.

AFirstLookatInformationEntropy-BasedDataPricing XijunLi(ShanghaiJiaoTongUniversity),JianguoYao(ShanghaiJiaoTongUniversity),XueLiu(McGillUniversity),HaibingGuan(ShanghaiJiaoTongUniversity)

Distributionofintangibleinformationgoodsisexperiencingtremendousgrowthinrecentyears,whichhasfacilitatedablossomingofinformationgoodseconomics.Asbigdatadevelops,therearemoreandmoreinformationgoodsmarketsfordatatrading.Inthecurrentofdatapricingpoliciesindatatrading,therearemanymetricstomeasurethevalueofdatagoods,suchasthedatagenerationdate,datavolume,anddataintegrity,etc.However,itisverychallengingtoidentifytheamountofdatainformationanditsdistribution,andthecorrespondingdatapricinghasrarelybeendiscussed.Inthispaper,weproposeanewdatapricingmetric,i.e.,thedatainformationentropy,whichhelpstomakeareasonablepriceinthedatatrading.Wefirstdemonstrateadatainformationmeasurementmethodbasedoninformationentropy,andthenproposeapricingfunctionbasedontheresultofdatainformationmeasurement.Tocomprehensivelyunderstandthenewdatapricingmetricandfacilitateitsapplicationindatatrading,weverifytherationalityofthedatainformationmeasurementmethodandgivethreeconcretepricingfunctions.Itisthefirsttimetolookattheinformationentropy-baseddatapricing,whichcaninspiretheresearchconcerningthepricingmechanismofdatagoods,furtherpromotingthedevelopmentofdataproductsbusiness.

RestrospectiveLightweightDistributedSnapshotsUsingLooselySynchronizedClocks AlekseyCharapko(SUNYBuffalo),AilidaniAilijiang(SUNYBuffalo),MuratDemirbas(SUNYBuffalo),SandeepKulkarni(MichiganStateUniversity)

Inordertotakeaconsistentsnapshotofadistributedsystem,itisnecessarytocollateandalignlocallogsfromeachnodetoconstructapairwiseconcurrentcut.ByleveragingNTPsynchronizedclocks,andaugmentingthemwithlogicalclockcausalityinformation,Retroscopeprovidesalightweightsolutionfortakingunplannedretrospectivesnapshotsofpastdistributedsystemstates.Insteadofstoringamultiversioncopyoftheentiresystemdata,thisisachievedefficientlybymaintainingaconfigurable-sizeslidingwindow-logateachnodetocapturerecentoperations.Inadditiontoretrospectivesnapshots,Retroscopealsoprovidesincrementalandrollingsnapshotsthatutilizeanexistingsnapshottoreducethecostofconstructinganewsnapshotinproximity.Thiscapabilityisusefulforperformingstepwisedebuggingandroot-causeanalysis,andsupportingdataintegritymonitoringandcheckpoint-recovery.WeimplementRetroscopefortheVoldemortdistributeddatastoreandevaluateitsperformanceundervaryingworkloads.

Power-AwarePopulationProtocols ChuanXu(LRI(CNRS/UPSud)),JannaBurman(LRI(CNRS/UPSud)),JoffroyBeauquier(LRI(CNRS/UPSud))

Inthispaper,weproposeaformalenergymodelwhichallowsananalyticalstudyofenergyconsumption,forthefirsttimeinthecontextofpopulationprotocols(PP).InPP,anonymousandboundedmemoryagentsmoveunpredictablyandcommunicateinpairs.Inordertoillustratethepowerandtheusefulnessoftheproposedenergymodel,wedevelopanewpower-awareprotocol(EB-TTFM)forthetaskofdatacollection.Theanalyticalresultsshowthat,intermsofenergyconsumption,EB-TTFMoutperformsaknowndatacollectionprotocolundercertainconditions.Finally,wepresentalowerboundconcerningenergyconsumptionofanypossibledatacollectionprotocolinPP,whichalsojustifiestheefficiencyofEB-TTFM.

MultiPub:LatencyandCost-AwareGlobal-ScaleCloudPublish/Subscribe JulienGascon-Samson(McGillUniversity),JörgKienzle(McGillUniversity),BettinaKemme(McGillUniversity)

Topic-basedpub/subisawidelyusedcommunicationmechanismindistributedsystemsfortargetedinformationdisseminationbetweenlooselycoupledentities.Toscaledynamicallydependingonthecurrentcommunicationdemands,pub/servicescanbeconvenientlydeployedinthecloud.Toprovidefastdissemination,theservicecanbedistributedacrossmultiplecloudregions.Thearchitecturaldesignandrun-timedeploymentofsuchamiddlewareistricky,though,asitcanhaveasignificanteffectoncommunicationlatencyandcloud-basedcost.Inthispaper,weproposeMultiPub,aflexiblepub/submiddlewareforlatency-constrained,world-widedistributedapplicationsthatdynamicallyreconfiguresthecommunicationlayertoensureapredefinedmaximumlatencyforpublicationdisseminationwhileminimizingcloud-basedcosts.Thisisachievedbyroutingpublicationseitherthroughasingleoracrossmultiplecloudregions.WedemonstratetheeffectivenessofMultiPubbypresentingasetofexperimentsthatreportontheachievedcommunicationlatencyandcostsavingscomparedtotraditionalapproaches,aswellasaperformanceevaluation.

ReachabilityinBinaryMultithreadedProgramsIsPolynomial AlexanderMalkis(TechnischeUniversitätMünchen),SteffenBorgwardt(UCDavis)

Automaticfindingofbugsinmultithreadedprogramsisanimportantbutinherentlydifficulttask,eveninthefinite-stateinterleaving-semanticscase.Thecomplexityofthistaskhasonlybeenpartiallyexploredsofar.Wemeasurequantitiessuchasthediameter,whichisthelongestfinitedistancerealizableinthetransitiongraphoftheprogram,thelocaldiameter,whichisthemaximumdistancefromanyprogramstatetoanythread-localstate,andthecomputationalcomplexityofbugfinding.Forthesubclassofso-calledbinarymultithreadedprograms,weprovenewbounds:allthesequantitiesaremajorizedbyapolynomialand,incertaincases,byalinear,logarithmic,orevenconstantfunction.Ourboundspresentapreparationsteptowardsthecorrespondingpolynomial-boundclaimsforgeneralprograms.Theseclaimscontrastsharplywiththecommonbeliefthatthemainobstacletoanalyzingconcurrentprogramsistheexponentialstateexplosioninthenumberofthreads.

AnEvent-LevelAbstractionforAchievingEfficiencyandFairnessinNetworkUpdate

97

TingQu(NationalUniversityofDefenseTechnology),DekeGuo(NationalUniversityofDefenseTechnology),XiaominZhu(NationalUniversityofDefenseTechnology),JieWu(TempleUniversity),XiaoleiZhou(NationalUniversityofDefenseTechnology),ZhongLiu(NationalUniversityofDefenseTechnology)

Changesofnetworkstateareacommonsourceofinstabilityinnetworks.Anupdateeventtypicallyinvolvesmultipleflowsthatcompetefornetworkresourcesatthecostofreschedulingandmigratingsomeexistingflows.Priornetworkupdatingschemestacklesuchflowsindependently,ratherthanastheentityofanupdateevent.Theyonlyoptimizetheflow-levelmetricsfortheflowsinvolvedinanupdateevent.Inthispaper,wepresentanevent-levelabstractionofnetworkupdatewhichgroupsflowsofanupdateeventandschedulesthemtogethertominimizetheeventcompletiontime(ECT).Wethenstudytheschedulingproblemofmultipleupdateeventsforachievinghighschedulingefficiencyandpreservingfairness.Thedesignedleastmigrationtrafficfirst(LMTF)methodschedulesallupdateeventsintheFIFOorder,butavoidshead-of-lineblockingbyrandomlyfine-tuningthequeueorderofsomeevents.Itcanconsiderablyreducetheupdatecost,theaverage,andtailECTsofallupdateevents.Inaddition,wedesignageneralparallel-LMTF(P-LMTF)methodtoguaranteefairnessandfurtherimproveschedulingefficiencyamongupdateevents.ItimprovestheLMTFmethodbyopportunisticallyupdatingmultipleeventssimultaneously.ThecomprehensiveevaluationresultsindicatethattheaverageECTofourapproachisupto10×fasterthantheflow-levelschedulingmethodfornetworkupdateevents,anditstailECTisupto6×faster.OurP-LMTFmethodincurs75%reductionintheaverageECTcomparedwithFIFOwhenthenetworkutilizationexceeds70%,anditachievesa42%reductionintailECT.

ShortPaper2:CloudandDataCenterSystemsandNetworksDCM:DynamicConcurrencyManagementforScalingn-TierApplicationsinCloud HuiChen(LouisianaStateUniversity),QingyangWang(LouisianaStateuniversity),BalajiPalanisamy(UniversityofPittsburgh),PengchengXiong(Hortonworks)

Scalingwebapplicationssuchase-commerceincloudbyaddingorremovingserversinthesystemisanimportantpracticetohandleworkloadvariations,withthegoalofachievingbothhighqualityofservice(QoS)andhighresourceefficiency.Throughextensivescalingexperimentsofann-tierapplicationbenchmark(RUBBoS),wehaveobservedthatscalingonlyhardwareresourceswithoutappropriateadaptationofsoftresourceallocations(e.g.,threadorconnectionpoolsize)ofeachserverwouldcausesignificantperformancedegradationoftheoverallsystembyeitherunder-orover-utilizingthebottleneckresourceinthesystem.Wedevelopadynamicconcurrencymanagement(DCM)frameworkwhichintegratessoftresourceallocationsintothesystemscalingmanagement.DCMintroducesamodelwhichdeterminesanear-optimalconcurrencysettingtoeachtierofthesystembasedonacombinationofoperationalqueuinglawsandonlineanalysisoffine-grainedmeasurementdata.WeimplementDCMasatwo-levelactuatorwhichscalesbothhardwareandsoftresourcesinann-tiersystemontheflywithoutinterruptingtheruntimesystemperformance.OurexperimentalresultsdemonstratethatDCMcanachievesignificantlymorestableperformanceandhigherresourceefficiencycomparedtothestate-of-the-arthardware-onlyscalingsolutions(e.g.,AmazonEC2-AutoScale)underrealisticburstyworkloadtraces.

MorePeak,LessDifferentiation:TowardsAPricing-awareOnlineControlFrameworkforInter-DatacenterTransfers WenxinLi(DalianUniversityofTechnology),XiaoboZhou(TiajjinUniversity),KeqiuLi(DalianUniversityofTechnology),HengQi(DalianUniversityofTechnology),DekeGuo(NationalUniversityofDefenceTechnology)

Theemergingdeploymentofgeographicallydistributeddatacenters(DCs)incursasignificantamountofdatatransfersovertheInternet.SuchtransfersaretypicallychargedbyInternetServiceProviders(ISPs)withthewidelyadoptedq-thpercentilechargingmodel.Insuchchargingmodel,thetimeslotswithtop100-qpercentofdatatransmissiondonotaffectthetotaltransmissioncost,andcanbeviewedasfree.Thisbringstheopportunitytooptimizetheschedulingofinter-DCtransferstominimizetheentiretransmissioncost.However,verylittleworkhasbeendonetoexploitthosefreetimeslotsforschedulinginter-DCtransfers.Thecruxisthatexistingworkeitherlacksamechanismtoaccumulatetraffictofreetimeslots,orinevitablyreliesonpriorknowledgeoftrafficarrivalpatterns.Inthispaper,weattempttoexploitthosefreetimeslotsbyleveragingdiversetime-sensitivitiesamonginter-DCtransfers,soastoreduceorevenminimizethetransmissioncost.Specifically,weadvocatethatasimpleprincipleshouldbefollowed:moretrafficpeaksshouldbescheduledinfreetimeslots,whilelesstrafficdifferentiationshouldbemaintainedamongtheremainingtimeslots.Tothisend,wetakeadvantageoftheLyapunovoptimizationtechniquestodesignapricing-awarecontrolframework.Thisframeworkefficientlymakesonlinedecisionsforinter-DCtransferswithoutrequiringapriorknowledgeoftrafficarrivals.Toverifyourproposedframework,weconductsmall-scaletestbedimplementation.Theresultsshowthatourframeworkcanrealisticallyreducethetransmissioncostbyupto19.38%.

RobustMulti-TenantServerConsolidationintheCloudforDataAnalyticsWorkloads JosephMate(UniversityofWaterloo),KhuzaimaDaudjee(UniversityofWaterloo),ShahinKamali(MITCSAIL)

Serverconsolidationistheallocationorhostingoftenantsonaminimumnumberofcloudservermachines.Givenasequenceofdataanalyticstenantloadsdefinedbytheamountofresourcesthatthetenantsrequireandaservice-levelagreement(SLA)betweenthecustomerandthecloudserviceprovider,significantresourcecostsavingscanbeachievedbyconsolidatingmultipletenantsonservermachines.Sinceservermachinescanfailcausingtheirtenantstobecomeunavailable,serviceproviderscanplacereplicasofeachtenantondifferentserversandreservecapacitytoensurethattenantfailoverwillnotresultinoverloadonanyremainingserver.WeproposetheCUBEFITalgorithmformulti-tenantserverconsolidationthatsavesresourcecostsbyutilizingfewerserversthanexistingapproachesfordataanalyticsworkloads.Unlikeexistingconsolidationalgorithms,CUBEFITcantoleratemultipleserverfailureswhileensuringthatnoserverbecomesoverloaded.WeprovideextensivetheoreticalanalysisandexperimentalevaluationofCUBEFIT.Weshowthatcomparedtoexistingalgorithms,theaveragecaseandworstcasebehaviorofCUBEFITissuperiorandthatitproducesnear-optimaltenantallocationwhenthenumberoftenantsislarge.Throughevaluationanddeploymentonaclusterofupto73machinesaswellasthroughsimulationstudies,weexperimentallydemonstratetheefficacyofCUBEFIT.

Flow-AwareAdaptivePacingtoMitigateTCPIncastinDatacenterNetworks ShaojunZou(CentralSouthUniversity),JiaweiHuang(CentralSouthUniversity),YutaoZhou(CentralSouthUniversity),JianxinWang(CentralSouthUniversity),TianHe(UniversityofMinnesota)

Indatacenternetworks,manynetwork-intensiveapplicationsleveragelargefan-inandmany-to-onecommunicationtoachievehighperformance.However,thespecialtrafficpatterns,suchasmicro-burstandhighconcurrency,easilycauseTCPIncastproblemandseriouslydegradetheapplicationperformance.ToaddresstheTCPIncastproblem,wefirstrevealtheoreticallyandempiricallythatalleviatingpacketburstinessismuchmoreeffectiveinreducingtheIncastprobabilitythancontrollingthecongestionwindow.Inspiredbythefindingsandinsightsfromourexperimentalobservations,wefurtherproposeageneralsupportingschemeAdaptivePacing(AP),whichdynamicallyadjustsburstinessaccordingtotheflowconcurrencywithoutanychangeonswitch.AnotherfeatureofAPisitsbroad

98

applicability.WeintegrateAPtransparentlyintodifferentTCPprotocols(i.e.,DCTCP,L2DCTandD2TCP).Throughaseriesoflarge-scaleNS2simulations,weshowthatAPsignificantlyreducestheIncastprobabilityacrossdifferentTCPprotocolsandthenetworkgoodputcanbeincreasedconsistentlybyonaverage7xunderseverecongestion.

Real-TimePowerCyclinginVideoonDemandDataCentresusingOnlineBayesianPrediction VicentSanzMarco(LancasterUniversity),ZhengWang(LancasterUniversity),BarryPorter(LancasterUniversity)

Energyusageindatacentrescontinuestobeamajorandgrowingconcernasanincreasingnumberofeverydayservicesdependonthesefacilities.Researchinthisareahasexaminedtopicsincludingpowersmoothingusingbatteriesanddeeplearningtocontrolcoolingsystems,inadditiontooptimisationtechniquesforthesoftwarerunninginsidedatacentres.Wepresentanovelreal-timepower-cyclingarchitecture,supportedbyamediadistributionapproachandonlinepredictionmodel,toautomaticallydeterminewhenserversareneededbasedondemand.Wedemonstratewithexperimentalevaluationthatthisapproachcansaveupto31%ofserverenergyinacluster.Ourevaluationisconductedontypicalrackmountserversinadatacentretestbedandusesarecentreal-worldworkloadtracefromtheBBCiPlayer,anextremelypopularvideoondemandserviceintheUK.

ADistributedAccessControlSystemforCloudFederations ShorouqAlansari(UniversityofSouthampton),FedericaPaci(UniversityofSouthampton),VladimiroSassone(UniversityofSouthampton)

Cloudfederationsareanewcollaborationparadigmwhereorganizationssharedataacrosstheirprivatecloudinfrastructures.However,theadoptionofcloudfederationsishinderedbyfederatedorganizations’concernsonpotentialrisksofdataleakageanddatamisuse.Forcloudfederationstobeviable,federatedorganizations’privacyconcernsshouldbealleviatedbyprovidingmechanismsthatalloworganizationstocontrolwhichusersfromotherfederatedorganizationscanaccesswhichdata.Weproposeanovelidentityandaccessmanagementsystemforcloudfederations.Thesystemallowsfederatedorganizationstoenforceattribute-basedaccesscontrolpoliciesontheirdatainaprivacy-preservingfashion.Usersaregrantedaccesstofederateddatawhentheiridentityattributesmatchthepolicies,butwithoutrevealingtheirattributestothefederatedorganizationowningdata.ThesystemalsoguaranteestheintegrityofthepolicyevaluationprocessbyusingblockchaintechnologyandIntelSGXtrustedhardware.Itusesblockchaintoensurethatusersidentityattributesandaccesscontrolpoliciescannotbemodifiedbyamalicioususer,whileIntelSGXprotectstheintegrityandconfidentialityofthepolicyenforcementprocess.Wepresenttheaccesscontrolprotocol,thesystemarchitectureanddiscussfutureextensions.

Voyager:CompleteContainerStateMigration ShripadNadgowda(IBMTJWatsonResearchCenter),SahilSuneja(IBMTJWatsonResearchCenter),NiltonBila(IBMTJWatsonResearchCenter),CanturkIsci(IBMTJWatsonResearchCenter)

Duetothesmallmemoryfootprintandfaststartuptimesofferredbycontainervirtualization,madeevermorepopularbytheDockerplatform,containersareseeingrapidadoptionasafoundationalcapabilitytobuildPaaSandSaaSclouds.Forsuchcontainerclouds,whicharefundamentallydifferentfromVMclouds,variouscloudmanagementservicesneedtoberevisited.Inthispaper,wepresentourVoyager-just-in-timelivecontainermigrationservice,designedinaccordancewiththeOpenContainerInitiative(OCI)principles.Voyagerisanovelfilesystem-agnosticandvendor-agnosticmigrationservicethatprovidesconsistentfull-systemmigration.VoyagercombinesCRIU-basedmemorymigrationtogetherwiththedatafederationcapabilitiesofunionmountstominimizemigrationdowntime.Withaunionviewofdatabetweenthesourceandtargethosts,Voyagercontainerscanresumeoperationinstantlyonthetargethost,whileperformingdiskstatetransferlazilyinthebackground.

Keddah:CapturingHadoopNetworkBehaviour JieDeng(QueenMaryUniversityLondon),GarethTyson(QueenMary),FélixCuadrado(QueenMaryUniversityofLondon),SteveUhlig(QueenMaryUniversityofLondon)

Asadistributedsystem,Hadoopheavilyreliesonthenetworktocompletedataprocessingjobs.WhileHadooptrafficisperceivedtobecriticalforjobexecutionperformance,theactualbehaviourofHadoopnetworktrafficisstillpoorlyunderstood.ThislackofunderstandinggreatlycomplicatesresearchrelyingonHadoopworkloads.Inthispaper,weexploreHadooptrafficthroughexperimentation.WeanalysethegeneratedtrafficofmultipletypesofMapReducejobs,withvaryinginputsizes,andclusterconfigurationparameters.Asaresult,wepresentKeddah,atoolchainforcapturing,modellingandreproducingHadooptraffic,forusewithnetworksimulators.KeddahcanbeusedtocreateempiricalHadooptrafficmodels,enablingreproducibleHadoopresearchinmorerealisticscenarios.

AScalableandDistributedApproachforNFVServiceChainCostMinimization ZijunZhang(UniversityofCalgary),ZongpengLi(UniversityofCalgary),ChuanWu(UniversityofHongKong),ChuanheHuang(WuhanUniversity)

Networkfunctionvirtualization(NFV)representsthelatesttechnologyadvancementinnetworkserviceprovisioning.Traditionalhardwaremiddleboxesarereplacedbysoftwareprogramsrunningonindustrystandardserversandvirtualmachines,forserviceagility,flexibility,andcostreduction.NFVusersareprovisionedwithservicechainscomposedofvirtualnetworkfunctions(VNFs).AfundamentalprobleminNFVservicechainprovisioningistosatisfyuserdemandswithminimumsystem-widecost.Wejointlyconsidertwotypesofcostinthiswork:nodalresourcecostandlinkdelaycost,andformulatetheservicechainprovisioningproblemusingnonlinearoptimization.Throughthemethodofauxiliaryvariables,wetransformtheoptimizationproblemintoitsseparableform,andthenapplythealternatingdirectionmethodofmultipliers(ADMM)todesignscalableandfullydistributedsolutions.Throughsimulationstudies,weverifytheconvergenceandefficacyofourdistributedalgorithmdesign.

ElasticPaxos:ADynamicAtomicMulticastProtocol SamuelBenz(UniversitàdellaSvizzeraitaliana),FernandoPedone(UniversitàdellaSvizzeraitaliana)

Replicationisacommontechniqueusedtodesignreliabledistributedsystemsbymaskingdefectivecomponents.TocopewiththerequirementsofmodernInternetapplications,replicationprotocolsmustallowforthroughputscalabilityanddynamicreconfiguration,thatis,on-demandreplacementorprovisioningofsystemresources.ThispaperdescribesElasticPaxos,anewdynamicatomicmulticastprotocolthatfulfillstheserequirements.ElasticPaxosallowstodynamicallyaddandremoveresourcestoanonlinepartiallyreplicatedstatemachine.WeimplementedElasticPaxosandevaluateditsperformanceinOpenStack,acloudenvironment.Wedemonstrateitspracticalitytodynamicallyscaleupanddownapartiallyreplicateddatastorewithitandtoreconfigureadistributedsystem.

BoostingTheBenefitsOfHybridSDN WenWang(McGillUniversity),WenboHe(McMasterUniversity),JinshuSu(NationalUniversityofDefenseTechnology)

99

Theupgradeofalegacynetworktoafullsoftware-definednetworking(SDN)deploymentisusuallyanincrementalprocess,duringwhichSDNswitchesandlegacyswitchescoexistinthehybridnetwork.However,withinappropriatedeploymentofSDNswitchesanddesignofhybridcontrol,theadvantagesofSDNcontrolcouldnotexert,anditevenresultsinperformancedegradationorinconsistency(e.g.,loops,black-holes).Therefore,thehybridSDNrequiresconsiderablecoordinationofthecentralizedcontrolanddistributedrouting.Inthispaper,weproposeasolutiontohandletheheterogeneitycausedbydistinctforwardingcharacteristicsofSDNandlegacyswitches,thereforeboostingthebenefitsofhybridSDN.WeplanSDNplacementtoenhancetheSDNcontrollabilityoverthehybridnetwork,andconducttrafficengineeringconsideringboththeforwardingcharacteristicsofSDNandlegacyswitches.TheexperimentswithvarioustopologiesshowthattheSDNplacementplanningandhybridforwardingyieldbetternetworkperformanceespeciallyintheearly70%SDNdeployment.

AdoptingSDNSwitchBuffer:BenefitsAnalysisandMechanismDesign FuliangLi(NortheasternUniversity),JiannongCao(TheHongKongPolytechnicUniversity),XingweiWang(NortheasternUniversity),YinchuSun(NortheasternUniversity),TianPan(BeijingUniversityofPostsandTelecommunication),XuefengLiu(TheHongKongPolytechnicUniversity)

OnecriticalissueinSDNistoreducethecommunicationoverheadbetweentheswitchesandthecontroller.Suchoverheadismainlycausedbyhandlingmiss-matchpackets,becauseforeachmiss-matchpacket,aswitchwillsendarequesttothecontrolleraskingforforwardingrule.Existingapproachestoaddressthisproblemgenerallyneedtodeployintermediateproxyorauthorityswitchestoholdrulecopies,soastoreducethenumberofrequestssenttothecontroller.Inthispaper,wearguethatusingtheintrinsicbufferinaSDNswitchcanalsogreatlyreducethecommunicationoverheadwithoutusingadditionaldevices.Ifaswitchbufferseachmiss-matchpacket,onlyafewheaderfieldsinsteadoftheentirepacketarerequiredtobesenttothecontroller.Experimentresultsshowthatthiscanreduce78.7%controltrafficand37%controlleroverheadatthecostofincreasingonly5.6%switchoverheadonaverage.Iftheproposedflow-granularitybuffermechanismisadopted,onlyonerequestmessageneedstobesenttothecontrollerforanewflowwithmanyarrivalpackets.Thusthecontroltrafficandcontrolleroverheadcanbefurtherreducedby64%and35.7%respectivelyonaveragewithoutincreasingtheswitchoverhead.

ShortPaper3:InternetofThings,SmartCities,andCyber-PhysicalSystemsIOTSENTINEL:AutomatedDevice-TypeIdentificationforSecurityEnforcementinIoT MarkusMiettinen(TechnischeUniversitatDarmstadt),SamuelMarchal(AaltoUniversity),IbbadHafeez(UniversityofHelsinki),N.Asokan(AaltoUniversity),Ahmad-RezaSadeghi(TechnischeUniversitatDarmstadt),SasuTarkoma(UniversityofHelsinki)

WiththerapidgrowthoftheInternet-of-Things(IoT),concernsaboutthesecurityofIoTdeviceshavebecomeprominent.SeveralvendorsareproducingIP-connecteddevicesforhomeandsmallofficenetworksthatoftensufferfromflawedsecuritydesignsandimplementations.Theyalsotendtolackmechanismsforfirmwareupdatesorpatchesthatcanhelpeliminatesecurityvulnerabilities.Securingnetworkswherethepresenceofsuchvulnerabledevicesisgiven,requiresabrownfieldapproach:applyingnecessaryprotectionmeasureswithinthenetworksothatpotentiallyvulnerabledevicescancoexistwithoutendangeringthesecurityofotherdevicesinthesamenetwork.Inthispaper,wepresentIoTSentinel,asystemcapableofautomaticallyidentifyingthetypesofdevicesbeingconnectedtoanIoTnetworkandenablingenforcementofrulesforconstrainingthecommunicationsofvulnerabledevicessoastominimizedamageresultingfromtheircompromise.WeshowthatIoTSentineliseffectiveinidentifyingdevicetypesandhasminimalperformanceoverhead.

EfficientZ-orderEncodingBasedMulti-modelDataCompressioninWSNs XiaofeiCao(MissouriUniversityofScienceandTechnology),SanjayMadria(MissouriUniversityofScienceandTechnology),TakahiroHara(OsakaUniversity)

Wirelesssensornetworkshavesignificantlimitationsinavailablebandwidthandenergy.Thelimitedbandwidthinsensornetworkscancausehighermessagedeliverylatencyinapplicationssuchasmonitoringpoisonousgasleak.Insuchapplications,therearemulti-modalsensorswhosevaluessuchastemperature,gasconcentration,locationandCO2levelneedtobetransmittedtogetherforfasterdetectionandtimelyassessmentofgasleak.Inthispaper,weproposenovelZ-orderbaseddatacompressionschemes(Z-compression)toreduceenergyandsavebandwidthwithoutincreasingthemessagedeliverylatency.InsteadofusingthepopularHuffmantreestylebasedencoding,ZcompressionusesZ-orderencodingtomapthemultidimensionalsensingdataintoone-dimensionalbinarystreamtransmittedusingasinglepacket.Ourexperimentalevaluationsusingreal-worlddatasetsshowthatZ-compressionhasamuchbettercompressionratio,energysaving,streamingratethanknownschemeslikeLEC(andadaptiveLEC),FELACSandTinyPackformulti-modalsensordata.

PTrack:EnhancingtheApplicabilityofPedestrianTrackingwithWearables YonghangJiang(CityUniversityofHongKong),ZhenjiangLi(CityUniversityofHongKong),JianpingWang(CityUniversityofHongKong)

Theabilitytoaccuratelytrackpedestriansisvaluableforvariantapplicationdesigns.Althoughpedestriantrackinghasbeeninvestigatedexcessivelyandownedawell-suitedsensingplatform,theproposedsolutionsarefarfrombeingmatureyet.Pedestriantrackingcontainsstepcountingandstrideestimationtwocomponents.Stepcountingalreadyhascommercialproducts,buttheperformanceisstillunreliableandlesstrustworthyinpractice.Strideestimationevenstaysintheresearchstagewithoutreadysolutionsreleasedonthemarket.Suchanon-negligiblegapbetweenlong-termresearchinvestigationandtechnique'sactualusageexistsduetoaseriesofcrucialapplicabilityissuesunsolved,includingdesignvulnerabilitytointerferingactivities,extractingpurelybody'smovementfromadditivesensorsignals,andparametertrainingwithoutuser'sintervention.Inthispaper,wedeeplyanalyzehuman'sgaitcyclesandobtaininspiringobservationstoaddresstheseissues.Weincorporateourtechniquesintoexistingpedestriantrackingdesignsandimplementaprototype,PTrack,onLGsmartwatch.WefindPTrackeffectivelyenhancesthesystemapplicabilityandachievespromisingperformanceunderverypracticalsettings.

SourceLocationPrivacy-AwareDataAggregationSchedulingforWirelessSensorNetworks JackKirton(UniversityofWarwick),MatthewBradbury(TheUniversityofWarwick),ArshadJhumka(UniversityofWarwick)

Sourcelocationprivacy(SLP)isanimportantpropertyfortheclassofassetmonitoringproblemsinwirelesssensornetworks(WSNs).SLPaimstopreventanattackerfromfindingavaluableassetwhenaWSNnodeisbroadcastinginformationduetothedetectionoftheasset.MostSLPtechniquesfocusattheroutinglevel,withtypicallyhighmessageoverhead.TheobjectiveofthispaperistoinvestigatethenovelproblemofdevelopingaTDMAMACschedulethatcanprovideSLP.Wemakeanumberofimportantcontributions:(i)wedevelopanovelformalisationofaclassofeavesdroppingattackersandprovidenovelformalisationsofSLP-awaredataaggregationschedules(DAS),(ii)wepresentadecisionproceduretoverifywhetheraDASscheduleisSLP-aware,thatreturnsacounterexampleifthescheduleisnot,similartomodelchecking,and(iii)wedevelopa3-stagedistributedalgorithmthattransformsaninitialDASalgorithmintoacorrespondingSLP-awarescheduleagainstaspecificclassofeavesdroppers.OursimulationresultsshowthattheresultingSLP-awareDASprotocolreducesthecaptureratioby50%attheexpenseofnegligablemessageoverhead.

100

VelocityOptimizationofPureElectricVehicleswithTrafficDynamicsConsideration LiuwangKang(UniversityofVirginia),HaiyingShen(UniversityofVirginia),AnkurSarker(UniversityofVirginia)

AsElectricVehicles(EVs)becomeincreasinglypopular,theirbattery-relatedproblems(e.g.,shortdrivingrangeandheavybatteryweight)mustberesolvedassoonaspossible.VelocityoptimizationofEVstominimizeenergyconsumptionindrivingisaneffectivealternativetohandletheseproblems.However,previousvelocityoptimizationmethodsassumethatvehicleswillpassthroughtrafficlightsimmediatelyatgreentrafficsignals.Actually,avehiclemaystillexperienceadelaytopassagreentrafficlightduetoavehiclewaitingqueueinfrontofthetrafficlight.Inthispaper,forthefirsttime,weproposeavelocityoptimizationsystemwhichenablesEVstoimmediatelypassgreentrafficlightswithoutdelay.Wecollectedrealdrivingdataona4.0kmlongroadsectionofUS-25highwaytoconductextensivetrace-drivensimulationstudies.TheexperimentalresultsfromMatlabandSimulationforUrbanMObility(SUMO)trafficsimulatorshowthatourvelocityoptimizationsystemreducesenergyconsumptionbyupto17.5%comparedwithrealdrivingpatternswithoutincreasingtriptime.

PIANO:Proximity-basedUserAuthenticationonVoice-PoweredInternet-of-ThingsDevices NeilZhenqiangGong(IowaStateUniversity),AltayOzen(IowaStateUniversity),YuWu(UCDavis),XiaoyuCao(IowaStateUniversity),RichardShin(UCBerkeley),DawnSong(UCBerkeley),HongxiaJin(SamsungResearchAmerica),XuanBao(GoogleInc.)

VoiceisenvisionedtobeapopularwayforhumanstointeractwithInternet-of-Things(IoT)devices.Weproposeaproximity-baseduserauthenticationmethod(calledPIANO)foraccesscontrolonsuchvoice-poweredIoTdevices.PIANOleveragesthebuilt-inspeaker,microphone,andBluetooththatvoice-poweredIoTdevicesoftenalreadyhave.Specifically,weassumethatausercarriesapersonalvoice-powereddevice(e.g.,smartphone,smartwatch,orsmartglass),whichservesastheuser’sidentity.Whenanothervoice-poweredIoTdeviceoftheuserrequiresauthentication,PIANOestimatesthedistancebetweenthetwodevicesbyplayinganddetectingcertainacousticsignals;PIANOgrantsaccessiftheestimateddistanceisnolargerthanauser-selectedthreshold.Weimplementedaproof-of-conceptprototypeofPIANO.Throughtheoreticalandempiricalevaluations,wefindthatPIANOissecure,reliable,personalizable,andefficient.

CategoryInformationCollectioninRFIDSystems JiaLiu(NanjingUniversity),ShigangChen(UniversityofFlorida),BinXiao(TheHongKongPolytechnicUniversity),YanyanWang(NanjingUniversity),LijunChen(NanjingUniversity)

InRFID-enabledapplications,whenatagisputintouseandassociatedwithaspecificobject,thecategory-relatedinformation(e.g.,thebrandsofclothes)aboutthisobjectmightbepreloadedintothetag’smemoryasrequired.Sincesuchinformationreflectsthecategoryattributes,alltagsinthesamecategorycarrytheidenticalcategoryinformation.Tocollectthisinformation,wedonotneedtorepeatedlyinterrogateeachtag;onetag’sresponseinacategoryissufficient.Inthispaper,weinvestigatethenewproblemofcategoryinformationcollectioninamulti-categoryRFIDsystem,whichisreferredtoasinformationsampling.Weproposeanefficienttwo-phasesamplingprotocol(TPS).Byquicklyzoomingintoacategoryandisolatingatagfromthiscategory,TPSisabletosampleacategorybybroadcastingonly7.5-bitpollingvector(veryefficientwhencomparedtothe96-bittagID).Wetheoreticallyanalyzetheprotocolperformanceanddiscusstheoptimalparametersettingsthatminimizetheoverallexecutiontime.ExtensivesimulationsshowthatTPSoutperformsthebenchmark,greatlyimprovingthesamplingperformance.

ScalableRole-basedDataDisclosureControlfortheInternetofThings AliYavari(RMITUniversity),ArezouSoltaniPanah(RMITUniversity),DimitriosGeorgakopoulos(SwinburneUniversityofTechnology),PremPrakashJayaraman(SwinburneUniversityofTechnology),RonvanSchyndel(RMITUniversity)

TheInternetofThings(IoT)isthelatestInternetevolutionthatinterconnectsbillionsofdevices,suchascameras,sensors,RFIDs,smartphones,wearabledevices,ODBIIdongles,etc.FederationsofsuchIoTdevices(or\textit{things})providestheinformationneededtosolvemanyimportantproblemsthathavebeentoodifficulttoharnessbefore.Despitethesegreatbenefits,privacyinIoTremainsagreatconcern,inparticularwhenthenumberofthingsincreases.Thispressestheneedforthedevelopmentofhighlyscalableandcomputationallyefficientmechanismstopreventunauthorisedaccessanddisclosureofsensitiveinformationgeneratedbythings.Inthispaper,weaddressthisneedbyproposingalightweight,yethighlyscalable,dataobfuscationtechnique.Forthispurpose,adigitalwatermarkingtechniqueisusedtocontrolperturbationofsensitivedatathatenableslegitimateuserstode-obfuscateperturbeddata.Toenhancethescalabilityofoursolution,wealsointroduceacontextualisationservicethatachievereal-timeaggregationandfilteringofIoTdataforlargenumberofdesignatedusers.We,then,assesstheeffectivenessoftheproposedtechniquebyconsideringahealth-carescenariothatinvolvesdatastreamedfromvariouswearableandstationarysensorscapturinghealthdata,suchasheart-rateandbloodpressure.Ananalysisoftheexperimentalresultsthatillustratetheunconstrainedscalabilityofourtechniqueconcludesthepaper.

Multi-representationbasedDataProcessingArchitectureforIoTApplications VaibhavArora(UniversityofCalifornia,SantaBarbara),FaisalNawab(UniversityofCalifornia,SantaBarbara),DivyakantAgrawal(UniversityofCalifornia,SantaBarbara),AmrElAbbadi(UniversityofCalifornia,SantaBarbara)

InternetofThings(IoT)applicationslikesmartcars,smartcitiesandwearablesarebecomingwidespreadandarethefutureoftheInternet.OneofthemajorchallengesforIoTapplicationsisefficientlyprocessing,storingandanalyzingthecontinuousstreamofincomingdatafromalargenumberofconnectedsensors.Weproposeamulti-representationbaseddataprocessingarchitectureforIoTapplications.Thedataisstoredinmultiplerepresentations,likerows,columns,graphswhichprovidessupportfordiverseapplicationdemands.Aunifyingupdatemechanismbasedondeterministicschedulingisusedtoupdatethedatarepresentations,whichcompletelyremovestheneedfordatatransferpipelineslikeETL(Extract,TransformandLoad).Thecombinationofmultiplerepresentations,andthedeterministicupdatemechanism,providestheabilitytosupportreal-timeanalyticsandcaterstoIoTapplicationsbyminimizingthelatencyofoperationslikecomputingpre-definedaggregates.

LongTermSensingviaBatteryHealthAdaptation GregJackson(ImperialCollegeLondon),ZhijinQin(ImperialCollegeLondon),JulieAMcCann(ImperialCollegeLondon)

EnergyNeutralOperation(ENO)hascreatedtheabilitytocontinuouslyoperatewirelesssensornetworksinareassuchasenvironmentalmonitoring,hazarddetectionandindustrialIoTapplications.CurrentENOapproachesutilisetechniquessuchassampleratecontrol,adaptivedutycyclinganddatareductionmethodstobalanceenergygeneration,storageandconsumption.However,thestateoftheartapproachesmakesastrongandunrealisticassumptionthatbatterycapacityisfixedthroughoutthedeploymenttimeofanapplication.ThisresultsinscenarioswhereENOsystemsoverallocatesensingtasks,thereforeasbatterycapacity

101

degradesitcausesthesystemtonolongerbeenergyneutralandthenfailunexpectedly.Inthispaper,weformulatetheproblemtomaximisethequality-of-serviceintermsofdutycycleandthebatterycapacitytoextendthedeploymentlifetimeofasensingapplication.Inaddition,wedevelopalightweightalgorithmtosolvetheformulatedproblem.Moreover,weevaluatetheproposedmethodusingrealsensorenergyconsumptiondatacapturedfrommicro-climatesensorsdeployedinQueenElizabethOlympicPark,London.Resultsshowthata307%extensionofdeploymentlifetimecanbeachievedwhencomparedtoatraditionalENOsolutionwithoutareductioninthedutycycleofthesensor.

DetectingTimeSynchronizationAttacksinCyber-PhysicalSystemswithMachineLearningTechniques JingxuanWang(TheUniversityofHongKong),WentingTu(ShanghaiUniversityofFinanceandEconomics),LucasC.K.Hui(TheUniversityofHongKong),SiuMingYiu(TheUniversityofHongKong),EricKeWang(HarbinInstituteofTechnologyShenzhenGraduateSchool)

Recently,researchersfoundanewtypeofattacks,calledtimesynchronizationattack(TSattack),incyber-physicalsystems.Insteadofmodifyingthemeasurementsfromthesystem,thisattackonlychangesthetimestampsofthemeasurements.Studiesshowthattheseattacksarerealisticandpractical.However,existingdetectiontechniques,e.g.baddatadetection(BDD)andmachinelearningmethods,maynotbeabletocatchtheseattacks.Inthispaper,wedevelopa“firstdifferenceaware”machinelearning(FDML)classifiertodetectthisattack.Thekeyconceptbehindourclassifieristousethefeatureof“firstdifference”,borrowedfromeconomicsandstatistics.SimulationsonIEEE14-bussystemwithrealdatafromNYISOhaveshownthatourFDMLclassifiercaneffectivelydetectbothTSattacksandothercyberattacks.

Speed-basedLocationTrackinginUsage-basedAutomotiveInsurance LuZhou(ShanghaiJiaoTongUniversity),QingrongChen(ShanghaiJiaoTongUniversity),ZutianLuo(ShanghaiJiaoTongUniversity),HaojinZhu(ShanghaiJiaoTongUniversity),CailianChen(ShanghaiJiaoTongUniversity)

Usage-basedInsurance(UBI)isregardedasapromisingwaytooffermoreaccurateinsurancepremiumbyprofilingdrivingbehaviors.Comparedwithtraditionalinsurancewhichconsidersdrivers’historyofaccidents,trafficviolationsandetc,UBIfocusesondrivingdataandcangiveamorereasonableinsurancepremiumbasedonthecurrentdrivingbehaviors.Insurersusesensorsinsmartphoneorvehicletocollectdrivingdata(e.g.mileage,speed,harkbraking)andcomputeariskscorebasedonthesedatatorecalculateinsurancepremium.Manyinsuranceprograms,whichareadvertisedasbeingprivacy-preserving,donotdirectlyusetheGPS-basedtracking,butitisnotenoughtoprotectdriver’slocationprivacy.Inrealworld,manyenvironmentfactorssuchasreal-timetrafficandtrafficregulationscaninfluencedrivingspeed.Thesefactorsprovidetheside-channelinformationaboutthedrivingroute,whichcanbeexploitedtoinferthevehicle’strace.Basedontheobservation,weproposeanovelspeedbasedtrajectoryinferencealgorithmwhichcantrackdriversonlywiththespeeddataandoriginallocation.WeimplementtheattackonapublicdatasetinNewJersey.Theevaluationresultsshowthattheattackercanrecovertheroutewithahighsuccessfulrate.

ShortPaper4:Mobile,Wireless,Edge,andCrowdComputingOnefficientoffloadingcontrolincloudradioaccessnetworkwithmobileedgecomputing TongLi(TsinghuaUniversity),ChathuraSarathchandraMagurawalage(UniversityofEssex),KezhiWang(UniversityofEssex),KeXu(TsinghuaUniversity),KunYang(UniversityofEssex),HaiyangWang(UniversityofMinnesotaatDuluth)

Cloudradioaccessnetwork(C-RAN)andmobileedgecomputing(MEC)haveemergedaspromisingcandidatesforthenextgenerationaccessnetworktechniques.Unfortunately,althoughMECtriestoutilizethehighlydistributedcomputingresourcesincloseproximitytouserequipmentsequipments(UE),C-RANsuggeststocentralizethebasebandprocessingunits(BBU)deployedinradioaccessnetworks.Tobetterunderstandandaddresssuchaconflict,thispapercloselyinvestigatestheMECtaskoffloadingcontrolinC-RANenvironments.Inparticular,wefocusonperspectiveofmatchingproblem.OurmodelsmartlycapturestheuniquefeaturesinbothMECandC-RANwithrespecttocommunicationandcomputationefficiencyconstraints.Wedividethecross-layeroptimizationintothefollowingthreestages:(1)matchingbetweenremoteradioheads(RRH)andUEs,(2)matchingbetweenBBUsandUEs,and(3)matchingbetweenmobileclones(MC)andUEs.ByapplyingtheGale-ShapleyMatchingTheoryintheduplexmatchingframework,weproposeamulti-stageheuristictominimizetherefusalrateforuser'staskoffloadingrequests.Trace-basedsimulationconfirmsthatoursolutioncansuccessfullyachievenear-optimalperformanceinsuchahybriddeployment.

LocationPrivacyinMobileEdgeClouds TingHe(PennsylvaniaStateUniversity),ErtugrulCiftcioglu(ArmyResearchLaboratory),ShiqiangWang(IBM),KevinChan(ArmyResearchLaboratory)

Inthispaper,weconsideruserlocationprivacyinmobileedgeclouds(MECs).MECsaresmallcloudsdeployedatthenetworkedgetooffercloudservicesclosetomobileusers,andmanysolutionshavebeenproposedtomaximizeservicelocalitybymigratingservicestofollowtheirusers.Co-locationofauserandhisservice,however,impliesthatacybereavesdropperobservingservicemigrationsbetweenMECscanlocalizetheuseruptooneMECcoveragearea,whichcanbefairlysmall(e.g.,afemtocell).Weconsiderusingchaffservicestodefendagainstsuchaneavesdropper,withfocusonstrategiestocontrolthechaffs.Assumingtheeavesdropperperformsmaximumlikelihood(ML)detection,weconsiderbothheuristicstrategiesthatmimictheuser'smobilityandoptimizedstrategiesdesignedtominimizethedetectionortrackingaccuracy.Weshowthatasinglechaffcontrolledbytheoptimalstrategycandrivetheeavesdropper'strackingaccuracytozerowhentheuser'smobilityissufficientlyrandom.Theefficacyofoursolutionsisverifiedthroughextensivesimulations.

ApproximationDesignforCooperativeRelayDeploymentinWirelessNetworks HaotianWang(ShanghaiJiaoTongUniversity),ShileiTian(ShanghaiJiaoTongUniversity),XiaofengGao(ShanghaiJiaoTongUniversity),LidongWu(UniversityofTexasatTyler),GuihaiChen(ShanghaiJiaoTongUniversity)

Inthispaper,weaimtomaximizeusers’satisfactionbydeployinglimitednumberofrelaysinatargetregiontoformawirelessrelaynetwork,anddefinetheDeploymentofCooperativeRelay(DoCR)problem,whichisprovedtobeNP-complete.WefirstproposeanO(δlogn)approximationalgorithmthatutilizesthealgorithmsforbudgetweightedSteinertreeproblemwithnovelpositionweightingassignment.WefurtherproposeaheuristicmethodtosolvetheDoCRproblemreleasingpotentiallocationconstraint.Ourextensiveexperimentsindicatethatthealgorithmsweproposecansignificantlyimprovethetotalsatisfactionofthenetwork.Furthermore,weestablishatestbedusingUSRPtoshowcaseourdesignsinrealscenarios.Tothebestofourknowledge,wearethefirsttoproposeapproximationalgorithmforrelayplacementproblemtomaximizeusersatisfaction,whichhasboththeoreticalandpracticalsignificanceintherelatedarea.

DispersingSocialContentinMobileCrowdthroughOpportunisticContacts LeiZhang(SimonFraserUniversity),FengWang(TheUniversityofMississippi),JiangchuanLiu(SouthChinaAgriculturalUniversity)

102

Crowdsourcedcontentsharinghasbecomeafast-growingactivityintoday'sonlinesocialnetworks,wherecontentsofinterestarecreatedbydiversesourceusersandconveyedoverthenetworkasfriendsviewandreshare.Therapidandboundlesspropagationinamobilecrowdhoweveroftencreatesseverebottlenecksontheserversideandincurssignificantenergyandmonetarycostsonthemobileside,particularlywiththestillexpensive3G/4Gcellularconnections.ThispaperpresentsSoCrowd,anovelframeworkforlarge-scalecontentsharinginamobilecrowdbyexploitingcontacts,i.e.,usershappentomoveclosewithsuchshortrangelowpowercommunicationsasWiFiandbluetoothbeingenabled.Weformulatetheschedulingproblemforsocialcontentpropagationinamobilecrowdwithcontacts,andpresentoptimaldynamicprogrammingsolution,whichfurthermotivatesaseriesofpracticalheuristics.TheeffectivenessofSoCrowdhasbeendemonstratedbyextensivesimulationsdrivenbyrealworldtracesanddatasets.

ALightweightRecommendationFrameworkforMobileUser'sLinkSelectioninDenseNetwork JiWang(NationalUniversityofDefenseTechnology),XiaominZhu(NationalUniversityofDefenseTechnology),WeidongBao(NationalUniversityofDefenseTechnology),GuanlinWu(NationalUniversityofDefenseTechnology)

Withtheproliferationofmobiledevicesandthedevelopmentofcommunicationtechnology,mobiledeviceshavepermeatedeveryaspectofourdailylives.However,indensenetworkwherelargecrowdofmobiledevicestrytoaccesstothenetworksimultaneously,thesevereinterferencebetweenmobiledevicesmayincuraremarkabledeteriorationofthewirelesscommunicationquality.Howtoimproveindividual'sexperienceinsuchscenarioisacriticalyetopenproblem.Inspiredbythemobiledeviceusers'usagepatternaswellasthecharacteristicofmostwirelesscommunicationsystems,weproposeaframeworkofferinguplink/downlinkselectionrecommendationtodifferentmobiledeviceuserstoenhancetheirutilityinthispaper.Thedesignoftheframeworkstartswithformulatingtheproblemasalinkselectiongame.AnalysisshowsthatthegamecanbecategorizedasageneralizedordinalpotentialgamewhoseNashEquilibriumisguaranteed.WethendeviseadistributedlinkselectionalgorithmtogenerateaNashEquilibriumofthegame.Toaccommodatetothecharacteristicofdensenetworkandthecapacitylimitationofmobiledevice,thedesignofthealgorithmshowsalight-weightpropertyanddoesnotrequireeachmobiledeviceusertoknowothers'currentselection.Theprobabilityofincompleteinformationgatheringisalsoconsidered.Extensiveexperimentsareconductedtodemonstratetheeffectivenessandsuperiorityoftheproposedframework.Experimentalresultsshowthattheglobalaverageutilityincreaseratereachesabove20%,andabout70%mobiledeviceuserscanbenefitfromusingourframework

MakingSmartphoneSmartonDemandforLongerBatteryLife MarcoBrocanelli(TheOhioStateUniversity),XiaoruiWang(TheOhioStateUniversity)

Amajorconcernfortoday’ssmartphonesistheirmuchfasterbatterydrainthantraditionalfeaturephones,despitetheirgreaterbatterycapacities.Thedifferenceismainlycontributedbythosemorepowerfulbutalsomuchmorepowerconsumingsmartphonecomponents,suchasthemulti-coreapplicationprocessor.Whiletheapplicationprocessormustbeactivewhenanysmartappsarebeingused,itisalsounnecessarilywakenup,evenduringidleperiods,toperformoperationsrelatedtobasicphonefunctions(i.e.,incomingcallsandtextmessages).Inthispaper,weinvestigatehowtoincreasethebatterylifeofsmartphonesbyminimizingtheuseoftheapplicationprocessorduringidleperiods.Wefindthattheapplicationprocessorisoftenwakenupbyaprocessrunningonit,calledtheRadioInterfaceLayerDaemon(RILD),whichinterfacestheuserandappstotheGSM/LTEcellularnetwork.Inparticular,wedemonstratethatagreatamountofenergycouldbesavedifRILDisstopped,suchthattheapplicationprocessorcansleepmoreoften.Basedonthiskeyfinding,wedesignaSmartOnDemand(SOD)configurationthatreducessmartphoneidleenergyconsumptionbyrunningRILDoperationsonasecondarylow-powermicrocontroller.Asaresult,RILDoperationscanbehandledatmuchlowerenergycostsandtheapplicationprocessoriswakenuponlywhenoneneedstouseanysmartapps,inanon-demandmanner.WehavebuiltahardwareprototypeofSODandevaluateditwithrealusertraces.OurresultsshowthatSODcanincreaseitsbatterylifebyupto2.5moredays.

FADEWICH:FastDeauthenticationovertheWirelessChannel GiulioLovisotto(UniversityofOxford),MauroConti(UniversityofPadua),IvanMartinovic(UniversityofOxford),GeneTsudik(UniversityofCalifornia,Irvine)

Bothauthenticationanddeauthenticationareinstrumentalforpreventingunauthorizedaccesstocomputersandotherresources.Whilethereareobviousmotivatingfactorsforusingstrongauthenticationmechanisms,convincinguserstodeauthenticateisnotstraight-forward,sincedeauthenticationisnotconsideredmandatory.Auserwholeavesalogged-inworkstationunattended(especiallyforashorttime)istypicallynotinconveniencedinanyway;infact,theotherwayaround–noannoyingreauthenticationisneededuponreturn.However,anunattendedworkstationistriviallysusceptibletothewell-known“lunchtimeattack”byanynearbyadversarywhosimplytakesoverthedeparteduser’slog-insession.Atthesametime,sincedeauthenticationdoesnotintrinsicallyrequireusersecrets,itcan,inprinciple,bemadeunobtrusive.Tothisend,thispaperdesignsthefirstautomaticuserdeauthenticationsystem–FADEWICH–thatdoesnotrelyonbiometric-orbehavior-basedtechniques(e.g.,keystrokedynamics)anddoesnotrequireuserstocarryanydevices.Itusesphysicalpropertiesofwirelesssignalsandtheeffectofhumanbodiesontheirpropagation.ToassessFADEWICH’sfeasibilityandperformance,extensiveexperimentswereconductedwithitsprototype.Resultsshowthatitsufficestohavenineinexpensivewirelesssensorsdeployedinasharedofficesettingtocorrectlydeauthenticatealluserswithinsixseconds(90%withinfourseconds)aftertheyleavetheirworkstation’svicinity.WeconsideredtworealisticscenarioswheretheadversaryattemptstosubvertFADEWICHandshowedthatlunchtimeattacksfail.

CognitiveWirelessCharger:Sensing-BasedReal-TimeFrequencyControlForNear-FieldWirelessCharging Sang-YoonChang(UniversityofColoradoColoradoSprings),SristiLakshmiSravanaKumar(AdvancedDigitalSciencesCenter),Yih-ChunHu(UniversityofIllinoisatUrbana-Champaign)

ArecentincreaseinmobileandIoTdeviceshasledtotheadvancementofwirelesscharging.Thestate-of-the-artwirelesschargingsystemsoperateataparticularfrequency,controlledbytheexplicitnetworkingfromthepower-receivingdevice(whichrelaysthebatterystatusinformation,usefulforthefrequencyselection),butsuchcontrolisnotdesignedtocopewiththevariationsinthepowerreceivingdevice’splacementsandalignments(whicharemoresignificantinnear-fieldandpseudo-tightlycoupledchargingapplications,asmorechargingpadsarebeingdeployedinthepublicdomainsandservingheterogeneousclients).Inthiswork,weanalyzetheimpactofthepowertransferperformancecausedbythepowerreceiver’sload,distance,andcoilalignment/overlapandintroducecognitivewirelesscharger(CWC),whichadaptivelycontrolstheoperatingfrequencyinreal-timeusingimplicitfeedbackfromsensingforoptimaloperations.InadditiontothetheoreticalandLTSpice-basedsimulationanalysis,webuildaprototypecompatibletotheQistandardandanalyzetheperformanceofCWCwithit.Throughouranalyses,weestablishthatfrequencycontrolachievesperformancegainsininductive-couplingchargingapplicationsandissensitivetothevariationsintheplacementandalignmentbetweenthepower-transmittingandthepower-receivingcoils.Ourprototype,whenCWCisturnedoff,hascomparableperformancetothecommercial-gradeQiwirelesschargersand,withCWCenabled,demonstratessignificantimprovementovermodernwirelesschargers.

103

DensityandMobility-drivenEvaluationofBroadcastAlgorithmsforMANETs RazielCarvajalGómez(UniversityofNeuchatel),IntiGonzalez-Herrera(LaBRI/UniversityofBordeaux),Yérom-DavidBromberg(UniversityofRennes1),LaurentRéveillère(UniversityofBordeaux),EtienneRivière(UniversityofNeuchatel)

BroadcastisafundamentaloperationinMobileAd-HocNetworks(MANETs).Alargevarietyofbroadcastalgorithmshavebeenproposed.Theydifferinthewaymessageforwardingbetweennodesiscontrolled,andinthelevelofinformationaboutthetopologythatthiscontrolrequires.DeploymentscenariosforMANETsvarywidely,inparticularintermsofnodesdensityandmobility.Thechoiceofanalgorithmdependsonitsexpectedcoverageandenergycost,whicharebothimpactedbythedeploymentcontext.Inthiswork,weareinterestedinthecomprehensivecomparisonofthecostsandeffectivenessofbroadcastalgorithmsforMANETsdependingontargetenvironmentalconditions.Wedescribetheresultsofanexperimentalstudyoffivealgorithms,representativeofthemaindesignalternatives.Ourstudyrevealsthatthebestalgorithmforagivensituation,suchasahighdensityandastablenetwork,isnotnecessarilythemostappropriateforadifferentsituationsuchasasparseandmobilenetwork.Weidentifythealgorithmscharacteristicsthatarecorrelatedwiththesedifferencesanddiscusstheprosandconsofeachdesign.

Energy-AwareCPUFrequencyScalingforMobileVideoStreaming WenjieHu(ThePennsylvaniaStateUniversity),GuohongCao(ThePennsylvaniaStateUniversity)

TheenergyconsumedbyvideostreamingincludestheenergyconsumedfordatatransmissionandCPUprocessing,whicharebothaffectedbytheCPUfrequency.HighCPUfrequencycanreducethedatatransmissiontimebutitconsumesmoreCPUenergy.LowCPUfrequencyreducestheCPUenergybutincreasesthedatatransmissiontimeandthenincreasestheenergyconsumption.Inthispaper,weaimtoreducethetotalenergyofmobilevideostreamingbyadaptivelyadjustingtheCPUfrequency.Basedonrealmeasurementresults,wemodeltheeffectsofCPUfrequencyonTCPthroughputandsystempower.Basedonthesemodels,weproposeanEnergy-awareCPUFrequencyScaling(EFS)algorithmwhichselectstheCPUfrequencythatcanachieveabalancebetweensavingthedatatransmissionenergyandCPUenergy.Sincethedownloadingscheduleofexistingvideostreamingappsisnotoptimizedintermsofenergy,wealsoproposeamethodtodeterminewhenandhowmuchdatatodownload.Throughtrace-drivensimulationsandrealmeasurement,wedemonstratethattheEFSalgorithmcanreduce30%ofenergyfortheYoutubeapp,andthecombinationofourdownloadmethodandEFSalgorithmcansave50%ofenergythanthedefaultYoutubeapp.

CrazyCrowdSourcingtoMitigateResourceScarcity NovaAhmed(NorthSouthUniversity),MdMahfuzurRahmanSiddiquee(IndependentResearcher),RefayaKarim(NorthSouthUniversity),MohsinaZaman(IndependentResearcher),SayedMahmudulAlam(NorthSouthUniversity),SyedFahimAsraf(NorthSouthUniversity)

Resourcescarcityprohibitsdevelopingcountrypopulationinmanywaysfromubiquitousservices.OnesuchserviceisprovidinginformationaboutthebestrouteforanambulanceinacrisissituationduetolackofproperroadnetworkinformationandGPSdata.WehaveworkedonaroutingmethodinDhaka,Bangladeshandutilizedthepowerofcrowdsourcingintimesofresourcescarcity.Weshareourchallengesandopportunitiesthatopenedupfollowedbythechallengesinthispaper.

DetectingRogueAPwiththeCrowdWisdom TongqingZhou(NationalUniversityofDefenseTechnology),ZhipingCai(NationalUniversityofDefenseTechnology),BinXiao(TheHongKongPolytechnicUniversity),YueyueChen(NationalUniversityofDefenseTechnology),MingXu(NationalUniversityofDefenseTechnology)

WiFinetworksarevulnerabletorogueAPattacksinwhichanattackersetsupanimposterAPtoluremobileuserstoconnect.Theattackercaneavesdroponthecommunication,severelythreateningusers'privacy.ExistingrogueAPdetectionsolutionsareconfinedtosomespecificattackscenarios(e.g.,byrelayingthetraffictoatargetAP)orrequireadditionalhardware.Inthispaper,weproposeacrowdsensingbasedapproach,namedCRAD,todetectrogueAPsincamouflagewithoutspecializedhardwarerequirement.CRADexploitsthespatialcorrelationofRSStoidentifyapotentialimposter,whichshouldbeatadifferentlocationfromthelegitimateone.TheRSSmeasurementscollectedfromthecrowdfacilitatearobustprofileandminimizetheinaccuracyeffectofasingleRSSvalue.Asaresult,CRADcanfilteroutabnormalsamplessensedintherealtimebydynamicallymatchingtheprofile.Weevaluateourapproachwithbothapublicdatasetandarealprototype.TheresultsshowthatCRADcanyield90%detectionaccuracyandprecisionwithpropercrowdpresence,evenwhentherogueAPislaunchedclosetothelegitimateone(e.g.,within1m).

ShortPaper5:DistributedBigDataSystemsandAnalyticsTowardsMultilingualAutomatedClassificationSystems AibekMusaev(UniversityofAlabama),CaltonPu(GeorgiaInstituteofTechnology)

Inthispaperweproposeandevaluatethreeapproachesforautomatedclassificationoftextsinover60languageswithouttheneedforamanuallyannotateddatasetinthoselanguages.AllapproachesarebasedontherandomizedExplicitSemanticAnalysismethodusingmultilingualWikipediaarticlesastheirknowledgerepository.WeevaluatetheproposedapproachesbyclassifyingaTwitterdatasetinEnglishandPortugueseintorelevantandirrelevantitemswithrespecttolandslideasanaturaldisaster,wherethehighestachievedF1-scoreis0.93.Theseapproachescanbeusedinvariousapplicationswheremultilingualclassificationisneeded,includingmultilingualdisasterreportingusingSocialMediatoimprovecoverageandincreaseconfidence.Asillustration,wepresentademonstrationthatcombinesdatafromphysicalsensorsandsocialnetworkstodetectlandslideeventsreportedinEnglishandPortuguese.

TheJointEffectsofTweetContentSimilarityandTweetInteractionsforTopicDerivation RobertusNugroho(MacquarieUniversity),WeiliangZhao(MacquarieUniversity),JianYang(MacquarieUniversity),CecileParis(CSIRO–ICTCentre),SuryaNepal(CSIRO)

Interactionsamongtweets,i.e.,mentions,retweets,replies,areimportantfactorscontributingtothequalityoftopicderivationonTwitter.Ifappliedcorrectly,theincorporationoftweetinteractionscansignificantlyimprovethequalityoftopicderivationincomparisonwithapproachesthataremainlybasedonthecontentsimilarityanalysis.However,howinteractionscanbemeasuredandintegratedwithcontentsimilarityfortopicderivationremainsachallenge.Inpreviouswork,thestrengthoftweet-to-tweetrelationshiphasbeencomputedbysimplyaddingmeasuresforcontentsimilarity,mentions,andreply-retweets.Thissimplelinearadditiondoesnotaccuratelyreflectthevariousimpactsthesefactorshaveontweetrelationships.Inordertoaddressthisissue,weproposeajointprobabilitymodelthatcaneffectivelyintegratetheeffectsofthecontentsimilarity,mentions,andreply-retweetstomeasurethetweetrelationshipforthepurposeoftopic

104

derivation.Theproposedmethodisbasedonmatrixfactorizationtechniques,whichenablesaflexibleimplementationonadistributedsysteminanincrementalmanner.Experimentalresultsshowthattheproposedmodelresultsinasignificantimprovementinthequalityoftopicderivationoverexistingmethods.

Timed-releaseofSelf-emergingDatausingDistributedHashTables ChaoLi(UniversityofPittsburgh),BalajiPalanisamy(UniversityofPittsburgh)

Releasingprivatedatatothefutureisachallengingproblem.Makingprivatedataaccessibleatafuturepointintimerequiresmechanismstokeepdatasecureandundiscoveredsothatprotecteddataisnotavailablepriortothelegitimatereleasetimeandthedataappearsautomaticallyattheexpectedreleasetime.Inthispaper,wedevelopnewmechanismstosupportself-emergingdatastoragethatsecurelyhidekeysofencrypteddatainaDistributedHashTable(DHT)networkthatmakestheencryptionkeysautomaticallyappearatthepredeterminedreleasetimesothattheprotectedencryptedprivatedatacanbedecryptedatthereleasetime.Weshowthatastraight-forwardapproachofprivatelystoringkeysinaDHTispronetoanumberofattacksthatcouldeithermakethehiddendataappearbeforetheprescribedreleasetime(release-aheadattack)ordestroythehiddendataaltogether(dropattack).Wedevelopasuiteofself-emergingkeyroutingmechanismsforsecurelystoringandroutingencryptionkeysintheDHT.Weshowthattheproposedschemeisresilienttobothrelease-aheadattackanddropattackaswellastoattacksthatariseduetotraditionalchurnissuesinDHTnetworks.Ourexperimentalevaluationdemonstratestheperformanceoftheproposedschemesintermsofattackresilienceandchurnresilience.

CachingforPatternMatchingQueriesinTimeEvolvingGraphs:ChallengesandApproaches MuhammadNisar(UniversityofGeorgia),SaharVoghoei(UniversityofGeorgia),LakshmishRamaswamy(UniversityofGeorgia)

Patternmatchingisanimportantclassofproblemsrelatedtographs.Itisafundamentalproblemformanyapplicationsandhasbeenextensivelystudiedinliterature.Withtheadventofhugegraphs,thechallengesinthisdomainhaveincreasedmanifold.Consequentlyalotofrecentresearchhasledtonewarchitecturesandapproachesforoptimizedsolutionstothepatternmatchingproblem.Avastmajorityofthesegraphshardlyremainstaticandconstantlyevolveovertime(likesocialnetworks,webgraphs,etc).Recently,cachinghasbeenstudiedinthecontextofstaticgraphstooptimizethethroughputofqueryprocessingsystems.Inthispaper,welistthechallengesincachinginthecontextofTimeEvolvingGraphs(TEGs).Amongstothers,onemajorchallengeisconsistencywhichentailstomakingsurethecacheisconsistentwiththestreamingchanges.Weproposeanapproachtosuccessfullyimplementcachingthataddressesthoseissuesandbasedontheinitialresults,weseesignificantgainsintheoverallperformanceofsystem.

GraphA:AdaptivePartitioningforNaturalGraphs DongshengLi(NationalUniversityofDefenseTechnology),ChengfeiZhang(NationalUniversityofDefenseTechnology),JinyanWang(NationalUniversityofDefenseTechnology),ZhaoningZhang(NationalUniversityofDefenseTechnology),YimingZhang(NationalUniversityofDefenseTechnology)

Large-scalegraphcomputationiscentraltoapplicationsrangingfromlanguageprocessingtosocialnetworks.However,naturalgraphstendtohaveskewedpower-lawdistributionswhereasmallsubsetoftheverticeshavealargenumberofneighbors.Existinggraph-parallelsystemssufferfromloadimbalance,highcommunicationcost,orsuboptimalandcomplexprocessing.InthispaperwepresentGraphA,anAdaptiveapproachtoefficientpartitioningandcomputationoflarge-scalenaturalgraphs.GraphAprovidesanadaptiveanduniformgraphpartitioningalgorithm,whichpartitionsthedatasetsinaload-balancedmannerbyusinganincrementalnumberofhashfunctions.WehaveimplementedGraphAbothonSparkandonGraphLab.ExtensiveevaluationshowsthatGraphAremarkablyoutperformsstate-of-the-artgraph-parallelsystems(GraphXandPowerLyra)iningresstime,executiontimeandstorageoverhead,forbothreal-worldandsyntheticgraphs.

ParallelAlgorithmforCoreMaintenanceinDynamicGraphs NaWang(HuazhongUniversityofScienceandTechnology),DongxiaoYu(HuazhongUniversityofScienceandTechnology),HaiJin(HuazhongUniversityofScienceandTechnology),ChenQian(HuazhongUniversityofScienceandTechnology),XiaXie(HuazhongUniversityofScienceandTechnology),Qiang-ShengHua(HuazhongUniversityofScienceandTechnology)

Thispaperinitiatesthestudiesofparallelalgorithmforcoremaintenanceindynamicgraphs.Thecorenumberisafundamentalindexreflectingthecohesivenessofagraph,whichiswidelyusedinlarge-scalegraphanalytics.Weinvestigatetheparallelisminthecoreupdateprocesswhenmultipleedgesandverticesareinserted.Specifically,wediscoverastructurecalledsuperioredgeset,theinsertionofedgesinwhichcanbeprocessedinparallel.Basedonthestructureofsuperioredgeset,anefficientparallelalgorithmisthendevised.Tothebestofourknowledge,theproposedalgorithmisthefirstparalleloneforthefundamentalcoremaintenanceproblem.Finally,extensiveexperimentsareconductedondifferenttypesofreal-worldandsyntheticdatasets,andtheresultsillustratetheefficiency,stabilityandscalabilityoftheproposedalgorithm.Thealgorithmshowsasignificantspeedupintheprocessingtimecomparedwithpreviousresultsthatsequentiallyhandleedgeandvertexinsertions.

DHCRF:ADistributedConditionalRandomFieldAlgorithmonHeterogeneousCPU-GPUClusterforBigData AiWei(HunanUniversity),LiKenli(HunanUniversity),ChenCen(HunanUniversity),PengJiwu(HunanUniversity),LiKeqin(HunanUniversity)

Asoneofthemostrecognizedmodelsinmachinelearning,theconditionalrandomfields(CRF)hasbeenwidelyusedinmanyapplications.AstheparameterestimationofCRFishighlytime-consuming,howtoimprovetheperformanceofCRFhasreceivedsignificantattention,inparticularinthebigdataenvironment.Todealwithlarge-scaledata,CPU-basedorGPU-basedparallelizationsolutionshavebeenproposedtoimproveperformance.However,theproblemisanongoingone.Inthispaper,wefocusonthebigdataenvironmentandproposeadistributedCRFonaheterogeneousCPU-GPUclustercalledDHCRF.Ourapproachdiffersfrompreviouswork.Specifically,itleveragesathree-stageheterogeneousMapandReduceoperationtoimprovetheperformance,makingfulluseofCPU-GPUcollaborativecomputingcapabilitiesinabigdataenvironment.Furthermore,bycombiningelasticdatapartitionandintermediateresultsmultiplexingmethod,thedistributedCRFisoptimized.Elasticdatapartitionisperformedtokeeptheloadbalanced,andtheintermediateresultsmultiplexingmethodisadoptedtoreducedatacommunication.ExperimentalresultsshowthattheDHCRFoutperformsthebaselineCRFalgorithmandtheCPU-basedparallelCRFalgorithmwithnotableperformanceimprovementwhilemaintainingcompetitivecorrectnessatthesametime.

TowardsNewAbstractionsforImplementingQuorum-basedSystems TormodErevikLea(UniversityofStavanger),LeanderJehl(UniversityofStavanger),HeinMeling(UniversityofStavanger)

105

ThispaperintroducesGorums,anovelRPCframeworkforbuildingfaulttolerantdistributedsystems.Gorumsoffersaflexibleandsimplequorumcallabstraction,usedtocommunicatewithasetofprocesses,andtocollectandprocesstheirresponses.Gorumsprovidesseparateabstractionsfor(a)selectingprocessesforaquorumcalland(b)processingreplies.Theseabstractionssimplifythemaincontrolflowofprotocolimplementations,especiallyforquorum-basedsystems,whereonlyasubsetoftherepliestoaquorumcallneedtobeprocessed.ToshowthatGorumscanbeusedinpracticalsystems,weimplementedEPaxos’latency-efficientquorumsystem,andranexperimentsusingakey-valuestorage.OurresultsshowthatGorums’abstractionscanprovideadditionalperformancebenefitstoEPaxos.

SelectiveTrafficOffloadingOntheFly:aMachineLearningApproach ZaiyangTang(HuazhongUniversityofScienceandTechnology),PengLi(TheUniversityofAizu),SongGuo(TheHongKongPolytechnicUniversity),XiaofeiLiao(HuazhongUniversityofScienceandTechnology),HaiJin(HuazhongUniversityofScienceandTechnology),DaqingZhang(InstitutMines-Telecom,TelecomSudParis)

Ithasbeenwellrecognizedthatnetworktransmissionconstitutesalargeportionofsmartphoneenergyconsumption,mainlybecauseofthetailenergycausedbycellularnetworkinterface.Trafficoffloadinghasbeenproposedtoreduceenergybylettingasmartphoneoffloadnetworktraffictoitsneighborsinvicinityvialow-powerdirectconnections(e.g.,WiFiDirectorBluetooth).Ourexperimentsconductedinarealisticenvironmentrevealthatenergyefficiencycannotbeimprovedorevendeteriorateswithoutacarefullydesignedoffloadingstrategy.Inthispaper,weproposeaselectivetrafficoffloadingschemeimplementedasasmartphonemiddlewareinasoftware-definedfashion,whichconsistsofapacketclassifierandatrafficscheduler.Usingalight-weightmachinelearningapproachexploitinguniquesmartphonecontextinformation,thepacketclassifieridentifiespacketsgeneratedontheflyasoffloadableornotwithsubstantiallyimprovedefficiencyandfeasibilityonresourcelimitedsmartphonescomparedtotraditionalapproaches.Bothtestbedandsimulationbasedexperimentsareconductedandtheresultsshowthatourproposalalwaysattainsthesuperiorperformanceonanumberofcomparisonmetrics.

AFastHeuristicAttributeReductionAlgorithmusingSpark MinchengChen(WuhanUniversityofTechnology),JinglingYuan(WuhanUniversityofTechnology),LinLi(WuhanUniversityofTechnology),DonglingLiu(WuhanUniversityofTechnology),TaoLi(UniversityofFlorida)

Energydata,whichconsistsofenergyconsumptionstatisticsandotherrelateddataingreendatacenters,growsdramatically.Theenergydatahasgreatvalue,butmanyattributeswithinitareredundantandunnecessary.Thusattributereductionfortheenergydatahasbeenconceivedasacriticalstep.However,manyexistingattributereductionalgorithmsareoftencomputationallytime-consuming.Toaddresstheseissues,weextendthemethodologyofroughsetstoconstructdatacenterenergyconsumptionknowledgerepresentationsystem.Bytakinggoodadvantageofin-memorycomputing,anattributereductionalgorithmforenergydatausingSparkisproposed.Inthisalgorithm,weuseaheuristicformulaformeasuringthesignificanceofattributetoreducesearchspace,andanefficientalgorithmforsimplifyingenergyconsumptiondecisiontable,whichfurtherimprovethecomputationefficiency.Theexperimentalresultsshowthespeedofouralgorithmgainsupto0.28XperformanceimprovementoverthetraditionalattributereductionalgorithmusingSpark.

ProfilingUsersbyModelingWebTransactions RadekTomsu(AaltoUniversity),SamuelMarchal(AaltoUniversity),N.Asokan(AaltoUniversity)

Usersofelectronicdevices,e.g.,laptop,smartphone,etc.havecharacteristicbehaviorswhilesurfingtheWeb.Profilingthisbehaviorcanhelpidentifythepersonusingagivendevice.Inthispaper,weintroduceatechniquetoprofileusersbasedontheirwebtransactions.Wecomputeseveralfeaturesextractedfromasequenceofwebtransactionsandusethemwithone-classclassificationtechniquestoprofileauser.Weassesstheefficacyandspeedofourmethodatdifferentiating25syntheticusersonabenchmarkdataset(fromamajorsecurityvendor)representing6monthsofwebtrafficmonitoringfromasmallenterprisenetwork.

JeCache:Just-EnoughDataCachingwithJust-in-TimePrefetchingforBigDataApplications YifengLuo(FudanUniversity),JiaShi(FudanUniversity),ShuigengZhou(FudanUniversity)

Bigdataclustersintroduceanintermediatecachelayerbetweenthecomputingframeworksandtheunderlyingdistributedfilesystems,toenableupper-levelapplicationsorenduserstoefficientlyaccessbigdatasetsincacheandeffectivelysharethemamongdifferentcomputingframeworks.Ascachesaresharedbymultipleapplicationsorendusers,directlyapplyingexistingon-demandcachingstrategieswillresultinintenseconflicts,whenbigdatasetsarecachedasawhole.Meanwhile,bigdataapplicationsusuallyinvolvemassivenumbersoffilescans,cached-indatablocksmayhavelittlechanceofbeingaccessedbeforetheyarecachedouttomakewayforotheron-demanddatablocks.Thus,itisunwisetocachedatablockslongbeforetheyareactuallyaccessed.Inthispaper,weproposeanoveljust-enoughbigdatacachingschemeforjust-in-timeblockprefetchingtoimprovethecacheeffectivenessofbigdataclusters.Withjust-in-timeblockprefetching,ablockiscachedinjustbeforethetaskbeginstoprocesstheblock,ratherthanbeingcachedinalongwithotherblocksofthesamedatasetbeingprocessed.Wemonitorblockaccessestomeasuretheaverageprocessingtimeofdatablocks,andthenestimatetheminimalnumberofblocksthatshouldbekeptincacheforabigdataset,sothatthespeedofdataprocessingmatcheswiththatofdataprefetching,andeachupper-leveltaskcanobtainitsinputblocksfromcachejustintime.Ourexperimentalresultsshowthattheproposedcachemethodcanrestrainover-requirementofcacheresourcesinbigdataapplications,andprovidesthesameperformanceimprovementaswhenalldatablocksarecached.

ShortPaper6:Security,Privacy,Trust,andFaultToleranceinDistributedSystemsProximityAwarenessApproachtoEnhancePropagationDelayontheBitcoinPeer-to-PeerNetwork MuntadherFadhilSallal(UniversityofPortsmouth),GarethOwenson(UniversityofPortsmouth),MoAdda(UniversityofPortsmouth)

IntheBitcoinsystem,apeer-to-peerelectroniccurrencysystem,thedelayoverheadintransactionverificationpreventstheBitcoinfromgainingincreasingpopularitynowadaysasitmakesthesystemvulnerabletodoublespendattacks.Thispaperintroducesaproximity-awareextensiontothecurrentBitcoinprotocol,namedBitcoinClusteringBasedPingTimeprotocol(BCBPT).Theultimatepurposeoftheproposedprotocol,thatisbasedonhowtheclustersareformulatedandthenodesdefinetheirmembership,istoimprovethetransactionpropagationdelayintheBitcoinnetwork.InBCBPT,theproximityofconnectivityintheBitcoinnetworkisincreasedbygroupingBitcoinnodesbasedonpinglatenciesbetweennodes.Weshow,throughsimulations,thattheproximitybasepinglatencydefinesbetterclusteringstructuresthatoptimizetheperformanceofthetransactionpropagationdelay.Thereductionofthecommunicationlinkcostmeasuredbytheinformationpropagationtimebetweennodesismainlyconsideredasakeyreasonforthisimprovement.BitcoinClusteringBasedPingTimeprotocolismoreeffectiveatreducingthetransactionpropagationdelaycomparedtotheexistingclusteringprotocol(LBC)thatweproposedinourpreviouswork.

106

CatchMeIfYouCan:DetectingCompromisedUsersThroughPartialObservationonNetworksDerekWang(DeakinUniversity),ShengWen(DeakinUniversity),JunZhang(DeakinUniversity),SuryaNepal(Data61),YangXiang(DeakinUniversity),WanleiZhou(DeakinUniversity)

Peoplearesufferingfromarangeofrisksintheubiquitousnetworksofcurrentworld,suchasrumoursspreadinginsocialnetworks,computervirusespropagatingthroughouttheInternetandunexpectedfailureshappenedinSmartgrids.Weusuallymonitoronlyafewusersofdetectingvariousrisksduetotheresourceconstraintsandprivacyprotection.Thisleadstoacriticalproblemtodetectcompromiseduserswhoareoutofsurveillance.Inthispaper,weproposeariskassessmentmethodtoaddressthisproblem.Theaimistoassessthesecuritystatusofunmonitoredusersaccordingtothelimitedinformationcollectedfrommonitoredusersinnetworks.Therearetwoinnovativetechniquesdeveloped:First,weidentifythesourceofriskpropagationbyinverselydisseminatingrisksfromtheinfluenced(byrumours)orinfected(byviruses)monitoredusers.Weshowanewfindingthattheoneswhosynchronouslyreceivetheriskcopiesfromallmonitoredusersaremostlikelytobethesources.Second,weproposeamicroscopicmathematicalmodeltopresenttheriskpropagationfromtheexposedsources.Thismodelformsadiscriminanttoclassifythecompromisedusersfromothers.Forevaluations,wecollectthreerealnetworksonwhichwelaunchsimulatedriskpropagationandthensamplethestatusofmonitoredusers.Theexperimentresultsshowthatourmethodiseffectiveandtheresultofriskassessmentwellmatchestherealstatusoftheunmonitoredusers.

LocationPrivacyBreach:AppsAreWatchingYouinBackground DachuanLiu(CollegeofWilliam&Mary),XingGao(CollegeofWilliam&Mary),HainingWang(UniversityofDelaware)

SmartphoneuserscanconvenientlyinstallasetofappsthatprovideLocationBasedService(LBS)frommarkets.TheseLBS-basedappsfacilitateusersinmanyapplicationscenarios,buttheyraiseconcernsonthebreachofprivacyrelatedtolocationaccess.Smartphoneuserscanhardlyperceivelocationaccess,especiallywhenithappensinbackground.Incomparisontolocationaccessinforeground,locationaccessinbackgroundcouldresultinmoreseriousprivacybreachbecauseitcancontinuouslyknowauser’slocations.Inthispaper,westudytheproblemoflocationaccessinbackground,andespeciallyperformthefirstmeasurementofthisbackgroundactionontheGoogleappmarket.Ourinvestigationdemonstratesthatmanypopularappsconductlocationaccessinbackgroundwithinshortintervals.Thisenablestheseappstocollectauser’slocationtrace,fromwhichtheimportantpersonalinformation,PointsofInterest(PoIs),canberecognized.Wefurtherextractauser’smovementpatternfromthePoIs,andutilizeittomeasuretheextentofprivacybreach.ThemeasurementresultsalsoshowthatusingthecombinationofmovementpatternrelatedmetricsandtheotherPoIrelatedmetricscanhelpdetecttheprivacybreachinanearliermannerthanusingeitheroneofthemalone.

AndroidMalwareDetectionusingComplex-Flows FengShen(SUNYBuffalo),JustinDelVecchio(SUNYBuffalo),AzizMohaisen(SUNYBuffalo),StevenY.Ko(SUNYBuffalo),LukaszZiarek(SUNYBuffalo)

Thispaperproposesanewtechniquetodetectmobilemalwarebasedoninformationflowanalysis.Ourapproachexaminesthestructureofinformationflowstoidentifypatternsofbehaviorpresentinthemandwhichflowsarerelated,thosethatsharepartialcomputationpaths.WecallsuchflowsComplex-Flows,astheirstructure,patterns,andrelationsaccuratelycapturethecomplexbehaviorexhibitedbybothrecentmalwareandbenignapplications.N-gramanalysisisusedtoidentifyuniqueandcommonbehavioralpatternspresentinComplex-Flows.TheN-gramanalysisisperformedonsequencesofAPIcallsthatoccuralongComplex-Flows'controlflowpaths.Weshowtheprecisionofourtechniquebyapplyingittodifferentdatasetstotaling7,798apps.Thesedatasetsconsistofbothrecentandoldergenerationbenignandmaliciousappstodemonstratetheeffectivenessofourapproachacrossdifferentgenerationsofapps.

PrivacyImplicationsofDNSSECLook-asideValidation AzizMohaisen(SUNYBuffalo),ZhongshuGu(IBMResearch),KuiRen(SUNYBuffalo)

TocomplementDNSSECoperations,DNSSECLook-asideValidation(DLV)isdesignedforalternativeoff-pathvalidation.WhileDNSprivacyattractsalotofattention,theprivacyimplicationsofDLVarenotfullyinvestigatedandunderstood.Inthispaper,wetakeafirstin-depthlookintoDLV,highlightingitslaxspecificationsandprivacyimplications.Byperformingextensiveexperimentsoverdatasetsofdomainnamesundercomprehensiveexperimentalsettings,ourfindingsfirmlyconfirmtheprivacyleakagescausedbyDLV.WediscoverthatalargenumberofdomainsthatshouldnotbesenttoDLVserversarebeingleaked.Weexploretherootcauses,includingthelaxspecificationsofDLV.Wealsoproposetwoapproachestofixtheprivacyleakages.OurapproachesrequiretrivialmodificationstotheexistingDNSstandardsandwedemonstratetheircostintermsoflatencyandcommunication.

FlipNet:ModelingCovertandPersistentAttacksonNetworkedResources SudipSaha(VirginiaPolytechnicInstituteandStateUniversity),AnilVullikanti(VirginiaPolytechnicInstituteandStateUniversity),MahanteshHalappanavar(PacificNorthwestNationalLab)

Persistentandzero-dayattackshaveincreasedconsiderablyintherecentpastintermsofscaleandimpact.Securityexpertscannolongerrelyonlyonknowndefensesandtherebyprotecttheirresourcespermanently.Itisincreasinglycommonnowtoobserveattackersbeingabletorepeatedlybreaksystemsexploitingnewvulnerabilitiesanddefendershardeningsystemswithnewmeasures.Tomodelthisphenomenonoftherepeatedtakeoverofthecomputingresourcesbysystemadministratorsandmaliciousattackers,anovelgameframework,FlipIt,hasbeenproposedby(VanDijketal.2013)forasystemconsistingofasingleresource.Inthispaper,weextendthisanddevelopFlipNet,whichisarepeatedgameframeworkforanetworkedsystemofmultipleresources.Thisgameinvolvestwoplayers---adefenderandanattacker.Eachplayer'sobjectiveistomaximizeitsgain(i.e.,itscontroloverthenodesinthenetworkwithstealthymoves),whileminimizingthecostformakingthosemoves.Thisleadstoanovelandnaturalgameformulation,withaverycomplexstrategyspace,thatdependsonthenetworkstructure.WeshowthatfindingthebestresponsestrategyforboththedefenderandattackerisNP-hard.Inakeyresultinthisstudy,weshowthattheattacker'sgainforaninstanceofthegamehasatypeofdiminishingmarginalreturnproperty,whichleadstoanear-optimalalgorithmformaximizingtheattacker'sgain.Weexaminetheimpactofnetworkstructureonthestrategyspaceusingsimulations.

UnderstandingtheMarket-levelandNetwork-levelBehaviorsoftheAndroidMalwareEcosystem ChaoYang(Niara,Inc.),JialongZhang(IBMResearch),GuofeiGu(TexasA&MUniversity)

TheprevalenceofmalwareinAndroidmarketplacesisagrowingandsignificantproblem.MostexistingstudiesfocusondetectingAndroidmalwareordesigningnewsecurityextensionstodefendagainstspecifictypesofattacks.Inthispaper,weperformanempiricalstudyonanalyzingthemarket-levelandnetwork-levelbehaviorsoftheAndroidmalwareecosystem.Wefocusonstudyingwhetherthereareinterestingcharacteristicsofthosemarketaccountsthatdistributemalware

107

andspecificnetworksthataremainlyutilizedbyAndroidmalwareauthors.WefurtherinvestigatecommunitypatternsamongAndroidmalwarefromtheperspectiveoftheirmarketaccountinfrastructureandremoteserverinfrastructure.Spurredbytheseanalysis,wedesignanovelcommunityinferencealgorithmtofindmoremaliciousappsbyexploitingtheircommunityrelationships.Byusingasmallseedset(50)ofknownmaliciousapps,wecaneffectivelyfindanotherextra20timesofmaliciousapps,whilemaintainingconsiderableaccuracyhigherthan94%.

EnGarde:Mutually-TrustedInspectionofSGXEnclaves. HaiNguyen(RutgersUniversity),VinodGanapathy(RutgersUniversity)

Intel’sSGXarchitectureallowscloudclientstocreateenclaves,whosecontentsarecryptographicallyprotectedbythehardwareevenfromthecloudprovider.Whilethisfeatureprotectstheconfidentialityandintegrityoftheclient’senclavecontent,italsomeansthatenclavecontentiscompletelyopaquetothecloudprovider.Thus,thecloudproviderisunabletoenforcepolicycomplianceonenclaves.Inthispaper,weintroduceEnGarde,asystemthatallowscloudproviderstoensureSLAcomplianceonenclavecontent.InEnGarde,cloudprovidersandclientsmutuallyagreeuponasetofpoliciesthattheclient’senclavecontentmustsatisfy.EnGardeexecuteswhentheclientprovisionstheenclave,ensuringthatonlypolicy-compliantcontentisloadedintotheenclave.EnGardeisabletoachieveitsgoalswithoutcompromisingthesecurityguaranteesofferedbytheSGX,andimposesnoruntimeoverheadontheexecutionofenclavecode.WehavedemonstratedtheutilityofEnGardebyusingittoenforceavarietyofsecuritypoliciesonenclavecontent.

TruthfulOnlineAuctionforCloudInstanceSubletting YifeiZhu(SimonFraserUniversity),SilveryFu(SimonFraserUniversity),JiangchuanLiu(SimonFraserUniversity),YongCui(TsinghuaUniversity)

DespitethatIaaSusersarebusyscalingup/outtheircloudinstancestomeettheever-increasingdemands,thedynamicsoftheirdemands,aswellasthecoarse-grainedbillingoptionsofferedbyleadingcloudproviders,haveledtosubstantialinstanceunderutilizationinbothtemporalandspatialdomains.Thispapertheoreticallyexaminesaninstancesublettingservice,whereunderutilizedinstancesareleasedtootherswithinuser-specifiedperiods.ServingasasecondarymarketthatcomplementstheexistinginstancemarketofIaaSproviders,wespecificallyidentifythetheoreticalchallengesininstancesublettingservices,anddesignanonlineauctionmechanismtomakeallocationandpricingdecisionsfortheinstancestobesublet.Ourmechanismguaranteestruthfulnessandindividualrationalitywiththebestpossiblecompetitiveratio.Extensivetrace-drivensimulationsshowthatourproposedmechanismachievessignificantperformancegainsinbothcostandsocialwelfare.

OnthePowerofWeakerPairwiseInteraction:Fault-TolerantSimulationofPopulationProtocols GiuseppeAntonioDiLuna(LaSapienza),PaolaFlocchini(UniversityofOttawa),TaisukeIzumi(NagoyaInstituteofTechnology),TomokoIzumi(CollegeofInformationScienceandEngineering),NicolaSantoro(CarletonUniversity),GiovanniViglietta(UniversityofOttawa)

Inthispaperweinvestigatethecomputationalpowerofpopulationprotocolsundersomeunreliableorweakerinteractionmodels.Moreprecisely,wefocusontwofeaturesrelatedtothepowerofinteractions:omissionfailuresandone-waycommunications.Westartourinvestigationbyprovidingacompleteclassificationofallthepossiblemodelsarisingfromtheaforementionedweaknesses,andestablishingthecomputationalhierarchyofthesemodels.Wethenaddressforeachmodelthefundamentalquestionofwhatadditionalpowerisnecessaryandsufficienttocompletelyovercomethemodel’sweaknessandmakeitabletosimulatefaultlesstwo-wayprotocols.Weanswerthisquestionbypresentingsimulatorsthatworkundercertainassumptionsandbyprovingthatsimulationisimpossiblewithoutsuchassumptions.

DistributedFaultTolerantLinearSystemSolversbasedonErasureCoding XuejiaoKang(PurdueUniversity--WestLafayette),DavidF.Gleich(PurdueUniversity--WestLafayette),AhmedSameh(PurdueUniversity--WestLafayette),AnanthGrama(PurdueUniversity--WestLafayette)

Wepresentefficientcodingschemesanddistributedimplementationsoferasurecodedlinearsystemsolvers.Erasurecodedcomputationsbelongtotheclassofalgorithmicfaulttoleranceschemes.Theyarebasedonaugmentinganinputdataset,executingthealgorithmontheaugmenteddataset,andintheeventofafault,recoveringthesolutionfromthecorrespondingaugmentedsolution.Thisprocesscanbeviewedasthecomputationalanalogoferasurecodedstorageschemes.Theproposedtechniquehasanumberofimportantbenefits:(i)asthehardwareplatformscalesinsizeandnumberoffaults,ourschemeyieldsincreasingimprovementinresourceutilization,comparedtotraditionalschemes;(ii)theproposedschemeiseasytocode–thecorealgorithmsremainthesame;and(iii)thegeneralschemeisflexible–accommodatingarangeofcomputationandcommunicationtradeoffs.Wepresentnewcodingschemesforaugmentingtheinputmatrixthatsatisfytherecoveryequationsoferasurecodingwithhighprobabilityintheeventofrandomfailures.Thesecodingschemesalsominimizefill(non-zeroelementsintroducedbythecodingblock),whilebeingamenabletoefficientpartitioningacrossprocessingnodes.Wedemonstrateexperimentallythatourschemeaddsminimaloverheadforfaulttolerance,yieldsexcellentparallelefficiencyandscalability,andisrobusttodifferentfaultarrivalmodels.

PreservingIncumbentUsers’PrivacyinExclusion-Zone-BasedSpectrumAccessSystems YanzhiDou(VirginiaTech),HeLi(VirginiaTech),KexiongZeng(VirginiaTech),JinshanLiu(VirginiaTech),YalingYang(VirginiaTech),BoGao(ChineseAcademyofSciences),KuiRen(SUNYBuffalo)

Dynamicspectrumaccess(DSA)techniquehasemergedasafundamentalapproachtomitigatethespectrumscarcityproblem.AsakeyformofDSA,thegovernmentisproposingtoreleasemorefederalspectrumforsharingwithcommercialwirelessusers.However,theflourishoffederalcommercialsharinghingesuponhowthefederalprivacyismanaged.IncurrentDSAproposals,thesensitiveexclusionzone(E-Zone)informationoffederalincumbentusers(IUs)needstobesharedwithaspectrumaccesssystem(SAS)torealizespectrumallocation.However,SASisnotnecessarilytrust-worthyforholdingthesensitiveIUE-Zonedata,especiallyconsideringthatFCCallowssomeindustrythirdparties(e.g.,Google)tooperateSASforbetterefficiencyandscalability.Therefore,thecurrentproposalsdissatisfytheIUs’privacyrequirement.Toaddresstheprivacyissue,thispaperpresentsanIU-privacypreservingSAS(IP-SAS)design,whichrealizesthespectrumallocationprocessthroughsecurecomputationoverciphertextbasedonhomomorphicencryptionsothatnoneoftheIUEZoneinformationisexposedtoSAS.ThispaperalsoproposesmechanismstopreventmaliciouspartiesfromcompromisingIP-SAS.Weprovetheprivacy-preservingpropertiesofIP-SASanddemonstratethescalabilityandpracticalityofIP-SASusingexperimentsbasedonreal-worlddata.EvaluationresultsshowthatIP-SAScanrespondanSU’sspectrumrequestin1.25secondswithcommunicationoverheadof17.8KB.

108

Demonstration Track Paper Abstracts

Demo1:DistributedApplicationsCluster

LITMUS:TowardsMultilingualReportingofLandslides AibekMusaev(UniversityofAlabama),QixuanHou(GeorgiaInstituteofTechnology),YangYang(GeorgiaInstituteofTechnology),CaltonPu(GeorgiaInstituteofTechnology)

LITMUSisareal-timeonlineandopenlyaccessibleservicethatcollectshighqualityinformationonlandslideeventsfromsocialmedia.Thisserviceusesdisasterrelatedkeywords,suchas"landslide"and"mudslide",toanalyzemessagespostedbyEnglishspeakingusers.However,comprehensivecoverageofdisastersmustincludemultilingualsupportasthereareeventsthatarereportedinlanguagesotherthanEnglish.Wediscussandevaluatepossibleimplementationsofsuchsupportusing"native"and"translated"approaches."Native"approachinvolvesacompletereimplementationoftheexistinginfrastructureinanotherlanguagewhereasinthe"translated"approachtheexistinginfrastructurecanbeusedwithoutmodification.Asanillustration,wepresentademothatextendsLITMUStoimplementa"native"approachformultilingualreportingoflandslideevents.

Pythia:ASystemforOnlineTopicDiscoveryofSocialMediaPosts IoulianaLitou(AthensUniversityofEconomicsandBusiness),VanaKalogeraki(AthensUniversityofEconomicsandBusiness)

Socialmediaconstitutenowadaysoneofthemostcommoncommunicationmediums.Millionsofusersexploitthemdailytoshareinformationwiththeircommunityinthenetworkviamessages,referredas\emph{posts}.Themassivevolumeofinformationsharedisextremelydiverseandcoversavastspectrumoftopicsandinterests.Automaticallyidentifyingthetopicsofthepostsisofparticularinterestasthiscanassistinavarietyofapplications,suchaseventdetection,trendsdiscovery,expertfindingetc.However,designinganautomatedsystemthatrequiresnohumanagentparticipationtoidentifythetopicscoveredinpostspublishedinOnlineSocialNetworks(OSNs)presentsmanifoldchallenges.First,postsareunstructuredandcommonlyshort,limitedtojustafewcharacters.Thispreventsexistingclassificationschemestobedirectlyappliedinsuchcases,duetosparsenessofthetext.Second,newinformationemergesconstantly,hencebuildingalearningcorpusfrompastpostsmayfailtocapturetheeverevolvinginformationemerginginOSNs.ToovercometheaforementionedlimitationswehavedesignedPythia,anautomatedsystemforshorttextclassificationthatexploitstheWikipediastructureandarticlestoidentifythetopicsoftheposts.Thetopicdiscoveryisperformedintwophases.Inthefirststep,thesystemexploitsWikipediacategoriesandarticlesofthecorrespondingcategoriestobuildthetrainingcorpusforthesuppervisedlearning.Inthesecondstep,thetextofagivenpostisaugmentedusingatextenrichmentmechanismthatextendsthepostwithrelevantWikipediaarticles.Aftertheinitialstepsareperformed,wedeployk-NNclassifiertodeterminethetopic(s)coveredintheoriginalpost.

Data-drivenSerendipityNavigationinUrbanPlaces XiaoyuGe(UniversityofPittsburgh),AmeyaDaphalapurkar(UniversityofPittsburgh),ManaliShimpi(UniversityofPittsburgh),KohliDarpun(UniversityofPittsburgh),KonstantinosPelechrinis(UniversityofPittsburgh),PanosChrysanthis(UniversityofPittsburgh),DemetriosZeinalipour-Yazti(MaxPlanckInstituteforInformaticsandUniversityofCyprus)

WiththeproliferationofmobilecomputingandtheabilitytocollectdetaileddatafortheurbanenvironmentanumberofsystemsthataimatprovidingPointsofInterest(POIs)andtourrecommendationshaveappeared.Theoverwhelmingmajorityofthesesystemsaimsatprovidinganoptimalrecommendation,whereoptimalityreferstoobjectivesofminimizingthedistancetobecoveredormaximizingthequalityofthePOIsrecommended.Amajorproblemisthatbyfocusingontheoptimizationoftheseobjectives,thereremainslittleroomtotheuserforserendipity.Urbanandsocialscientistshaveidentifiedserendipity,i.e.,theabilitytocomeacrossunexpectedplaces,asafeaturethatmakesacitylivable.Inthiswork,weintroduceaprototypeofanexperimentalplatformforevaluatingvenuerecommendationalgorithmsbyprovidinginformativetourrecommendationsbasedonthesuggestedvenues.OurprototypesystemintegratesthenotionofserendipityinurbannavigationatboththevenueaswellastherouterecommendationlevelwithoutcompromisingthequalityanddiversityoftherecommendedPOIs.Inaddition,oursystemallowstheusertouploadtheirownalgorithmsandexploretheirperformanceascomparedtomanywell-knownalgorithms.

TowardAnIntegratedApproachtoLocalizingFailuresinCommunityWaterNetworks(DEMO) QingHan(UniversityofCaliforniaIrvine),PhuNguyen(UniversityofCaliforniaIrvine),RonaldT.Eguchi(ImageCat,Inc.),Kuo-LinHsu(UniversityofCaliforniaIrvine),NaliniVenkatasubramanian(UniversityofCaliforniaIrvine)

Wepresentacyber-physical-human(CPHS)distributedcomputingframework,AquaSCALE,forgathering,analyzingandlocalizinganomalousoperationsofincreasinglyfailure-pronecommunitywaterservices.Today,detectionofwaterpipeleakstakeshourstodays.AquaSCALEleveragesdynamicdatafrommultipleinformationsourcesincludingIoT(InternetofThings)sensingdata,geophysicaldata,humaninputandsimulation/modelingenginestocreateasensor-simulation-dataintegrationplatformthatcanlocatemultiplesimultaneouspipefailuresatfinelevelofgranularitywithhighlevelofaccuracyanddetectiontimereducedbyordersofmagnitude(fromhours/daystominutes).

Demo2:SecurityandPrivacyCluster

PrivateGraph:ACloud-CentricSystemforPrivacy-PreservingSpectralAnalysisofLargeEncryptedGraphs SagarSharma(WrightStateUniversity),KekeChen(WrightStateUniversity)

Graphdatasetshaveinvaluableuseinbusinessapplicationsandscientificresearch.Becauseofthegrowingsizeanddynamicallychangingnatureofgraphs,graphdataownersmaywanttousepubliccloudinfrastructurestostore,process,andperformgraphanalytics.However,whenoutsourcingdataandcomputation,dataownersareatburdentodevelopmethodstopreservedataprivacyanddataownershipfromcuriouscloudproviders.Thisdemonstrationexhibitsaprototypesystemforprivacy-preservingspectralanalysisframeworkforlargegraphsinpublicclouds(PrivateGraph)thatallowsdataownerstocollectgraphdatafromdatacontributors,andstoreandconductsecuregraphspectralanalysisinthecloudwithpreservedprivacyandownership.Thisdemosystemletsitsaudienceinteractivelylearnthemajorcloud-clientinteractionprotocols:theprivacy-preservingdatasubmission,thesecureLanczosandNystromapproximateeigen-decompositionalgorithmsthatworkoverencrypteddata,andtheoutcomeofanimportantapplicationofspectralanalysis-spectralclustering.Intheprocessofdemonstrationtheaudiencewillunderstandtheintrinsicrelationshipamongstcosts,resultquality,privacy,andscalabilityoftheframework.

109

IoTSentinelDemo:AutomatedDevice-TypeIdentificationforSecurityEnforcementinIoT MarkusMiettinen(TechnischeUniversitatDarmstadt),SamuelMarchal(AaltoUniversity),IbbadHafeez(universityofhelsinki),TommasoFrassetto(TechnischeUniversitatDarmstadt),N.Asokan(AaltoUniversity),Ahmad-RezaSadeghi(TechnischeUniversitatDarmstadt),SasuTarkoma(UniversityofHelsinki)

TheemergenceofnumerousnewmanufacturersproducingdevicesfortheInternet-of-Things(IoT)hasgivenrisetonewsecurityconcerns.ManyIoTdevicesexhibitsecurityflawsmakingthemvulnerableforattacksandmanufacturershavedifficultiesinprovidingappropriatesecuritypatchestotheirproductsinatimelyanduser-friendlymanner.Inthispaper,wepresentourimplementationofIOTSENTINEL,whichisasystemaimedatprotectingtheuser’snetworkfromvulnerableIoTdevices.IOTSENTINELautomaticallyidentifiesvulnerabledeviceswhentheyarefirstintroducedtothenetworkandenforcesappropriatetrafficfilteringrulestoprotectotherdevicesfromthethreatsoriginatingfromthevulnerabledevices.

RogueAccessPointDetectorUsingCharacteristicsofChannelOverlappingin802.11nRhonghoJang(INHAuniversityofKorea),JeonilKang(INHAuniversity),AzizMohaisen(SUNYBuffalo),DaehunNyang(DepartmentofComputerandInformationEngineering,INHAUniversity,Incheon,Korea)

Inthiswork,weintroduceapowerfulhardwarebasedrogueaccesspoint(PrAP),whichcanrelaytrafficbetweenalegitimateAPandawirelessstationbackandforth,andactasaman-in-the-middleattacker.OurPrAPisbuiltoftwodedicatedwirelessroutersinterconnectedphysically,andcanrelaytrafficrapidlybetweenastationandalegitimateAP.Throughextensiveexperiments,wedemonstratethatthestateof-the-arttime-basedrogueAP(rAP)detectorscannotdetectourPrAP,althougheffectiveagainstsoftware-basedrAP.TodefendagainstPrAPs,weproposePrAP-Hunterbasedonintentionalchannelinterference.PrAP-Hunterishighlyaccurate,evenunderheavytrafficscenarios.Usingahigh-performance(desktop)andlow-performance(mobile)experimentalsetupsofourPrAPHunterinvariousdeploymentscenarios,wedemonstratecloseto100%ofdetectionrate,comparedto60%detectionratebythestate-of-the-art.WeshowthatPrAP-Hunterisfast(takes5-10sec),doesnotrequireanypriorknowledge,andcanbedeployedinthewildbyrealworldexperimentsat10coffeeshops.Keywords.Intrusiondetection,WirelessLAN,RogueAP,channelinterference,IEEE802.11n.

ReverseCloak:AReversibleMulti-levelLocationPrivacyProtectionSystem ChaoLi(UniversityofPittsburgh),BalajiPalanisamy(UniversityofPittsburgh),AravindKalaivanan(UniversityofPittsburgh),SriramRaghunathan(UniversityofPittsburgh)

Withthefastpopularizationofmobiledevicesandwirelessnetworks,alongwithadvancesinsensingandpositioningtechnology,wearewitnessingahugeproliferationofLocation-basedServices(LBSs).LocationanonymizationreferstotheprocessofperturbingtheexactlocationofLBSusersasacloakingregionsuchthatauser'slocationbecomesindistinguishablefromthelocationofasetofotherusers.However,existinglocationanonymizationtechniquesfocusprimarilyonsinglelevelunidirectionalanonymization,whichfailstocontroltheaccesstothecloakingdatatoletdatarequesterswithdifferentprivilegesgetinformationwithvaryingdegreesofanonymity.Inthisdemonstration,wepresentatoolkitforReverseCloak,alocationperturbationsystemtoprotectlocationprivacyoverroadnetworksinamulti-levelreversiblemanner,consistingofan'Anonymizer'GUItoadjusttheanonymizationsettingsandvisualizethemultilevelcloakingregionsoverroadnetworkforlocationdataownersanda'De-anonymizer'GUItode-anonymizethecloakingregionanddisplaythereducedregionoverroadnetworkforlocationdatarequesters.Withthetoolkit,wedemonstratethepracticalityandeffectivenessoftheReverseCloakapproach.

Demo3:CloudsandVirtualizationCluster

Hopsworks:ImprovingUserExperienceandDevelopmentonHadoopwithScalable,StronglyConsistentMetadata MahmoudIsmail(KTH-RoyalInstituteofTechnology),ErmiasGebremeskel(RISESICS),TheofilosKakantousis(RISESICS),GautierBerthou(RISESICS),JimDowling(KTH-RoyalInstituteofTechnology)

Hadoopisapopularsystemforstoring,managing,andprocessinglargevolumesofdata,butithasbare-bonesinternalsupportformetadata,asmetadataisabottleneckandlessmeansmorescalability.Theresultisascalableplaformwithrudimentaryaccesscontrolthatisneitheruser-nordeveloper-friendly.Also,metadataservicesthatarebuiltonHadoop,suchasSQL-on-Hadoop,accesscontrol,dataprovenance,anddatagovernancearenecessarilyimplementedaseventuallyconsistentservices,resultinginincreaseddevelopmenteffortandmorebrittlesoftware.Inthispaper,wepresentanewproject-basedmulti-tenancymodelforHadoop,builtonanewdistributionofHadoopthatprovidesadistributeddatabasebackendfortheHadoopDistributedFilesystem’s(HDFS)metadatalayer.WeextendHadoop’smetadatamodeltointroduceprojects,datasets,andproject-usersasnewcoreconceptsthatenableauser-friendly,UI-drivenHadoopexperience.Asourmetadataserviceisbackedbyatransactionaldatabase,developerscaneasilyextendmetadatabyaddingnewtablesandensurethestrongconsistencyofextendedmetadatausingbothtransactionsandforeignkeys.

IsolationinDockerthroughLayerEncryption IoannisGiannakopoulos(NationalTechnicalUniversityofAthens),KonstantinosPapazafeiropoulos(NationalTechnicalUniversityofAthens),KaterinaDoka(NationalTechnicalUniversityofAthens),NectariosKoziris(NationalTechnicalUniversityofAthens)

Containersareconstantlygaininggroundinthevirtualizationlandscapeasalightweightandefficientalternativetohypervisor-basedVirtualMachines,withDockerbeingthemostsuccessfulrepresentative.Dockerreliesonunion-capablefilesystems,whereanyactionperformedtoabaseimageiscapturedasanewfilesystemlayer.ThisstrategyallowsdeveloperstoeasilypackapplicationsintoDockerimagelayersanddistributethemviapublicregistries.However,thisimagecreationanddistributionstrategydoesnotprotectsensitivedatafrommaliciousprivilegedusers(e.g.,registryadministrator,cloudprovider),sinceencryptionisnotnativelysupported.WeproposeanddemonstrateamechanismforsecureDockerimagemanipulationthroughoutitslifecycle:Thecreation,storageandusageofaDockerimageisbackedbyadata-at-restmechanism,whichmaintainssensitivedataencryptedondiskandencrypts/decryptsthemon-the-flyinordertopreservetheirconfidentialityatalltimes,whilethedistributionandmigrationofimagesisenhancedwithamechanismthatencryptsonlyspecificlayersofthefilesystemthatneedtoremainconfidentialandensuresthatonlylegitimatekeyholderscandecryptthemandreconstructtheoriginalimage.Througharichinteractionwithoursystemtheaudiencewillexperiencefirst-handhowsensitiveimagedatacanbesafelydistributedandremainencryptedatthestoragedevicethroughoutthecontainer'slifetime,bearingonlyamarginalperformanceoverhead.

Dela-SharingLargeDatasetsbetweenHadoopClusters AlexandruA.Ormenisan(KTHRoyalInstituteofTechnology),JimDowling(KTHRoyalInstituteofTechnology)

110

Bigdatahas,inrecentyears,revolutionisedanever-growingnumberoffields,frommachinelearningtoclimatesciencetogenomics.Thecurrentstate-of-the-artforstoringlargedatasetsiseitherobjectstoresordistributedfilesystems,withHadoopbeingthedominantopen-sourceplatformformanaging‘BigData’.Existinglarge-scalestorageplatforms,however,lacksupportfortheefficientsharingoflargedatasetsovertheInternet.Thosesystemsthatarewidelyusedforthedisseminationoflargefiles,likeBitTorrent,needtobeadaptedtohandlechallengessuchasnetworklinkswithbothhighlatencyandhighbandwidth,andscalablestoragebackendsthatareoptimisedforstreamingandnotrandomaccess.Inthispaper,weintroduceDela,apeer-to-peerdata-sharingserviceintegratedintotheHopsHadoopplatformthatprovidesanend-to-endsolutionfordatasetsharing.Delaisdesignedforlarge-scalestoragebackendsanddatatransfersthatarebothnon-intrusivetoexistingTCPnetworktrafficandprovidehighernetworkthroughputthanTCPonhighlatency,highbandwidthnetworklinks,suchastransatlanticnetworklinks.Delaprovidesapluggablestoragelayer,implementingtwoalternativewaysforclientstoaccessshareddata:streamprocessingofdataasitarriveswithKafka,andtraditionalofflineaccesstodatausingtheHadoopDistributedFilesystem.DelaisthefirststepfortheHadoopplatformtowardscreatinganopendatasetecosystemthatsupportsuser-friendlypublishing,searching,anddownloadingoflargedatasets.

InVivoEvaluationoftheSecureOpportunisticSchemesMiddlewareusingaDelayTolerantSocialNetworkCoreyE.Baker(UniversityofCaliforniaSanDiego),AllenStarke(UniversityofFlorida),TanishaG.Hill-Jarrett(UniversityofFlorida),JaniseMcNair(UniversityofFlorida)

Overthepastdecade,onlinesocialnetworks(OSNs)suchasTwitterandFacebookhavethrivedandexperiencedrapidgrowthtoover1billionusers.AmajorevolutionwouldbetoleveragethecharacteristicsofOSNstoevaluatetheeffectivenessofthemanyroutingschemesdevelopedbytheresearchcommunityinreal-worldscenarios.Inthisdemonstration,weshowcasetheSecureOpportunisticSchemes(SOS)middlewarewhichallowsdifferentroutingschemestobeeasilyimplementedrelievingtheburdenofsecurityandconnectionestablishment.ThefeasibilityofcreatingadelaytolerantsocialnetworkisdemonstratedbyusingSOStoenableAlleyOopSocial,asecuredelaytolerantnetworkingresearchplatformthatservesasareal-lifemobilesocialnetworkingapplicationforiOSdevices.AlleyOopSocialallowsuserstointeract,publishmessages,anddiscoverothersthatsharecommoninterestsinanintermittentnetworkusingBluetooth,peer-to-peerWiFi,andinfrastructureWiFi.

Demo4:DistributedSystemsandNetworkingCluster

ScalingandLoadTestingLocation-basedPublishandSubscribe BertilChapuis(UniversityofLausanne),BenoîtGarbinato(UniversityofLausanne)

TheriseoftheInternetofthings(IoT)posesmassivescalabilityissuesforlocation-basedservices.Moreparticularly,location-awarepublishandsubscribeservicesarestrugglingtoscaleoutthecomputationofmatchesbetweenpublicationsandsubscriptionsthatcontinuouslyupdatetheirlocation.Inthisdemonstrationpaper,weproposeanoveldistributedandhorizontallyscalablearchitectureforlocation-awarepublishandsubscribe.Ourmiddlewarearchitecturereliesonamultisteproutingmechanismbasedonconsistenthashingandrangepartitioning.Todemonstrateitsscalability,wepresentatrafficdatagenerator,which,incontrasttoexistinggenerators,canbeusedtoperformreal-timeloadtests.Finally,weshowthatourarchitecturecanbedeployedonasmall10-nodeclusterandcanprocessupto80,000locationupdatespersecondproducing25,000matchesperseconds.

ADistributedEvent-centricCollaborativeWorkflowsDevelopmentSystemforIoTApplication YongyangCheng(BUPT),ShuaiZhao(BUPT),BoCheng(BUPT),ShouluHou(BUPT),XiuleiZhang(BUPT),JunliangChen(BUPT)

TherapiddevelopmentofInternetofThings(IoT)attractsgrowingattentionfrombothindustryandacademia.IoTseamlesslyconnectsthephysicalworldandcyberspaceviavarioussensors.Itismoreworthforustopayattentiontothemechanismoftheeventstoworkcollaborativelyratherthanthosestandalonesensors.Inthispaper,wepresentaDistributedEvent-centricCollaborativeWorkflowsdevelopmentsystemforIoTapplication,calledDECW.Itsupportslooselycoupledevent-basedinteractionbetweenprocesses,whichenablesreal-timeresponsetoeventsfromthephysicalworld.Unliketraditionalcentralizedcontrolflowmode,theinteractionbetweenprocessesinDECWisconstrainedbytheeventinterface.Userscoulddynamicallyadjusttheinterfacebetweenprocesseswithoutmodifyingtheinternallogicoftheprocess.Inaddition,DECWsystemprovidesafulllifecycleforthedevelopmentandoperationoftheIoTapplication,includinggraphicalcreationofprocesses,dynamicdefinitionoftheprocessinteractioninterfaces,logicalvalidation,distributedpackaginganddeployment,parallelexecution,andreal-timemonitoringandmanagingtherunningstatusoftheIoTapplication.

IncentiveMechanismforData-CentricMessageDeliveryinDelayTolerantNetworks HimanshuJethawa(MissouriUniversityofScienceandTechnology),SanjayMadria(MissouriUniversityofScienceandTechnology)

Akeyissueindelaytolerantnetworks(DTN)istofindtherightnodetostoreandrelaymessages.Weconsidermessagesannotatedwiththeuniquekeywordsdescribingthemessagesubject,andnodesalsoaddskeywordstodescribetheirmissioninterests,priorityandtheirtransientsocialrelationship(TSR).Tooffsetresourcecosts,anincentivemechanismisdevelopedovertransientsocialrelationshipswhichenrichenroutemessagecontentandmotivatebettersemanticallyrelatednodestocarryandforwardmessages.Theincentivemechanismensuresavoidanceofcongestionduetouncooperativeorselfishbehaviorofnodes.

PerformanceOfCognitiveWirelessChargerForNear-FieldWirelessChargingSang-YoonChang(UniversityofColorado,ColoradoSpringsandAdvancedDigitalSciencesCenter),SristiLakshmiSravanaKumar(AdvancedDigitalSciencesCenter),Yih-ChunHu(UniversityofIllinoisatUrbana-Champaign)

WirelesschargingprovidesaconvenientwaytochargevariousmobileandIoTdevices.State-of-the-artwire-lesschargingsystemsoperateataparticularfrequencyandarecontrolledbyexplicitnetworkingwiththepower-receivingdevices.However,controlbyexplicitnetworkingisnotdesignedtocopewiththevariationsinthepower-receivingdevicesplacementsandalignments.Thisisespeciallymoresignificantinnear-fieldandpseudo-tightlycoupledchargingapplicationsasmorechargingpadsarebeingdeployedinthepublicdomainsandservingheterogeneousclients.Weestablishthatfrequencycontrolachievesbetterperformancegainsininductive-couplingchargingapplicationsandisalsosensitivetothevariationsintheplacementandalignmentbetweenthepower-transmittingandthepower-receivingcoils.Inthisdemo,weshowtheimpactinpowertransferperformancecausedbythevariationsintheplacementandalignmentbetweenthepower-transmittingandthepower-receivingcoilsandshowcasetheperformanceofourcognitivewirelesscharger(CWC),whichadaptivelycontrolstheoperatingfrequencyinreal-timeusingimplicitfeedbackforoptimaloperations.

111

112

Poster Track Paper Abstracts

Poster1:DistributedApplicationsCluster

TowardVehicleSensing:Anintegratedapplicationwithsparsevideocamerasandintelligenttaxicabs YangWang(UniversityofScienceandTechnologyofChina),WujiChen(UniversityofScienceandTechnologyofChina),WeiZheng(Sanofi-AventisUSLLC),HeHuang(SoochowUniversity),WenZhang(UniversityofScienceandTechnologyofChina),HengchangLiu(UniversityofScienceandTechnologyofChina)

Duetothesparsedistributionofroadvideosurveillancecameras,precisetrajectorytrackingforvehiclesremainsachallengingtask.Tothebestofourknowledge,noneofthepreviousresearchconsideredusingon-roadtaxicabsasmobilevideosurveillancecamerasandroadtrafficflowpatterns,thereforenotsuitableforrecoveringtrajectoriesofvehicles.Withthisinsight,wemodelthetraveltime-costofaroadsegmentduringvarioustimeperiodspreciselywithLNDs(LogarithmicNormalDistributions),thenuseLSNDs(LogSkewNormalDistributions)toapproximatethetime-costofanurbantripduringvarioustimeperiods.Weproposeanapproachtocalculatepossiblelocationandtimedistributionofthevehicle,selectthetaxicabtoverifythedistributionbyuploadingandcheckingvideoclipsofthistaxicab,finallyrefinetherestoringtrajectoryinarecursivemanner.Weevaluateoursolutiononreal-worldtaxicabandroadsurveillancesystemdatasets.Experimentalresultsdemonstratethatourapproachoutperformsalternativesolutionsintermsofaccuracyratioofvehicletracking.

SegmentationofTimeSeriesbasedonKineticCharacteristicsforStorageConsumptionPrediction BeibeiMiao(Baidu,Inc),YuChen(Baidu,Inc),XueboJin(SchoolofComputerandInformationEngineering,BeijingTechnologyandBusinessUniversity),BoWang(Baidu,Inc),XianpingQu(Baidu,Inc),DongWang(Baidu,Inc),ShiminTao(Baidu,Inc),ZhiZang(Baidu,Inc)

TheInternetservicesgeneratehugeamountofdata,whichrequirelargespaceforstorage.Determiningdevicepurchaseplanturnsouttobeveryimportantfortheserviceproviders.Under-purchasingmightleadtodataloss,whileover-purchasingwouldresultinwaste.Inthispaper,weproposealinearregressionbasedapproachtopredictthestoragedemandaccordingtothetimeseriesofthestorageconsumption.Wepartitionedthestorageconsumptiontimeseriesintoseverallinearsegments,andperformpredictiononthelastsegmentusinglinearregression.Sincethepositionofturningpointsbetweenadjacentsegmentsandthetotalnumberofthesegmentsarebothunknown,howtoachievetheonlinesegmentationbecomesabigchallenge.Aimingtosolvethisproblem,wecarriedouttheKalmanAnovasegmentationmethod.Experimentresultsshowthatourmethodhasgoodaccuracyinprecision,recallandF-measurevalues.Moreover,themethodisabletosegmentnonlineartimeseriesaswell,suggestingapotentialwiderapplication.TheproposedmethodhasbeendeployedinBaiduInc.andsavesabout45thousanddollarsinoneofitsdevicepurchaseprogram.

AMulti-stageHierarchicalWindowModelwithApplicationtoReal-TimeGraphAnalysis SachiniJayasekara(UniversityofMelbourne),ShanikaKarunasekera(UniversityofMelbourne),AaronHarwood(UniversityofMelbourne)

Thedynamicnatureofreal-worldnetworks,suchassocialnetworksandcommunicationnetworks,hasincreasedthefocustowardsreal-timedynamicgraphanalysis.Observationsmadebasedonreal-timeanalysisofdynamicgraphsreflectthelatestpropertiesofthegraphandhavethemostvalueinreal-timeanalysis.Computinggraphpropertiesoflarge-scale,fast-evolvinggraphsinreal-timeischallengingdue,notonlytothehighcomputationalandmemorycost,butalsototheunderstandingoftheresultwithrespecttothedatafromwhichitwasderived.Thispaperproposesamulti-stagehierarchicalwindowmodelthatcanaidinrigorousunderstandingofcomplicatedreal-timeresultsandweapplyittogenerategraphsbasedonreal-timeupdatesalongwithperiodiccomputationsongraphsnapshotsforprocessingdynamicgraphs.Moreover,thepaperdiscussestheutilizationofparallelwindowcomputation.ThepaperevaluatesthehierarchicalmodelthroughanalyzinggraphsformedbycooccurringhashtagsinaTwitterdata-stream.

DynamicPricingatElectricVehicleChargingStationsforQueueingDelayReduction XiaoshanSun(UniversityofScienceandTechnologyofChina),PengXu(UniversityofScienceandTechnologyofChina),JinyangLi(UniversityofScienceandTechnologyofChina),HengchangLiu(UniversityofScienceandTechnologyofChina),WeiZheng(Sanofi-Aventis)

Theresearchofelectricvehicles(EVs)hasgainedmoreandmoreattentioninrecentyearsinbothindustryandacademia,andnewregistrationsofEVsincreaserapidly,whilethelongdelayattheconvenientbutcrowdedchargingstationsmaydiscouragemanydriversfromswitchingtoEVs.Toaddresstheproblems,weproposeanoveldynamicpricingpolicythatallowschargingstationstoadjusttheirservicefeesinrealtimebasedontheloadatthestations.Inourwork,theselectionofdriversismodeledbyanewdissatisfactionfunctionwithmultiplevariables,whichcanbeeasilyvalidatedandimprovedbyrealapplications,andoursolutionisevaluatedfromtherealworlde-chargedataset.Tothebestofourknowledge,thisisthefirstworkthatconsidersdynamicservicefeesamongvariouschargingstationsforloadbalancingandreductionofqueueingdelay.Thismakesourworkmorerealisticandbeneficial.

PairwiseRankingAggregationbyNon-interactiveCrowdsourcingwithBudgetConstraints ChangjiangCai(StevensInstituteofTechnology),HaipeiSun(StevensInstituteofTechnology),BoxiangDong(MontclairStateUniversity),BoZhang(StevensInstituteofTechnology),TingWang(LehighUniversity),WendyHuiWang(StevensInstituteofTechnology)

Crowdsourcedrankingalgorithmsaskthecrowdtocomparetheobjectsandinferthefullrankingbasedonthecrowdsourcedpairwisecomparisonresults.Inthispaper,weconsiderthesettinginwhichthetaskrequesterisequippedwithalimitedbudgetthatcanaffordonlyasmallnumberofpairwisecomparisons.Tomaketheproblemmorecomplicated,thecrowdmayreturnnoisycomparisonanswers.Weproposeanapproachtoobtainagood-qualityfullrankingfromasmallnumberofpairwisepreferencesintwosteps,namelytaskassignmentandresultinference.Inthetaskassignmentstep,wegeneratepairwisecomparisontasksthatproduceafullrankingwithhighprobability.Intheresultinferencestep,basedonthetransitivepropertyofpairwisecomparisonsandtruthdiscovery,wedesignanefficientheuristicalgorithmtofindthebestfullrankingfromthepotentiallyconflictivepairwisepreferences.Theexperimentresultsdemonstratetheeffectivenessandefficiencyofourapproach.

Buffer-BasedReinforcementLearningforAdaptiveStreaming YueZhang(SUNYBinghamton),YaoLiu(SUNYBinghamton)

113

Adaptivestreamingimprovesuser-perceivedqualitybyalteringthestreamingbitratedependingonnetworkconditions,tradingreducedvideobitratesforreducedstalltimes.Existingadaptationapproaches,e.g.,rate-based,bufferbased,eitherrelyheavilyonaccuratebandwidthpredictionorcanbeoverly-conservativeaboutvideobitrates.Inthiswork,weproposeareinforcementlearningapproachtochoosethesegmentqualityduringplayback.Thisapproachusesonlythebufferstateinformationandoptimizesforameasureofuser-perceivedstreamingquality.SimulationresultsshowthatourproposedapproachachievesbetterQoEthanrate-,buffer-basedapproaches,aswellasotherreinforcementlearningapproaches.

Thecaseforusingcontent-centricnetworkingfordistributinghigh-energyphysicssoftware MohammadAlhowaidi(UniversityofNebraska-Lincoln),ByravRamamurthy(UniversityofNebraska-Lincoln),BrianBockelman(UniversityofNebraska-Lincoln),DavidSwanson(UniversityofNebraska-Lincoln)

NamedDataNetworking(NDN)isoneofthepromisingfutureinternetarchitectures,whichfocusesonthedataratherthanitslocation(IP/host-basedsystem).NDNhasseveralcharacteristicswhichfacilitateaddressingandroutingthedata:fail-over,in-networkcachingandloadbalancing.Thismakesitusefulinareassuchasmanagingscientificdata.TheCMSexperimentontheLargeHadronCollider(LHC)hasadataaccessproblemamenabletocontent-centricnetworking.CERNVirtualMachineFileSystem(CVMFS)isusedbyHighEnergyPhysics(HEP)communityforworldwidesoftwaredistribution.CVMFSmaintainitsdatabyusingcontentaddressablestorage,whichmakesitsuitableforNDN.Inthispaper,weinvestigatethepossibilitiesofusingacontentcentricnetworkingarchitecturesuchasNDNondistributingCMSsoftware.

LAVEA:Latency-awareVideoAnalyticsonEdgeComputingPlatformShanheYi(CollegeofWilliamandMary),ZijiangHao(CollegeofWilliamandMary),QingyangZhang(WayneStateUniversity),QuanZhang(WayneStateUniversity),WeisongShi(WayneStateUniversity),QunLi(CollegeofWilliamandMary)

WepresentLAVEA,asystembuiltforedgecomputing,whichoffloadscomputationtasksbetweenclientsandedgenodes,collaboratesnearbyedgenodes,toprovidelow-latencyvideoanalyticsatplacesclosertotheusers.Wehaveutilizedanedge-firstdesigntominimizetheresponsetime,andcomparedvarioustaskplacementschemestailedforinter-edgecollaboration.Ourresultsrevealthattheclient-edgeconfigurationhastaskspeedupagainstlocalorclient-cloudconfigurations.

CompleteToleranceRelationbasedFillingAlgorithmusingSpark JinglingYuan(WuhanUniversityofTechnology),YaoXiang(WuhanUniversityofTechnology),XianZhong(WuhanUniversityofTechnology),MinchengChen(WuhanUniversityofTechnology),TaoLi(UniversityofFlorida)

Withtheadventofcloudcomputing,renewableenergyisintegratedintodatacenterpowersupplysystemsincreasingly.Thepowerstatisticscollectionmaynotbeavailableduetotheinstabilityofrenewableenergy,whichresultsinincompletedata.Theincompleteenergydatawillsignificantlydisturbthemanagementofdatacenters.Wefurtherproposeafillingalgorithmbasedoncompletetoleranceclass.Thealgorithmexpandsthetraditionaltolerancerelation,andfillsthemissingvaluesoftheenergydata,whichensuresthedataintegrity.Bytakinggoodadvantageofin-MemoryComputing,WefurtherparallelizeandoptimizeouralgorithmusingSpark.Theexperimentresultsdemonstratethatouralgorithmoutperformsothergeneralfillingalgorithmsintermsoffillingaccuracy.Theproposedalgorithmalsoshowsgoodperformanceasthemissingraterisesup.

Poster2:SecurityandPrivacyCluster

TowardsSecurePublicDirectoryforPrivacy-PreservingDataSharingAminFallahi(SyracuseUniversity),XiLiu(SyracuseUniversity),YuzheTang(SyracuseUniversity),ShuangWang(UCSD),RuiZhang(ChineseAcademyofSciences)

Inemergingfederateddatabasesystems,suchasHealthInformationExchange(orHIE),animportantyetunderstudiedproblemistheprivacy-preservingsharingofpersonalrecordsamongautonomousdataowners.Thegoalposestechnicaldesignchallenges,includingtheassuredprivacypreservationunderbackground-knowledgeattacks,andscalableandsecuremulti-partycomputationsonprivatebig-datainalarge-scalesystem.Totacklethechallenges,weproposeaprotocol,multi-partydeterministicnoisingorMPDN,whichdeterministicallyinjectsnoisestothepublishedmeta-datawhilestayingawareofthebackgroundknowledge.Italsooptimizestheperformanceofmulti-partycomputation(orMPC)bypre-computationonthepublicbackgroundknowledge.Thepre-computationexhibitsdata-levelparallelismandweleveragegeneral-purposecomputingongraphicsprocessingunits(GPGPU)inourimplementationtoexploittheparallelismandtofurtheroptimizeperformance.Theproposedprotocolisimplementedonopen-sourceMPCsoftware(i.e.,GMW)anditsefficiencywithaspeedupofmorethananorderofmagnitudeisdemonstratedinageo-distributedsetting.Throughevaluationonreal-worlddatasets,theassuranceofprivacypreservationisalsoverified.

AnonymousRoutingtoMaximizeDeliveryRatesinDTNs KazuyaSakai(TokyoMetropolitanUniversity),Min-TeSun(NationalCentralUniversity),Wei-ShinnKu(AuburnUniversity),JieWu(TempleUniversity)

Securityandprivacyissuesareconsideredtobetwoofthemostsignificantconcernstoorganizationsandindividualsusingmobileapplications.Inthispaper,weseektoaddressanonymouscommunicationsindelaytolerantnetworks(DTNs).Whilemanydifferentanonymousroutingprotocolshavebeenproposedforadhocnetworks,tothebestofourknowledge,onlyvariantsofonion-basedroutinghavebeentailoredforDTNs.Sinceeachtypeofanonymousroutingprotocolhasitsadvantagesanddrawbacks,thereisnosingleanonymousroutingprotocolforDTNsthatcanadapttothedifferentlevelsofsecurityrequirements.Inthispaper,wefirstdesignasetofanonymousroutingprotocolsforDTNs,calledanonymousEpidemicandzone-basedanonymousrouting,basedontheoriginalanonymousroutingprotocolsforadhocnetworks.Then,weproposeaframeworkofanonymousrouting(FAR)forDTNs,whichsubsumesalltheaforementionedprotocols.Bytuningitsparameters,theproposedFARisabletooutperformonionbased,anonymousEpidemic,andzone-basedrouting.Inaddition,numericalanalysesforthetraceablerateandnodeanonymitymodelsarebuilt.Extensivesimulationsusingrandomlygeneratedgraphsaswellasrealtracesareconductedtodemonstratethatgivenappropriateparametersettings,ourFARoutperformsalltheexistinganonymousroutingprotocolsforDTNs.

EvaluatingConnectionResiliencefortheOverlayNetworkKademliaHennerHeck(UniversitätKassel),OlgaKieselmann(UniversitätKassel),ArnoWacker(UniversitätKassel)

114

Kademliaisadecentralizedoverlaynetwork,uptonowmainlyusedforhighlyscalablefilesharingapplications.Duetoitsdistributednature,itisfreefromsinglepointsoffailure.Communicationcanhappenoverredundantnetworkpaths,whichmakesinformationdistributionwithKademliaresilientagainstfailingnodesandattacks.Inthispaper,wesimulateKademlianetworkswithvaryingparametersandanalyzethenumberofnode-disjointpaths.Withourresults,weshowtheinfluenceoftheseparametersonthenetworkconnectivityand,therefore,theresilienceagainstfailingnodesandcommunicationchannels.

Shortfall-basedOptimalSecurityProvisioningforInternetofThings AntoninoRullo(UniversityofCalabria),EdoardoSerra(BoiseStateUniversity),JorgeLobo(UniversitatPompeaFabra),ElisaBertino(PurdueUniversity)

WepresentaformalmethodforcomputingthebestsecurityprovisioningforInternetofThings(IoT)scenarioscharacterizedbyahighdegreeofmobility.Thesecurityinfrastructureisintendedasasecurityresourceallocationplan,computedasthesolutionofanoptimizationproblemthatminimizestheriskofhavingIoTdevicesnotmonitoredbyanyresource.Weemploytheshortfallasariskmeasure,aconceptmostlyusedintheeconomics,andadaptittoourscenario.Weshowhowtocomputeandevaluateanallocationplan,andhowsuchsecuritysolutionsaddressthecontinuoustopologychangesthataffectanIoTenvironment.

GroupDifferentialPrivacy-preservingDisclosureofMulti-levelAssociationGraphs BalajiPalanisamy(UniversityofPittsburgh),ChaoLi(UniversityofPittsburgh),PrashantKrishnamurthy(UniversityofPittsburgh)

Traditionalprivacy-preservingdatadisclosuresolutionshavefocusedonprotectingtheprivacyofindividual’sinformationwiththeassumptionthatallaggregate(statistical)informationaboutindividualsissafefordisclosure.Suchschemesfailtosupportgroupprivacywhereaggregateinformationaboutagroupofindividualsmayalsobesensitiveandusersofthepublisheddatamayhavedifferentlevelsofaccessprivilegesentitledtothem.WeproposethenotionofGroupDifferentialPrivacythatprotectssensitiveinformationofgroupsofindividualsatvariousdefinedprivacylevels,enablingdatauserstoobtainthelevelofaccessentitledtothem.Wepresentapreliminaryevaluationoftheproposednotionofgroupprivacythroughexperimentsonrealassociationgraphdatathatdemonstratetheguaranteesongroupprivacyonthediscloseddata.

TrackingInformationFlowinCyber-PhysicalSystems StefanGries(UniversityofDuisburg-Essen),MarcHesenius(UniversityofDuisburg-Essen),VolkerGruhn(UniversityofDuisburg-Essen)

Cyber-PhysicalSystemsaredistributed,heterogeneous,decentralizedandlooselycouplednetworksinwhichindividualsystemsmeasurephysicalprocesses,exchangeinformation,andinfluenceprocesses.Sensorsmeasurethesephysicalprocesses,whileaggregatorsprocessthemandactuatorsperformresultingactions.Decisionsareoftenbasedonsensordatacollectedbyothersystems.Furthermore,theaggregatorsalsointerchangeinformationandusethemtoderiveowndecisions.Decisionsmustbecomprehensible.However,thisisonlythecaseifalldatadependenciesareknown.Duetothesizeofthesenetworks,theirloosecouplingandtheirdynamicbehavior,decisionsmadebyasystemarenotalwayseasytounderstand.Ifanerroroccursinthesystem,theerrorsourcemustbeidentified.Itmustbeknownonwhichdataadecisionwasbased.However,sincethedecisioncanbebasedoninformationfromothernodes,thesearchfortheerrorsourceisnotatrivialtask.Keepinmind,thatdependentnodescanhavedependenciesthemselvesaswell.WepresenttheInformationFlowMonitor(IFM)thatcollectsinformationaboutsemanticdatadependenciesindynamicnetworks.Thecollecteddependencyinformationisprovidedatacentralnetworklocation.Subsequently,semanticdependenciesbetweeninformationcanbevisualized.

Privacy-preservingMatchmakinginGeosocialNetworkswithUntrustedServers QiuxiangDong(ArizonaStateUniversity),DijiangHuang(ArizonaStateUniversity)

AsamajorbranchofLBSs,geosocialnetworkingservicesbecomepopular.Animportantfunctionalityofgeosocialnetworkingservicesisallowingpeopletofindpotentialfriendswhohavesimilarprofilewithincloseproximityandinitiatecommunicationwitheachother.However,inordertorealizethisfunctionality,mostexistingservicesrequiremobileuserstorevealtheirprofilesandlocationinformationtoanuntrustedserviceprovider,whichmayexposeLBSstovulnerabilitiesforabuseandendangermobileusers’privacy.Toaddressthisproblem,weproposetoencryptusers’profilewithanewsearchableencryptionscheme.Combiningthissearchableencryptionschemewithothercryptographictechniquesweconstructaprivacypreservingmatchmakingsystem.Comparedwithapreviousonethataimstosolvethesameproblem,oursismoresecure,supportsmoreflexiblefunctionalitiesandmovescomputationallyheavykeyupdatestoresourcefulserviceproviders.

You’veBeenTricked!AUserStudyoftheEffectivenessofTyposquattingTechniques JeffreySpaulding(SUNYBuffalo),ShambhuUpadhyaya(SUNYBuffalo),AzizMohaisen(SUNYBuffalo)

ThenefariouspracticeofTyposquattinginvolvesdeliberatelyregisteringInternetdomainnamescontainingtypographicalerrorsthatprimarilytargetpopulardomainnames,inanefforttoredirectuserstounintendeddestinationsorstealingtrafficformonetarygain.Typosquattinghasexistedforwellovertwodecadesandcontinuestobeacrediblethreattothisday.AsrecentlyshownintheonlinemagazineSlate.com[16],cybercriminalshaveattemptedtodistributemalwarethroughNetflix.om,atyposquattedvariantofthepopularstreamingsiteNetflix.comthatusesthecountrycodetop-leveldomain(ccTLD)forOman(.om).Whilemuchofthepriorworkhasexaminedvarioustyposquattingtechniquesandhowtheychangeovertime,nonehaveconsideredhoweffectivetheyareindeceivingusers.Inthispaper,weattempttofillinthisgapbyconductingauserstudythatexposessubjectstoseveraluniformresourcelocators(URLs)inanattempttodeterminetheeffectivenessofseveraltyposquattingtechniquesthatareprevalentinthewild.WealsoattempttodetermineifthesecurityeducationandawarenessofcybercrimessuchastyposquattingwillaffectthebehaviorofInternetusers.Ultimately,wefoundthatsubjectstendtocorrectlyidentifytyposquattingwhichaddscharacterstothedomainnames,whilethemosteffectivetechniquestodeceiveusersinvolvespermutationsandsubstitutionsofcharacters.Wealsofoundthatsubjectsgenerallyperformedbetterandfasteratidentifyingtyposquatteddomainnamesafterbeingthoroughlyeducatedaboutthem,andthatcertainattributessuchasAgeandEducationaffecttheirbehaviorwhenexposedtothem.

Real-timeDetectionofIllegalFileTransfersintheCloud AdamBowers(MissouriUniversityofScienceandTechnology),DanLin(MissouriUniversityofScienceandTechnology),AnnaSquicciarini(ThePennsylvaniaStateUniversity),AliHurson(MissouriUniversityofScienceandTechnology)

Therehasbeenaprolificriseinthepopularityofcloudstorageinrecentyears.Whilecloudstorageoffersmanyadvantagessuchasflexibilityandconvenience,usersarenowunabletotellorcontroltheactuallocationsoftheirdata.Thislimitationmayaffectusers’confidenceandtrustinthestorageprovider,orevenbeunsuitableforstoringdatawithstrictlocationrequirements.Toaddressthisissue,weproposeanillegalfiletransferdetectionframeworkthatconstantlymonitors

115

thereal-timefiletransfersinthecloudandiscapableofdetectingpotentialillegaltransferswhichmovessensitivedataoutsidethe(“legal”)boundariesspecifiedbythefileowner.Themainideaistoclassifyingmultipleusers’locationpreferenceswhenmakingthedatastoragearrangementinthecloudnodes.Wemodelthelegalfiletransfersamongnodesasaweightedgraphandthenmaximizetheprobabilityofstoringdataitemsofsimilarprivacypreferencesinthesameregion.ThenweleveragethesocketmonitoringfunctionsprovidedbyLAST-HDFS(arecentlocation-awareHadoopfilestoragesystem)tomonitorthereal-timecommunicationamongcloudnodes.Basedonourlegalfiletransfergraphandthedetectedcommunication,weproposeanapproachtocalculatetheprobabilityofthedetectedtransfertobeillegal.Wehaveimplementedourproposedframeworkandourexperimentalresultsindicatethatourapproachisabletodetectmuchmoreillegalfiletransfersthanthestateoftheart.

EyesoftheSwarm:Streamers'DetectioninBitTorrent DanielSilva(FluminenseFederalUniversity),AntonioRocha(FluminenseFederalUniversity)

ManyBitTorrent(BT)clientsareusingtheseBTnetworksasavideo-on-demandservice,takingadvantageofthepopularityandthelargecollectionofmediaavailable.However,transformingtheswarmsintoanon-demandmediaservicecancauseseriousdamagetotheoverallnetworkperformance.Inthispaper,weproposeamethodology,usingtheconceptsofEntropy,andpresentaSpyBitTorrentclientthatisabletoidentifypeersstreaminginaswarm.Largescalemonitoring,forrealswarms,wereperformedtodetectthepresenceofstreamers.

Poster3:CloudsandVirtualizationCluster

Loadpredictionforenergy-awareschedulingforCloudscomputingplatformsAlexandreDambreville(LRI),JoannaTomasik(CentraleSupélec),JohanneCohen(LRI-CNRS),FabienDufoulon(LRI)

WeaddressonlineschedulingforserversofCloudserviceproviders.Eachserveriscomposedofseveralvariablespeedprocessorswhosepowerfunctionisconvex.Theserversmaybebusy,idleorswitchedoff.TheobjectiveofourschedulingistominimizetheenergyconsumedbyaCloudcomputingplatform.Toachievethisgoal,wetrytoanticipatecomputingdemandsbypredictingaworkload,thenwemodifythesetofavailableserverstofitthispredictionandfinallywescheduleourjobsontheavailableservers.ToschedulejobswehavedevelopedthePOD(PredictOptimizeDispatch)algorithm.Weevaluateitsperformanceforreal-lifetracesinthepresenceofdifferenttypesofprediction.Theanalysisshowsthatourschedulingreducesenergyconsumptionconsiderably.

Learn-as-you-gowithMegh:EfficientLiveMigrationofVirtualMachines DebabrotaBasu(NationalUniversityofSingapore),XiayangWang(InstituteofParallelandDistributedSystems,ShanghaiJiaoTongUniversity),YangHong(ShanghaiJiaoTongUniversity),HaiboChen(ShanghaiJiaoTongUniversity),StephaneBressan(NationalUniversityofSingapore)

Weproposeareinforcementlearningalgorithm,Megh,forlivemigrationofvirtualmachinesthatsimultaneouslyreducesthecostofenergyconsumptionandenhancestheperformance.Meghlearnstheuncertaindynamicsofworkloadsasit-goes.Meghusesadimensionalityreductionschemetoprojectthecombinatoriallyexplosivestate-actionspacetoapolynomialdimensionalspace.TheseschemesenableMeghtobescalableandtoworkinreal-time.WeexperimentallyvalidatethatMeghismorecost-effectiveandtime-efficientthantheMadVMandMMTalgorithms.

Machine-LearningBasedPerformanceEstimationforDistributedParallelApplicationsinVirtualizedHeterogeneousClusters SeontaeKim(UNIST),NguyenPham(UNIST),WoongkiBaek(UNIST),Young-RiChoi(UNIST)

Inavirtualizedheterogeneouscluster,foradistributedparallelapplicationwhichrunsinmultiplevirtualmachines(VMs)concurrently,thereareahugenumberofpossiblewaystoplaceitsVMs.Thispaperinvestigatesaperformanceestimationtechniquefordistributedparallelapplicationsinvirtualizedheterogeneousclusters.WefirstanalyzetheeffectsofdifferentVMconfigurationsontheperformanceofvariousdistributedparallelapplications.Wethenpresentamachinelearningbasedperformancemodelforadistributedparallelapplication.Usingaheterogeneousclusterwithtwodifferenttypesofnodes,weshowthatourmachine-learningbasedmodelscanestimatetheruntimesofdistributedparallelapplicationswithmodesterrorrates.

IncrementalelasticityforNoSQLdatastores AntonisPapaioannou(ICS-FORTHandUniversityofCrete),KostasMagoutis(ICS-FORTHandUniversityofIoannina)

ElasticityactionsinNoSQLdatastoresmovelargeamountsofdataoverthenetworktotakeadvantageofnewresources.Hereweproposeincrementalelasticity,anewmechanismforschedulingdatatransferstoajoiningserver,leadingtosmootherelasticityactionswithareducedperformanceimpact.

AFrameworkforEfficientEnergySchedulingofSparkWorkloads StathisMaroulis(AthensUniversityofEconomicsandBusiness),NikosZacheilas(AthensUniversityofEconomicsandBusiness),VanaKalogeraki(AthensUniversityofEconomicsandBusiness)

NowadaysdistributedprocessingframeworkslikeApacheSparkhavebeensuccessfullyusedfortheexecutionofbigdataapplications.Despitetheirwideadoptionlittleworkhasbeendoneintermsofcontrollingtheapplications’energyconsumption.Datacenterscontributeover2%ofthetotalUSelectricusagethereforeminimizingtheenergyutilizationofSparkapplicationcanbeextremelyhelpful.SolvingthisenergyconsumptionproblemrequirestheschedulingofSparkapplicationsinanenergy-efficientway.However,theproblemischallengingaswealsohavetoconsiderapplicationperformancerequirements.Inthiswork,weprovidetheoverviewofanovelframeworkthatorchestratestheexecutionorderofSparkapplications,exploitingDVFStotunethecomputingnodesCPUfrequenciesinordertominimizetheenergyconsumptionandsatisfyapplication’sperformancerequirements.Ourearlyexperimentalresultsillustratetheworkingandbenefitsofourframework.

TowardsaCompleteVirtualDataCenterEmbeddingAlgorithmusingHybridStrategy MPGilesh(NationalInstituteofTechnologyCalicut),SDMadhuKumar(NationalInstituteofTechnologyCalicut),LillykuttyJacob(NationalInstituteofTechnologyCalicut),UmeshBellur(IndianInstituteofTechnologyBombay)

VirtualDataCenters(VDCs)areasetofvirtualmachine(VM)endpointsconnectedbyavirtualnetwork(VN)topology.WhileVMsarespecifiedbytheircapacityalongtheaxesofCPU,memory,andothermachinelevelresources,theVNischaracterizedbytheresourcesofvirtualswitches,andthebandwidthandlatencyoflinks.Today’sclouddatacenterssupportdynamicrequestsforVDCs,byusingsoftwaredefinedembeddingstrategies,thatallowthemtomeshmultipleVDCsontotheirphysicaldatacenter(PDC)networkandmachines.Overaperiodoftime,entriesandexitsofdifferentVDCscreatemultiplefragmentsofPDCresources,which

116

areunusableunlessconsolidated,resultinginpooracceptancerateofVDCs.However,suchaconsolidationwouldnecessitatecostlyliveVMandvirtualswitchmigrations.AgoodstrategyshouldtradeoffthecostofmigrationsfortheacceptancerateofVDCrequests.Inthispaper,wepresentasolutiontothisVDCembeddingproblemthatachievesahigheracceptanceratebyminimizingfragmentation,comparedtoexistingstrategies,whileminimizingthemigrationsofVMsintheexistingVDCs.Experimentalresultsshowthatwecanachieveupto5%higheracceptancetoexistingsolutionswhilehaving6%fewerrateofmigrations.

FederatingConsistencyforPartition-ProneNetworks BenjaminBengfort(UniversityofMaryland),PeteKeleher(UniversityofMaryland)

Groupsofstronglyconsistentdevicescanefficientlyordereventsunderideal(datacenter)conditions,butbecomelesseffectiveindynamicandheterogeneousenvironments.Weaklyconsistentdevicesefficientlytoleratebothfaultsanddynamicconditionsbutareslowtoconvergeonasingleorderingofsystemevents.Wepropose“federatedconsistency”,whichcombinesthestrengthsofbothapproachesintoasingleprotocol.Federatedgroupsuseastronglyconsistentinnercoreofdevicestomaintainatotallyordered,fault-tolerantsequenceofevents.Acloudofweakly-consistentdevicesdisseminatesorderingsandenablesprogressdespitevaryingconnectivityandpartitions.Thoughtheconstituentsub-protocolstakedifferent(nearlyopposite)approachestoresolvingconflicts;weshowthatexpandingdistributedversionvectorswithafortecomponentallowsthemtointer-operateeffectively.Weuseadiscreteeventsimulationtoshowthatagroupoffederateddevicescanobtainthekeyadvantagesofbothapproaches.Suchsystemshavebeeninvestigatedbefore[1],[2],butourapproachtargetsmoreactive“weaknodes”inawide-areasetting.

Mitigatingnesting-agnostichypervisorpoliciesinderivativeclouds ChandraPrakash(IITBombay),Prashanth(IITBombay),PurushottamKulkarni(IITBombay),UmeshBellur(IITBombay)

ThefixedgranularityofvirtualmachinesofferedbyIaaSprovidershaspromptedtheevolutionofderivativecloudswhereresourcesarerepackagedintosmallercontainersandleasedouttypicallyinPaaSmode.Insuchasetup,containersareprovisionedwithinvirtualmachines.Suchanestedsetupresultsintwocontrolcentersfortheresourcesusedbythosecontainers—theguestOSandtheHypervisor.Thelatter’scontrolactionsareagnosticoftheapplicationexecutingwithinaVM.Thislackofvisibilitymayresultinhypervisorcontrolthathasanon-uniformeffectontheVM’snestedcontainerswhichisundesirable.Inthiswork,weproposepolicybasedcontroloftheeffectofthehypervisor’scontrolactionsamongstthecontainersnestedintheaffectedVM.

ANovelArchitectureforEfficientFogtoCloudDataManagementinSmartCities AmirSinaeepourfard(UPC),JordiGarcia(UPC),XavierMasip-Bruin(UPC),EvaMarin-Tordera(UPC)

Traditionalsmartcityresourcesmanagementrelyoncloudbasedsolutionstoprovideacentralizedandrichsetofopendata.Theadvantagesofcloudbasedframeworksaretheirubiquity,(almost)unlimitedresourcescapacity,costefficiency,aswellaselasticity.However,accessingdatafromthecloudimplieslargenetworktraffic,highdatalatencies,andhighersecurityrisks.Alternatively,fogcomputingemergesasapromisingtechnologytoabsorbtheseinconveniences.Theuseofdevicesattheedgeprovidesclosercomputingfacilities,reducesnetworktrafficandlatencies,andimprovessecurity.Wehavedefinedanewframeworkfordatamanagementinthecontextofsmartcitythroughaglobalfogtocloudmanagementarchitecture;inthispaperwepresentthedataacquisitionblock.Asafirstexperimentweestimatethenetworktrafficduringdatacollection,andcompareitwithatraditionalrealsystem.Wealsoshowtheeffectivenessofsomebasicdataaggregationtechniquesinthemodel,suchasredundantdataeliminationanddatacompression.

Networklet:ConceptandDeploymentShengZhang(NanjingUniversity),YuLiang(NanjingUniversityofPostsandTelecommunications),ZhuzhongQian(NanjingUniversity),MingjunXiao(UniversityofScienceandTechnologyofChina),JieWu(TempleUniversity),FanyuKong(AntFinancial),SangluLu(NanjingUniversity)

Intoday’sdatacenters,resourcerequestsfromtenantsareincreasinglytransformingintohybridrequeststhatmaysimultaneouslydemandIaaS,PaaS,andSaaSresources.Thispapertacklesthechallengeofmodelinganddeployinghybridtenantrequestsindatacenters,forwhichwecoin“networklet”torepresentasetofVMsthatcollaborativelyprovideaPaaSorSaaSservice.Throughextractingnetworkletsfromtenantrequestsandthussharingthembetweentenants,wecanachieveawin-winsituationfordatacenterprovidersandtenants.

OptimisticCausalConsistencyforGeo-ReplicatedKey-ValueStores KristinaSpirovska(EPFL),DiegoDidona(EPFL),WillyZwaenepoel(EPFL)

Inthispaperwepresentanewapproachtoimplementingcausalconsistencyingeo-replicateddatastores,whichwecallOptimisticCausalConsistency(OCC).Theoptimisminourapproachliesinthatupdatesfromaremotedatacenterareimmediatelymadevisibleinthelocaldatacenter,withoutcheckingiftheircausaldependencieshavebeenreceived.Serversperformthedependencycheckneededtoenforcecausalconsistencyonlyuponservingaclientoperation,ratherthanonthereceiptofareplicateddataitemasinexistingsystems.OCCexploresanoveltrade-offinthelandscapeofcausalconsistencyprotocols.ThepotentiallyblockingbehaviorofOCCmakesitvulnerabletonetworkpartitions.Becausenetworkpartitionsarerareinpractice,however,OCCchoosestotradeavailabilitytomaximizedatafreshnessandreducethecommunicationoverhead.WefurtherproposearecoverymechanismthatallowsanOCCsystemtofallbackonapessimisticprotocoltocontinueoperatingevenduringnetworkpartitions.POCCisanimplementationofOCCbasedonphysicalclocks.WeshowthatOCCimprovesdatafreshness,whileofferingcomparableorbetterperformancethanitspessimisticcounterpart.

AutomatedPerformanceEvaluationforMulti-TierCloudServiceSystemsSubjecttoMixedWorkloads XudongZhao(ShandongUniversity),LizhenCui(ShandongUniversity),JiweiHuang(BeijingUniversityofPostsandTelecommunications),ShijunLiu(ShandongUniversity),LeiLiu(ShandongUniversity),CaltonPu(GeorgiaTech)

Inmulti-tiercloudservicesystems,performanceevaluationreliesonnumerousexperimentsinordertocollectkeymetricssuchasresourcesusage.Theapproachmayresultinhighlytime-consuminginpractice.Inthispaper,weproposeanautomatedframeworkforperformancetracking,datamanagementandanalysistominimizehumaninterventioninmultitiercloudservicesystems.Theframeworksupportfine-grainedanalysisofthemixedworkloadsthroughtheDiscrete-timeMarkov-modulatedPoissonprocess(DMMPP).Ageneralmultitierapplicationistheoreticallyformulatedasaqueueingnetworktoevaluatetheperformance.TheeffectivenessofthemodelhasbeenvalidatedthroughextensiveexperimentsconductedintheRUBiSbenchmarksystem.

DecentralisedRuntimeMonitoringforAccessControlSystemsinCloudFederations

117

MdSadekFerdous(UniversityofSouthampton),AndreaMargheri(UniversityofSouthampton),FedericaPaci(UniversityofSouthampton),MuYang,VladimiroSassone(UniversityofSouthampton)

Cloudfederationisanemergentcloud-computingparadigmwherepartnerorganisationssharedataandserviceshostedontheirowncloudplatforms.Inthiscontext,itiscrucialtoenforceaccesscontrolpoliciesthatsatisfydataprotectionandprivacyrequirementsofpartnerorganisations.However,duetothedistributednatureofcloudfederations,theaccesscontrolsystemalonedoesnotguaranteethatitsdeployedcomponentscannotbecircumventedwhileprocessingaccessrequests.Inordertopromoteaccountabilityandreliabilityofadistributedaccesscontrolsystem,wepresentadecentralisedruntimemonitoringarchitecturebasedonblockchaintechnology.

Poster4:DistributedSystemsandNetworkingCluster

DuoFS:AnAttemptatEnergy-SavingandRetainingReliabilityofStorageSystems ShuYin(HunanUniversity)

AsissuesoftheEnergyWallandtheReliabilityWallbecomeunavoidable,itisademandingandchallengingtasktoreduceenergyconsumptioninlarge-scalestoragesystemsinmoderndatacentreswhileretainingacceptablesystemsreliability.Mostenergyconservationtechniquesinevitablyhaveadverseimpactsontheparalleldisksystems.Toaddressthereliabilityissuesofenergy-efficientparallelstoragesystems,weproposeareliableenergy-efficientstoragesystemcalledDuoFS,whichaimsatimprovingbothenergyefficiencyandreliabilityofparallelstoragesystemsbyseamlesslyintegratingHDDsandSSDs.Withthehelpofthemiddlewarelayer,DuoFScandistributepopulardatatoSSD-basednodesandputHDD-basednodesintothelow-powermodeunderlightworkloadconditionswithoutmodificationoftheparallelsystems

AProposalofanEfficientTrafficMatrixEstimationunderPacketDrops KoheiWatabe(NagaokaUniversityofTechnology),ToruMano(NTTNetworkInnovationLaboratories),KimihiroMizutani(NTTNetworkInnovationLaboratories),OsamuAkashi(NTTNetworkInnovationLaboratories),KenjiNakagawa(NagaokaUniversityofTechnology),TakeruInoue(NTTNetworkInnovationLaboratories)

Trafficmatrix(TM)estimationhasbeenextensivelystudiedfordecades.Althoughconventionalestimationtechniquesassumethattrafficvolumesareunchangedbetweenoriginsanddestinations,packetsareoftendiscardedonapathduetotrafficburstiness,silentfailures,etc.ThispaperproposesanovelTMestimationmethodthatworkscorrectlyevenunderpacketdrops.ThemethodisestablishedonaBooleanfaultlocalizationtechnique;thetechniquerequiresfewercountersthoughitonlydetermineswhethereachlinkishealthy.ThispaperextendstheBooleantechniquesoastodealwithtrafficvolumeswitherrorboundsjustbyasmallnumberofcounters.Alongwithsubmodularoptimizationfortheminimumcounterplacement,weevaluateourmethodwithrealnetworkdatasets.

StragglerMitigationforDistributedBehavioralSimulation EmanBinKhunayn(UniversityofMelbourne),ShanikaKarunasekera(UniversityofMelbourne),HairuoXie(UniversityofMelbourne),KotagiriRamamohanarao(UniversityofMelbourne)

Runninglarge-scalebehavioralsimulationsrequireshighcomputationalpower,whichcanbeacquiredbydistributingcomputationworkloadtomultiplecomputingnodes(i.e.,workers)thatruninparallel.TheimplementationsofsuchsystemscommonlyfollowtheBulkSynchronousParallel(BSP)model.However,implementationsusingBSPusuallysufferfromthestragglerproblem,wherethedelayofanyworkerslowsdowntheentiresimulation.Theproblemusuallyoccursduetocommunicationdelaysorimbalancedworkloadamongworkers.Tomitigatethestragglerproblem,weproposeanovelparallelcomputationalmodel,calledPrioritySynchronousParallel(PSP)model.PSPexploitsdatadependenciesofparallelprocessestodeterminehighprioritydatatobecomputedandsynchronizedwhilecomputingtheremainingdata.PSPisimplementedandevaluatedusingtrafficsimulationsforthreelargecities.TheproposedtechniqueshowssignificantperformanceimprovementsovertheBSPmodel.

SupportingResourceControlforActorSystemsinAkka AhmedAbdelMoamen(UniversityofSaskatchewan),DezhongWang(UniversityofSaskatchewan),NadeemJamali(UniversityofSaskatchewan)

AlthoughtherearemodelsandprototypeimplementationsforcontrollingresourceuseinActorsystems,theyaredifficulttoimplementforproductionimplementationsofActorssuchasAkka.Thisisbecausethemessagingandschedulinginfrastructuresofruntimesystemsvarywidelyandareincreasinglycomplex.Inthispaper,wecomparetwodifferentwaysofapproximatingactor-levelcontrolsupportforAkka.Thefirstimplementationexpectsactormessagestoincludeestimatesofresourcesrequiredforprocessingthem.Thesecondimplementationsimplytracksactors’resourceusetodecidewhentheyshouldbeschedulednext.Wepresentexperimentalresultsontheperformancecostoftheseresourcecontrolmechanisms,aswellastheirimpactonresourceutilization.

ADistributedOperatingSystemNetworkStackandDeviceDriverforMulticores BMSaifAnsary(ECE,VirginiaTech),AntonioBarbalace(ECE,VirginiaTech),BinoyRavindran(ECE,VirginiaTech),ThomasLazor(ECE,VirginiaTech),Ho-RenChuang(ECE,VirginiaTech)

Withtheadvancesinnetworkspeedsasingleprocessorcannotcopeanymorewiththegrowingnumberofdatastreamsfromasinglenetworkcard.MulticoreprocessorscomeatarescuebuttraditionalSMPOSes,whichintegratethesoftwarenetworkstack,scaleonlytoacertainextent,limitinganapplication’sabilitytoservemoreconnectionswhileincreasingthenumberofcores.Ontheotherhand,kernelbypasssolutionsseemtoscalebetter,butlimitresourceflexibilityandcontrol.WeproposeattackingtheseproblemswithadistributedOSdesign,usingmultiplenetworkstacks(oneperkernel)andrelyingonmulti-queuehardwareandhardwareflowsteering.Thiscreatesasingle-socketabstractionamongkernelswhileminimizinginter-corecommunication.Weintroduceourdesign,consistingofadistributednetworkstack,adistributeddevicedriver,andaload-balancingalgorithm.Wecompareourprototype,NetPopcorn,withLinux,AffinityAccept,FastSocket.NetPopcornacceptsbetween5to8timesmoreconnectionsandreducesthetaillatencycomparedtothesecompetitors.WealsocompareNetPopcornwithmTCPandobservethatforhighcorecounts,mTCPacceptsonly18%moreconnectionsyetwithhighertaillatencythanNetPopcorn.

CachePotentialityofMONs:APrime PeiyanYuan(HenanNormalUniversity),HonghaiWu(HenanUniversityofScienceandTechnology),XiaoyanZhao(HenanNormalUniversity),ZhengnanDong(HenanNormalUniversity)

118

NodebuffersizehasabiginfluenceonperformanceofMobileOpportunisticNetworks(MONs).Thisismainlybecauseeachnodeshouldtemporarilycachepacketstodealwiththeintermittentlyconnectedlinks.Inthispaper,westudyfundamentalboundsonnodebuffersizebelowwhichthenetworksystemcannotachievetheexpectedperformance.Giventheconditionthateachlinkhasthesameprobabilityptobeactive,andqtobeinactiveduringeachtimeslot,thereexitsacriticalvaluepcfromapercolationperspective.Ifp>pc,thenetworkisinthesupercriticalcase,thereisanachievableupperboundonthebuffersizeofnodes,independentoftheinactiveprobabilityq.Whenp<pc,thenetworkisinthesubcriticalcase,andthereexistsaclosed-formsolutionforbufferoccupation,whichisindependentofthesizeofthenetwork.

Oak:User-TargetedWebPerformance MarcelFlores(NorthwesternUniversity),AlexanderWenzel(NorthwesternUniversity),AleksandarKuzmanovic(NorthwesternUniversity)

Webperformancehaslongprovedtobeoneofthemostsoughtafteranddifficulttoachievecomponentsfortheweb.Sincetheinceptionofthemodernwebinfrastructure,thesituationhasbeengrowingincomplexity,addingremotehostsandobjects,providingeverythingfromcomputationinfrastructure,contentdistributioncapability,andtargetedadvertising.Whilemanyofthesecomponentsprovideimprovementsforsomeusers,thecomplexityoftheInternetoftenleavesotheruserssufferingfrompoorperformance.WeproposeOak,asystemwhichaddressesclientperformanceontheindividuallevel,henceaddressingchallengeswhichmaybeuniquetotheuser.Oakmeasuresauser’sperformanceforobjectsloadingonapage,anddetermineswhichcomponentsareunderperforming.Oakfurtherprovidesanautomatedmechanismbywhichsitesareabletoreplaceresourceswiththoseprovidedbyabetterperformingalternativeserviceforaparticularuser.Inthiswork,wedemonstratetheprevalenceofunder-performingservicesontheweb,findingthatover60%oftheAlexaTop500haveatleastoneunder-preformingserver.WefurtherevaluateOakonexperimentalandpopularexistingwebpages,anddemonstrateitseffectivenessinmakingdecisionsinexistingenvironmentsandwithadistributeduserbase.

Ctrl-A:ASelf-*DistributedandIn-bandSDNControlPlaneMarcoCanini(UniversitécatholiquedeLouvain),IosifSalem(ChalmersUniversityofTechnology),LironSchiff(TelAvivUniversity),EladMichaelSchiller(ChalmersUniversityofTechnology),StefanSchmid(AalborgUniversity&TUBerlin)

Adoptingdistributedcontrolplanesiscriticaltowardsensuringhighavailabilityandfault-toleranceofdependableSoftware-DefinedNetworks(SDNs).However,designingandbootstrappingadistributedSDNcontrolplaneisachallengingtask,especiallyiftobedonein-band,withoutadedicatedcontrolnetwork,andwithoutrelyingonlegacynetworkingprotocols.Oneofthemostappealingandpowerfulnotionsoffault-toleranceisself-organizationandthispaperdiscussesthepossibilityofselforganizingalgorithmsforin-bandcontrolplanes.

119

Tutorial Abstracts

Tutorial1:ServerlessProgramming(FunctionasaService)PaulCastro(IBMT.J.WatsonResearchCenter),VatcheIshakian(BentleyUniversity),VinodMuthusamy(IBMT.J.WatsonResearchCenter),AleksanderSlominski(IBMT.J.WatsonResearchCenter)

ServerlessComputing(FunctionasaService)isemergingasanewandcompellingparadigmforthedeploymentofcloudapplications,largelyduetotherecentshiftofenterpriseapplicationarchitecturestocontainersandmicroservices.

FromtheperspectiveofanInfrastructure-as-a-Service(IaaS)customer,thisparadigmshiftpresentsbothanopportunityandarisk.Ontheonehand,itprovidesdeveloperswithasimplifiedprogrammingmodelforcreatingcloudapplicationsthatabstractsawaymost,ifnotall,operationalconcerns;itlowersthecostofdeployingcloudcodebychargingforexecutiontimeratherthanresourceallocation;anditisaplatformforrapidlydeployingsmallpiecesofcloudnativecodethatrespondstoevents,forinstance,tocoordinatemicroservicecompositionsthatwouldotherwiserunontheclientorondedicatedmiddleware.Ontheotherhand,deployingsuchapplicationsinaserverlessplatformischallengingandrequiresrelinquishingtotheplatformdesigndecisionsthatconcern,amongotherthings,quality-of-service(QoS)monitoring,scaling,andfault-toleranceschemes.

Fromtheperspectiveofacloudprovider,serverlesscomputingprovidesanadditionalopportunitytocontroltheentiredevelopmentstack,reduceoperationalcostsbye_cientoptimizationandmanagementofcloudresources,andenablingaserverlessecosystemthatencouragesthedeploymentofadditionalcloudservices.

Serverlessplatformspromisenewcapabilitiesthatmakewritingscalablemicroserviceseasierandcosteffective,positioningthemselvesasthenextstepintheevolutionofcloudcomputingarchitectures.MostoftheprominentcloudcomputingprovidersincludingAmazon,IBM,Microsoft,andGooglehaverecentlyreleasedserverlesscomputingcapabilities.Therearealsoseveralopen-sourceeffortsincludingtheOpenLambdaproject.

Inthistutorial,wewillpresentserverlesscomputing,surveyexistingserverlessplatformsfromindustry,academia,andopensourceprojects,identifykeycharacteristicsandusecases,anddescribetechnicalchallengesandopenproblems.Ourtutorialwillinvolveahands-onexperienceofusingtheserverlesstechnologiesavailablefromdifferentcloudproviders(e.g.IBM,Amazon,GoogleandMicrosoft).Weexpectouruserstohavebasicknowledgeofprogrammingandbasicknowledgeofcloudcomputing.

PaulCastro,Ph.D.isaResearchStaffMemberattheIBMWatsonResearchCenter.Hehasbeenactiveinresearchonmobileandpervasivecomputing,cloudinfrastructure,wirelesslocationsystems,locationdatabases,streamprocessing,andenterprisewebapplicationsandhasbeenawardedseveralpatentsintheseareas.Hehasworkedoncloudservicesforsupportingmobileapplicationsrunningonvarioussmartphoneplatforms.Workfromhisresearchintheareaofmulti-deviceapplicationsupportwasrecentlyreleasedaspartoftheIBMBluemixMobileBackendasaService.HehasearnedtwoIBMTechnicalAchievmentAwardsfortheIBMSmartCloudWebMeetingsformobileclientsandtheIntelligentNotificationSystem.Mostrecently,heworkedonIBMOpenWhiskforBluemix,withafocusonmobilesolutions.

VatcheIshakianisanAssistantProfessorintheComputerInformationSystemsdepartmentatBentleyUniversity,beforestartinghisacademiccareer,VatchewasaResearchStaffMemberatIBMResearchworkingonseveralprojectsincludingIBMOpenWhiskserverlesscomputingplatform.VatcheComputerhisPhDinComputerSciencefromBostonUniversity.Hisresearchinterestsincludedistributedbusinessprocessmanagement,Servicescomposition,andpricedbasedmodelsforcloudservices.

VinodMuthusamyisaResearchStaffMemberintheComponentSystemsGroupattheIBMT.J.WatsonResearchCenter.HecompletedhisPhDinComputerEngineeringattheUniversityofToronto.Vinod’sresearchinterestsincludepublish/subscribeeventprocessing,anddistributedbusinessprocessmanagement.Mostrecently,heworkedonIBMOpenWhiskServerlessComputingplatform.

AleksanderSlominskiisaResearchStaffMemberintheServicesandAPIEcosystemsGroupattheIBMT.J.WatsonResearchCenter.HeisinterestedindevelopmentofapplicationsforforfutureAPIEconomythattakeadvantageofupcomingcloudprogrammingapproaches,suchasserverlesscomputings,forcompositionsandorchestrationofcomponentsintobusinessworkflows.Mostrecently,heworkedonIBMIBMOpenWhiskServerlessComputingplatform.

Tutorial2:SensorCloud:ACloudofSensorNetworksSanjayMadria(MissouriUniversityofScienceandTechnology)

Traditionalmodelofcomputingwithwirelesssensorsimposesrestrictionsonhowefficientlywirelesssensorscanbeusedduetoresourceconstraints.NewermodelsforinteractingwithwirelesssensorssuchasInternetofThingsandSensorCloudaimtoovercometheserestrictions.Inthistutorial,Iwilldiscusssensorcloudarchitectures,whichenabledifferentwirelesssensornetworks,spreadinahugegeographicalareatoconnecttogetherandbeusedbymultipleusersatthesametimeondemandbasis.Iwillfurtherdiscusshowvirtualsensorsassistincreatingamultiuserenvironmentontopofresourceconstrainedphysicalwirelesssensorsandcanhelpinsupportingmultipleapplicationson-demandbasis.Iwillthenpresentsomesecurityissuesandprovideoverviewofthesolutionstotheproblemsfromtheliterature.Inparticular,Iwilldiscussenergyefficientprivacyanddataintegritypreservingdataaggregationalgorithm,riskassessmentinsensorcloudaswellasattribute-basedaccesscontrolforsensorcloudapplications.Thetopicscoveredwillbe:1.CloudofSensors–SensorCloudArchitectures2.VirtualizationinSensorCloud3.SchedulingandQoSinSensorCloud4.DatacompressionandSecureAggregationinSensorCloud5.Security,PrivacyandRiskIssuesinSensorCloud

SanjayKMadriareceivedhisPh.D.inComputerSciencefromIndianInstituteofTechnology,Delhi,Indiain1995.HeisafullprofessorintheDepartmentofComputerScienceattheMissouriUniversityofScienceandTechnology(formerly,UniversityofMissouri-Rolla,USA).Hehaspublishedover235Journalandconferencepapersintheareasofmobileandsensorcomputing,cloudandcybersecurity.HewonfiveIEEEbestpapersawardsinconferencessuchasIEEEMDM2011,IEEEMDM2012andIEEESRDS2015.Heisaco-authorofabookpublishedbySpringerinNov2003.Hehaspresentedtutorialsintheareasofsecuresensorcloud,cloudcomputing,mobilecomputing,etc.NSF,NIST,ARL,ARO,AFRL,DOE,Boeing,HangsoftandBoeinghavefundedhisresearchprojects,amongothers.HewasawardedJSPS(JapaneseSocietyforPromotionofScience)visitingscientistfellowshipin2006andASEE(AmericanSocietyofEngineeringEducation)fellowshipfrom2008to2017.In2012,hewasawardedNRCFellowshipbyNationalAcademies.Hereceivedfacultyexcellenceandresearchawardsintheyears2007,2009,2011,2013and2015fromhisuniversityforexcellenceinresearch.HeisACMDistinguishedScientist,andACMDistinguishedSpeakerandIEEESeniorMemberaswellasIEEEGoldenCoreAwardee.

120

121

ADSN 2017 Workshop Abstracts

UnderstandingandImprovingTemporalFairnessonanElectronicTradingVenueHaydenMelton(DeakinUniversity)

Fairness,ingeneral,isatopicthathasreceivedmuchattentioninresearchondistributedsystems.Intheirapplicationaselectronictradingvenues,however,temporalfairnessremainsatopicthatispoorlyunderstood.Thisisconcerningbecauseoperatorsofthesevenuesgenerallyhaveobligationstoensuretheirfairness.Consequently,thispaper(1)describeswhattemporalfairnessisandisnot,(2)identifiesthingsthatcanmakeitelusive,and(3)describesamechanismforimprovingitthatwasrecentlyretrofittedtoamajorFXtradingvenue:ThomsonReutersMatching.

CertificateLessCryptography-basedRuleManagementProtocolforAdvancedMissionDeliveryNetworksJonghoWon(PurdueUniversity),AnkushSingla(PurdueUniversity),ElisaBertino(PurdueUniversity)

AssuredMissionDeliveryNetwork(AMDN)isacollaborativenetworktosupportdata-intensivescientificcollaborationsinamulti-cloudenvironment.Eachscientificcollaborationgroup,calledamission,specifiesasetofrulestohandlecomputingandnetworkresources.SecurityisanintegralpartoftheAMDNdesignsincetherulesmustbesetbyauthorizedusersandthedatageneratedbyeachmissionmaybeprivacy-sensitive.Inthispaper,weproposeaCertificateLesscryptography-basedRule-managementProtocol(CL-RP)forAMDN,whichsupportsauthenticatedruleregistrationsandupdateswithnon-repudiation.WeevaluateCL-RPthroughtest-bedexperimentsandcompareitwithotherstandardprotocols.

FaultySensorDataDetectioninWirelessSensorNetworksUsingLogisticalRegressionTianyuZhang(UniversityofHyogo),QianZhao(UniversityofHyogo),YukikazuNakamoto(UniversityofHyogo)

Wirelesssensornetworks(WSNs)arecommonlyusedtomonitorchangesinanenvironmentandpreventdisasterssuchasstructuralinstability,forestfires,andtsunamis.WSNsshouldrapidlyrespondtochangesandmustprocessandanalyzesensordatainadistributedwaytominimizebatteryconsumption.Ontheotherhand,machinelearning(ML)algorithmsisapowerfultoolfordataanalyzing.However,MLalgorithmsaresocomplexthatcannotbeexecutedonresourceconstrainedsensornodes.AnotherchallengeofusingMLalgorithmsinWSNsisthatMLalgorithmsaredifficulttobedistributedoneverysensornode.BecauseMLalgorithmsarebasedonstatistics'methodsthatneedcollectingamountofdatatoapproachaccuracy.Inthispaper,weproposeamethodthatdividesalogisticalregressionMLmethodintotwosteps,thendistributesthetwostepsontosinknodeandsensornodestodetectfaultysensordata.

AnAdaptability-EnhancedRoutingMethodforMultipleGateway-basedWirelessSensorNetworksUsingSecureDispersedDataTransferRyumaTani(HiroshimaCityUniversity),KentoAoi(HiroshimaCityUniversity),EitaroKohno(HiroshimaCityUniversity),YoshiakiKakuda(HiroshimaCityUniversity)

Inconventionalwirelesssensornetworks(hereinafterreferredtoasWSNs),thesinglesinknodemodelhasbeenemployedtocollectandstorethemeasureddatatoprovidetotheexternalusersofWSNs.However,thesinglesinkmodelofWSNscanbethesinglepointoffailureforsomeusage.Tocounterthisproblem,wecanemploymultiplegateway-basedWSNs.Inaddition,WSNsaresusceptibletovariouskindsofattackssuchaseavesdropping.Tocountereavesdropping,wealreadyhaveproposedthesecretsharingscheme-basedsecuredisperseddatatransfermethod(hereinafterreferredtoasthesecuredisperseddatatransfermethod).Whilewehadconfirmedthatthesecuredisperseddatatransfermethodiseffectivetocountereavesdroppingthroughtheuseofradioareadisjointmultiplepaths,wealsofoundthatthesecuredisperseddatatransfermethodcannotbeeffectiveinsevereenvironmentssuchasinanetworkwithalowdensityofnodes.

AProgressiveDownloadMethodBasedonTimer-DrivenRequestingSchemesUsingMultipleTCPFlowsonMultiplePathsHiroakiHoriba(HiroshimaCityUniversity),TokumasaHiraoka(HiroshimaCityUniversity),JunichiFunasaka(HiroshimaCityUniversity)

Duetothewidespreaduseofbroadbandcommunicationmedia,theconventionalTCPcannotfullyutilizesuchbroadbandwidth,somanyimprovementsonTCPitselfandalotofacceleratingmethodswhichusemultipleTCPflowshavebeenproposed.Inaddition,videohostingservicesontheInternetasanewmediumhavebecomepopular,andprogressivedownloadingmethods,whichdownloadsegmentedvideodatawhilereplayingthem,areadoptedonvarioussites.TheplaybackqualityofprogressivedownloadmethodshasbeenimprovedbytheexistingmethodwhichestablishesmultipleTCPflowsoneachofmultiplepaths.However,theexistingmethodassumesthatbandwidth,delay,andpacketlossrateofeachpathareknown.Therefore,inthispaper,amethodusingthetimer-drivenrequestingschemewhichistobeeffectiveevenwhenbandwidth,delay,andpacketlossratearenotgiven.Moreover,itfeaturesduplicaterequestingschemetocopewithqualitydeteriorationinvideoplaybackduetoout-of-orderblockarrivalswhenapplyingprogressivedownloadusingmultiplepaths.Thispaperevaluatestheproposedmethodcomparingwiththeexistingmethodbysimulation.Asaresult,itisfoundthattheproposedmethodyieldshighperformanceenoughtokeepthevideoqualityhigherthantheexistingmethodeventhoughthenetworkconditionisnotclarifiedinadvance.Theproposalcanberegardedasanassurancenetworktechnologysinceitcanadapttothecurrentnetworkstatusandkeeptheplaybackratehigh.

122

BGP 2017 Workshop Abstracts

WolfPath:Acceleratingiterativetraversing-basedgraphprocessingalgorithmsonGPUHuanzhouZhu(UniversityofWarwick),LigangHe(UniversityofWarwick)

Thereisthesignificantinterestnowadaysindevelopingtheframeworksofparallelizingtheprocessingforthelargegraphssuchassocialnetworks,Webgraphs,etc.Mostparallelgraphprocessingframeworksemployiterativeprocessingmodel.However,bybenchmarkingthestate-of-artGPU-basedgraphprocessingframeworks,weobservedthattheperformanceofiterativetraversing-basedgraphalgorithms(suchasBreadFirstSearch,SingleSourceShortestPathandsoon)onGPUislimitedbythefrequentdataexchangebetweenhostandGPU.Inordertotackletheproblem,wedevelopaGPU-basedgraphframeworkcalledWolfPathtoacceleratetheprocessingofiterativetraversing-basedgraphprocessingalgorithms.InWolfPath,theiterativeprocessisguidedbythegraphdiametertoeliminatethefrequentdataexchangebetweenhostandGPU.Toaccomplishthisgoal,WolfPathproposesadatastructurecalledLayeredEdgelisttorepresentthegraph,fromwhichthegraphdiameterisknownbeforethestartofgraphprocessing.InordertoenhancetheapplicabilityofourWolfPathframework,agraphpreprocessingalgorithmisalsodevelopedinthisworktoconvertanygraphintotheformatoftheLayeredEdgelist.WeconductedextensiveexperimentstoverifytheeffectivenessofWolfPath.TheexperimentalresultsshowthatWolfPathachievessignificantspeedupoverthestate-of-artGPU-basedin-memoryandout-of-memorygraphprocessingframeworks.

ANovelAuction-basedQueryPricingSchemaXingwangWang(JilinUniversity),XiaohuiWei(JilinUniversity),ShangGao(JilinUniversity),YuanyuanLiu(JilinUniversity),ZongpengLi(UniversityofCalgary)

Asacommonprocessingmethod,queryiswidelyusedinmanyareas,suchasgraphprocessing,machinelearning,statistics,etc.However,queriesareusuallypricedaccordingtovendor-specifiedfixedviews(API)ornumberoftransactions,whichignorestheheterogeneityofqueries(computingresourceconsumptionforqueryandinformationthattheanswerbrings)andviolatesthemonotoneprinciple.

Inthisworkwestudytherelationalquerypricingproblembytakingbothinformation(i.e.,data)valueandqueryresourceconsumptionsintoaccount.Wedesignefficientauctionsforquerypricing.Differentfromtheexistingquerypricingschemas,queryauctiondeterminesdatapricesthatreflectthedemand-supplyofsharedcomputingresourcesandinformationvalue(i.e.,pricediscovery).Wetargetqueryauctionthatrunsinpolynomialtimeandachievesnear-optimalsocialwelfarewithagoodapproximationratio,whileelicitstruthfulbidsfromconsumers.Towardsthesegoals,weadaptthepostedpricingframeworkingame-theoreticperspectivebycastingthequeryauctiondesignintoanIntegerLinearProgrammingproblem,anddesignaprimal-dualalgorithmtoapproximatetheNP-hardoptimizationproblem.Theoreticalanalysisandempiricalstudiesdrivenbyreal-worlddatamarketbenchmarkverifytheefficiencyofourqueryauctionschema.

Asacommonprocessingmethod,queryiswidelyusedinmanyareas,suchasgraphprocessing,machinelearning,statistics,etc.However,queriesareusuallypricedaccordingtovendor-specifiedfixedviews(API)ornumberoftransactions,whichignorestheheterogeneityofqueries(computingresourceconsumptionforqueryandinformationthattheanswerbrings)andviolatesthemonotoneprinciple.

Inthisworkwestudytherelationalquerypricingproblembytakingbothinformation(i.e.,data)valueandqueryresourceconsumptionsintoaccount.Wedesignefficientauctionsforquerypricing.Differentfromtheexistingquerypricingschemas,queryauctiondeterminesdatapricesthatreflectthedemand-supplyofsharedcomputingresourcesandinformationvalue(i.e.,pricediscovery).Wetargetqueryauctionthatrunsinpolynomialtimeandachievesnear-optimalsocialwelfarewithagoodapproximationratio,whileelicitstruthfulbidsfromconsumers.Towardsthesegoals,weadaptthepostedpricingframeworkingame-theoreticperspectivebycastingthequeryauctiondesignintoanIntegerLinearProgrammingproblem,anddesignaprimal-dualalgorithmtoapproximatetheNP-hardoptimizationproblem.Theoreticalanalysisandempiricalstudiesdrivenbyreal-worlddatamarketbenchmarkverifytheefficiencyofourqueryauctionschema.

BlockGraphChi:EnablingBlockUpdateinOut-of-coreGraphProcessingZhiyuanShao(HuazhongUniversityofScienceandTechnology),ZhenjieMei(HuazhongUniversityofScienceandTechnology),XiaofengDing(HuazhongUniversityofScienceandTechnology),HaiJin(HuazhongUniversityofScienceandTechnology)

Inthepastseveralyears,lotsofout-of-coregraphprocessingsystemsarebuilttoprocessbiggraphdatasetsincomputersystemswithlimitedmainmemory.Duetotheiterativenatureofgraphalgorithms,mostofthesesystemsemploysynchronousexecutionmodeltoorganizethecomputation,i.e.,dividethecomputingintomultiplerounds,eachofwhichcorrespondstooneiterationofthegraphalgorithm.Inordertofullyutilizethediskbandwidth,thesesystemssequentiallyscanthewholegraphdatasetateachiteration.However,asthegraphdatasetunderprocessingmaybehuge,moreiterationsgenerallymeanslargerI/Ooverheads.Althoughasynchronousimplementationofthesynchronousexecutionmodelallowsmessagepassingwithinaniteration,theeffectivenessisstilllimited.Sinceinsuchmodel,atmostonemessageisallowedtobepassedfromonevertextoanother.

Inthispaper,weinvestigatetheideaofblockupdatinginthesynchronousexecutionmodelframeworkintheout-of-coregraphprocessingsystems.Withthisnewmodel,thesystemconductsgraphalgorithmontheloadedsubgraph(i.e.,block)toitslocalconvergence,andthenswitchestoothersubgraphstocontinuethisprocess,untiltheglobalconvergenceisreached.WeimplementthisnewmodelinGraphChi(theresultsystemiscalledBlockGraphChi),andproposeagraphpartitionmethod,namedasDMLP,tocooperatewiththisnewmodel.Bythisstudy,wefoundthatcomparedwiththeoriginalexecutionmodelofGraphChi:1)thenewmodelcangenerallyreducetheamountofiterations(andthustheI/Ooverheads)forgraphalgorithms,whiletheextentofreductiondependsonthemethodofgraphpartitioningandthepropertiesofthealgorithms;2)thenewmodelcandramaticallyreducetheoverallexecutiontimeofgraphtraversalalgorithms(byupto31.4x),andbetterpartitioningmethodleadstobetterperformance;3)thenewmodelhasmuchsmallereffectivenessonimprovingtheoverallperformanceoffix-pointalgorithms,suchasPageRank,duetotheincreasedcomputationaloverhead.

IncrementalParallelComputingusingTransactionalModelinLarge-scaleDynamicGraphStructuresAnandTripathi(UniversityofMinnesota,Minneapolis),RahulR.Sharma(UniversityofMinnesota),ManuKhandelwal(UniversityofMinnesota),TanmayMehta(UniversityofMinnesota),VarunPandey(UniversityofMinnesota)

Manygraphanalyticsproblemsbenefitfromtheuseofparallelcomputingtechniquestoreducetheexecutiontime,whichcanstillbequitehighforlargegraphproblems.Thegoalofourworkistoeliminatetheneedofre-executingananalyticsprogramwhenthegraphstructureismodifiedwithasmallsetofupdatesaftertheinitialexecutionoftheprogram.Towardsthisgoal,wepresentheretheresultsofourinvestigationofincrementalcomputationtechniquesindynamicgraph

123

structuresusingatransactionalmodelofparallelprogramming.Inthismodel,computationtasksinananalyticsapplicationareexecutedinparallelasserializabletransactions.Thispaperdescribeshowincrementalcomputationtechniquesaresupportedbythismodelfordynamicgraphstructures.Weusetheproblemsoffindingconnected-componentsinagraphandthegraphcoloringproblemtoillustrateourapproachforincrementalcomputations.Usingexperimentalevaluations,weshowthebenefitsofthisapproach.

AgainstSigned-GraphDeanonymizationAttacks:PrivacyProtectionforSocialNetworksJianliangGao(CentralSouthUniversity),YuLiu(CentralSouthUniversity),PingZhong(CentralSouthUniversity),JianxinWang(CentralSouthUniversity)

Socialnetworksareusuallypresentedasgraphs.Butthetopologicalcharacteristicsofgraphscouldbeusedbyattackerstodeanonymizetargetentitiesinsocialnetworks.Existingworksmostlyhaveanassumptionthatattackerknowsonlythetargetentities'neighborhoodgraph.Thisassumptionmightresultinprivacyleakagebecauseoftheignoranceoflinkpropertybetweenentities.Inrealapplications,attackersmightre-identifyentitiesinsocialnetworksbasedonnotonlythelinksbetweenentities,butalsothepropertyoflinks.Inthispaper,wetakethepropertyoflinksintoconsiderationforthefirsttimewhenachieving$k$-anonymityforsocialnetworks,whichmeanstheattackerscannotre-identifyatargetwithconfidencehigherthan$1/k$.Thelinksarecatalogedaspositiveandnegative,whichiscalledsignedgraph.Inthisbackground,weproposea$k$-anonymizationschemetoprotecttheprivacyofkeyentitiesinsocialnetworks.Theproposedschememinimizestheamountofmodificationonoriginalgraphs,whichpreservestheutilityoftheoriginaldata.Extensiveexperimentsonrealdatasetsandsyntheticgraphillustratetheeffectivenessoftheproposedscheme.Theutilityofanonymizednetworksareremainedbydemonstratingwiththeresultsofvertexdegree,betweenness,closenessandtheirKolmogorov-Smirnov(K-S)test.

124

CCN-CPS 2017 Workshop Abstracts

PoliciesGuidingCohesiveInteractionsamongInternetofThingswithCommunicationCloudandSocialNetworksHenryHexmoor(SouthernIllinoisUniversity)

CohesiveinteractionamongInternetofthingnodeswillbenefitfromformationofadhoccommunicationnetworkcloudsforrapidexchangeofinformationthatispertinentfortheirsuccessfulinteraction.Longenduringinteractionsamongsuchnodeswillbenefitfromadhocsociallylinkednetworksforcollaborationonsharedobjectives.Wepresentguidelinesforformingandusingtheseconstructsandpoliciesthatconstrainthemtorequirementsofspecificapplications.

EnhancedSecurityofBuildingAutomationSystemsThroughMicrokernel-BasedControllerPlatformsXiaolongWang(UniversityofSouthFlorida),RichardHabeeb(UniversityofSouthFlorida),XinmingOu(UniversityofSouthFlorida),SiddharthAmaravadi(KansasStateUniversity),JohnHatcliff(KansasStateUniversity),MasaakiMizuno(KansasStateUniversity),MitchellLNeilsen(KansasStateUniversity),RajRajagopalan(Honeywell),SrivatsanVaradarajan(HoneywellAerospaceAdvancedTechnologyLabs)

ABuildingAutomationSystem(BAS)isacomplexdistributedCyber-PhysicalSystemthatcontrolsbuildingfunctionalitiessuchasheating,ventilation,andaircondition-ing(HVAC),lighting,access,emergencycontrol,andsoon.ThereisagrowingopportunityandmotivationforBAStobeintegratedintoenterpriseITnetworkstogetherwithvariousnew""smart""technologiestoimproveoccupantcomfortandreduceenergyconsumption.Thesenewtechnologiescoexistwithlegacyapplications,creatingamixed-criticalityenvironment.Inthisenvironment,assystemsareintegratedintoITnetworks,newattackvectorsareintroduced.Thus,networkednon-criticalapplicationsrunningontheOSplatformmaybecompromised,leavingthecontrolsystemsvulnerable.Theindustryneedsareliablecomputingfoundationthatcanprotectandisolatetheseendangeredcriticalsystemsfromuntrustedapplications.

Thisworkpresentsanovelkernel-basedapproachtosecurecriticalapplications.Ourmethodusesasecurity-enhanced,microkernelarchitecturetoensurethesecurityandsafetypropertiesofBASinapotentiallyhostilecyberenvironment.WecomparethreesystemdesignandimplementationsforasimpleBASscenario:1)usingthemicrokernelMINIX3enhancedwithmandatoryaccesscontrolforinter-processcommunication(IPC),2)usingseL4,aformallyverified,capability-basedmicrokernel,and3)usingLinux,amonolithickernelOS.Weshowthroughexperimentthatwhenthenon-criticalapplicationsarecompromisedinbothMINIX3andseL4,thecriticalprocessesthatimpactthephysicalworldarenotaffected.WhereasinLinux,thecompromisedapplicationscaneasilydisruptthephysicalprocesses,jeopardizingthesafetypropertiesinthephysicalworld.ThisshowsthatmicrokernelsareasuperiorplatformforBASorothersimilarcontrolenvironmentsfromasecuritypointofview,anddemonstratesthroughexamplehowtoleveragethearchitecturetobuildarobustandresilientsystemforBAS.

HighlevelDesignofaHomeAutonomousSystemBasedonCyberPhysicalSystemModelingBasmanAlhafidh(FloridaInstituteofTechnology),WilliamH.Allen(FloridaInstituteofTechnology)

Theprocessusedtobuildanautonomoussmarthomesystemusingcyber-physicalsystems(CPS)principleshasreceivedmuchattentionbyresearchersanddevelopers.However,therearemanychallengesduringthedesignandimplementationofsuchasystem,suchasPortability,Timing,Prediction,andIntegrity.Thispaperpresentsanovelmodelingmethodologyforasmarthomesysteminthescopeofcyber-physicalinterfacethatattemptstoovercometheseissues.Wediscussahigh-leveldesignapproachthatsimulatesthefirstthreelevelsofa5CarchitectureinCPSlayersinasmarthomeenvironment.Adetaileddescriptionofthemodeldesign,architecture,andasoftwareimplementationviaNetLogosimulationprogramwillbepresented.Ourdesignprovidesanexamplefordevelopersonhowtoimplementanecosysteminahomeenvironmentaspartofasmartcities'infrastructurebasedonCPSdesignprinciples.

ACyberPhysicalBuses-and-DronesMobileEdgeInfrastructureforLargeScaleDisasterEmergencyCommunicationsMamtaNarang(AucklandUniversityofTechnology),WilliamLiu(AucklandUniversityofTechnology),JairoAGutierrez(AucklandUniversityofTechnology),LucaChiaraviglio(UniversityofRomeTorVergata)

Immediatelyafteradisaster,thenormaltelecommunicationinfrastructure,includingwiredandwirelessnetworks,isoftenseriouslycompromisedandcannotguaranteeregularcoverageandreliablecommunicationsservices.Thesetemporarily-missingcommunicationscapabilitiesarecrucialtorescuersandaffectedcitizensastherespondersneedtoeffectivelycoordinateandcommunicatetominimizethelossoflivesandproperty.Acyber-physicalsystem(CPS)iscomposedofintegratedcommunication,computationandphysicalobjects,andcyber-physicalvehiclesystems(CPVSs)areanemergingfieldduetotherapidadvancementsonreal-timecomputing,mobilecommunicationsandautonomouscontrolinintelligenttransportsystems.Inthispaper,weproposeacyber-physicalbuses-and-dronesmobiLeedgeinfrastructure(AidLife)fordisasteremergencycommunications,whichaimsatarapidlydeployableresilientsystemcapableofsupportingflexiblecommunicationstoservelarge-scaledisastersituationsbyutilizingtheexistingpublictransportsystem.Inparticularweenvisionaproposalwherepublicbusescanberecruitedtotemporarilyhostportablebasestation(BS)andcomputationunitsaswellaspowerresourcessoastoformabuses-basedmobileedgeinfrastructure,andalsoaccommodatedronestoextendtheircoveragetohard-to-reachareas.OurpreliminaryresultsshowthattheAidLifesystemcanguaranteeagoodcoveragetousers,evenwhenalargenumberofnormalBSsthataredamaged.

APerformanceComparisonofContainersandVirtualMachinesinWorkloadMigrationContextKumarGaurav(VMwareSoftwareIndiaPvtLtd),PavanKarkun(VMwareSoftwareIndiaPvtLTD),Y.C.Tay(NationalUniversityofSingapore)

Thispapergivesamathematicalframeworkfordecisionmakingaroundplacingandmigratingworkloadsinadata-centerwhereapplicationsarepackagedasOScontainersrunningonvirtualmachines.ThedecisionpointonVMmigrationvscontainerkill/restart,VMforkvscontainerspawnarestudiedhere.Weproposeamathematicalmodelforthemigrationofworkloadsaforementionedcasesandalsoforsharedmemorydecayincaseofforkingavirtualmachine.Experimentalresultsareanalyzedtodeterminethevalidityofthemodel.

TowardsService-OrientedMiddlewareforCyberPhysicalSystemsNaderMohamed(MiddlewareTechnologiesLab.),SanjaLazarova-Molnar(UniversityofSouthernDenmark)

Cyber-PhysicalSystems(CPS)providemanysmartfeaturesforenhancingphysicalsystemsandenvironments.Theyaredesignedwithasetofdistributedhardware,software,andnetworkcomponentsthatareembeddedinphysicalsystemsandenvironmentsorattachedtohumans.ManyCPSatdifferentscalesarebeingdevelopedforavarietyofapplicationsthatprovidevaluableinteractionsbetweenthecyberworldandthephysicalsystemsandenvironments.However,thesedevelopmentsfacemanychallengesduetothecomplexityoftheseapplications.Anappropriatemiddlewareisneededtoprovideinfrastructuralsupportandassist

125

thedevelopmentandoperationsofdiverseCPSapplications.Thispaperstudiesutilizingtheservice-orientedmiddlewareapproachforCPSanddiscussestheadvantagesandrequirementsforsuchutilization.Inaddition,itproposesaservice-orientedmiddlewareforCPS,calledCPSWare.ThismiddlewareviewsallCPScomponentsasasetofservicesandprovidesaninfrastructuretodevelopandoperateCPSapplications.ThisapproachprovidessystemicsolutionsforsolvingmanycomputingandnetworkingissuesinCPS.ItalsoenablestheintegrationofCPSwithothersystemssuchasCloudComputingandFogComputing.Inaddition,asCPScanbedevelopedforvariousapplicationsatdifferentscales,thispaperprovidesaclassificationforCPSapplicationsanddiscusseshowCPSWarecaneffectivelydealwiththesecategories.

NetworkingandCommunicationinCyberPhysicalSystemsImadJawhar(UAEUniversity),JameelaAl-Jaroodi(RobertMorrisUniversity)

Cyber-physicalsystems(CPSs)areemergingasanewtechnology,whichisusedtoprovideseamlessinteractionbetweenthephysicalandcyberworlds.Thisnovelparadigmisanaturalevolutionandextensionofwirelesssensornetworks(WSNs)andcontrolmodelstoallowforeffectivemonitoringandcontrolofphysicalsystemsfromthecomputingenvironment.Inordertosupportthisinterfaceandallowsuchsmoothinteractions,efficientnetworkingandcommunicationbetweenthephysicalandcyberworldstakeaveryimportantandcriticalrole.Inthispaper,weidentifythevariousapplicationsandcategoriesofCPSsystems,andcharacterizetheassociateddatatrafficthatisgenerated.Wealsodiscussthedifferentprotocolsandrequirementsthatareneededatthevariousnetworkinglayersfortheseapplications.Subsequently,weidentifyimportantparameterssuchasbandwidth,delay,reliability,security,andmobility,whichareessentialinordertoallowforeffectiveandrobustoperationofthevariousCPSsystems.

OptimalDeploymentofChargingStationsforElectricVehicles:AFormalApproachAmarjitDatta(TennesseeTechnologicalUniversity),BrianLedbetter(TennesseeTechnologicalUniversity),MohammadAshiqurRahman(TennesseeTechnologicalUniversity)

Electricvehicles(EVs)areafascinatinginnovationofthemodernautomobileindustry.Duetotheirattractivefeaturesandagrowingworldwideenvironmentalawareness,thenumberofEVpurchasesisgrowingatanincreasingratedaybyday.AsthepriceofEVsisexpectedtodropinthenearfuture,alargenumberofnewEVswillhittheroadconsequently.However,ourcurrentinfrastructureisnotcapableofsupportingthisgrowingnumberofEVs.Weneedmorechargingstations,placedoptimallyacrossanarea,eachequippedwithmultiplechargingoutletstochargetheincomingEVsinareasonableamountoftime.Inthispaper,wepresentaformalframeworktooptimallydeploychargingstationsforEVsinagivenarea.TheframeworkdesignsthisverificationasanoptimizationproblemwherethegoalistooptimallyplacethechargingstationswithasufficientnumberofchargingoutletstoserveallEVsinagivenareawhilesatisfyingthelimitedbudgetandothersystemconstraints.Weevaluatetheproposedframeworkforitsanalysiscapabilityaswellasitsscalabilitybyexecutingexperimentsondifferentsynthetictestcases.

FormalVerificationofControlStrategiesforaCyberPhysicalSystemAmjadGawanmeh(KhalifaUniversityofScienceandTechnology),AliAlwadi(AucklandUniversityofTechnology),SaziaParvin(UniversityofNewSouthWales)

CyberPhysicalSystems(CPS)useemergingcomputing,communication,andcontrolmethodstomonitorandcontrolgeographicallydispersedcriticalsystemcomponentstoallowahighlevelofconfidenceabouttheiroperation.Simulationmethodsarefrequentlyusedintestingsuchcriticalsystemcomponents,however,itmightnotbeadequatetoshowtheabsenceoferrorsgiventhecomplexityofthesystemcomponentsundertest.Failureindetectingerrorsinsafetycriticalsystemscanleadtoacatastrophicsituation.Inthispaperweproposeanapproach,basedonsimulationandformalanalysis,forthereliabilityanalysisofCPS.WeillustratethisapproachonanindustrialcasestudythatdemonstratesseveralchallengingfeaturesinthedesignandimplementationofCPS.Experimentalresultsobtainedshowthattheproposedapproachisefficientlyusedinordertotestandverifythefourtanksprocesssystem,wheresimulationresultsshowthevalidityofapproximationandabstractionofthesystem,andformalanalysisisusedtovalidatethatseveraldesignrequirementsweresatisfiedinthecontrolstrategiesproposed.

LightweightDetectionandIsolationofBlackHoleAttacksinConnectedVehiclesSamiAlbouq(OaklandUniversity),ErikFredericks(OaklandUniversity)

ConnectedVehicles(CVs)canbeexposedtoblackholeattacksthatdeceivelegitimatenodesbyfalsifyinganattractiveroutetoadestinationnode.Thisoccurswhenanattackersendsapackettothesourcenodeconfirmingtheexistenceofafreshroute.Inthispaper,weproposeaBlackHoleDetectionProtocol(BlackDP)thatworksonahighwaydividedintoclustersandmonitoredbyRoadSideUnits(RSUs)todetectbothsingleandcooperativeblackholeattacks.EveryRSUistaskedwithperformingbothdetectionandisolationofblackholeattacksfortheirrespectivehighwaysectionafterauthenticationviolationsandsuspiciousrouteestablishmentactivitiesthathavebeenreportedbyalegitimatenode.ThedesigngoalofBlackDPistodecouplethedetectionprocessfrommobilenodesandconstructatrustedsemi-centricdetectionprocessthatcancollectneededinformationforlightweightdetectionandreliableisolationofmaliciousnodes.WevalidateBlackDPinasimulatedhighwayenvironmenttodemonstrateitseffectiveness.

AnewthreatassessmentmethodforintegratinganIoTinfrastructureinaninformationsystemBrunoDorsemaine(OrangeLabs),Jean-PhilippeGaulier(OrangeLabs),Jean-PhilippeWary(OrangeLabs),NizarKheir(Thales),PascalUrien(TelecomParisTech)

Inthispaper,weproposeanewapproachtomanagethethreatsbroughtbyanIoTinfrastructuretoaninformationsystem(IS).WefirstgiveastateofartforinformationsecuritypropertiesinIoTandISbasedonstandardssuchasISO16982andISO27005andapreviouslypublishedtaxonomy.Thenwedetailaninnovativemethod,basedontheevaluationofthreatsbroughtbyanIoTinfrastructureontoanIS.ItisrepresentedasaqualitativematrixbetweenIoTinfrastructurethreatsandtheSecuritypropertiesoftheIS.Themethodisthenappliedtotheusecaseofconnectedlightbulbs.Thankstothisapproach,itispossibletologicallyorganizethreatmanagementwhileintegratinganIoTinfrastructureintoanIS.

ASecurityFrameworkforSDN-enabledSmartPowerGridsUttamGhosh(TennesseeStateUniversity),PushpitaChatterjee(SRMRESEARCHINSTITUTE),SachinShetty(OldDominionUniversity)

Emergingsoftwaredefinednetworking(SDN)paradigmprovidesflexibilityincontrolling,managing,anddynamicallyreconfiguringsmartgridnetworks.ItcanbeseenintheliteraturethatconsiderablylessattentionhasbeengiventoprovidesecurityinSDN-enabledsmartgridnetworks.Mostoftheeffortsfocusonprotecting

126

smartgridnetworksagainstvariousformsofoutsiderattacksonlybyprovidingconsistentaccesscontrol,applyingefficientandeffectivesecuritypolicies,andmanagingandcontrollingthenetworkthroughtheuseofacentralizedSDNcontroller.Furthermore,centralizedSDNcontrollersareplaguedbyreliabilityandsecurityissues.ThispaperpresentsaframeworkwithmultipleSDNcontrollersandsecuritycontrollersthatprovidesasecureandrobustsmartgridarchitecture.TheproposedframeworkdeploysalocalIDSinasubstationtocollectthemeasurementdataperiodicallyandtomonitorthecontrol-commandsthatareexecutedonSCADAslaves.AglobalIDSincontrolcentercollectsthemeasurementdatafromthesubstationsandestimatesthestateofthesmartgridsystembyutilizingthetheoryofdifferentialevolution.TheglobalIDSfurtherverifiestheconsequencesofcontrol-commandsissuedbySDNcontrollerandSCADAmaster.Analarmisgeneratedupondetectionofanattackerorunsteadystateofthesmartgridsystem.Theframeworkalsodeployslight-weightidentitybasedcryptographytoprotectthesmartgridnetworkfromoutsideattacks.PerformancecomparisonandinitialsimulationresulthavebeenpresentedtoshowthattheproposedframeworkiseffectiveascomparedtoexistingsecurityframeworksforSDN-enabledsmartgrids.

Real-timeMonitoringSteamGeneratorsusingaHybridImagingSystemMahmoudMeribout(PetroleumInstitute),ImranSaied(PetroleumInstitute),EsraAlHosani(AdcoGroup)

Thispaperpresentsahybriddeviceforreal-timemeasurementandimagingofsolidandliquidcontaminantsthatmayoccurinsteamgenerators.ThedeviceusesadedicatedNearInfra-Reddevicetodeterminethetypeofcontaminants(i.e.waterdropletsandironoxideparticles)andaTHzimagingsystemwhichmeasurestheamountofcontaminantsaswellasitsflowrate.TheNIRdevicecanalsodeterminetheconcentrationofcontaminantsatsub-mgaccuracywhenitsvalueisrelativelylowusingspectrometrytechniquecombinedwithprincipalcomponentanalysis(PCA).Threeprincipalcomponents(PC1,PC2,andPC3)wereenoughforthispurpose.ThePCAclassificationwasperformedusingtheleastsquaresupportvectormachine(LS-SVM)method.Incaseofrelativelyhighconcentration,theTHzimagingsystemwhichusesblock-basedmotionestimationalgorithmcandeterminethevelocityofindividualcontaminantparticlestocomputetheglobalmotionvector,theintensityanddirectionofwhichrepresentstheoverallflowrateandflowregimeofthecontaminants.TheusageofimageprocessingtechniquestogetherwithNIRspectrometryconstitutesanewpromisingstepinflowmetering.ThisisdemonstratedbytheextensiveexperimentswhichhavebeenconductedfordifferentscenariowheretheNIRsubsystemsystemcoulddeterminetheconcentrationofwaterdropletsandsolidcontaminantswithamaximumuncertaintyof+/-1.45%and+/-1.16%respectively.WiththeNIRsubsystem,pixel-levelaccuracyofmotionvectorwasachieved,whiletheconcentrationofsolidcontaminantsshowedconsistedproportionalitywiththeaveragepixelintensity.

SecuringbigDataEfficientlythroughMicroaggregationTechniqueandHuffmanCompressionShakilaMahjabinTonni(BangladeshArmyInternationalUniversityofScienceandTechnology),MohammadZahidurRahman(JahangirnagarUniversity),SaziaParvin(UniversityofNewSouthWales),AmjadGawanmeh(KhalifaUniversityofScienceandTechnology)

Cyber-PhysicalSystems(CPS)requiresbigdatacommunicationsaswellasintegrationfromseveraldistributedsources.Thisdatacanusuallybeinterconnectedwithphysicalapplications,suchaspowergridsorSCADAsystems.Inaddition,itcanbepubliclyaccessibleforusingbythirdpartyusersordatascientists.Therefore,itbecomesimperativetoensurethatthisbigdataiswellsecured.Microaggregationisanwidelyusedtechniquetoprotectadatasetthroughanonymityinordertopreventexposureofaperson'sidentity.Thisdatadisclosuremayalsoresultfromanunpredicteddatalinkagewithanotherdataset.As,mostofthesesurveydatasetsstorerecordsusingnumericalvalues,manyofthemicroaggregationtechniquesaredevelopedandtestedonnumericaldata.Thesealgorithmsarenotsuitableforthosedatawherebothnumericalandcategoricaldataarestored.Inthispaperwe'reproposingamicroaggregationtechniqueinordertoprovidedataanonymityregardlessofitstype.TherecordsareclusteredintoseveralgroupsusinganevolutionaryattributegroupingalgorithmandeachgrouprecordsarethenmicroaggregatedapplyingHuffmandatacompressionalgorithm.

ModelBasedEnergyConsumptionAnalysisofWirelessCyberPhysicalSystemsJingLiu(PekingUniversity),PingWang(PekingUniversity),JinlongLin(PekingUniversity),Chao-HsienChu(PennsylvanniaStateUniversity)

Wirelessmeshnetworksbegintobeusedasaninfrastructureofcyber-physicalsystems.Acriticalissueindevelopingwirelesscyberphysicalsystems(WCPSs)isthelimitedamountofenergyavailableinthenodes.Energyconsumptionanalysiscanhelpdesignertoconductapower-awaredesignprocess.Inthispaper,weproposeamodelbasedenergyconsumptionanalysisframeworkatarchitecturelevelforWCPSs.Weextracteventchainsfromthearchitecturemodel,withtheenergyconsumptionmodelforprocessingeachtypeofevent,wecanestimatetheenergyconsumptionforeachcontrolloopandeachnode,aswellastheoverallenergyconsumption.AlltheseenergyconsumptionindexescanhelpustodesignaperformanceandenergyconsumptionbalancedWCPS.

127

HotPOST 2017 Workshop Abstracts

Router-basedBrokeringforSurrogateDiscoveryinEdgeComputingJulienGedeon(TechnischeUniversitätDarmstadt),ChristianMeurisch(TechnischeUniversitätDarmstadt),DishaBhat(TechnischeUniversitätDarmstadt),MichaelStein(TechnischeUniversitätDarmstadt),LinWang(TechnischeUniversitätDarmstadt),MaxMühlhäuser(TechnischeUniversitätDarmstadt)

In-networkprocessingpushescomputationalcapabilitiesclosertotheedgeofthenetwork,enablingnewkindsoflocation-aware,real-timeapplications,whilepreservingbandwidthinthecorenetwork.Thisisdonebyoffloadingcomputationstomorepowerfulorenergy-efficientsurrogatesthatareopportunisticallyavailableatthenetworkedge.Inmobileandheterogeneoususagecontexts,thequestionariseshowaclientcandiscoverthemostappropriatesurrogateinthenetworkforoffloadingatask.Inthispaper,weproposeabrokeringmechanismthatmatchesaclientwiththebestavailablesurrogate,basedonspecifiedrequirementsandcapabilities.Thebrokerisimplementedonstandardhomerouters,andthus,leveragestheubiquityofsuchdevicesinurbanenvironments.Tomotivatethefeasibilityofthisapproach,weconductacoverageanalysisbasedoncollectedaccesspointlocationsinamajorcity.Furthermore,thebrokeringfunctionalityintroducesonlyaminimalresourceoverheadontheroutersandcansignificantlyreducethelatencycomparedtodistant,cloud-basedsolutions.

ModelingtheSpreadofInfluenceforIndependentCascadeDiffusionProcessinSocialNetworksZeshengChen(IndianaUniversity-PurdueUniversityFortWayne),KurtisTaylor(IndianaUniversity-PurdueUniversityFortWayne)

Modelingthespreadofinfluenceinonlinesocialnetworksisimportantforpredictingtheinfluenceofindividualsandbetterunderstandingmanyscenariosinsocialnetworks,suchastheinfluencemaximizationproblem.Thepreviousworkonmodelingthespreadofinfluencemakestheassumptionthatthestatusesofnodesinanetworkareindependentofeachother,whichisapparentlynotcorrectforsocialnetworks.Thegoalofthisworkistoderiveanaccuratemathematicalmodeltocharacterizethespreadofinfluencefortheindependentcascadediffusionprocessinonlinesocialnetworks.Specifically,weapplythesusceptible-infected-recoveredepidemicmodelfromepidemiologytocharacterizetheindependentcascadediffusionprocessandderiveageneralmathematicalframework.Toapproximatethecomplexspatialdependenceamongnodesinanetwork,weproposeaMarkovmodeltopredictthespreadofinfluence.Throughtheextensivesimulationstudyoverseveralgeneratedtopologiesandarealcoauthorshipnetwork,weshowthatourdesignedMarkovmodelhasmuchbetterperformancethantheexistingindependentmodelinpredictingtheinfluenceofindividualsinonlinesocialnetworks.

ThankYouForBeingAFriend:AnAttackerViewonOnline-Social-Network-basedSybilDefensesDavidKoll(UniversityofGoettingen),MartinSchwarzmaier(UniversityofGoettingen),JunLi(UniversityofOregon),Xiang-YangLi(UniversityofScienceandTechnologyofChina),XiaomingFu(UniversityofGoettingen)

OnlineSocialNetworks(OSNs)havebecomearewardingtargetforattackers.OneparticularlypopularattackistheSybilattack,inwhichtheadversarycreatesmanyfakeaccountscalledSybilsinorderto,forinstance,distributespamormanipulatevotingresults.AfirstgenerationofdefensesystemstriedtodetecttheseSybilsbyanalyzingchangesinthestructureoftheOSNgraph---unfortunatelywithlimitedsuccess.Basedontheseeffortsasecondgenerationofsolutionsenrichesthegraph-structuralapproacheswithhigher-leveluserfeaturesinordertodetectSybilnodesmoreefficiently.Inthisworkweprovideanin-depthanalysisofthesedefenses.Wedescribetheircommondesignandworkingprinciples,analyzetheirvulnerabilities,anddesignsimpleyeteffectiveattackstrategiesthatanadversarycouldlaunchtocircumventthesesystems.InourevaluationwerevealthatanmiscreantcanexploitthecredulityofOSNusersandfollowatargetedattackstrategytosuccessfullyavoiddetectionbyallexistingapproaches.

EfficientDynamicServiceFunctionChainCombinationofNetworkFunctionVirtualizationWenkeYan(BeijingUniversityofPostsandTelecommunications),KonglinZhu(BeijingUniversityofPostsandTelecommunications),LinZhang(BeijingUniversityofPostsandTelecommunications),SixiSu(BeijingUniversityofPostsandTelecommunications)

NetworkFunctionVirtualization(NFV)andSoftwareDefinedNetwork(SDN)arerecentlyintroducedtoprovidethevirtualizationtechnologyfortacklingthedeploymentofnetworkservicefunctionsincorporatenetworks,broadbandaccessnetworks,andmorerecentlyindatacenters.Howtoenhancetheflexibility,efficiencyandeffectiveofservicefunctiondeploymentisfullofchallenge.AlthoughServiceFunctionChain(SFC)iscarriedouttosupporttheflexibilityofnetworkservices,itstillneedsonestepforwardtofulfilltheefficientandeffectivecombinationofnetworkservices.Inthispaper,weproposeanorthogonalcrossoverdifferentialevolution(OXDE)tooptimizeSFCcombinationwithrespecttoprocessingdelay,energyconsumption,andpacketlossrate.TheevaluationresultsshowthattheproposedOXDEalgorithmoutperformstheotheralgorithmsanditcanachievetheefficiencyandeffectivenessofSFCcombination.

WhenAugmentedRealitymeetsBigDataCarlosBermejo(TheHongKongUniversityofScienceandTechnology),ZhanpengHuang(TheHongKongUniversityofScienceandTechnology),TristanBraud(TheHongKongUniversityofScienceandTechnology),PanHui(TheHongKongUniversityofScienceandTechnology)

Weliveinanerawhereweareoverloadedwithdata,andthiscanbethekeyforgainingrichinsightsaboutourworld.Augmentedreality(AR)enablesusthepossibilitytovisualiseandanalysethegrowingtorrentofdatainainteractive,usablecanvas.Wecandisplaycomplexdatastructuresinsimplerandmoreunderstandablewaysthatwasnotpossiblebefore.BigDataisanewparadigmresultsfromthemyriaddatasourcessuchastransactions,Internet,socialnetworks,healthcaredevicesandsensornetworks.ARandbigdatahavealogicalmaturitythatinevitablywillconverge.ThetreadofharnessingARandbigdatatobreednewinterestingapplicationsisstartingtohaveatangiblepresence.Inthispaper,weexplorethepotentialtocapturevaluefromthemarriagebetweenARandbigdatatechnologies,followingwithseveralchallengesthatmustbeaddressedtofullyrealizethispotential.

SamplingBasedEfficientAlgorithmtoEstimatetheSpectralRadiusofLargeGraphsSamarAbbas(LahoreUniversityofManagementSciences),JuvariaTariq(LahoreUniversityofManagementSciences),ArifZaman(LahoreUniversityofManagementSciences),ImdadullahKhan(LahoreUniversityofManagementSciences)

Evaluatinganextremelyusefulgraphproperty,thespectralradius(largestabsoluteeigenvalueofthegraphadjacencymatrix),forlargegraphsrequiresexcessivecomputingresources.Thisproblembecomesespeciallychallenging,forinstancewithdistributedorremotestorage,whenaccessingthewholegraphitselfisexpensiveintermsofmemoryorbandwidth.Oneapproachtotacklethischallengeistoestimatethespectralradiusofthegraphwhilereadingonlyasmallportion

128

ofthegraph.Inthispaperwepresentasamplingapproachtoestimatethespectralradiusoflargegraphs.Wedefineascoreforverticesthati)ismoreofacombinatorialnatureandiseasiertocomputeandii)hassolidtheoreticaljustificationshence,itcloselyapproximateavertex'scontributiontothelargesteigenvalueofthegraph.Usingthisscore,wemodelthesamplingproblemasabudgetedoptimizationproblemanddesignagreedyalgorithmtoselectasubgraphwhosespectralradiusapproachesthatofthewholegraph.Weprovideanalyticalboundoncomputationalcomplexityofouralgorithm.Wedemonstrateeffectivenessofouralgorithmonvarioussyntheticandreal-worldgraphsandshowthatouralgorithmalsoempiricallyoutperformsknowntechniques.Furthermore,wecomparethequalityofourresultstoestimatesobtainedfromwellknownupperandlowerboundsknowninthespectralgraphtheoryliterature.

ExtemporaneousMicro-MobileServiceExecutionWithoutCodeSharingZhengSong(VirginiaTech),MinhLe(UtahStateUniversity),Young-WooKwon(UtahStateUniversity),EliTilevich(VirginiaTech)

Inmobileedgecomputing,amobileorIoTdevicerequestsanearbydevicetoexecutesomefunctionalityandreturnbacktheresults.However,theexecutablecodemusteitherbepre-installedonthenearbydeviceorbetransferredfromtherequesterdevice,reducingtheutilityorsafetyofdevice-to-devicecomputing,respectively.Toaddressthisproblem,wepresentamicro-servicemiddlewarethatexecutesservicesonnearbymobiledevices,withatrustedmiddlemandistributingexecutablecode.Oursolutioncomprises(1)atrustedstoreofvettedmobileservices,self-containedexecutablemodules,downloadedtodevicesandinvokedatruntime;and(2)amiddlewaresystemthatmatchesservicerequirementstoavailabledevicestoorchestratethedevice-to-devicecommunication.Ourexperimentsshowthatoursolution(1)enablesexecutingmobileservicesonnearbydevices,withoutrequiringadevicetoreceiveexecutablecodefromanuntrustedparty;(2)supportsmobileedgecomputinginpracticalsettings,increasingperformanceanddecreasingenergyconsumption;(3)reducesthemobiledevelopmentworkloadbyreusingservices.

PreventingColludingIdentityCloneAttacksinOnlineSocialNetworksGeorgesA.Kamhoua(FloridaInternationalUniversity),NikiPissinou(FloridaInternationalUniversity),S.S.Iyengar(FloridaInternationalUniversity),JonathanBeltran(FloridaInternationalUniversity),CharlesKamhoua(AirForceResearchLaboratory),BrandonLHernandez(UTRGV),LaurentNjilla(AirForceResearchLaboratory)

Nowadays,OnlineSocialNetworks(OSNs)becomeoneofthemostcommonwayamongstpeopletofacilitatecommunication,thishasmadeitatargetforattackerstostealinformationfrominfluentialusers.ThishasbroughtnewformsofcustomizedattacksforOSNs.AttackerstakeadvantageoftheusertrustworthinesswhenusingOSN.Thisexploitationleadstoattackswithacombinationofbothclassicalandmodernthreats.Specifically,colludingattackershavebeentakenadvantageofmanyOSNsbycreatingfakeprofilesoffriendsofthetargetinthesameOSNorothers.Colludersimpersonatetheirvictimsandaskfriendrequeststothetargetintheaimtoinfiltrateherprivatecircletostealinformation.ThistypeofattacksaredifficulttodetectinOSNsbecausemultiplemalicioususersmayhaveasimilarpurposetogaininformationfromtheirtargeteduser.Inthispaper,toovercomethistypeofattack,wefirstaddresstheproblemofmatchinguserprofilesacrossmultipleOSNs,second,byusingbothtextualandfeaturesextractedfromuserprofileandbasedonsupervisedlearningtechniques,webuildaclassifier.Simulationandexperimentalresultsareprovidedtovalidatetheaccuracyofourfindings.

129

IoTCA 2017 Workshop Abstracts

TowardsPrivacy-AwareSmartBuildings:Capturing,Communicating,andEnforcingPrivacyPoliciesandPreferencesPrimalPappachan(UniversityofCaliforniaIrvine),MartinDegelingy(CarnegieMellonUniversity),RobertoYus(UniversityofCaliforniaIrvine),AnupamDasy(CarnegieMellonUniversity),SrutiBhagavatulay(CarnegieMellonUniversity),WilliamMelichery(CarnegieMellonUniversity),PardisEmamiNaeiniy(CarnegieMellonUniversity),ShikunZhangy(CarnegieMellonUniversity),LujoBauery(CarnegieMellonUniversity),AlfredKobsa(UniversityofCaliforniaIrvine),SharadMehrotra(UniversityofCaliforniaIrvine),NormanSadeh(CarnegieMellonUniversity),NaliniVenkatasubramanian(UniversityofCaliforniaIrvine)

TheInternetofThings(IoT)ischangingthewayweinteractwithoursurroundingenvironmentindomainsasdiverseashealth,transportation,officebuildingsorourhomes.Insmartbuildingenvironments,informationcapturedaboutabuilding’sinfrastructureanditsinhabitantswillhelpdevelopservicesthatcanhelpusbecomemoreproductive,increaseourcomfort,enhanceoursocialinteractions,increasesafety,saveenergyandmore.Butbyrelyingonthecollectionandsharingofinformationaboutabuilding’sinhabitantsandtheiractivities,theseservicesalsoopenthedoortoprivacyrisks.Inthispaper,weintroduceaframeworkwhereIoTAssistantscaptureandmanagetheprivacypreferencesoftheirusersandcommunicatethemtoprivacy-awaresmartbuildings,whichenforcethemwhencollectinguserdataorsharingitwithbuildingservices.Weoutlineelementsofaninfrastructurenecessarytosupportsuchinteractionsandalsodiscussimportantprivacypolicyattributesthatneedtobecaptured.Thisincludeslookingatattributesnecessarytodescribe–(1)thedatacollectionandsharingpracticesassociatedwithdeployedsensorsandservicesinsmartbuildingsaswellas(2)theprivacypreferencesweneedtocapturetohelpusersmanagetheirprivacyinsuchenvironments.

DeployingData-DrivenSecuritySolutionsonResource-ConstrainedWearableIoTSystemHangCai(WorcesterPolytechnicInstitute),TianlongYun(WorcesterPolytechnicInstitute),JosiahHester(DartmouthCollege),KrishnaK.Venkatasubramanian(ClemsonUniversity)

WearableInternet-of-Things(WIoT)environmentshavedemonstratedgreatpotentialinabroadrangeofapplicationsinhealthcareandwell-being.SecurityisessentialforWIoTenvironments.LackofsecurityinWIoTsnotonlyharmsuserprivacy,butmayalsoharmtheuser’ssafety.ThoughdevicesintheWIoTcanbeattackedinmanyways,inthispaperwefocusonadversarieswhomountwhatwecallsensorhijackingattacks,whichpreventtheconstituentmedicaldevicesfromaccuratelycollectingandreportingtheuser’shealthstate(e.g.,reportingoldorwrongphysiologicalmeasurements).Inthispaperweoutlinesomeofourexperiencesinimplementingadatadrivensecuritysolutionfordetectingsensor-hijackingattackonasecurewearableinternet-of-things(WIoT)basestationcalledtheAmulet.Giventhelimitedcapabilities(computation,memory,batterypower)oftheAmuletplatform,implementingsuchasecuritysolutionisquitechallengingandpresentsseveraltradeoffswithrespecttoresourcesrequirements.WeconcludethepaperwithalistofinsightsintowhatcapabilitiesconstrainedWIoTplatformsshouldprovidedeveloperssoastomaketheinclusionofdata-drivensecurityprimitivesonsuchsystemseasy.

AMotifbasedIoTFrameworkforDataEfficiencyAkashSahoo(TexasA&MUniversity),RabiMahapatra(TexasA&MUniversity)

InternetofThings(IoT)hasallowedembeddeddevicestoconnecttothevastInternetnetworkworldwide.WithbillionsofIoTdeviceswaitingtobeconnected,itisnecessarytobuildefficientinfrastructuretohandlelargeamountofdataforefficientstorageandnetworktraffic.TheamountofdatacreatedattheIoTedgesisregardedasonethebiggestchallengesofIoT.Thispaperproposesamotif-basedencodingschemeforIoTframeworkthathelpstoreducedatageneratedbysensorsatedgenodes.Thissimpleencodingfeatureresidesinboththeserverandtheenddeviceslikeinserver-clientmodel.Ourexperimentsdemonstratedtheschemesbenefitsbyusingslowandfastbaudratesensorssuchastemperatureandaccelerometerrespectivelyasthecasestudies.Theresultsobtainedshowtheproposedmotifbasedframeworkreducesthedataredundancyuptotwoordersofmagnitudewhileretainingmorethan80%accuracytowardsmotifrecognition.

CoTWare:ACloudofThingsMiddlewareJameelaAl-Jaroodi(RobertMorrisUniversity),NaderMohamed(MiddlewareTechnologiesLab.),ImadJawhar(MidcompResearchCenter)

Therearemanyapplicationsthatrequireintegratingalargenumberofphysicalobjectsanddevicesinalarge-scaleInternetofThings(IoT)networks.Someexamplesoftheseapplicationsaresmartgrids,smartwaternetworks,andintelligenttransportationsystems.Theseapplicationsneedreal-timecontrols,powerfulandscalabledatastorageandprocessingcapabilities,andadvanceddataanalyticsmechanisms.OneofthepromisingtechnologiestosupportsuchapplicationsistheCloudofThings(CoT).CoTcanprovideaplatformforlinkinganIoTwithCloudComputing(CC).AnothertechnologythatcanbeutilizedforenhancingIoTapplicationsisFogComputing,whichextendsthetraditionalCloudComputingparadigmtotheedgeofthenetworktoenablebettersupportforoperatingenhancedservices.However,properintegrationandefficientutilizationofCoTandFogComputingforlarge-scaleIoTapplicationsisnotaneasytask.Thispaperproposesaservice-orientedmiddleware,calledCoTWare,tofacilitateeffectiveintegrationandutilizationofCoTandFogComputingforlarge-scaleIoTapplications.

SecuringtheInternetofThings:AMeta-StudyofChallenges,Approaches,andOpenProblemsMahmudHossain(UniversityofAlabamaatBirmingham),RagibHasan(UniversityofAlabamaatBirmingham),AnthonySkjellum(AuburnUniversity)

TheInternetofThings(IoT)isbecomingakeyinfrastructureforthedevelopmentofsmartecosystems.However,theincreaseddeploymentofIoTdeviceswithpoorsecurityhasalreadyrenderedthemincreasinglyvulnerabletocyberattacks.Insomecases,theycanbeusedasatoolforcommittingseriouscrimes.AlthoughsomeresearchershavealreadyexploredsuchissuesintheIoTdomainandprovidedsolutionsforthem,thereremainstheneedforathoroughanalysisofthechallenges,solutions,andopenproblemsinthisdomain.Inthispaper,weconsiderthisresearchgapandprovideasystematicanalysisofsecurityissuesofIoT-basedsystems.Then,wediscusscertainexistingresearchprojectstoresolvethesecurityissues.Finally,wehighlightasetofopenproblemsandprovideadetaileddescriptionforeach.WepositthatoursystematicapproachforunderstandingthenatureandchallengesinIoTsecuritywillmotivateresearcherstoaddressingandsolvingtheseproblems.IndexTerms—InternetofThings;SecurityIssue;AttackSur-face;AttackTaxonomy;IoTForensics.

InternetofThingsFrameworkforSmartLearningAnalyticsAliYavari(SwinburneUniversityofTechnology),RezaSoltanpoor(RMITUniversity)

130

LearningAnalytics(LA)hasbecomeaprominentparadigminthecontextofeducationlatelywhichadoptstherecentadvancementsoftechnologysuchascloudcomputing,bigdataprocessing,andInternetofThings.LAalsorequiresanintensiveamountofprocessingresourcetogeneraterelevantanalyticalresults.However,thetraditionalapproacheshavebeeninefficienttotackleLAchallengessuchasreal-time,highper-formance,andscalableprocessingofheterogeneousdatasetsandstreamingdata.AnInternetofThings(IoT)scalable,distributedandhighperformanceframeworkhasthepotentialtoaddressmentionedLAchallengesbyefficientcontextualizationofdata.Inthispaper,SmartLearningAnalyticsconceptualmodelisproposedtoimprovetheeffectivenessofLAbyutilizinganIoT-basedplatformintermsofperformance,scalability,andefficiency.

131

JCC 2017 Workshop Abstracts

HeterogeneousMalwareSpreadProcessinStarNetworkLiboJiao(TsinghuaUniversity),HaoYin(TsinghuaUniversity),DongchaoGuo(TsinghuaUniversity),YongqiangLyu(TsinghuaUniversity)

TheheterogeneousSISmodelforvirusspreadinanyfinitesizegraphcharacterizestheinfluenceoffactorsofSISmodelandcouldbeanalyzedbytheextendedN-Intertwinedmodelintroducedin[1].Wespecificallyfocusontheheterogeneousvirusspreadinthestarnetworkinthispaper.Theepidemicthresholdandtheaveragemeta-stablestatefractionofinfectednodesarederivedforvirusspreadinthestarnetwork.OurresultsillustratetheeffectofthefactorsofSISmodelonthesteadystateinfection.

CostReductioninHybridCloudsforEnterpriseComputingBiyuZhou(InstituteofComputingTechnology,ChineseAcademyofSciences),FaZhang(InstituteofComputingTechnology,ChineseAcademyofSciences),JieWu(TempleUniversity),ZhiyongLiu(InstituteofComputingTechnology,ChineseAcademyofSciences)

Hybridcloud-baseddeploymentisatrendincloudcomputingwhichenablesenterprisetobenefitfromcloudinfrastructureswhilehonoringprivacyrestrictionsonsomeservices.Enterpriseapplicationmigrationisaneffectivewaytoimprovetheefficiencyofusingthecloudinfrastructures.However,itisachallengingproblemtodecidewhichpartsoftheapplicationstomigrateandwheretomigrate.Inthispaper,wefocusontheproblemofplanningthemigrationofenterpriseapplicationsinhybridcloudinfrastructures.Unlikepreviousstudies,weconsiderageneralhybridcloudarchitecturethatinvolvesmultiplepubliccloudsratherthanonlyone.Ouraimistomaximizetheenterprisecostreductionundertheconstraintofuserexperienceintermsofresponsetime.Wefirstformulatethepplicationmigrationproblemasanoptimizationproblem.AwareofitsNP-hardness,wedesignanefficientmigrationframeworktoapproximatetheoptimumforalargeproblemsize.First,weleveragetheapplicationcharacteristictoreducethescaleoftheproblembydividingitintomultiplesmallersubproblems.Then,anefficientalgorithmbasedondynamicprogrammingisproposedtosolvethesmallscalesubproblems.Finally,weconstructafeasiblesolutiontotheoriginalproblem.Simulationresultsdemonstratethatourframeworkcanbringsignificantbenefitstoenterprises.

DC-RSF:ADynamicandCustomizedReputationSystemFrameworkforJointCloudComputingFanghuaYe(SunYat-senUniversity),ZibinZheng(SunYat-senUniversity),ChuanChen(SunYat-senUniversity),YurenZhou(SunYat-senUniversity)

Jointcloudcomputing(JointCloud),asabrand-newparadigmofcloudcomputing,aimsatbuildingacloudecosystem,inwhichendusersareagnostictocloudservicevendorsasapplicationsandservicesarebuiltuponvirtualclouds.IncaseoflowqualitycloudresourcesprovideddeliberatelyandinordertofacilitatethepersistentandsounddevelopmentofJointCloudecosystem,weproposeadynamicandcustomizedreputationsystemframework(DC-RSF)toevaluatethecredibilityofcloudservicevendors.AtthecoreofDC-RSFisthecustomizedanddynamiccredibilitymodel(CDCM),whichcalculatescreditvalueforeachcloudservicevendorbasedonservicerequirementsofendusersandcredentialattributesofcloudservicevendors.WefurtherincorporateaBlockchain-basedmoduleintoDC-RSFtopreventthecreditvaluefrombeingartificiallytampered.

WebServiceApplianceBasedonUnikernelKaiYu(NationalLabforParallelandDistributedProcessing),ChengfeiZhang(NationalLabforParallelandDistributedProcessing),YunxiangZhao(NationalLabforParallelandDistributedProcessing)

Mini-OSisatinyOS(operatingsystem)kerneldistributedwithXenProjectHypervisor.ItismainlyusedasanOSforstubdomainaimedatDom0disaggregationandalsoasteppingstoneforUnikerneldevelopment.WeimplementedasimplehttpserveronMini-OS,andbuiltMini-OSintoawebserviceappliance.WeevaluateditsperformancecomparedwiththesameimplementedserveronUbuntuPV(para-virtualization)DomU,andachievedabout39%performanceimprovement.TheresultsshowsthatMini-OScanbeawebserviceapplianceandhasagoodperformance.

AnalysisandEvaluationoftheGASModelforDistributedGraphComputationWangJinyan(NationalLabforParallelandDistributedProcessing),ZhangChengfei(NationalLabforParallelandDistributedProcessing)

Comparedwithdistributedgraphcomputation,traditionallysinglenodecomputationisunfittedinprocessinglargescalegraphdata.TheGAS(Gather,ApplyandScatter)Modelisauniversalvertex-cutgraphcomputationprogrammingmodelbasedonedge-centricprogramstosupportgraphalgorithms,whichprocessdistributedgraphcomputationaftergraphpartition.Inthispaper,weintroducethatthreeminor-stepsofGAS.WethenanalyzemorecompleteprocessofGASconsideringintra-nodecomputationandinter-nodecommunicationofdistributedgraphcomputation.Basedonouranalysis,weevaluatetheperformanceindifferentnodesofgraphanalysisalgorithmapplyingGASmodel.Theevaluationshowsthatthebottleneckiscomputationperformanceorcommunicationbandwidthdependingonnumberofnodes,whichisaninspirationofoptimizingtheGASmodel.

TrafficSignsDetectionBasedonFasterR-CNNZhongrongZuo(NationalLabforParallelandDistributedProcessing),KaiYu(NationalLabforParallelandDistributedProcessing),QiaoZhou(NationalLabforParallelandDistributedProcessing),XuWang(NationalLabforParallelandDistributedProcessing),TingLi(NationalLabforParallelandDistributedProcessing)

Inthispaper,weuseaadvancedmethodcalledFasterR-CNNtodetecttrafficsigns.Thisnewmethodrepresentsthehighestlevelinobjectrecognition,whichdon'tneedtoextractimagefeaturemanuallyanymoreandcansegmentimagetogetcandidateregionproposalsautomatically.Ourexperimentisbasedonatrafficsigndetectioncompetitionin2016byCCFandUISEEcompany.ThemAPvalueoftheresultis0.3449thatmeansFasterR-CNNcanindeedbeappliedinthisfield.Eventhoughtheexperimentdidnotachievethebestresults,weexploreanewmethodintheareaofthetrafficsignsdetection.Webelievethatwecangetabetterachievementinthefuture.

JCLedger:ABlockchainBasedDistributedLedgerforJointCloudComputing

132

XiangFu(NationalUniversityofDefenseTechnology),HuaiminWang(NationalUniversityofDefenseTechnology),PeichangShi(NationalUniversityofDefenseTechnology),YingweiFu(NationalUniversityofDefenseTechnology),YijieWang(NationalUniversityofDefenseTechnology)

WiththedevelopmentofEconomicGlobalization,traditionalsingle-cloudproviderscannotmeettheneedsoftheexplosive,global,diversecloudservices.JointCloudaimsatempoweringthecooperationamongmultipleCloudServiceProviders(CSP)toprovidecross-cloudservices.OurworkinthispaperismainlyfocusedontheaccountingtechnologyforJointCloudcomputingandweproposetheJCLedger-ablockchainbaseddistributedledger.AnewparticipantCCP(CryptocurrencyProvider)isintroducedintotheJointCloudcollaborationenvironmenttoprovidethecryptocurrencytransferred.WehaveadetaileddescriptionofJCLedgermodel.WefurtheranalyzethefourmostimportantmechanismsforJCLedgerandprovidebasicperspectivesforin-depthanalysis.Finally,wediscusstheinnovationsofJCLedgerandourfutureworkinthisfield.

CorporationArchitectureforMultipleCloudServiceProvidersinJointCloudComputingPeichangShi(NationalUniversityofDefenseTechnology),HuaiminWang(NationalUniversityofDefenseTechnology),XikunYue(NationalUniversityofDefenseTechnology),ShilanYang(NationalUniversityofDefenseTechnology),ShangzhiYang(NationalUniversityofDefenseTechnology),YuxingPeng(NationalUniversityofDefenseTechnology)

Nowadays,cloudcomputingishardtoeffectivelysustaintheimplementationofthecommercialmodelofInternetServiceglobalization.Thereisagrowingtrendtobuildanenvironmentofcloudservice,withthecapacitytoserveanytimeandanywhere,bymutualcooperationbetweencloudserviceprovidersaroundtheworld.However,thistendencywillraiseakeyissuewhichishowtoprovideabenignenvironment,thatallowsself-collaborationandfaircompetition,fordifferentcloudserviceproviderswithdiversestakeholder.GuidedbytheconceptandstructureofService-OrientedArchitecture(SOA)service,thispaperproposesastructurenamedJointCloudCorporationEnvironment(JCCE),whichoffersamutualbenefitandwin-winJointCloudenvironmentforglobalcloudserviceproviders.JCCEcontainsthreecoreservices,whichareDistributedCloudTransaction,DistributedCloudCommunityandDistributedCloudSupervision.Also,facingwithdifferentcloudserviceparticipants,JCCEoffersthreemainservicemodesfortheirconsumption,supplyandcoordination.Thisstudyplaysasignificantroleinsupportingthesharingandself-collaborationofmultiplecloudentities,andpromotingthedevelopmentofcloudservicemarkethealthyandorderly.

SharingPrivacyDatainSemi-TrustworthyStoragethroughHierarchicalAccessControlYuzhaoWu(TsinghuaUniversity),YongqiangLyu(TsinghuaUniversity),QianFang(TsinghuaUniversity),GengZheng(TsinghuaUniversity),HaoYin(TsinghuaUniversity),YuanchunShi(TsinghuaUniversity)

Dataoutsourcingincloudisemergingasasuccessfulparadigmthatbenefitsorganizationsandenterpriseswithhigh-performance,low-cost,scalabledatastorageandsharingservices.However,thisparadigmalsobringsforthnewchallengesfordataconfidentialitybecausetheoutsourcedarenotunderthephysiccontrolofthedataowners.Theexistingschemestoachievethesecurityandusabilitygoalusuallyapplyencryptiontothedatabeforeoutsourcingthemtothestorageserviceproviders(SSP),anddisclosethedecryptionkeysonlytoauthorizeduser.Theycannotensurethesecurityofdatawhileoperatingdataincloudwherethethird-partyservicersareusuallysemi-trustworthy,andneedlotsoftimetodealwiththedata.WeconstructaprivacydatamanagementsystemappendinghierarchicalaccesscontrolcalledHAC-DMS,whichcannotonlyassuresecuritybutalsosaveplentyoftimewhenupdatingdataincloud.

AReliabilityBenchmarkforBigDataSystemsonJointCloudYingyingZheng(InstituteofSoftware,ChineseAcademyofSciences),LijieXu(InstituteofSoftware,ChineseAcademyofSciences),WeiWang(InstituteofSoftware,ChineseAcademyofSciences),WeiZhou(KSYUN),YingDing(ChangchunUniversityofScienceandTechnology)

JointCloudprovidesaflexibleandelasticcomputingresourceplatform.BigdatasystemssuchasMapReduceandSparkarewidelydeployedonthisplatformforbigdataprocessing.Theseframeworkshavehighscalability,buttheapplicationsrunningatopthemoftengenerateruntimeerrors,suchasoutofmemoryerrors,IOexceptions,andtasktimeouts.Forusers,theywanttoknowwhetherthedevelopedapplicationshavepotentialapplicationfaults.Forsystemdesignersandmanagers,theywanttoknowwhetherthedeployed/updatedframeworkshavepotentialsystemfaults.Currentperformancebenchmarkingcanchoosesuitablecloudsplatformforcustomers.However,theydonotconsiderreliabilityofapplicationsdeployedonthecloud.Inaddition,currentbenchmarksforbigdatasystemarealsoonlydesignedforperformancetesting.Tofillthisgap,weproposeareliabilitybenchmark,whichcontainsrepresentativeapplications,anabnormaldatagenerator,andaconfigurationcombinationgenerator.Differentfromperformancebenchmarks,thisbenchmark(1)generatesabnormaltestdataaccordingtotheapplicationcharacteristics,and(2)reducestheconfigurationcombinationspacebasedonconfigurationfeatures.Currently,weimplementedthisbenchmarkonSparkframework.Inourpreliminarytest,wefoundthreetypesoferrors(i.e.,outofmemoryerror,timeoutandwrongresults)infiveSQL,MachineLearning,andGraphapplications.

UCPR:UserClassificationandInfluenceAnalysisinSocialNetworkCongZha(TsinghuaUniversity),YongqiangLv(TsinghuaUniversity)

Therearevigorousdevelopmentsofsocialnetworkwhichaffectoutlifegreatly.Userinfluenceisanimportantreasontopro-motetheinteractioninsocialnetwork.Whenweanalyzeuserinfluence,singlevaluecan’tindicatetheuserinfluenceindifferentdomains.ThispaperputsforwardthedesignofUserClassi-ficationPageRank(UCPR)tosolvethisproblem.Firstly,weclassifyusersaccordingtothecontentwhichtheyforwarded.Then,weusespacemappingtosetupseveralsubnet.Finally,weanalyzeuserinfluenceineveryspecificsubnetbyDomainMappedNetwork(DMN)whichisbasedonPageRankalgorithmandweimprovethisalgorithmtoanalyzetheuserinfluenceindifferentdomains.Throughtheworkofthispaper,weusedavectortopresentuserinfluenceratherthanasinglenumberandwetestandverifiedthelong-taileddistributionsofsocialnet-workinexperiments.

AdaptiveRoutingAlgorithmforJointCloudVideoDeliveryZexunJiang(TsinghuaUniversity),HaoYin(TsinghuaUniversity)

AstheInternetkeepsgrowing,onlinevideohasbecomeagreatpartofthecurrentInternetdatatraffic,whichwilltakeover80%ofInternettrafficaccordingtoCiscosreport.Also,newandmoreheavyweightapplicationskeepdevelopingtofulfillpeople’sgrowingrequirements,like4kresolutionandvisualrealityvideos.However,onesingleserviceprovider,likeaContentDeliveryNetwork(CDN),cannotmeettheperformancerequirementscompletely.ToemploythepotentialofJointCloud,thispaperdesignsandimplementsanewrequestroutingalgorithmthatcanmakevideodeliveryutilizemultiplecloudsandservers.Onthepremiseofguaranteeingthequalityofvideoplaying,thisalgorithmminimizesthecostofserviceresourcesbasedondifferentinfrastructuresservicequality,cost,andcover

133

areas.Basedonthisalgorithm,weimplementapracticalvideodeliverysystemusinglight-weight,flash-basedterminals.Andthissystemprovideslivevideoandvideo-on-demanddeliveryserviceforChinaFutureNetworksIndustrySummit2014onJune4th.Theactualuserdatawasgatheredandanalyzedtoverifytheeffectivenessofthisalgorithm.90.2%ofthetotalVODrequestswerecompletedsmoothlywithoutpause,andthevideotrafficwasoptimizedbythealgorithm.

TowardsEfficientResourceManagementinVirtualCloudsBoAn(PekingUniversity),JunmingMa(PekingUniversity),DonggangCao(PekingUniversity),GangHuang(PekingUniversity)

Theuseofmultiplecloudsbringsmanyadvantages:costoptimization,Quality-of-Service(QoS)improvements,highavailability,avoidanceofvendorlock-in,disasterrecoveryandsoon.However,currentlythecloudvendorislargelyproprietaryanddifferentcloudvendorshavetheirownheterogeneousinfrastructure,makingitdifficultforuserstoutilizeresourcefrommultiplecloudvendors.Asaresult,usershavetomanagedistributedapplicationsspanningmultiplecloudsandtakeintoconsiderationtheservicesmigrationforreasonslikebestcostefficiency.Inthispaper,weintroducesthenotionofVirtualCloudandfocusontheissuesrelatedtomulti-cloudresourcemanagementinVirtualCloud.VirtualCloudisacustomizedcloudbyaggregatingresourcesandservicesofdifferentcloudsandaimstoprovideenduserswithaspecificcloudworkingenvironment.Itwilleaseusers’burdenofresourceanddistributedapplicationmanagementaswellastheworkloadmigrationacrosscloud.

MonitoringandBillingofALightweightCloudSystemBasedonLinuxContainerYujianZhu(PekingUniversity),JunmingMa(PekingUniversity),BoAn(PekingUniversity),DonggangCao(PekingUniversity)

Nowadays,moreandmoreenterprisesandresearchinstituteschoosetobuildmini-datacentersanddeployprivatecloudenvironmentstomeetgrowingbusinessandresearchneeds.Tomakeuserscanrundifferentapplicationframeworksonthesamedatacenter,Caoetal.proposedanewservicemodelnamedClaaS(ClusterasaService)anddevelopedalightweightprototypesystemnamedDockletwhichisbasedonLXC(LinuxContainer).Dockletfacesaproblemofresourceswasteandabuseduetoourfreepolicy.ThispaperintroducesthemonitoringandbillingmodulesofDockletinordertosolvethisproblem.Monitoringmoduleprovidesusersandadministratorswithaclear,real-timeanddetailedmonitoringinterfacetounderstandthestatuesofrunningapplicationsandtheusageofphysicalresources.Billingmoduleusesthesedatatoreminduserstoreleaseunnecessaryresources.Anexperimentandobservationsshowthatourproposedmonitoringmethodiseffectiveandlightweightandourproposedbillingmodelincreasestheutilizationofphysicalresourcesofamini-datacenter.

Buildingemulationframeworkfornon-volatilememoryGuoliangZhu(NationalUniversityofDefenseTechnology),KaiLu(NationalUniversityofDefenseTechnology),XiaopingWang(NationalUniversityofDefenseTechnology)

Currently,researchersusesimulatorstoexperimenttheirinnovationonemergingnon-volatilememory.Unfortunately,simulationmethodisbothtime-consumingandarehardtodebug.Inthispaper,wepresentanon-volatilememoryemulatorwhichenablessystem-levelresearchonemergingmemory.Ouremulatorusesperformancemonitoringunitsonoff-the-shelfprocessorstoimplementanaccureteperformancemodel.

Seflow:EfficientFlowSchedulingforData-ParallelJobsQiaoZhou(NationalLabforParallelandDistributedProcessing),ZiyangLi(NationalLabforParallelandDistributedProcessing),PingZhong(CentralSouthUniversity),TianTian(NationalLabforParallelandDistributedProcessing),YuxingPeng(NationalLabforParallelandDistributedProcessing)

Data-paralleljobstransfermassiveamountsofdatabetweenaseriesofsuccessivestages.Thecoflowabstractionisproposedtorepresentagroupofparallelflowsbetweentwostagesandefficientlyimprovesstagelevelperformance.However,state-of-the-artcoflowschedulingtechniquesareagnostictothejobs’intercoflowsemanticsandthusaresuboptimalinreducingtheaveragejobcompletiontimes(JCT).Toaddressthisproblem,inthispaperwepresentthe“semanticflow”(seflow)abstractiontoexpressthejob-levelintercoflowsemantics.Aseflowcomprisesnotonlyallthecoflowsofajobbutalsotherelationshipbetweenthecoflows.Wedesignanefficientseflowschedulerwhichutilizestherichseflowsemanticsofjobstoachievebetterperformancethanseflow-agnosticschedulingfordataparalleljobs.

OnlineEncodingforErasure-CodedDistributedStorageSystemsFangliangXu(NationalUniversityofDefenseTechnology),YijieWang(NationalUniversityofDefenseTechnology),XingkongMa(NationalUniversityofDefenseTechnology)

Manylarge-scaledistributedstoragesystemsdeployerasurecodingtoprotectdatafromfrequentserverfailuresforcostreason.Inmostofthesesystems,newlyinserteddataisfirstreplicatedacrossdifferentstoragenodesandthenmigratedtoerasurecoded.Althoughthisofflineencodingmannercanimproveperformanceofdataaccessbeforeerasurecodingforsomesystems,ithelpslittleandwastesmanynetworkresourcesanddiskresourcesformanyothersystems.Inthisstudy,weproposeanonlineencodingmethod,whichencodesdataassoonasitisinsertedintothesystem.Byeliminatingthemigrationprocess,ouronlineencodingcansignificantlyreducenetworktransferanddataread;bycachingtheintermediateparityblocksintomemory,ouronlineencodingalsosignificantlyreducedatawrite.Analysisshowthatouronlineencodingcanreducedatatransferbymorethan25%,reducedatawriteby57%atleastandeliminatealldataread,comparedtotraditionalofflineencoding.

134

PED 2017 Workshop Abstracts

WED-SQL:ARelationalFrameworkforDesignandImplementationofProcess-AwareInformationSystemsBrunoPadilha(UniversityofSaoPaulo),AndréLuisSchwerz(FederalUniversityofTechnology),RafaelLiberatoRoberto(FederalUniversityofTechnology)

Despitethesignificantevolutionofthedesignandimplementationofbusinessprocessmodels,atransactionalapproachthatevolvesanincrementalandadaptivestrategyremainsanimportantchallengetobeovercome.TraditionalframeworkssuchasBPEL,ProcessAlgebra,andPetriNetrequireanadditionalsoftwarelayerorsomethirdpartytoolkitstobeabletoenforceadata-statebasedtransactioncontrolanddealwithsemanticexceptions.However,thecomplexityofimplementationbasedonthesetraditionalframeworks,especiallytotreatexceptions,istoohigh.Inthispaper,wepresenttheWED-SQL,adistributedframeworkthatprovidesareliableandefficientwaytodesignandimplementbusinessprocesses.OurmaincontributionistheintegrationofWED-flowconceptsintothePostgresSQLRDBMS.ThisintegrationenablestheWED-SQLtotakefulladvantageoftransactionalpropertiesandalsobenefitfromtheSQLlanguagetospecifytheWED-flowdefinitions.

QueryingWorkflowLogsYanTang(UniversityofCaliforniaatSantaBarbara),JianwenSu(UniversityofCaliforniaatSantaBarbara)

Abusinessprocess(BPorworkflow)isanassemblyoftaskstoaccomplishabusinessgoal.Businessprocessmanagement(BPM)isastudytoprovidesupportforthedesign,configuration/implementation,enactmentandmonitoring,diagnose/analysis,andre-designofworkflow.Businessanalyticsorintelligence(BI)isanecessarysteptowardsre-design/improvement.ThetraditionalmethodologyforBIisthewellknownsequenceofETL,data/processwarehouse,andOLAPtools.Inthispaper,wefocusontheproblemofadhocqueryingprocessenactmentsfordata-centricbusinessprocesses.Wedevelopanalgebraicquerylanguagebasedon“incidents”toallowtheusertoformulateadhocqueriesdirectlyonworkflowlogs.Aformalsemanticsandanpreliminaryqueryevaluationalgorithmareprovided.

Ontheintegrationofevent-basedandtransaction-basedarchitecturesforSupplyChainsZhijieLi(IndianaUniversity–PurdueUniversityIndianapolis),HaoyanWu(IndianaUniversity–PurdueUniversityIndianapolis),BrianKing(IndianaUniversity–PurdueUniversityIndianapolis),ZinaBen-Miled(IndianaUniversity–PurdueUniversityIndianapolis),JohnWassick(TheDowChemicalCompany),JeffreyTazelaar(TheDowChemicalCompany)

Affordableandreliablesupplychainvisibilityisbecomingincreasinglyimportantasthecomplexityofthenetworkunderlyingsupplychainsisbecomingordersofmagnitudeshighercomparedtoadecadeago.Moreoverthisincreaseincomplexityisstartingtoreflectonthecostofgoodsandtheiravailabilitytotheconsumers.Thispaperaddressestwokeyissuesinthedistributionphaseofthesupplychain,namely,affordabilityandpseudoreal-timevisibilityoftruckloadactivities.Theproposedframeworkcreatesadigitalthreadthattracksthepseudoreal-timestatusoftheshipmentmakingthephysicaldistributionprocesscompletelytransparenttothestakeholders.Thearchitectureoftheframeworkisbasedonadynamichybridpeer-to-peernetworkandaprivate/publicblockchaindatamodelthatleveragesemergentsensortechnologies.

CacheDOCS:ADynamicKey-ValueObjectCachingServiceJulienGascon-Samson(UniversityofBritishColumbia),MichaelCoppinger(McGillUniversity),FanJin(McGillUniversity),JörgKienzle(McGillUniversity),BettinaKemme(McGillUniversity)

Cachingplaysanimportantroleinmanydomains,asitcanleadtoimportantperformanceimprovements.Akey-valuebasedcachingsystemtypicallystorestheresultsofpopularqueriesinefficientstoragelocation.Whilecachingenjoyswidespreadusageinthecontextofdynamicwebapplications,mostmainstreamcachingsystemsstorestaticbinaryitems,whichmakesthemimpracticalformanyreal-worldapplicationsthatwouldbenefitfromstoringdynamicitems.Inthispaper,weproposeCacheDOCS,adynamickey-valueobjectcachingservicethatallowsforcachingarbitraryobjects.Aspartofourmodel,CacheDOCSprovidesanAPIthatsupportstheexecutionofoperationsagainstcachedobjects,andallowsforclientstoseamlesslysubscribetokeeptheirlocalcopiesinsyncwithcachedremoteobjects.CacheDOCSsupportsmultipleupdatedisseminationstrategiesinordertooptimizeperformance,andproposesaversioningmechanismtoensureconsistency.WeimplementedafullversionofCacheDOCSandweranseveralperformance-relatedexperimentsunderthreeuse-casescenarios.

135

PSBD 2017 Workshop Abstracts

Anovelgame-theoreticmodelforcontent-adaptiveimagesteganographyQiLi(HunanUniversity),XinLiao(HunanUniversity),GuoyongChen(HunanUniversity),LipingDing(GuangzhouBranchofInstituteofSoftware,ChineseAcademyofScience)

Content-adaptiveimagesteganographymeansthatsteganographerchoosessecurityembeddingpositionsbasedonimagetextures.Steganalystcanalsofocusondetectingthesepositionsaccordingtoimagetextures.Gametheoryispreferredtoanalyzetheabovesituation.However,inpreviousgamemodels,steganalystwillmistakenlyidentifythatnobitisembedded,whenthesecretbitisthesameastheleastsignificantbitofcoverimage.Inthispaper,anovelgametheoreticmodelbasedonsecondaryembeddingisproposedtocorrectthejudgmentdrawbackforabetterNashequilibriumbysteganalyst.However,steganalyst’schoicedisturbspreviousequilibriumandsteganographerwillchangehischoicetofindnewequilibriumbyGametheory.Co-occurrencematrixandpointdeviationdegreeareutilizedfordescribingsteganalyst’schoices.Theoccurrencenumberofeachpixelpairsiscalculatedtoconstituteco-occurrencematrix,andthenEuclideandistancebetweenonepointandadjacentpointsiscomputedtolocateembeddingpositions.Incontent-adaptiveimagesteganography,wecandrawaconclusionthatsteganographershouldselectembeddingpositionsfrombothimageedgeareasandsmoothareas.

AFine-grainedAccessControlSchemeforBigDataBasedonClassificationAttributesTengfeiYang(StateKeyLaboratoryofInformationSecurity,InstituteofInformationEngineering,ChineseAcademyofSciences),PeisongShen(StateKeyLaboratoryofInformationSecurity,InstituteofInformationEngineering,ChineseAcademyofSciences),XueTian(StateKeyLaboratoryofInformationSecurity,InstituteofInformationEngineering,ChineseAcademyofSciences),ChiChen(StateKeyLaboratoryofInformationSecurity,InstituteofInformationEngineering,ChineseAcademyofSciences)

Inordertoprotectthesecurityandprivacyofbigdata,thecloudstorageserviceneedstoenforceeffectiveaccesscontrolmechanismonuserrequests.Attribute-BasedEncryptionisapromisingcryptographicaccesscontroltechniquetoensuretheend-to-endsecurityofdataincloud.However,theexistingABEresearchesmainlyfocusontheefficiencydecryption,whiletheflexibilityofpolicy,thecommunicationcost,andthemetadatamanagementofciphertextsarestillchallengingissuesinthebigdataenvironment.Inthispaper,forthefirsttime,weproposeanewdistributed,scalableandfine-grainedaccesscontrolschemebasedonclassificationattributesforthecloudobjectstorage.Theclassificationattributesandthresholdpoliciesareintegratedintoanaccessstructure,andthentheobjectsareencryptedwiththeintegratedaccessstructure.Theconstant-sizeciphertextcomponentsrelatedtoattributescanbemanagedasthecorrespondingmetadata.Asaresulttheencryptioncomplexityandciphertextstoragearereduced.Inaddition,wepresentanewlabel-basedaccesscontrolmodelwithmulti-authoritiestodescribethedetailedrelationshipsofentitiesinourscheme.Besides,theproposedschemeisprovedtobesecureunderlBDHEassumption,andthesystemimplementationdemonstratesthepracticalfeasibilityandgoodperformance.

Social-AwareDecentralizationforEfficientandSecureMulti-PartyComputationYuzheTang(SyracuseUniversity),SuchetaSoundarajan(SyracuseUniversity)

ThisworkstudiestheproblemofMPCschedulingthatis,identifyingasetofcomputingnodestoexecutesecuremulti-partycomputationprotocols(MPC)overadistributedprivatedataset.Ourprimarycontributionisinestimatingtheriskofcollusionbetweennodestowhomthecomputationisscheduled.Thisworkhaspotentialinenablingefficientprivacy-preservingdatasharinginemergingplatformsofbig-datafederation,inhealthcare,finance,andothermarketplaces.Inourmethods,weassumethattheMPCcomputingnodesexistinasocialnetwork,andpresenttwomodelsforestimatingtheriskofcollusion,aswellasalgorithmsforfindingtheMPCnodessuchthattheriskofcollusionisminimized.Weevaluateourmethodsonseveralreal-worldnetworkdatasets,andshowthattheyareeffectiveinminimizingtherisklevels.

StatisticalAnomalyDetectiononMetadataStreamsviaCommoditySoftwaretoProtectCompanyChristineChen(UniversityofPortland),JamesGurganus(MicroSystemsEngineering,Inc.)

Asacompanygrows,itsinfrastructurenaturallymustgrowtosupportit.Theresultingmountainsofinfrastructuremetadatacontainvaluableinformationonthehealthandwellbeingofthesystemsthroughoutthecompany.Forexample,anabnormallylowdiskwriteratetoafileservermayindicatethataregularlyscheduledtaskhasfailedtostart,oranabnormallyhighdiskwriteratemayindicatethepresenceofamaliciousthreatsuchasransomware.Thehypothesisofthiscasestudyisthatsuchmetadatastreamscanbeeffectivelyutilizedbyimplementingstatisticalanomalydetectionmethodsviacommoditysoftware(Splunk,inthiscase).Thesemethodsweretestedprimarilyonservermetadatainaransomwaresimulationandalsoonservermetadatafromfileserversandproductionserversinactiveuse.

Intheransomwaresimulation,thealertingsystemdetectedtheransomwarebehaviorfiveminutesafteranencryptioneventbeganinthesimulationenvironmentandalertedsteadilyforthedurationofthesimulation.Intheweek-longexperimentover11fileserversandproductionservers,atotalof1,484alertsweregenerated.Applyingsimplecorrelationtechniquescreatedamoreconcentratedinformationstreamwith77events.Theseresultsconfirmthevalueofmetadatainidentifyingsystemanomaliesandprovidinganotherlayerofdefenseagainstmaliciousthreats.Therelativelysimpleanomalydetectiontechniquesutilizedinthiscasestudyalsohighlighttheincreasingpracticalityofbehavioralanalytics—itcanonlybeamatteroftimebeforesuchtechniqueswillbeubiquitous.

Computationalimprovementsinparallelizedk-anonymousmicroaggregationoflargedatabasesAhmadMohamadMezher(UniversitatPolitècnicadeCatalunya),AlejandroGarcíaÁlvarez(UniversitatPolitècnicadeCatalunya),DavidRebollo-Monedero(UniversitatPolitècnicadeCatalunya),JordiForné(UniversitatPolitècnicadeCatalunya)

Thetechnicalcontentsofthispaperfallwithinthefieldofstatisticaldisclosurecontrol(SDC),whichconcernsthepostprocessingofthedemographicportionofthestatisticalresultsofsurveyscontainingsensitivepersonalinformation,inordertoeffectivelysafeguardtheanonymityoftheparticipatingrespondents.Theconcretepurposeofthisstudyistoimprovetheefficiencyofawidelyusedalgorithmfork-anonymousmicroaggregation,knownasmaximumdistancetoaveragevector(MDAV),tovastlyaccelerateitsexecutionwithoutaffectingitsexcellentfunctionalperformancewithrespecttocompetingmethods.Theimprovementsputforthinthispaperencompassalgebraicmodificationsandtheuseofthebasiclinearalgebrasubprograms(BLAS)library,fortheefficientparallelcomputationofMDAVonCPU.

136

WoSC 2017 Workshop Abstracts

Ripple:HomeAutomationforResearchDataManagementRyanChard(ArgonneNationalLaboratory),KyleChard(UniversityofChicagoandArgonneNationalLab),JasonAlt(NationalCenterforSupercomputingApplications),DilworthParkinson(LawrenceBerkeleyNationalLaboratory),SteveTuecke(UniversityofChicagoandArgonneNationalLab),IanFoster(ArgonneNationalLaboratory&TheUniversityofChicago)

Explodingdatavolumesandacquisitionrates,plusevermorecomplexresearchprocesses,placesignificantstrainonresearchdatamanagementprocesses.Itisincreasinglycommonfordatatoflowthroughpipelinescomprisedofdozensofdif-ferentmanagement,organization,andanalysisstepsdistributedacrossmultipleinstitutionsandstoragesystems.Toalleviatetheresultingcomplexity,weproposeahomeautomationapproachtomanagingdatathroughoutitslifecycle,inwhichusersspecifyviahigh-levelrulestheactionsthatshouldbeperformedondataatdifferenttimesandlocations.Tothisend,wehavedevelopedRIPPLE,aresponsivestoragearchitecturethatallowsuserstoexpressdatamanagementtasksviaarulesnotation.RIPPLEmonitorsstoragesystemsforevents,evaluatesrules,andusesserverlesscomputingtechniquestoexecuteactionsinresponsetotheseevents.WeevaluateoursolutionbyapplyingRIPPLEtothedatalifecyclesoftworeal-worldprojects,inastronomyandlightsourcescience,andshowthatitcanautomatemanymundaneandcumbersomedatamanagementprocesses.

Pipsqueak:LeanLambdaswithLargeLibrariesEdwardOakes(UniversityofWisconsin-Madison),LeonYang(UniversityofWisconsin-Madison),KevinHouck(UniversityofWisconsin-Madison),TylerHarter(MicrosoftGraySystemsLab),AndreaC.Arpaci-Dusseau(UniversityofWisconsin-Madison),RemziH.Arpaci-Dusseau(UniversityofWisconsin-Madison)

Microservicesareusuallyfasttodeploybecauseeachmicroserviceissmall,andthuseachcanbeinstalledandstartedquickly.Unfortunately,leanmicroservicesthatdependonlargelibrarieswillstartslowlyandharmelasticity.Inthispaper,weexplorethechallengesofleanmicroservicesthatrelyonlargelibrariesinthecontextofPythonpackagesandtheOpenLambdaserverlesscomputingplatform.WeanalyzethepackagetypesandcompressibilityoflibrariesdistributedviathePythonPackageIndexandproposePipBench,anewtoolforevaluatingpackagesupport.WealsoproposePipsqueak,apackage-awarecomputeplatformbasedonOpenLambda.

LeveragingtheServerlessArchitectureforSecuringLinuxContainersNiltonBila(IBM),PaoloDettori(IBM),AliKanso(IBM),YujiWatanabe(IBM),AlaaYoussef(IBM)

Linuxcontainerspresentalightweightsolutiontopackageapplicationsintoimagesandinstantiatetheminisolatedenvironments.Suchimagesmayincludevulnerabilitiesthatcanbeexploitedatruntime.Avulnerabilityscanningservicecandetectthesevulnerabilitiesbyperiodicallyscanningthecontainersandtheirimagesforpotentialthreats.Whenathreatisdetected,aneventmaybegeneratedto(1)quarantineorremovethecompromisedcontainer(s)andoptionally(2)remedythevulnerabilitybyrebuildingasecureimage.Webelievethatsuchevent-drivenprocessisagreatfittobeimplementedinaserverlessarchitecture.InthispaperwepresentourdesignandimplementationofaserverlesssecurityanalyticsservicebasedonOpenWhiskandKubernetes.

ServerlessComputing:Design,Implementation,andPerformanceGarrettMcGrath(UniversityofNotreDame),PaulR.Brenner(UniversityofNotreDame)

Wepresentthedesignofanovelperformance-orientedserverlesscomputingplatformimplementedin.NET,deployedinMicrosoftAzure,andutilizingWindowscontainersasfunctionexecutionenvironments.Implementationchallengessuchasfunctionscalingandcontainerdiscovery,lifecycle,andreusearediscussedindetail.WeproposemetricstoevaluatetheexecutionperformanceofserverlessplatformsandconducttestsonourprototypeaswellasAWSLambda,AzureFunctionsandIBM’sdeploymentofApacheOpenWhisk.Ourmeasurementsshowtheprototypeachievinggreaterthroughputthanotherplatformsatmostconcurrencylevels,andweexaminethescalingandinstanceexpirationtrendsintheimplementations.Additionally,wediscussthegapsandlimitationsinourcurrentdesign,proposepossiblesolutions,andhighlightfutureresearch.

137

NSF-JST 2017 Workshop Abstracts

AcceleratingBigDataInfrastructureandApplicationsKevinBrown(TokyoInstituteofTechnology),TianqiXu(TokyoInstituteofTechnology),KeitaIwabuchi(TokyoInstituteofTechnology),KentoSato(LawrenceLivermoreNationalLaboratory),AdamMoody(LawrenceLivermoreNationalLaboratory),KathrynMohror(LawrenceLivermoreNationalLaboratory),NikhilJain(LawrenceLivermoreNationalLaboratory),AbhinavBhatele(LawrenceLivermoreNationalLaboratory),MartinSchulz(LawrenceLivermoreNationalLaboratory),RogerPearce(LawrenceLivermoreNationalLaboratory),MayaGokhale(LawrenceLivermoreNationalLaboratory),SatoshiMatsuoka(TokyoInstituteofTechnology)

High-performancecomputing(HPC)systemsareincreasinglybeingusedfordata-intensive,or``BigData",workloads.However,sincetraditionalHPCworkloadsarecompute-intensive,theHPC-BigDataconvergencehascreatedmanychallengeswithoptimizingdatamovementandprocessingonmodernsupercomputers.Ourcollaborativeworkaddressesthesechallengesusingathree-prongedapproach:(i)measuringandmodelingextreme-scaleI/Oworkloads,(ii)designingalow-latency,scalable,on-demandburst-buffersolution,and(iii)optimizinggraphalgorithmsforprocessingBigDataworkloads.Wedescribethethreeareasofourcollaborationandreportontheirrespectivedevelopments.

DisasterNetworkEvolutionUsingDynamicClusteringofTwitterDataKrishnaKant(TempleUniversity),YilangWu(AizuUniversity),ShanshanZhang(TempleUniversity),JunboWang(AizuUniversity),AmitangshuPal(TempleUniversity)

Adhocsmartphonenetworkscanbeusedtoaugmentcommunicationsdegradedbydisastersprovidedthattheindividualadhocclusterscanreachsome``connectiongateways''togetouttotheInternetviaconnecteddevicesinthesurroundingarea(inadditiontoconnectivityviaanyspeciallydeployedemergencyequipment).Thedisconnectedareasarenotknownuntiltheyarebackonline;however,weneedamechanismtodeterminethemsothatthegatewaydevicecanbebestrecruitedtoprovidetheconnectivity.Thisneedstobedoneinadynamicenvironmentbecauseofdisasterrelatedmobility.Inthispaperweproposeamechanismtosolvethisproblembyestimatingregionsthatarelikelytobedensebutdisconnectedwithsignificantnumberofconnecteddevicesaroundthem.Becauseoflackofdirectinformationonpeople(orsmartphone)density,weattempttodothisbyanalyzingthetwitterdata.Byvirtueofitsefficiency,thealgorithmcanbeusedonadynamicallyevolvingdatasetandthusallowsdynamictracking.

Single-epochsupernovaclassificationwithdeepconvolutionalneuralnetworksAkisatoKimura(NTT),IchiroTakahashi(KavliIPMU,TheUniversityofTokyo),MasaomiTanaka(NationalAstronomicalObservatoryofJapan),NaokiYasuda(KavliIPMU,TheUniversityofTokyo),NaonoriUeda(NTT),NaokiYoshida(KavliIPMU,TheUniversityofTokyo)

SupernovaeType-Ia(SNeIa)playasignificantroleinexploringthehistoryoftheexpansionoftheUniverse,sincetheyarethebest-knownstandardcandleswithwhichwecanaccuratelymeasurethedistancetotheobjects.FindinglargesamplesofSNeIaandinvestigatingtheirdetailedcharacteristicshasbecomeanimportantissueincosmologyandastronomy.Thecurrentphotometricsupernovasurveysproducevastlymorecandidatesthancanbefollowedupspectroscopically,highlightingtheneedforeffectiveclassificationmethods.Existingmethodsreliedonaphotometricapproachthatfirstmeasurestheluminanceofsupernovacandidatespreciselyandthenfitstheresultstoaparametricfunctionoftemporalchangesinluminance.However,itinevitablyrequiresalotofobservationsandcomplexluminancemeasurements.Inthiswork,wepresentanovelmethodfordetectingSNeIasimplyfromsingle-shotobservationimageswithoutanycomplexmeasurements,byeffectivelyintegratingthestate-of-the-artcomputervisionmethodologyintothestandardphotometricapproach.Ourmethodfirstbuildsaconvolutionalneuralnetworkforestimatingtheluminanceofsupernovaefromtelescopeimages,andthenconstructsanotherneuralnetworkfortheclassification,wheretheestimatedluminancesandobservationdatesareusedasfeaturesforclassification.BothoftheneuralnetworksareintegratedintoasingledeepneuralnetworktoclassifySNeIadirectlyfromobservationimages.Experimentalresultsshowtheeffectivenessoftheproposedmethodandrevealclassificationperformancecomparabletoexistingphotometricmethodswithmanyobservations.

EnablingLargeScaleDeliberationusingIdeationandNegotiation-SupportAgentsKatsuhideFujita(TokyoUniversityofAgricultureandTechnology),TakayukiIto(NagoyaInstituteofTechnology),MarkKlein(MIT)

ThispaperdescribesanongoingJapan-USprojectthatisdevelopingthekindofadvancedcomputersupportforonlinecrowd-scaledeliberationthatisneededtoenablesmarterandmoreconnectedcommunities.Oursharedworkhasfocusedonaddressingboththeseproblems:(1)ideation:helpingcrowdsmoreeffectivelydeveloppotentialwin-winsolutions,and(2)decision-making:helpingcrowdsgettopareto-optimalityinthesolutionstheyselect.InJapan,adiscussionsupportsystemcalledCOLLAGREEthatfacilitatesfreetextdiscussionstoachieveconsensushasbeendeveloping.InUS,anonlinetoolcalledtheDeliberatoriumthatintegratesargumentationtheoryandsocialcomputingtechniquestoenablemoreeffectivecrowd-scaledeliberationhasbeendeveloping.Oneofourimmediatejointworkistointegratethefacilitatedfree-textdiscussionsofCOLLAGREEwiththestructureddeliberationsprovidedbytheDeliberatorium.Wewillalsodevelopautomatedagentsthatenablebetterideationaswellasbetterdecision-making.

138

Local Information

Maps

139

Restaurants in/near Lenox Mall

140

141

142

top related