Author image not provided
 Patrick Th Eugster

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article14.18
Citation Count1,475
Publication count104
Publication years1999-2016
Available for download54
Average downloads per article586.85
Downloads (cumulative)31,690
Downloads (12 Months)2,496
Downloads (6 Weeks)312
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Advisor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


106 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 106
Result page: 1 2 3 4 5 6

Sort by:

1 published by ACM
April 2017 IoTDI '17: Proceedings of the Second International Conference on Internet-of-Things Design and Implementation
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 20,   Downloads (12 Months): 51,   Downloads (Overall): 51

Full text available: PDFPDF
The Internet of Things (IoT) has penetrated various domains, from smart grids to precision agriculture, facilitating remote sensing and control. However, IoT devices are target to a spectrum of reliability and security issues. Therefore, capturing the normal behavior of these devices and detecting abnormalities in program execution is key for ...
Keywords: Ball-Larus Path Profiling, Contextsensitive modeling, Anomaly Detection, Control-Flow, Security and Reliability

2 published by ACM
November 2016 Middleware '16: Proceedings of the 17th International Middleware Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 10,   Downloads (12 Months): 86,   Downloads (Overall): 86

Full text available: PDFPDF
Designing low-latency cloud-based applications that are adaptable to unpredictable workloads and efficiently utilize modern cloud computing platforms is hard. The actor model is a popular paradigm that can be used to develop distributed applications: actors encapsulate state and communicate with each other by sending events. Consistency is guaranteed if each ...
Keywords: Cloud elasticity, strong consistency, actor system, scalability

3 published by ACM
November 2016 FSE 2016: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 15,   Downloads (12 Months): 132,   Downloads (Overall): 132

Full text available: PDFPDF
Nowadays, a rapidly increasing number of web users are using Ad-blockers to block online advertisements. Ad-blockers are browser-based software that can block most Ads on the websites, speeding up web browsers and saving bandwidth. Despite these benefits to end users, Ad-blockers could be catastrophic for the economic structure underlying the ...
Keywords: web bots, Ad-blockers, randomization

4 published by ACM
October 2016 SCALA 2016: Proceedings of the 2016 7th ACM SIGPLAN Symposium on Scala
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 37,   Downloads (Overall): 37

Full text available: PDFPDF
Cloud computing offers an attractive and cost-efficient computing platform and hence it has been widely adopted by the industry and the government. At the same time, cloud computing poses a serious security challenge because sensitive data must often be outsourced to third party entities that can access the data and ...
Keywords: Domain-specific language, Secure computation

5 published by ACM
October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 27,   Downloads (12 Months): 284,   Downloads (Overall): 284

Full text available: PDFPDF
Failing to properly isolate components in the same address space has resulted in a substantial amount of vulnerabilities. Enforcing the least privilege principle for memory accesses can selectively isolate software components to restrict attack surface and prevent unintended cross-component memory corruption. However, the boundaries and interactions between software components are ...
Keywords: privilege separation, operating system security, threads isolation

6 published by ACM
October 2016 SoCC '16: Proceedings of the Seventh ACM Symposium on Cloud Computing
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 15,   Downloads (12 Months): 217,   Downloads (Overall): 217

Full text available: PDFPDF
With the advent of the Internet of Things (IoT), billions of devices are expected to continuously collect and process sensitive data (e.g., location, personal health). Due to limited computational capacity available on IoT devices, the current de facto model for building IoT applications is to send the gathered data to ...
Keywords: Stream data processing, Confidentiality, IoT

7 published by ACM
July 2016 ISSTA 2016: Proceedings of the 25th International Symposium on Software Testing and Analysis
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7,   Downloads (12 Months): 122,   Downloads (Overall): 122

Full text available: PDFPDF
Modern browsers have a highly concurrent page rendering process in order to be more responsive. However, such a concurrent execution model leads to various race issues. In this paper, we present ARROW, a static technique that can automatically, safely, and cost effectively patch certain race issues on client side pages. ...
Keywords: race condition, constraint solving, Automatic repair

8
June 2016 36th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems - Volume 9688
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

This paper presents a formal framework for programming distributed applications capable of handling partial failures, motivated by the non-trivial interplay between failure handling and messaging in asynchronous distributed environments. Multiple failures can affect protocols at the level of individual interactions alignment. At the same time, only participants affected by a ...
Keywords: Partial failure handling, Distributed systems, Session types

9
April 2016 IEEE/ACM Transactions on Networking (TON): Volume 24 Issue 2, April 2016
Publisher: IEEE Press
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 2,   Downloads (12 Months): 7,   Downloads (Overall): 7

Full text available: PDFPDF
Efficient packet classification is a core concern for network services. Traditional multi-field classification approaches, in both software and ternary content-addressable memory (TCAMs), entail tradeoffs between (memory) space and (lookup) time. TCAMs cannot efficiently represent range rules, a common class of classification rules confining values of packet fields to given ranges. ...
Keywords: ternary content-addressable memory (TCAM), packet classification

10 published by ACM
March 2016 ANCS '16: Proceedings of the 2016 Symposium on Architectures for Networking and Communications Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 44,   Downloads (Overall): 86

Full text available: PDFPDF
Buffering architectures and policies for their efficient management constitute one of the core ingredients of a network architecture. In this work we introduce a new specification language, BASEL, that allows to express virtual buffering architectures and management policies representing a variety of economic models. BASEL does not require the user ...
Keywords: buffer management, admission control, packet scheduling

11 published by ACM
March 2016 MODULARITY 2016: Proceedings of the 15th International Conference on Modularity
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 16,   Downloads (Overall): 36

Full text available: PDFPDF
Event-driven programming has become a major paradigm in developing concurrent, distributed systems. Its benefits are often informally captured by the key tenet of “decoupling”, a notion which roughly captures the ability of modules to join and leave (or fail) applications dynamically, and to be developed by independent parties. Programming models ...
Keywords: control flow, linear type system, Event-driven programming, aliasing, decoupling

12
November 2015 IEEE Transactions on Parallel and Distributed Systems: Volume 26 Issue 11, November 2015
Publisher: IEEE Press
Bibliometrics:
Citation Count: 1

Efficient subscription summarization and event matching is key to the scalability of content-based publish/subscribe networks (CPSNs). Current summarization and event matching mechanisms based on subscription subsumption induce heavy event processing load on brokers degrading the performance of CPSNs especially under high rates of churn, i.e., addition, deletion, or modification of ...

13 published by ACM
October 2015 SPLASH Companion 2015: Companion Proceedings of the 2015 ACM SIGPLAN International Conference on Systems, Programming, Languages and Applications: Software for Humanity
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 5,   Downloads (Overall): 37

Full text available: PDFPDF
Reactive programming and event-based programming are two closely related programming styles that are becoming ever more important with the advent of advanced HCI technology and the ever increasing requirement for applications to run on the web or on collaborating mobile devices. A number of publications about middleware and language design ...
Keywords: Complex Event Processing, Object-oriented Programming, Language Design, Reactive Programming, Event-based Program- ming, Functional Reactive Pro- gramming

14
July 2015 SIROCCO 2015: Post-Proceedings of the 22nd International Colloquium on Structural Information and Communication Complexity - Volume 9439
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 1

Cloud applications bring new challenges to the design of network elements, in particular accommodating for the burstiness of traffic workloads. Shared memory switches represent the best candidate architecture to exploit buffer capacity; we analyze the performance of this architecture. Our goal is to explore the impact of additional traffic characteristics ...

15 published by ACM
April 2015 IPSN '15: Proceedings of the 14th International Conference on Information Processing in Sensor Networks
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 5,   Downloads (12 Months): 40,   Downloads (Overall): 173

Full text available: PDFPDF
Wireless sensor networks (WSNs) are plagued by the possibility of bugs manifesting only at deployment. However, debugging deployed WSNs is challenging for several reasons---the remote location of deployed sensor nodes, the non-determinism of execution that can make it difficult to replicate a buggy run, and the limited hardware resources available ...
Keywords: debugging, wireless sensor networks, replay, tracing

16 published by ACM
April 2015 IPSN '15: Proceedings of the 14th International Conference on Information Processing in Sensor Networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 15,   Downloads (Overall): 62

Full text available: PDFPDF
Wireless sensor networks (WSNs) are plagued by the possibility of bugs manifesting only at deployment. However, debugging deployed WSNs is challenging for several reasons---the remote location of deployed sensor nodes, the non- determinism of execution that can make it difficult to replicate a buggy run, and the limited hardware resources ...
Keywords: debugging, wireless sensor networks, replay, tracing

17 published by ACM
December 2014 Middleware '14: Proceedings of the 15th International Middleware Conference
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 5,   Downloads (12 Months): 24,   Downloads (Overall): 129

Full text available: PDFPDF
Top- k matching is a fundamental problem underlying on-line advertising platforms, mobile social networks, etc. Distributed processes (e.g., advertisers) specify predicates, which we call subscriptions , for events (e.g., user actions) they wish to react to. Subscriptions define weights for elementary constraints on individual event attributes and do not require ...

18
November 2014 SOCA '14: Proceedings of the 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Cyber Physical Systems (CPS), interconnected smart devices in the Internet of Things (IoT) and other data sources are increasingly bridging the gap between the physical and digital world by providing fine-grained data about real-world events. Enterprise software systems are adopting the paradigm of event-based systems (EBS) to enable them to ...

19
October 2014 ICNP '14: Proceedings of the 2014 IEEE 22nd International Conference on Network Protocols
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

The software-defined networking (SDN) paradigm allows network operators to conveniently deploy network services through a centralized controller. Recent interest in SDNs has fueled the implementation of a variety of network services on controllers written in different languages and supported by different organizations. Given the large number of network services and ...

20 published by ACM
October 2014 SPLASH '14: Proceedings of the companion publication of the 2014 ACM SIGPLAN conference on Systems, Programming, and Applications: Software for Humanity
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 11,   Downloads (Overall): 55

Full text available: PDFPDF
Reactive programming and event-based programming are two closely related programming styles that are becoming ever more important with the advent of advanced HCI technology and the ever increasing requirement for applications to run on the web or on collaborating mobile devices. A number of publications about middleware and language design ...
Keywords: Complex Event Processing, Functional Reactive Programming, Object-oriented Programming, Event-based Programming, Language Design, Reactive Programming



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2017 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us