|
ROLE
BOOKMARK & SHARE
|
|
1
April 2017
IoTDI '17: Proceedings of the Second International Conference on Internet-of-Things Design and Implementation
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 20, Downloads (12 Months): 51, Downloads (Overall): 51
Full text available:
PDF
The Internet of Things (IoT) has penetrated various domains, from smart grids to precision agriculture, facilitating remote sensing and control. However, IoT devices are target to a spectrum of reliability and security issues. Therefore, capturing the normal behavior of these devices and detecting abnormalities in program execution is key for ...
Keywords:
Ball-Larus Path Profiling, Contextsensitive modeling, Anomaly Detection, Control-Flow, Security and Reliability
2
November 2016
Middleware '16: Proceedings of the 17th International Middleware Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 10, Downloads (12 Months): 86, Downloads (Overall): 86
Full text available:
PDF
Designing low-latency cloud-based applications that are adaptable to unpredictable workloads and efficiently utilize modern cloud computing platforms is hard. The actor model is a popular paradigm that can be used to develop distributed applications: actors encapsulate state and communicate with each other by sending events. Consistency is guaranteed if each ...
Keywords:
Cloud elasticity, strong consistency, actor system, scalability
3
November 2016
FSE 2016: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 15, Downloads (12 Months): 132, Downloads (Overall): 132
Full text available:
PDF
Nowadays, a rapidly increasing number of web users are using Ad-blockers to block online advertisements. Ad-blockers are browser-based software that can block most Ads on the websites, speeding up web browsers and saving bandwidth. Despite these benefits to end users, Ad-blockers could be catastrophic for the economic structure underlying the ...
Keywords:
web bots, Ad-blockers, randomization
4
October 2016
SCALA 2016: Proceedings of the 2016 7th ACM SIGPLAN Symposium on Scala
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4, Downloads (12 Months): 37, Downloads (Overall): 37
Full text available:
PDF
Cloud computing offers an attractive and cost-efficient computing platform and hence it has been widely adopted by the industry and the government. At the same time, cloud computing poses a serious security challenge because sensitive data must often be outsourced to third party entities that can access the data and ...
Keywords:
Domain-specific language, Secure computation
5
October 2016
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 27, Downloads (12 Months): 284, Downloads (Overall): 284
Full text available:
PDF
Failing to properly isolate components in the same address space has resulted in a substantial amount of vulnerabilities. Enforcing the least privilege principle for memory accesses can selectively isolate software components to restrict attack surface and prevent unintended cross-component memory corruption. However, the boundaries and interactions between software components are ...
Keywords:
privilege separation, operating system security, threads isolation
6
October 2016
SoCC '16: Proceedings of the Seventh ACM Symposium on Cloud Computing
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 15, Downloads (12 Months): 217, Downloads (Overall): 217
Full text available:
PDF
With the advent of the Internet of Things (IoT), billions of devices are expected to continuously collect and process sensitive data (e.g., location, personal health). Due to limited computational capacity available on IoT devices, the current de facto model for building IoT applications is to send the gathered data to ...
Keywords:
Stream data processing, Confidentiality, IoT
7
July 2016
ISSTA 2016: Proceedings of the 25th International Symposium on Software Testing and Analysis
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7, Downloads (12 Months): 122, Downloads (Overall): 122
Full text available:
PDF
Modern browsers have a highly concurrent page rendering process in order to be more responsive. However, such a concurrent execution model leads to various race issues. In this paper, we present ARROW, a static technique that can automatically, safely, and cost effectively patch certain race issues on client side pages. ...
Keywords:
race condition, constraint solving, Automatic repair
8
June 2016
36th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems - Volume 9688
Publisher: Springer-Verlag New York, Inc.
This paper presents a formal framework for programming distributed applications capable of handling partial failures, motivated by the non-trivial interplay between failure handling and messaging in asynchronous distributed environments. Multiple failures can affect protocols at the level of individual interactions alignment. At the same time, only participants affected by a ...
Keywords:
Partial failure handling, Distributed systems, Session types
9
April 2016
IEEE/ACM Transactions on Networking (TON): Volume 24 Issue 2, April 2016
Publisher: IEEE Press
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 2, Downloads (12 Months): 7, Downloads (Overall): 7
Full text available:
PDF
Efficient packet classification is a core concern for network services. Traditional multi-field classification approaches, in both software and ternary content-addressable memory (TCAMs), entail tradeoffs between (memory) space and (lookup) time. TCAMs cannot efficiently represent range rules, a common class of classification rules confining values of packet fields to given ranges. ...
Keywords:
ternary content-addressable memory (TCAM), packet classification
10
March 2016
ANCS '16: Proceedings of the 2016 Symposium on Architectures for Networking and Communications Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 44, Downloads (Overall): 86
Full text available:
PDF
Buffering architectures and policies for their efficient management constitute one of the core ingredients of a network architecture. In this work we introduce a new specification language, BASEL, that allows to express virtual buffering architectures and management policies representing a variety of economic models. BASEL does not require the user ...
Keywords:
buffer management, admission control, packet scheduling
11
March 2016
MODULARITY 2016: Proceedings of the 15th International Conference on Modularity
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4, Downloads (12 Months): 16, Downloads (Overall): 36
Full text available:
PDF
Event-driven programming has become a major paradigm in developing concurrent, distributed systems. Its benefits are often informally captured by the key tenet of “decoupling”, a notion which roughly captures the ability of modules to join and leave (or fail) applications dynamically, and to be developed by independent parties. Programming models ...
Keywords:
control flow, linear type system, Event-driven programming, aliasing, decoupling
12
November 2015
IEEE Transactions on Parallel and Distributed Systems: Volume 26 Issue 11, November 2015
Publisher: IEEE Press
Efficient subscription summarization and event matching is key to the scalability of content-based publish/subscribe networks (CPSNs). Current summarization and event matching mechanisms based on subscription subsumption induce heavy event processing load on brokers degrading the performance of CPSNs especially under high rates of churn, i.e., addition, deletion, or modification of ...
13
October 2015
SPLASH Companion 2015: Companion Proceedings of the 2015 ACM SIGPLAN International Conference on Systems, Programming, Languages and Applications: Software for Humanity
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2, Downloads (12 Months): 5, Downloads (Overall): 37
Full text available:
PDF
Reactive programming and event-based programming are two closely related programming styles that are becoming ever more important with the advent of advanced HCI technology and the ever increasing requirement for applications to run on the web or on collaborating mobile devices. A number of publications about middleware and language design ...
Keywords:
Complex Event Processing, Object-oriented Programming, Language Design, Reactive Programming, Event-based Program- ming, Functional Reactive Pro- gramming
14
July 2015
SIROCCO 2015: Post-Proceedings of the 22nd International Colloquium on Structural Information and Communication Complexity - Volume 9439
Publisher: Springer-Verlag New York, Inc.
Cloud applications bring new challenges to the design of network elements, in particular accommodating for the burstiness of traffic workloads. Shared memory switches represent the best candidate architecture to exploit buffer capacity; we analyze the performance of this architecture. Our goal is to explore the impact of additional traffic characteristics ...
15
April 2015
IPSN '15: Proceedings of the 14th International Conference on Information Processing in Sensor Networks
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 5, Downloads (12 Months): 40, Downloads (Overall): 173
Full text available:
PDF
Wireless sensor networks (WSNs) are plagued by the possibility of bugs manifesting only at deployment. However, debugging deployed WSNs is challenging for several reasons---the remote location of deployed sensor nodes, the non-determinism of execution that can make it difficult to replicate a buggy run, and the limited hardware resources available ...
Keywords:
debugging, wireless sensor networks, replay, tracing
16
April 2015
IPSN '15: Proceedings of the 14th International Conference on Information Processing in Sensor Networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4, Downloads (12 Months): 15, Downloads (Overall): 62
Full text available:
PDF
Wireless sensor networks (WSNs) are plagued by the possibility of bugs manifesting only at deployment. However, debugging deployed WSNs is challenging for several reasons---the remote location of deployed sensor nodes, the non- determinism of execution that can make it difficult to replicate a buggy run, and the limited hardware resources ...
Keywords:
debugging, wireless sensor networks, replay, tracing
17
December 2014
Middleware '14: Proceedings of the 15th International Middleware Conference
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 5, Downloads (12 Months): 24, Downloads (Overall): 129
Full text available:
PDF
Top- k matching is a fundamental problem underlying on-line advertising platforms, mobile social networks, etc. Distributed processes (e.g., advertisers) specify predicates, which we call subscriptions , for events (e.g., user actions) they wish to react to. Subscriptions define weights for elementary constraints on individual event attributes and do not require ...
18
November 2014
SOCA '14: Proceedings of the 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications
Publisher: IEEE Computer Society
Cyber Physical Systems (CPS), interconnected smart devices in the Internet of Things (IoT) and other data sources are increasingly bridging the gap between the physical and digital world by providing fine-grained data about real-world events. Enterprise software systems are adopting the paradigm of event-based systems (EBS) to enable them to ...
19
October 2014
ICNP '14: Proceedings of the 2014 IEEE 22nd International Conference on Network Protocols
Publisher: IEEE Computer Society
The software-defined networking (SDN) paradigm allows network operators to conveniently deploy network services through a centralized controller. Recent interest in SDNs has fueled the implementation of a variety of network services on controllers written in different languages and supported by different organizations. Given the large number of network services and ...
20
October 2014
SPLASH '14: Proceedings of the companion publication of the 2014 ACM SIGPLAN conference on Systems, Programming, and Applications: Software for Humanity
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3, Downloads (12 Months): 11, Downloads (Overall): 55
Full text available:
PDF
Reactive programming and event-based programming are two closely related programming styles that are becoming ever more important with the advent of advanced HCI technology and the ever increasing requirement for applications to run on the web or on collaborating mobile devices. A number of publications about middleware and language design ...
Keywords:
Complex Event Processing, Functional Reactive Programming, Object-oriented Programming, Event-based Programming, Language Design, Reactive Programming
|
|