Technical Program

Best Paper Award:

RITM: Revocation in the Middle
Pawel Szalachowski, Laurent Chuat, Taeho Lee, and Adrian Perrig (ETH Zurich)

June 27, Day 0

9:00–17:30TutorialsRoom C
9:30–17:30Workshop: ADSN 2016Room B
9:30–15:30Workshop: DCPerf 2016Room D
14:00–17:30Workshop: SDDCS 2016Room A-1
9:00–16:00Workshop: STAM 2016Room A-2
9:00–12:30Workshop: WEC 2016Room A-1

June 28, Day 1

9:00–9:15Opening SessionRoom A+B
9:15–10:15Keynote 1Room A+B
10:30–11:50Session 1A: Distributed Fault Tolerance and DependabilityRoom A+B
Session 1B: Cloud and Datacenter Networks 1Room C
13:00–14:00Session 2A: Distributed Data Management and AnalyticsRoom A+B
Session 2B: Mobile SystemsRoom C
14:20–15:20Session 3: Best Paper NomineesRoom A+B
15:50–17:30Session 4A: Distributed Systems and SoftwareRoom A
Session 4B: Distributed Algorithms and Theory 1Room B

June 29, Day 2

9:00–10:00Keynote 2Room A+B
10:30–11:50Session 5A: Security and Privacy 1Room A
Session 5B: Mobile Crowdsensing and CrowdsourcingRoom B
13:00–14:40Session 6A: Cloud Service and StorageRoom A
Session 6B: Social Networks and Mobile SensingRoom B
15:00–17:00Poster & Demo SessionRoom C
17:00–18:30Excursion (visit Kohfukuji Temple National Treasure Hall)

June 30, Day 3

8:00–8:20Excursion (visit Deer Park (Nara Park))
9:00–10:00Session 7A: Energy Management and Green Distributed ComputingRoom A-1
Session 7B: Smart Communities and Internet of ThingsRoom B
10:15–11:35Session 8A: Distributed Algorithms and Theory 2Room A-1
10:15–11:55Session 8B: Mobile Networks and ProtocolsRoom B
13:00–14:20Session 9A: Cloud and Datacenter Networks 2Room A-1
Session 9B: Security and Privacy 2Room B

June 27, Day 0

9:00–17:30 Tutorials
Room C

9:30–17:30 The 15th International Workshop on Assurance in Distributed Systems and Networks (ADSN 2016)
Room B

9:30–15:30 The 6th International Workshop on Big Data and Cloud Performance (DCPerf 2016)
Room D

14:00–17:30 The International Workshop of Software-Defined Data Communications and Storage (SDDCS 2016)
Room A-1

9:00–16:00 The 2nd International Workshop on Security Testing And Monitoring in Distributed Systems (STAM 2016)
Room A-2

9:00–12:30 The 1st International Workshop of Edge Computing (WEC 2016)
Room A-1

18:30–20:00 Reception

return to timetable

June 28, Day 1

9:00–9:15 Opening Session
Room A+B
9:15–10:15 Keynote 1
Room A+B
Chair: Ricardo Bianchini (Microsoft Research)

What's So Special about Big Learning - a Distributed Systems Perspective
Phillip Gibbons (Carnegie Mellon University, U.S.A.)

return to timetable

10:15–10:30 Break
10:30–11:50 [Session 1A] Distributed Fault Tolerance and Dependability
Room A+B
Chair: Fernando Pedone (University of Lugano)

INSPECTOR: Data Provenance using Intel Processor Trace (PT)
Joerg Thalheim, Pramod Bhatotia, and Christof Fetzer (TU Dresden)

PAG: Private and Accountable Gossip
Jérémie Decouchant (University of Luxembourg), Sonia Ben Mokhtar (CNRS LIRIS), Albin Petit (INSA Lyon), and Vivien Quéma (Grenoble INP)

Practical Intrusion-Tolerant Networks
Daniel Obenshain, Thomas Tantillo, and Amy Babay (Johns Hopkins University), John Schultz (Spread Concepts LLC), Andrew Newell and Md. Endadul Hoque (Purdue University), Yair Amir (Johns Hopkins University), and Cristina Nita-Rotaru (Northeastern University)

Gremlin: Systematic Resilience Testing of Microservices
Victor Heorhiadi (UNC Chapel Hill), Shriram Rajagopalan and Hani Jamjoom (IBM T. J. Watson Research), Michael K. Reiter (UNC Chapel Hill), and Vyas Sekar (Carnegie Mellon University)

return to timetable

10:30–11:50 [Session 1B] Cloud and Datacenter Networks 1
Room C
Chair: Yu Hua (Huazhong University of Science and Technology)

CRONets: Cloud-Routed Overlay Networks
Chris X. Cai (University of Illinois, Urbana-Champaign), Franck Le (IBM Research T.J.Watson), Xin Sun (Florida International University), Geoffrey Xie (Naval Postgraduate School), Hani Jamjoom (IBM Research T.J.Watson), and Roy H. Campbell (University of Illinois, Urbana-Champaign)

Riptide: Jump-Starting Back-Office Connections in Cloud Systems
Marcel Flores (Northwestern University) and Amir Khakpour and Harkeerat Bedi (Verizon Digital Media Services)

The Internet is For Porn: Measurement and Analysis of Online Adult Traffic
Faraz Ahmed (Michigan State University), M. Zubair Shafiq (The University of Iowa), and Alex X. Liu (Michigan State University)

Tuning the Aggressive TCP Behavior for Highly Concurrent HTTP Connections in Data Center
Jiawei Huang, Jianxin Wang, and Tao Zhang (Central South University), Jianer Chen (Texas A&M University), and Yi Pan (Georgia State University)

return to timetable

11:50–13:00 Lunch
13:00–14:00 [Session 2A] Distributed Data Management and Analytics
Room A+B
Chair: Lydia Chen (IBM Switzerland)

A Performance Analysis of Incentive Mechanisms for Cooperative Computing
Carlee Joe-Wong (Princeton University), Youngbin Im (University of Colorado at Boulder), Kyuyong Shin (Korea Military Academy), and Sangtae Ha (University of Colorado Boulder)

GrapH: Heterogeneity-Aware Graph Computation with Adaptive Partitioning
Christian Mayer, Muhammad Adnan Tariq, Chen Li, and Kurt Rothermel (University of Stuttgart)

Minimum-cost Cloud Storage Service Across Multiple Cloud Providers
Guoxin Liu and Haiying Shen (Clemson University)

return to timetable

13:00–14:00 [Session 2B] Mobile Systems
Room C
Chair: Sotiris Nikoletseas (University of Patras and CTI)

A Realistic and Optimized V2V Communication System for Taxicabs
Yang Wang and Erkun Yang (University of Science and Technology of China), Wei Zheng (Sanofi-Aventis,U.S.), Liusheng Huang, Hengchang Liu and Binxin Liang (University of Science and Technology of China)

Optimal Marching of Autonomous Networked Robots
Buri Ban, Miao Jin, and Hongyi Wu (University of Louisiana at Lafayette)

RichNote: Adaptive Selection and Delivery of Rich Media Notifications to Mobile Users
Md Yusuf Sarwar Uddin (University of California Irvine), Vinay Setty (Max Planck Institute for Informatics), Ye Zhao (University of California Irvine), Roman Vitenberg (University of Oslo), and Nalini Venkatasubrahmanian (University of California Irvine)

return to timetable

14:00–14:20 Break
14:20–15:20 [Session 3] Best Paper Nominees
Room A+B
Chair: Hiroshi Shigeno (Keio University)

Decentralized Context Sharing in Vehicular Delay Tolerant Networks with Compressive Sensing
Kun Xie and Wang Luo (Hunan University), Xin Wang (State University of New York at Stony Brook), Dongliang Xie (Beijing University of Posts and Telecommunications), Jiannong Cao (The Hong Kong Polytechnic University) and Jigang Wen and Gaogang Xie (Chinese Academy of Sciences)

RuleTris: Minimizing Rule Update Latency for TCAM-based SDN Switches
Xitao Wen (Northwestern University), Bo Yang (Zhejiang University), Yan Chen (Northwestern University), Li Erran Li (Fudan University), Kai Bu (Zhejiang University), Peng Zheng (Xi'an Jiaotong University), Yang Yang (Northwestern University), and Chengchen Hu (Xi'an Jiaotong University)

RITM: Revocation in the Middle
Pawel Szalachowski, Laurent Chuat, Taeho Lee, and Adrian Perrig (ETH Zurich)

return to timetable

15:20–15:50 Break
15:50–17:30 [Session 4A] Distributed Systems and Software
Room A
Chair: Roman Vitenberg (University of Oslo)

A Distributed Auctioneer for Resource Allocation in Decentralized Systems
Amin M. Khan (Universitat Politècnica de Catalunya), Xavier Vilaça and Luís Rodrigues (INESC-ID Lisboa), and Felix Freitag (Universitat Politècnica de Catalunya)

Datacomp: Locally Independent Adaptive Compression for Real-World Systems
Peter A. H. Peterson (University of Minnesota Duluth) and Peter L. Reiher (University of California, Los Angeles)

Hybrid Content-based Routing Using Network and Application Layer Filtering
Sukanya Bhowmik, Muhammad Adnan Tariq, Lobna Hegazy, and Kurt Rothermel (University of Stuttgart)

Exploiting Causality to Engineer Elastic Distributed Software
K. R. Jayaram (IBM Research, USA)

RUSH: A RobUst ScHeduler to Manage Uncertain Completion-Times in Shared Clouds
Zhe Huang (Princeton University), Bharath Balasubramanian (AT&T Labs Research), Michael Wang (Princeton University), Tian Lan (George Washington University), Mung Chiang (Princeton University), and Danny H.K. Tsang (The Hong Kong University of Science and Technology)

return to timetable

15:50–17:30 [Session 4B] Distributed Algorithms and Theory 1
Room B
Chair: Jose Rolim (University of Geneva)

The Same Speed Timer in Population Protocols
Yuichi Sudo (NTT Secure Platform Laboratories), Toshimitsu Masuzawa (Osaka University), and Ajoy K. Datta and Lawrence L. Larmore (University of Nevada, Las Vegas)

Interactive Wireless Charging for Energy Balance
Sotiris Nikoletseas and Theofanis P. Raptis (University of Patras) and Christoforos Raptopoulos (Computer Technology Institute and Press "Diophantus")

Nearly Optimal Distributed Algorithm For Computing Betweenness Centrality
Qiang-Sheng Hua (Huazhong University of Science and Technology), Haoqiang Fan (Tsinghua University), and Ming Ai, Lixiang Qian, Yangyang Li, Xuanhua Shi, and Hai Jin (Huazhong University of Science and Technology)

An Efficient Lock-free Logarithmic Search Data Structure Based on Multi-dimensional List
Deli Zhang and Damian Dechev (University of Central Florida)

Characterizing the Computational Power of Anonymous Mobile Robots
Mattia D'Emidio (Gran Sasso Science Institute), Daniele Frigioni (University of L'Aquila), and Alfredo Navarra (University of Perugia)

return to timetable

June 29, Day 2

9:00–10:00 Keynote 2
Room A+B
Chair: Teruo Higashino (Osaka University)

Power of Big Data - from Commercial Profits to Societal Benefits -
Masaru Kitsuregawa (National Institute of Informatics / University of Tokyo, Japan)

return to timetable

10:00–10:30 Break
10:30–11:50 [Session 5A] Security and Privacy 1
Room A
Chair: Sherman Chow (Chinese University of Hong Kong)

CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data
Nolen Scaife (University of Florida), Henry Carter (Villanova University), and Patrick Traynor and Kevin Butler (University of Florida)

Amnesia: A Bilateral Generative Password Manager
Luren Wang, Yue Li, and Sun Kun (The College of William and Mary)

Know Your Phish: Novel Techniques for Detecting Phishing Sites and their Targets
Samuel Marchal and Kalle Saari (Aalto University), Nidhi Singh (Intel Security), and N. Asokan (Aalto University)

BotMeter: Charting DGA-Botnet Landscapes in Large Networks
Ting Wang (Lehigh University), Xin Hu (Pinterest), Jiyong Jang (IBM Research), Shouling Ji (Georgia Institute of Technology), Marc Stoecklin (IBM Research), and Teryl Taylor (UNC Chapel Hill)

return to timetable

10:30–11:50 [Session 5B] Mobile Crowdsensing and Crowdsourcing
Room B
Chair: Takahiro Hara (Osaka University)

Enabling Privacy-Preserving Incentives for Mobile Crowd Sensing Systems
Haiming Jin (University of Illinois at Urbana-Champaign), Lu Su (State University of New York at Buffalo), Bolin Ding (Microsoft Research), and Klara Nahrstedt and Nikita Borisov (University of Illinois at Urbana-Champaign)

Quality-aware and Fine-grained Incentive Mechanisms for Mobile Crowdsensing
Jing Wang and Jian Tang (Syracuse University), Dejun Yang (Colorado School of Mines), Erica Wang (Hershey High School), and Guoliang Xue (Arizona State University)

Toward Optimal DoS-resistant authentication in Crowdsensing Networks via Evolutionary Game
Na Ruan, Lei Gao, Haojin Zhu, Weijia Jia, Xiang Li, and Qi Hu (Shanghai Jiao Tong University)

Resource-Aware Photo Crowdsourcing Through Disruption Tolerant Networks
Yibo Wu, Yi Wang, Wenjie Hu, Xiaomei Zhang, and Guohong Cao (The Pennsylvania State University)

return to timetable

11:50–13:00 Lunch
13:00–14:40 [Session 6A] Cloud Service and Storage
Room A
Chair: Wyatt Lloyd (University of Southern California and Facebook)

Mayflower: Improving Distributed Filesystem Performance Through SDN/Filesystem Co-Design
Sajjad Rizvi, Xi Li, Bernard Wong, Fiodar Kazhamiaka, and Benjamin Cassell (University of Waterloo)

A Parity-based Data Outsourcing Model for Query Authentication and Correction
Shixin Tian, Ying Cai, and Zhenbi Hu (Iowa State University)

Cure: Strong semantics meets high availability and low latency
Deepthi Devaki Akkoorath (University of Kaiserslautern), Alejandro Tomsic (Inria & LIP6-UPMC-Sorbonne Universités), Manuel Bravo and Zhongmiao Li (Université Catholique de Louvain), Tyler Crain (Inria & LIP6-UPMC-Sorbonne Universités), Annette Bieniusa (University of Kaiserslautern), Nuno Preguiça (NOVA LINCS), and Marc Shapiro (Inria & LIP6-UPMC-Sorbonne Universités)

Flexible Instance: Meeting Deadlines of Delay Tolerant Jobs in The Cloud with Dynamic Pricing
Xiaomeng Yi and Fangming Liu (Huazhong University of Science and Technology), Zongpeng Li (University of Calgary), and Hai Jin (Huazhong University of Science and Technology)

SpotLight: An Information Service for the Cloud
Xue Ouyang, David Irwin, and Prashant Shenoy (University of Massachusetts Amherst)

return to timetable

13:00–14:40 [Session 6B] Social Networks and Mobile Sensing
Room B
Chair: Vana Kalogeraki (Athens University of Economics and Business)

Routing and Scheduling of Social Influence Diffusion in Online Social Networks
Hui-Ju Hung (Pennsylvania State University), De-Nian Yang (Academia Sinica), and Wang-Chien Lee (Pennsylvania State University)

Social Graph Publishing with Privacy Guarantees
Faraz Ahmed, Alex X. Liu, and Rong Jin (Michigan State University)

ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks
Douglas McGeehan, Dan Lin, and Sanjay Madria (Missouri University of Science and Technology)

On Source Dependency Models for Reliable Social Sensing: Algorithms and Fundamental Error Bounds
Shuochao Yao, Shaohan Hu, Shen Li, and Yiran Zhao (University of Illinois at Urbana Champaign), Lu Su (SUNY Buffalo), Lance Kaplan (Army Research Labs), Aylin Yener (Pennsylvania State University), and Tarek Abdelzaher (University of Illinois at Urbana Champaign)

Efficient Top-k Result Diversification for Mobile Sensor Data
Masahiro Yokoyama and Takahiro Hara (Osaka University)

return to timetable

14:40–15:00 Break
15:00–17:00 Poster & Demo Session
Room C

List of posters and demos

return to timetable

17:00–18:30 Excursion (visit Kohfukuji Temple National Treasure Hall)

return to timetable

19:00– Banquet

June 30, Day 3

8:00–8:20 Excursion (visit Deer Park (Nara Park))

return to timetable

9:00–10:00 [Session 7A] Energy Management and Green Distributed Computing
Room A-1
Chair: Fangming Liu (Huazhong University of Science and Technology)

Energy Minimization for Quality-Constrained Video with Multipath TCP over Heterogeneous Wireless Networks
Jiyan Wu, Bo Cheng, and Ming Wang (Beijing University of Posts and Telecommunications)

Efficient Resource Allocation and Consolidation with Selfish Agents: An Adaptive Auction Approach
Richard T. B. Ma (National University of Singapore)

HIDE: AP-assisted Broadcast Traffic Management to Save Smartphone Energy
Ge Peng, Gang Zhou, and David T. Nguyen (College of William and Mary), Xin Qi (VMware Inc), and Shan Lin (Stony Brook University)

return to timetable

9:00–10:00 [Session 7B] Smart Communities and Internet of Things
Room B
Chair: Hideyuki Tokuda (Keio University)

Accurate Spatial Calibration of RFID Antennas via Spinning Tags
Chunhui Duan, Lei Yang, and Yunhao Liu (Tsinghua University)

WiLocator: WiFi-sensing based Real-time Bus Tracking and Arrival Time Prediction in Urban Environments
Wenping Liu (Huazhong University of Science and Technology ), Jiangchuan Liu (Simon Fraser University), Hongbo Jiang (Huazhong University of Science and Technology), Bicheng Xu (Simon Fraser University), Hongzhi Lin (Huazhong University of Science and Technology), and Guoyin Jiang and Jing Xing (Hubei University of Economics)

CACE: Exploiting Behavioral Interactions for Improved Activity Recognition in Multi-Inhabitant Smart Homes
Mohammad Arif Ul Alam and Nirmalya Roy (University of Maryland Baltimore County), Archan Misra (Singapore Management University), and Joseph Taylor (University of Maryland Baltimore County)

return to timetable

10:00–10:15 Break
10:15–11:35 [Session 8A] Distributed Algorithms and Theory 2
Room A-1
Chair: Toshimitsu Masuzawa (Osaka University)

Overlay Design for Topic-based Publish/Subscribe under Node Degree Constraints
Chen Chen (University of Toronto), Yoav Tock (IBM Research - Haifa), and Hans-Arno Jacobsen (University of Toronto)

Service Placement for Detecting and Localizing Failures Using End-to-End Observations
Ting He (IBM T. J. Watson Research Center), Novella Bartolini (Sapienza University of Rome), Hana Khamfroush and InJung Kim (Pennsylvania State University), Liang Ma (IBM T. J. Watson Research Center), and Tom La Porta (Pennsylvania State University)

Live Exploration of Dynamic Rings
Giuseppe Antonio Di Luna (University of Ottawa), Stefan Dobrev (Slovak Academy of Sciences), Paola Flocchini (University of Ottawa), and Nicola Santoro (Carleton University)

Randomized Load Balancing in Finite Regimes
Antonie S. Godtschalk (Capgemini, Utrecht) and Florin Ciucu (University of Warwick)

return to timetable

10:15–11:55 [Session 8B] Mobile Networks and Protocols
Room B
Chair: Stephan Sigg (Georg-August University of Goettingen)

Spectrum Matching
Yanjiao Chen (University of Toronto), Linshan Jiang, Haofan Cai, and Jin Zhang (South University of Science and Technology of China), and Baochun Li (University of Toronto)

CACA: Link-based Channel Allocation Exploiting Capture Effect for Channel Reuse in Wireless Sensor Networks
Junghyun Jun (Indian Institute of Technology Ropar), Solchan Yeon (Kookmin University), Titir Kundu and Dharma P Agrawal (University of Cincinnati), and Jaehoon Jeong (Sungkyunkwan University)

An Analysis of Onion-Based Anonymous Routing for Delay Tolerant Networks
Kazuya Sakai (Tokyo Metropolitan University), Min-Te Sun (National Central University), Wei-Shinn Ku (Auburn University), Jie Wu (Temple University), and Faisal S. Alanazi (The Ohio State University)

Directional Beam Alignment for Millimeter Wave Cellular Systems
Jie Zhao and Xin Wang (Stony Brook University) and Harish Viswanathan (Alcatel-Lucent)

Measurement, Modeling, and Analysis of TCP in High-Speed Mobility Scenarios
Qingfang Liu and Ke Xu (Tsinghua University), Haiyang Wang (University of Minnesota at Duluth), Meng Shen (Beijing Institute of Technology), and Li Li and Qingyang Xiao (Tsinghua University)

return to timetable

11:55–13:00 Lunch
13:00–14:20 [Session 9A] Cloud and Datacenter Networks 2
Room A-1
Chair: Sanjay Madria (Missouri University of Science and Technology)

Backlog-Aware SRPT Flow Scheduling in Data Center Networks
Tong Zhang, Fengyuan Ren, and Ran Shu (Tsinghua University)

An NFV Orchestration Framework for Interference-free Policy Enforcement
Xin Li and Chen Qian (University of Kentucky)

Bandwidth-Greedy Hashing for Massive-Scale Concurrent Flows
Tian Pan, Bin Liu, Xiaoyu Guo, and Yang Li (Tsinghua University) and Haoyu Song (Huawei Technologies)

Fast Total Ordering for Modern Data Centers
Amy Babay and Yair Amir (Johns Hopkins University)

return to timetable

13:00–14:20 [Session 9B] Security and Privacy 2
Room B
Chair: Sonia Ben Mokhtar (LIRIS-CNRS)

A De-compositional Approach to Regular Expression Matching for Network Security Applications
Eric Norige and Alex X. Liu (Michigan State University)

Privacy-preserving Data Classification and Similarity Evaluation for Distributed Systems
Qi Jia, Linke Guo, and Zhanpeng Jin (Binghamton University) and Yuguang Fang (University of Florida)

Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor
Qian Wang, Shengshan Hu, and Jingjun Wang (Wuhan University) and Kui Ren (The State University of New York at Buffalo)

D-DEMOS: A Distributed, End-to-end Verifiable, Internet Voting system
Nikos Chondros (University of Athens), Bingsheng Zhang (University of Lancaster), Thomas Zacharias and Panos Diamantopoulos (University of Athens), Stathis Maneas (University of Toronto), and Christos Patsonakis, Alex Delis, Aggelos Kiayias, and Mema Roussopoulos (University of Athens)

return to timetable