


default search action
40th SRDS 2021: Shanghai, China
- 40th International Symposium on Reliable Distributed Systems, SRDS 2021, Chicago, IL, USA, September 20-23, 2021. IEEE 2021, ISBN 978-1-6654-3819-3

- Christian Berger

, Hans P. Reiser, Alysson Bessani
:
Making Reads in BFT State Machine Replication Fast, Linearizable, and Live. 1-12 - Dominik Widhalm

, Karl M. Göschka
, Wolfgang Kastner:
Node-level indicators of soft faults in wireless sensor networks. 13-22 - Daniel Cason, Enrique Fynn, Nenad Milosevic, Zarko Milosevic, Ethan Buchman, Fernando Pedone

:
The design, architecture and performance of the Tendermint Blockchain Network. 23-33 - Chrysoula Stathakopoulou, Signe Rüsch, Marcus Brandenburger, Marko Vukolic:

Adding Fairness to Order: Preventing Front-Running Attacks in BFT Protocols using TEEs. 34-45 - Igor Zavalyshyn, Thomas Given-Wilson, Axel Legay, Ramin Sadre, Etienne Rivière:

Chaos Duck: A Tool for Automatic IoT Software Fault-Tolerance Analysis. 46-55 - Guillaume Rosinosky

, Florian Schmidt, Oleh Bodunov, Christof Fetzer, André Martin, Etienne Rivière:
Active replication for latency-sensitive stream processing in Apache Flink. 56-66 - Hadi Moloodi, Fathiyeh Faghih, Borzoo Bonakdarpour:

Parameterized Distributed Synthesis of Fault-Tolerance Using Counter Abstraction. 67-77 - Douglas Simões Silva, Rafal Graczyk

, Jérémie Decouchant
, Marcus Völp
, Paulo Esteves Veríssimo:
Threat Adaptive Byzantine Fault Tolerant State-Machine Replication. 78-87 - Jan Z. Konczak, Pawel T. Wojciechowski

:
Failure Recovery from Persistent Memory in Paxos-Based State Machine Replication. 88-98 - Zhinan Cheng, Lu Tang, Qun Huang, Patrick P. C. Lee:

Enabling Low-Redundancy Proactive Fault Tolerance for Stream Machine Learning via Erasure Coding. 99-108 - Tong Cao, Jérémie Decouchant

, Jiangshan Yu
, Paulo Esteves Veríssimo:
Characterizing the Impact of Network Delay on Bitcoin Mining. 109-119 - Orestis Alpos, Christian Cachin, Luca Zanolini:

How to Trust Strangers: Composition of Byzantine Quorum Systems. 120-131 - Rui Han, Jiang Xiao, Xiaohai Dai, Shijie Zhang

, Yi Sun, Baochun Li, Hai Jin:
Vassago: Efficient and Authenticated Provenance Query on Multiple Blockchains. 132-142 - Xian Zhang, Xiaobing Guo, Zixuan Zeng, Wenyan Liu, Zhongxin Guo, Yang Chen, Shuo Chen, Qiufeng Yin, Mao Yang:

Argus: A Fully Transparent Incentive System for Anti-Piracy Campaigns. 143-153 - Ardhi Putra Pratama Hartono, Christof Fetzer:

BROFY: Towards Essential Integrity Protection for Microservices. 154-163 - Nazatul Haque Sultan, Vijay Varadharajan, Chandan Kumar Chaudhary

, Seyit Camtepe
, Surya Nepal
:
A Secure Access and Accountability Framework for Provisioning Services in Named Data Networks. 164-175 - Rogério Pontes

, Bernardo Portela
, Manuel Barbosa
, Ricardo Vilaça
:
CODBS: A cascading oblivious search protocol optimized for real-world relational database indexes. 176-186 - Christian Göttel, Konstantinos Parasyris, Osman S. Unsal, Pascal Felber

, Marcelo Pasin, Valerio Schiavoni
:
Scrooge Attack: Undervolting ARM Processors for Profit: Practical experience report. 187-197 - Sarah Abdelwahab Gaballah, Christoph Coijanovic

, Thorsten Strufe, Max Mühlhäuser:
2PPS - Publish/Subscribe with Provable Privacy. 198-209 - Rebekah Houser, Shuai Hao, Zhou Li, Daiping Liu, Chase Cotton, Haining Wang:

A Comprehensive Measurement-based Investigation of DNS Hijacking. 210-221 - Sina Gholamian, Paul A. S. Ward:

What Distributed Systems Say: A Study of Seven Spark Application Logs. 222-232 - Paulo R. Coelho, Fernando Pedone

:
GeoPaxos+: Practical Geographical State Machine Replication. 233-243 - Rui Li, Zhinan Cheng, Patrick P. C. Lee, Pinghui Wang, Yi Qiang, Lin Lan, Cheng He, Jinlong Lu, Mian Wang, Xinquan Ding:

Automated Intelligent Healing in Cloud-Scale Data Centers. 244-253 - Lars Nielsen, Dorian Burihabwa, Valerio Schiavoni

, Pascal Felber
, Daniel E. Lucani:
MinervaFS: A User-Space File System for Generalised Deduplication: (Practical experience report). 254-264 - Simon Scherrer, Che-Yu Wu, Yu-Hsi Chiang, Benjamin Rothenberger, Daniele Enrico Asoni, Arish Sateesan

, Jo Vliegen, Nele Mentens
, Hsu-Chun Hsiao, Adrian Perrig:
Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows. 265-276 - Colette Johnen

, Luciana Arantes, Pierre Sens:
FIFO and Atomic broadcast algorithms with bounded message size for dynamic systems. 277-287 - Dolev Adas, Roy Friedman:

Sliding Window CRDT Sketches. 288-298 - Tong Chen, Yingxiao Xiang, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Jiqiang Liu, Gang Li

, Qi Alfred Chen:
Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory. 299-309 - Buse G. A. Tekgul, Yuxi Xia, Samuel Marchal

, N. Asokan
:
WAFFLE: Watermarking in Federated Learning. 310-320 - Zhipin Gu

, Yuexiang Yang, Heyuan Shi
:
Detecting Malicious Gradients from Asynchronous SGD on Variational Autoencoder. 321-330 - Fangqi Liu, Tzu-Yi Fan, Casey Grant, Cheng-Hsin Hsu, Nalini Venkatasubramanian:

DragonFly: Drone-Assisted High-Rise Monitoring for Fire Safety. 331-342 - Chunyu Mao, Wojciech M. Golab:

Sharding Techniques in the Era of Blockchain. 343-344 - Yulei Jia, Guangping Xu, Chi Wan Sung, Salwa Mostafa

:
Adaptive Erasure Coded Data Maintenance for Consensus in Distributed Networks. 345-346 - Ritam Ganguly:

Runtime Verification for Blockchains. 347-348 - Anik Momtaz:

Runtime Verification for Distributed Cyber-Physical Systems. 349-350

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














