Conference Program
Program Overview
October 1st, 2019: Nautibus Building | |||
---|---|---|---|
DRSS (Room C4) | FURTHERMORE (Room C5) | W-PSDS + WBD (LIRIS Room) | |
8:00-8:45 | Registration | ||
8:45-9:00 | Opening | ||
9:00-10:00 | Invited Talk | Invited Talk | Invited Talk W-PSDS |
10:00-10:30 | Coffee | ||
10:30-12:30 | Session 1 | Session 1 | Session 1: W-PSDS |
12:30-14:00 | Lunch | ||
14-16 30 | Session 2 | Invited Talk WBD | |
Session 2 | Session 2: WBD | ||
16:30-17:00 | Coffee break | Coffee break | |
17:00-18:00 | Michel Raynal Invited Tutorial | ||
18:00-19:00 | Workshop Reception |
October 2nd, 2019: Bibliothèque Marie Curie | ||
---|---|---|
8:00 | 8:45 | Registration |
8:45 | 9:00 | Opening |
9:00 | 10:00 | Keynote - Peter Druschel Session chair: Gilles Muller |
10:00 | 10:30 | Coffee/Tea break |
10:30 | 12:30 | Session 1 - Security & Privacy Session chair: Kostas Magoutis |
12:30 | 14:00 | Lunch |
14:00 | 15:40 | Session 2 - Database Management Systems
Session chair: Hari Ramasamy |
15:40 | 16:10 | Coffee/Tea break |
16:10 | 17:50 | Session 3 - Fault Tolerance Session chair: Anne Remke |
19:00 | 21:30 | Conference Reception: Musée des Confluences |
October 3rd, 2019: Bibliothèque Marie Curie | ||
---|---|---|
8:00 | 8:45 | Registration |
9:00 | 10:00 | Keynote - Anne-Marie Kermarrec
Session chair: Rui Oliveira |
10:00 | 10:30 | Coffee/Tea break |
10:30 | 11:30 | Session 4 - Best Paper Candidates
Session chair: José Pereira |
11:30 | 12:00 | 1-minute madness
Session chair: François Taïani |
12:00 | 14:00 | Lunch + Posters/Demos/PhD Forum |
14:00 | 16:00 | Session 5 - Networks
Session chair: Xavier Defago |
16:00 | 16:30 | Coffee/Tea break |
16:30 | 18:30 | Session 6 - Industrial Session
Session chair: Evgenia Smirni |
19:30 | 21:30 | Banquet: Brasseries Georges |
October 4th, 2019: Bibliothèque Marie Curie | ||
---|---|---|
9:00 | 10:00 | Session 7 - Storage
Session chair: Joao Paulo |
10:00 | 10:30 | Coffee/Tea break |
10:30 | 11:30 | Session 8 - Blockchain
Session chair: Pascal Felber |
11:30 | 12:00 | Closing |
Detailed Conference Program
Session | Paper Title | Authors |
---|---|---|
Session 1 - Security & Privacy | P3LS: Plausible Deniability for Practical Privacy-Preserving Live Streaming | Jérémie Decouchant, Antoine Boutet, Jiangshan Yu and Paulo Esteves-Veríssimo |
Fuzzing IPC with Knowledge Inference | Kun Yang, Hanqing Zhao, Chao Zhang, Jianwei Zhuge and Haixin Duan | |
Anonymous and Confidential File Sharing over Untrusted Clouds | Stefan Contiu, Rafael Pires, Sébastien Vaucher, Marcelo Pasin, Pascal Felber and Laurent Réveillère | |
Preacher: Network Policy Checker for Adversarial Environments | Kashyap Thimmaraju, Liron Schiff and Stefan Schmid | |
Architecture and prototype implementation for process-aware intrusion detection in electrical grids | Robert Flosbach, Justyna Chromik and Anne Remke | |
Supply Chain Malware Targets SGX: Take Care of What You Sign (Practical Experience Report) | Andrei Mogage, Rafael Pires, Vlad Crăciun, Pascal Felber and Emanuel Onica | |
Session 2 - Database Management Systems | d’Artagnan: a Trusted NoSQL Database on Untrusted Clouds | Rogério Pontes, Francisco Maia, Nuno Machado and Ricardo Vilaça |
Gyro: A Modular Scale-Out Layer for Single-Server DBMSs | Habib Saissi, Marco Serafini and Neeraj Suri | |
Fulva: Efficient Live Migration for In-memory Key-Value Stores with Zero Downtime | Jiewen Hai, Cheng Wang and Heming Cui | |
ESCAPe: Elastic Caching For Big Data Systems | Thanasis Priovolos, Stathis Maroulis and Vana Kalogeraki | |
BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage | Bernardo Ferreira, Bernardo Portela, Tiago Oliveira, Guilherme Borges, Henrique Domingos and João Leitão | |
Session 3 - Fault Tolerance | Fault Tolerant High Performance Solver for Linear Equation Systems | Marcello Artioli, Daniela Loreti and Anna Ciampolini |
DBFT: A Byzantine Fault Tolerant Protocol with Graceful Performance Degradation | Jingjing Zhang, Yingyao Rong, Jiannong Cao, Chunming Rong, Jing Bian and Weigang Wu | |
Making Speculative BFT Resilient with Trusted Monotonic Counters | Lachlan Gunn, Jian Liu, Bruno Vavala and N Asokan | |
Multilevel Checkpoint/Restart for Large Computational Jobs on Distributed Computing Resources | Masoud Gholami Estahbanati and Florian Schintke | |
Deterministic Fuzzy Checkpoints | Michael Eischer, Markus Büttner and Tobias Distler | |
Session 4 - Best Paper Candidates | A More Consistent Understanding of Consistency | Subhajit Sidhanta, Ricardo Dias and Rodrigo Rodrigues |
Improved Fast Rerouting Using Postprocessing | Klaus-Tycho Förster, Andrzej Kamisinski, Yvonne-Anne Pignolet, Stefan Schmid and Gilles Tredan | |
Resilient Wide-Area Byzantine Consensus Using Adaptive Weighted Replication | Christian Berger, Hans P Reiser, João Sousa and Alysson Bessani | |
Session 5 - Networks | Emergent Overlays for Adaptive MANET Broadcast | Raziel Carvajal Gomez, Yérom-David Bromberg, Yehia Elkhatib, Laurent Réveillère and Etienne Rivière |
A Dual Digraph Approach for Leaderless Atomic Broadcast | Marius Poke and Colin W Glass | |
Merkle Search Trees: Efficient State-Based CRDTs in Open Networks | Alex Auvolat and François Taïani | |
Revisiting Broadcast Algorithms for Wireless Edge Networks | André Rosa, Pedro Ákos Costa and João Leitão | |
THUNDERSTORM: a tool to evaluate dynamic network topologies on distributed systems | Luca Liechti, Paulo Gouveia, João Neves, Peter Kropf, Miguel Matos and Valerio Schiavoni | |
Attack-resistant Spanning Tree Construction in Route-Restricted Overlay Networks | Martin Byrenheid, Stefanie Roos and Thorsten Strufe | |
Session 6 - Industrial Session | ARM Research - Challenges and Opportunities for Efficient Serverless Computing at the Edge | Phani K Gadepalli, Gregor Peach, Ludmila Cherkasova, Rob Aitken, Gabriel Parmer |
RedHat - Scalability and resilience in practice: current trends and opportunities | Mark Little and Julien Ponge | |
Orange - Toward an in-kernel high performance key-value store implementation | Kahina Lazri, Antoine Blin, Julien Sopena, and Gilles Muller | |
IBM - Combining Learning and Model-Based Reasoning to Reduce Uncertainties in Cloud Security and Compliance Auditing | Uttam Thakore, Rohit Ranchal, Yi-Hsiu Wei, and Harigovind Ramasamy | |
Session 7 - Storage | A Generic Construction for All Parameters in Minimum Storage Regenerating Codes | Liuqing Ye, Dan Feng, Yuchong Hu and Xueliang Wei |
Exploring Declustered Software RAID for Enhanced Reliability and Recovery Performance in Storage Systems | Zhi Qiao, Song Fu, Hsing-Bung Chen and Bradley Settlemyer | |
Lightweight Dynamic Redundancy Control for Server-based Storage | Takayuki Fukatani, Hieu Hanh Le and Haruo Yokota | |
Session 8 - Blockchain | Bloxy: Providing Transparent and Generic BFT-Based Ordering Services for Blockchains | Signe Rüsch, Rüdiger Kapitza and Kai Bleeke |
Blockchain-based Metadata Protection for Archival Systems | Arnaud L'Hutereau, Dorian Burihabwa, Pascal Felber, Hugues Mercier and Valerio Schiavoni | |
Trusted Computing meets Blockchain: Rollback Attacks and a Solution for Hyperledger Fabric | Marcus Brandenburger, Christian Cachin, Rüdiger Kapitza and Alessandro Sorniotti |