International Middleware Conference最新文献

筛选
英文 中文
Blockchain Landscape and AI Renaissance: The Bright Path Forward 区块链景观和人工智能复兴:光明的前进道路
International Middleware Conference Pub Date : 2018-12-10 DOI: 10.1145/3279945.3279947
H. Jacobsen, Mohammad Sadoghi, M. Tabatabaei, R. Vitenberg, Kaiwen Zhang
{"title":"Blockchain Landscape and AI Renaissance: The Bright Path Forward","authors":"H. Jacobsen, Mohammad Sadoghi, M. Tabatabaei, R. Vitenberg, Kaiwen Zhang","doi":"10.1145/3279945.3279947","DOIUrl":"https://doi.org/10.1145/3279945.3279947","url":null,"abstract":"Known for powering cryptocurrencies such as Bitcoin and Ethereum, blockchain is seen as a disruptive technology capable of revolutionizing a wide variety of domains, ranging from finance to governance, by offering superior security, reliability, and transparency founded upon a decentralized and democratic computational model. In this tutorial, we first present the original Bitcoin design, along with Ethereum and Hyperledger, and reflect on their design choices through the academic lens. We further provide an overview of potential applications and associated research challenges, as well as a survey of ongoing research directions related to byzantine fault-tolerance consensus protocols. We highlight the new opportunities blockchain creates for building the next generation of secure middleware platforms and explore the possible interplay between AI and blockchains, or more specifically, how blockchain technology can enable the notion of \"decentralized intelligence.\" We conclude with a walkthrough demonstrating the process of developing a decentralized application using a popular Smart Contract language (Solidity) over the Ethereum platform","PeriodicalId":262822,"journal":{"name":"International Middleware Conference","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117314288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Tutorial: Adaptive Replication and Partitioning in Data Systems 教程:数据系统中的自适应复制和分区
International Middleware Conference Pub Date : 2018-12-10 DOI: 10.1145/3279945.3279946
Brad Glasbergen, Michael Abebe, Khuzaima S. Daudjee
{"title":"Tutorial: Adaptive Replication and Partitioning in Data Systems","authors":"Brad Glasbergen, Michael Abebe, Khuzaima S. Daudjee","doi":"10.1145/3279945.3279946","DOIUrl":"https://doi.org/10.1145/3279945.3279946","url":null,"abstract":"To meet growing application demands, distributed data systems replicate and partition data across multiple machines. Replication increases the resource and request processing capabilities of a system by spreading copies of the data across multiple machines, while partitioning splits data across machines to achieve the same objectives. Replication and partitioning present different trade-offs in the form of replication maintenance and multi-machine coordination costs, which system administrators must carefully evaluate. Traditionally, administrators made replication and partitioning decisions based on their understanding of the application workload, which results in suboptimal performance if the system is misconfigured or if the workload changes. However, systems that adaptively employ replication and partitioning can adjust these decisions based on workload observations and predictions, which improves performance and reduces complexity for administrators. In this tutorial, we present an overview of techniques used by systems to adaptively partition and replicate data and services. We focus on the decision-making strategies employed by these systems, and how these decisions are executed in an online environment. Finally, we identify opportunities for research in the area.","PeriodicalId":262822,"journal":{"name":"International Middleware Conference","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117256574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Usable declarative configuration specification and validation for applications, systems, and cloud 用于应用程序、系统和云的可用声明性配置规范和验证
International Middleware Conference Pub Date : 2017-12-11 DOI: 10.1145/3154448.3154453
Salman Baset, Sahil Suneja, Nilton Bila, Ozan Tuncer, C. Isci
{"title":"Usable declarative configuration specification and validation for applications, systems, and cloud","authors":"Salman Baset, Sahil Suneja, Nilton Bila, Ozan Tuncer, C. Isci","doi":"10.1145/3154448.3154453","DOIUrl":"https://doi.org/10.1145/3154448.3154453","url":null,"abstract":"Diagnosing misconfiguration across modern software stacks is increasingly difficult. These stacks comprise multiple micro-services which are deployed across a combination of containers and hosts (VMs, physical machines) in a cloud or a data center. The existing approaches for detecting misconfiguration, whether rule-based or inference, are highly specialized (e.g., security only), cumbersome to write and maintain, geared towards a host (instead of container images), and can result into false-positives or false-negatives.\u0000 This paper introduces configuration validation language (CVL), a declarative language for writing rules to detect misconfigurations that can, for instance, impact security, performance, functionality. We have built a system, ConfigValidator, which applies the CVL rules across a multitude of environments such as Docker images, running containers, host, and cloud. The system is running in production and has scanned thousands of Docker images and running containers for identifying misconfigurations.","PeriodicalId":262822,"journal":{"name":"International Middleware Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116643555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Predicting DRAM reliability in the field with machine learning 用机器学习预测DRAM的可靠性
International Middleware Conference Pub Date : 2017-12-11 DOI: 10.1145/3154448.3154451
I. Giurgiu, J. Szabó, Dorothea Wiesmann, J. Bird
{"title":"Predicting DRAM reliability in the field with machine learning","authors":"I. Giurgiu, J. Szabó, Dorothea Wiesmann, J. Bird","doi":"10.1145/3154448.3154451","DOIUrl":"https://doi.org/10.1145/3154448.3154451","url":null,"abstract":"Uncorrectable errors in dynamic random access memory (DRAM) are a common form of hardware failure in server clusters. Failures are costly both in terms of hardware replacement costs and service disruption. While a large body of work exists on analyzing DRAM reliability in large production clusters, little has been reported on the automatic prediction of such errors ahead of time. In this paper, we present a highly accurate predictive model, based on daily event logs and sensor measurements, in a large fleet of commodity servers going back to 2014. By correlating correctable errors with sensor metrics, we can use ensemble machine learning techniques to predict uncorrectable errors weeks in advance.\u0000 In addition, we show how such models can be applied in the wild and consumed by customer support teams. Our goal is to minimize false positives, as healthy DRAMs should not be replaced, while accounting for common limitations, such as missing data points and rare occurences of uncorrectable errors.","PeriodicalId":262822,"journal":{"name":"International Middleware Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132355555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Accessing google scholar under extreme internet censorship: a legal avenue 在极端网络审查制度下访问谷歌学术:一条法律途径
International Middleware Conference Pub Date : 2017-12-11 DOI: 10.1145/3154448.3154450
Zhen Lu, Zhenhua Li, Jian Yang, Tianyin Xu, Ennan Zhai, Yao Liu, Christo Wilson
{"title":"Accessing google scholar under extreme internet censorship: a legal avenue","authors":"Zhen Lu, Zhenhua Li, Jian Yang, Tianyin Xu, Ennan Zhai, Yao Liu, Christo Wilson","doi":"10.1145/3154448.3154450","DOIUrl":"https://doi.org/10.1145/3154448.3154450","url":null,"abstract":"Internet censorship is pervasive across the world. However, in some countries like China, even legal, nonpolitical services (e.g., Google Scholar) are incidentally blocked by extreme censorship machinery. Therefore, properly accessing legal Internet services under extreme censorship becomes a critical problem. In this paper, we conduct a case study on how scholars from a major university of China access Google Scholar through a variety of middleware. We characterize the common solutions (including VPN, Tor, and Shadowsocks) by measuring and analyzing their performance, overhead, and robustness to censorship. Guided by the study, we deploy a novel solution (called ScholarCloud) to help Chinese scholars access Google Scholar with high performance, ease of use, and low overhead. This work provides an insider's view of China's Internet censorship and offers a legal avenue for coexistence with censorship.","PeriodicalId":262822,"journal":{"name":"International Middleware Conference","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126833594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Opvis: extensible, cross-platform operational visibility and analytics for cloud Opvis:可扩展的、跨平台的云操作可视性和分析
International Middleware Conference Pub Date : 2017-12-11 DOI: 10.1145/3154448.3154455
Fábio Oliveira, Sahil Suneja, S. Nadgowda, P. Nagpurkar, C. Isci
{"title":"Opvis: extensible, cross-platform operational visibility and analytics for cloud","authors":"Fábio Oliveira, Sahil Suneja, S. Nadgowda, P. Nagpurkar, C. Isci","doi":"10.1145/3154448.3154455","DOIUrl":"https://doi.org/10.1145/3154448.3154455","url":null,"abstract":"Operational visibility is an important administrative capability and a critical factor in deciding the success or failure of a cloud service. It is becoming increasingly complex due to the need to (1) track both persistent and volatile system state across heterogeneous endpoints and (2) consider a broader range of data sources fueled by demand for sophisticated analytics. In this paper we present OpVis, a monitoring and analytics framework to provide operational visibility without the limitations of traditional fragmented monitoring solutions. We highlight OpVis' extensible data model, enabling custom data collection and analytics based on the cloud user's requirements, describe its monitoring and analytics capabilities, present performance measurements, and discuss our experiences while supporting operational visibility in our cloud.","PeriodicalId":262822,"journal":{"name":"International Middleware Conference","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122903868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
SμV - the security microvisor: a virtualisation-based security middleware for the internet of things SμV—安全微帽:一种基于虚拟化的物联网安全中间件
International Middleware Conference Pub Date : 2017-12-11 DOI: 10.1145/3154448.3154454
Wilfried Daniels, D. Hughes, M. Ammar, B. Crispo, Nelson Matthys, W. Joosen
{"title":"SμV - the security microvisor: a virtualisation-based security middleware for the internet of things","authors":"Wilfried Daniels, D. Hughes, M. Ammar, B. Crispo, Nelson Matthys, W. Joosen","doi":"10.1145/3154448.3154454","DOIUrl":"https://doi.org/10.1145/3154448.3154454","url":null,"abstract":"The Internet of Things (IoT) creates value by connecting digital processes to the physical world using embedded sensors, actuators and wireless networks. The IoT is increasingly intertwined with critical industrial processes, yet contemporary IoT devices offer limited security features, creating a large new attack surface and inhibiting the adoption of IoT technologies. Hardware security modules address this problem, however, their use increases the cost of embedded IoT devices. Furthermore, millions of IoT devices are already deployed without hardware security support. This paper addresses this problem by introducing a Security MicroVisor (SμV) middleware, which provides memory isolation and custom security operations using software virtualisation and assembly-level code verification. We showcase SμV by implementing a key security feature: remote attestation. Evaluation shows extremely low overhead in terms of memory, performance and battery lifetime for a representative IoT device.","PeriodicalId":262822,"journal":{"name":"International Middleware Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126755009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Darnet: a deep learning solution for distracted driving detection Darnet:用于分心驾驶检测的深度学习解决方案
International Middleware Conference Pub Date : 2017-12-11 DOI: 10.1145/3154448.3154452
Christopher Streiffer, R. Raghavendra, Theophilus A. Benson, M. Srivatsa
{"title":"Darnet: a deep learning solution for distracted driving detection","authors":"Christopher Streiffer, R. Raghavendra, Theophilus A. Benson, M. Srivatsa","doi":"10.1145/3154448.3154452","DOIUrl":"https://doi.org/10.1145/3154448.3154452","url":null,"abstract":"Distracted driving is known to be the leading cause of motor vehicle accidents. With the increase in the number of IoT devices available within vehicles, there exists an abundance of data for monitoring driver behavior. However, designing a system around this goal presents two key challenges - how to concurrently collect data spanning multiple IoT devices, and how to jointly analyze this multimodal input. To that end, we present a unified data collection and analysis framework, DarNet, capable of detecting and classifying distracted driving behavior. DarNet consists of two primary components: a data collection system and an analytics engine. Our system takes advantage of advances in machine learning (ML) to classify driving behavior based on input sensor data. In our system implementation, we collect image data from an inward facing camera, and Inertial Measurement Unit (IMU) data from a mobile device, both located within the vehicle. Using deep learning techniques, we show that DarNet achieves a Top-1 classification percentage of 87.02% on our collected dataset, significantly outperforming our baseline model of 73.88%. Additionally, we address the privacy concerns associated with collecting image data by presenting an alternative framework designed to operate on down-sampled data which produces a Top-1 classification percentage of 80.00%.","PeriodicalId":262822,"journal":{"name":"International Middleware Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132246780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Building global and scalable systems with atomic multicast 使用原子多播构建全局和可扩展的系统
International Middleware Conference Pub Date : 2014-12-08 DOI: 10.1145/2663135.2663323
S. Benz, Parisa Jalili Marandi, F. Pedone, B. Garbinato
{"title":"Building global and scalable systems with atomic multicast","authors":"S. Benz, Parisa Jalili Marandi, F. Pedone, B. Garbinato","doi":"10.1145/2663135.2663323","DOIUrl":"https://doi.org/10.1145/2663135.2663323","url":null,"abstract":"The rise of worldwide Internet-scale services demands large distributed systems. Indeed, when handling several millions of users, it is common to operate thousands of servers spread across the globe. Here, replication plays a central role, as it contributes to improve the user experience by hiding failures and by providing acceptable latency. In this paper, we claim that atomic multicast, with strong and well-defined properties, is the appropriate abstraction to efficiently design and implement globally scalable distributed systems. We substantiate our claim with the design of two modern online services atop atomic multicast, a strongly consistent key-value store and a distributed log. In addition to presenting the design of these services, we experimentally assess their performance in a geographically distributed deployment.","PeriodicalId":262822,"journal":{"name":"International Middleware Conference","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127703880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
LVD: lean virtual disks LVD:精简虚拟硬盘
International Middleware Conference Pub Date : 2014-12-08 DOI: 10.1145/2663165.2663322
Gaurab Basu, S. Nadgowda, Akshat Verma
{"title":"LVD: lean virtual disks","authors":"Gaurab Basu, S. Nadgowda, Akshat Verma","doi":"10.1145/2663165.2663322","DOIUrl":"https://doi.org/10.1145/2663165.2663322","url":null,"abstract":"In this work, we present Lean Virtual Disks (LVD), a new virtual disk format for virtualized servers. LVD transparently consolidates duplicate blocks across virtual machines to create a lean disk image, leading to a merged datapath for all virtual machines. This merged datapath allows efficient storage usage, reduction in disk I/O (read/write) by eliminating I/O for same content across VMs and efficient host cache utilization. LVD is motivated by clouds, where VMs are created from golden masters and use standardized middleware and management tools leading to high content similarity. We implement LVD as an extension of QCow2 and study its ability to improve common data center system management activities as well as improving application performance of popular I/O benchmark workloads. We observed that LVD reduced disk space and disk I/O by 70%, making applications run faster by 25% on an average.","PeriodicalId":262822,"journal":{"name":"International Middleware Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125787796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信