{"title":"Holium: A Protocol for Data Transformation Pipelines","authors":"Philippe Metais","doi":"10.1109/ICDCSW56584.2022.00014","DOIUrl":"https://doi.org/10.1109/ICDCSW56584.2022.00014","url":null,"abstract":"The present file introduces a tutorial planned at the DINPS 22 workshop. The tutorial will cover Holium, a protocol based on IPFS, IPLD and WebAssembly, dedicated to data transformation pipelines. It will be provided by Philippe Métais, one of its designers and core developers of the reference implementation.","PeriodicalId":357138,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114282942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Are all the flowers the same? A Citizen Science mobile app for increasing awareness about insect pollinators","authors":"Giovanni Delnevo, C. Ceccarini, Catia Prandi","doi":"10.1109/ICDCSW56584.2022.00052","DOIUrl":"https://doi.org/10.1109/ICDCSW56584.2022.00052","url":null,"abstract":"Climate change is one of the most significant challenges of our time. Biodiversity makes an essential contribution to both climate-change mitigation and adaptation. To this end, it is essential to protect insect pollinators that are responsible for the reproduction of over 80% of the world's flowering plants. To increase citizen awareness about the local flowers species and their attractiveness to wild pollinators, we designed a mobile app exploiting citizen science, AR, deep learning, and gamification. This short paper presents the design framework, the prototype, and some preliminary results of the deep learning performance. Finally, we conclude the paper with future work and directions.","PeriodicalId":357138,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132356337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of RTX Architecture in Virtual Production and Graphics Processing","authors":"Tony Oakden, M. Kavakli","doi":"10.1109/ICDCSW56584.2022.00048","DOIUrl":"https://doi.org/10.1109/ICDCSW56584.2022.00048","url":null,"abstract":"Real-time rendering techniques developed for computer games combined with the improved algorithms and advanced hardware such as the Nvidia Geforce RTX 3000 series of graphic cards improve the quality of the rendered images in CGI. In this paper, our goal is to test the performance of RTX architecture in Virtual Production and graphics processing. We conducted a series of tests for rendering of a scene in Unreal game engine in a Virtual Production studio. Images are rendered in 4K and output to a network distribution system where the image is broken down into a series of smaller images each rendered onto LED screens. The comparison of render times between two graphics workstations using Nvidia RTX A6000 GPU and Nvidia RTX A3090 GPU show that whilst RTX architecture produces better image quality, the gains might not be worth the additional hardware cost required by the high-end graphic cards. It might also be optimal to split the rendering of the scene across multiple computers.","PeriodicalId":357138,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134006504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cornelius Ihle, Fabian Deifuß, M. Schubotz, Bela Gipp
{"title":"Towards Portable Identities in the Matrix Protocol","authors":"Cornelius Ihle, Fabian Deifuß, M. Schubotz, Bela Gipp","doi":"10.1109/ICDCSW56584.2022.00025","DOIUrl":"https://doi.org/10.1109/ICDCSW56584.2022.00025","url":null,"abstract":"In this paper we present a cryptographic challenge-response authentication mechanism to enable portable identities within the Matrix protocol. Online instant communication systems like Matrix connect people in a convenient and cost-effective manner. However, most of today's communication infrastructure relies on inherently centralized infrastructure. Matrix currently, takes a federated approach instead. However, to fully decentralize the Matrix network, further actions must take place. Among others, a user's identity must be disconnected from the server they used to sign up and happen to communicate on. As part of this effort, a challenge-response authentication mechanism has been implemented that allows user IDs to be usable on any server, even if the a user's homeserver becomes unreachable.","PeriodicalId":357138,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122025734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decentralized Hole Punching","authors":"Marten Seemann, Max Inden, Dimitris Vyzovitis","doi":"10.1109/ICDCSW56584.2022.00027","DOIUrl":"https://doi.org/10.1109/ICDCSW56584.2022.00027","url":null,"abstract":"We present a decentralized hole punching mechanism built into the peer-to-peer networking library libp2p [1]. Hole punching is cru-cial for peer-to-peer networks, enabling each participant to directly communicate to any other participant, despite being separated by firewalls and NATs. The decentralized libp2p hole punching proto-col leverages protocols similar to STUN (RFC 8489 [2]), TURN (RFC 8566 [3]) and ICE (RFC 8445 [4]), without the need for any cen-tralized infrastructure. Specifically, it doesn't require any previous knowledge about network participants other than at least one (any arbitrary) node to bootstrap peer discovery. The key insight is that the protocols used for hole punching, namely address discovery and relaying protocols, can be built such that their resource require-ments are negligible. This makes it feasible for any participant in the network to run these, thereby enabling the coordination of hole punch attempts, assuming that at least a small fraction of nodes is not located behind a firewall or a NAT.","PeriodicalId":357138,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128490604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alfonso De la Rocha, Lefteris Kokoris-Kogias, Jorge M. Soares, M. Vukolic
{"title":"Hierarchical Consensus: A Horizontal Scaling Framework for Blockchains","authors":"Alfonso De la Rocha, Lefteris Kokoris-Kogias, Jorge M. Soares, M. Vukolic","doi":"10.1109/icdcsw56584.2022.00018","DOIUrl":"https://doi.org/10.1109/icdcsw56584.2022.00018","url":null,"abstract":"","PeriodicalId":357138,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123168185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stealthy Clustering of Ethereum Transactions Using Time Leakage from Fixed Nodes","authors":"Congcong Yu, Chengpu Jiang, Chenjie Yang, Meng Shen, Liehuang Zhu, Zheng Che","doi":"10.1109/ICDCSW56584.2022.00011","DOIUrl":"https://doi.org/10.1109/ICDCSW56584.2022.00011","url":null,"abstract":"In recent years, data mining with users as entities has become a fundamental tool for digital currency investigations. In Ethereum, researchers can perform transaction clustering based on users' behavioral habits and usage patterns in specific scenarios. However, the major shortcoming of these technologies is that they cover only a small fraction compared to the huge number of transactions. In this paper, we propose a stealthy clustering of Ethereum transactions using time leakage from fixed nodes (CIFO), which is applied to all transactions, while also being stealthy and difficult to detect. Leveraging timestamps relayed from $N$ fixed nodes, CIFO can better describe the network properties of transactions, in compared with the first $N$ timestamps. The experimental results show that CIFO can determine whether two transactions enter the network from the same source with the precision of 87%.","PeriodicalId":357138,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125323192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solving Source Location Problems with Particle Swarm Optimizer and Height Information","authors":"Junqi Zhang, Yehao Lu, Mengchu Zhou","doi":"10.1109/ICDCSW56584.2022.00029","DOIUrl":"https://doi.org/10.1109/ICDCSW56584.2022.00029","url":null,"abstract":"Recently, there has been great interest in utilizing robot swarm to solve source location problems. A particle swarm optimizer (PSO) is among the most popular method. To our best knowledge, almost all work in this field focuses on a 2-D search space while ignoring height information. This work proposes a 3-D source location model where the sensing range of an unmanned aerial vehicle (UAV) gradually increases with its flying height, but its obtained signal strength gradually weakens. It can avoid meaningless wandering of UAV s in no-signal areas. Experimental results show that the effective use of height information can significantly improve the search efficiency.","PeriodicalId":357138,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131463498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mingze Li, Tong Wu, Huan Zhou, Liang Zhao, Victor C. M. Leung
{"title":"Incentive-driven Computation Offloading and Resource Allocation in Mobile Cloud-Edge Computing","authors":"Mingze Li, Tong Wu, Huan Zhou, Liang Zhao, Victor C. M. Leung","doi":"10.1109/ICDCSW56584.2022.00038","DOIUrl":"https://doi.org/10.1109/ICDCSW56584.2022.00038","url":null,"abstract":"This paper proposes a novel Reverse Auction-based Computation Offloading and Resource Allocation Mechanism, named RACORAM for the mobile Cloud-Edge computing. The basic idea is that the Cloud Service Center (CSC) recruits edge server owners to replace it to accommodate offloaded computation from nearby resource-constraint Mobile Devices (MDs). In RACORAM, the reverse auction is used to stimulate edge server owners to participate in the offloading process, and the reverse auction-based computation offloading and resource allocation problem is formulated as a Mixed Integer Nonlinear Programming (MINLP) problem, aiming to minimize the cost of the CSC. Specifically, a Greedy Randomized Adaptive Search Procedure based Winning Bid Scheduling Method (GWBSM) is proposed to determine the computation offloading strategy. Simulations are conducted to evaluate the performance of RACORAM, and the results show that RACORAM is very close to the optimal method with significantly reduced computational complexity, and greatly outperforms the other baseline methods in terms of the CSC's cost under different scenarios.","PeriodicalId":357138,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132695638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social games and Blockchain: exploring the Metaverse of Decentraland","authors":"Barbara Guidi, Andrea Michienzi","doi":"10.1109/ICDCSW56584.2022.00045","DOIUrl":"https://doi.org/10.1109/ICDCSW56584.2022.00045","url":null,"abstract":"Online Social Networks gained a crucial role in people's everyday life, acting as the medium through which people can interact with each other. The introduction of blockchain technology prompted a new generation of social media based on the concept of Non-Fungible Token (NFT) and other Web3 technologies, giving birth to the Metaverse. Decentraland is one such platform, where users can explore a 3D virtual world and communicate with each other. The main feature of Decentraland is that the virtual world is divided into parcels, implemented through NFTs, that can be traded among users and where owners can create buildings or mini-games for other users to play with. In this work, we explore the virtual world of Decentraland by presenting the main details of the virtual world and by focusing on the economic impact of NFT trading on the description of the parcels. In detail, the parcel's description can be used to advertise the proximity of the parcel to infrastructures or special projects to attract potential buyers. This paper's findings show the impact and the magnitude of this phenomenon, highlighting entire quarters that adopt this technique throughout the map by overriding the playful aspect of the platform.","PeriodicalId":357138,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132827234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}