Paper Title |
Authors |
Round Efficient Computationally Secure Multi-party Computation Revisited |
L. Bangalore, A. Choudhury, G. Garimella
|
Distributed Symmetry-Breaking with Improved Vertex-Averaged Complexity |
L. Barenboim, Y. Tzur
|
Sublinear-Time Mutual Visibility for Fat Oblivious Robots |
P. Poudel, G. Sharma, A. Aljohani
|
Parallel Algorithms for Predicate Detection |
V. Garg, R. Garg
|
Reconfigurable Dataflow Graphs For Processing-In-Memory |
C. Shelor, K. Kavi
|
Silent Self-Stabilizing Scheme for Spanning-Tree-like Construction |
S. Devismes, D. Ilcinkas, C. Johnen
|
The Weakest Failure Detector to Solve the Mutual Exclusion Problem in an Unknown Dynamic Environment |
E. Mauffret, D. Jeanneau, L. Arantes, P. Sens
|
Benefit of Self-Stabilizing Protocols in Eventually Consistent Key-Value Stores: A Case Study |
D. Nguyen, S. Kulkarni, A. Datta
|
Efficient Dispersion of Mobile Robots on Graphs |
A. Kshemkalyani, F. Ali
|
Perfectly Secure Message Transmission over Partially Synchronous Networks |
R. Kishore, A. Inumella, K. Srinathan
|
Improving Efficacy of Concurrent Internal Binary Search Trees using Local Recovery |
A. Ramachandran, N. Mittal
|
A Simple and Practical Concurrent Non-blocking Unbounded Graph with Reachability Queries |
B. Chatterjee, S. Peri, M. Sa, N. Singhal
|
Session Guarantees with Raft and Hybrid Logical Clocks |
M. Roohitavaf, J. Ahn, W. Kang, K. Ren, G. Zhang, S. Ben-Romdhane, S. Kulkarni
|
Time-Optimal Uniform Scattering in a Grid |
P. Poudel, G. Sharma
|
A simple 2(1-1/\ell ) factor distributed approximation algorithm for Steiner tree in the CONGEST model |
P. Saikia, S. Karmakar
|
Consistify: Preserving Correctness and SLA Under Weak Consistency |
S. Sidhanta, W. Golab, S. Mukhopadhyay
|
Paper Title |
Authors |
Big Data Analytics Framework for Spatial Data |
P. Shah, S. Chaudhary
|
Odd-Even Based Adaptive Two-way Routing in Mesh NoCs for Hotspot Mitigation |
R. S. Reshma Raj, C. Gayathri, Saidalavi Kalady, P.B. Jayaraj
|
On the Hardness of the Strongly Dependent Decision Problem |
M. Biely, P. Robinson
|
QoS and Performance Metrics for Container-based Virtualization in Cloud Environments |
I. Jawarneh, P. Bellavista, F. Bosi, L. Foschini, G. Martuscelli, R. Montanari, A. Palopoli
|
Paper Title |
Authors |
Distributed Alpha-Fair Transmit Power Adaptation Based Congestion Control in VANET |
C. Navdeti, C. Giri, I. Banerjee
|
Scalable, High-speed On-chip based NDN Name Forwarding using FPGA |
D. Saxena, S. Mahar, V. Raychoudhury, J. Cao
|
Detection of Beacon Transmission Denial Attack in ITS Using Temporal Auto-correlation and Random Inspections |
S. Sultana, F. Altaf, M. Aditia, M. Burra, C. Maurya, S. Maity
|
Building an Emulation Environment for Cyber Security Analyses of Complex Networked Systems |
F. Tanasache, M. Sorella, S. Bonomi, R. Rapone, D. Meacci
|
Scheduling Virtual WiFi Interfaces for High Bandwidth Live Video Upstreaming Using Multipath TCP |
S. Maheshwari, P. Lundrighan, S. Kasera
|
pTASC - Tranversal Autonomous Secure Communications |
P. Sousa, A. Cirne, J. Resende, R. Martins, L. Antunes
|
Advanced Urban Public Transportation System for Indian Scenarios |
P. Rajput, M. Chaturvedi, P. Patel
|
Improving Performance of TCP for Wireless Network using SDN |
K. Singh, S. Gupta, S. Verma, M. Pandey
|
Low Complexity Landmark-Node Tracing in WSNs using Multi-Agent Random Walks |
S. Redhu, R. Hegde
|
On Upper and Lower Bounds of Identifying Code Set for Soccer Ball Graph with Application to Satellite Deployment |
A. Sen, V. Goliber, K. Basu, C. Zhou, S. Ghosh
|
Multi-Tenant Mobile Offloading Systems for Real-Time Computer Vision Applications |
Z. Fang, J. Lin, M. Srivastava, R. Gupta
|
pDCell: an End-to-End Transport Protocol for Mobile Edge Computing Architectures |
C. Fiandrino, J. Widmer, K. Kogan, A. de la Oliva
|
NOVN: Named-Object Based Virtual Network Architecture |
F. Bronzino, S. Maheshwari, I. Seskar, D. Raychaudhuri
|
Exploration and Impact of Blockchain-enabled Adaptive Non-binary Trust Models |
D. Kravitz
|
Cache Attacks on Blockchain Based Information Centric Networks: An Experimental Evaluation |
S. Roy, F. Morais, M. Salimitari, M. Chatterjee
|
Measurements and Analytics of Wide-Area File Transfers over Dedicated Connections |
N. Rao, Q. Liu, S. Sen, Z. Liu, R. Kettimuthu, I. Foster
|
Paper Title |
Authors |
A Hybrid Classifier Approach to Multivariate Sensor Data for Climate Smart Agriculture Cyber-Physical Systems |
A. Pandey, P. Tiwary, S. Kumar, S.K. Das
|
Defense Strategies and Expected Capacity of High Performance Computing Infrastructures |
N. Rao, N. Imam, C. Ma, F. He
|
Dynamic Sensor Selection for Path Coverage |
S. Shamoun, T. Abdelzaher, A. Bar-Noy
|
HydraDoctor: Real-time Liquids Intake Monitoring by Collaborative Sensing |
B. Du, C. Lu, X. Kan, K. Wu, M. Luo, J. Hou, K. Li, S. Kanhere, Y. Shen, H. Wen
|
A Study on Packet Processing Using GPUs |
D. Cerovic, A. Amamou, K. Haddadou, G. Pujolle
|
|