Technical Program of IPCCC 2019
Time | Gunnell Suite | Christie Room |
Tuesday, October 29 |
||
08:00-08:30 | Registration | |
08:30-09:00 | Introduction | |
09:00-10:00 | Keynote: "5G & The Internet of Skills In Action" | |
10:00-10:30 | Coffee Break | |
10:30-12:00 | 1: Best Paper Candidates | |
12:00-13:30 | Lunch | |
13:30-15:30 | 2a: Big Data Processing and Analytics | 2b: Computer Networks |
15:30-16:00 | Coffee Break | |
16:00-18:00 | 3a: Deep Learning | 3b: Security - Hide and Seek |
18:00-20:00 | Reception with Posters (Atrium Lounge) | |
Wednesday, October 30 |
||
08:00-08:30 | Registration | |
08:30-09:30 | Keynote: "The many layers of delay requirements" | |
09:30-10:00 | Coffee Break | |
10:00-12:00 | 4a: Caching | 4b: Security - Network Intrusion Detection |
12:00-13:30 | Lunch | |
13:30-15:30 | 5a: System Performance & Testbeds | 5b: Security - What's going on? |
15:30-16:00 | Coffee Break | |
16:00-18:00 | 6a: Edge and Cloud | 6b: Constructive Security |
Thursday, October 31 |
||
08:30-10:00 | 7: Parallel and Distributed Systems | |
10:00-10:30 | Coffee Break | |
10:30-12:00 | 8: Machine Learning and beyond |
Tuesday, October 29
Tuesday, October 29 8:00 - 8:30
Registration
Tuesday, October 29 8:30 - 9:00
Introduction
Tuesday, October 29 9:00 - 10:00
Keynote: "5G & The Internet of Skills In Action"
Abstract: Today's internet, accessed by fixed and mobile networks, allows us to transmit files, voice and video across the planet. With the emergence of an ultra-responsive and reliable ‘Tactile Internet,' advanced techniques in robotics and artificial intelligence, we predict the emergence of an ‘Internet of Skills' which allows the transmission of labor globally. It will invoke an important shift from content-delivery to skillset-delivery networks, where engineers would service cars or surgeons performing critical operations anywhere on the planet. For this to work, however, we require some fundamental laws of physics to be "reengineered." This keynote will discuss the vision, technology and building blocks for said emerging Internet of Skills. I will deep-dive into some of these building blocks, such as 5G and its ability to deliver ultra-low latency networking capabilities as well as open challenges from a compute and networking point of view.
Tuesday, October 29 10:00 - 10:30
Coffee Break
Tuesday, October 29 10:30 - 12:00
1: Best Paper Candidates
- 10:30 Sphinx: A Transport Protocol for High-Speed and Lossy Mobile Networks
- 11:00 Using DCT-based Approximate Communication to Improve MPI Performance in Parallel Clusters
- 11:30 Reliability, timeliness and load reduction at the edge for cloud gaming
Tuesday, October 29 12:00 - 13:30
Lunch
Tuesday, October 29 13:30 - 15:30
2a: Big Data Processing and Analytics
- 13:30 ATuMm: Auto-tuning Memory Manager in Apache Spark
- 14:00 Query Optimization Approach with Shuffle Intermediate Cache Layer for Spark SQL
- 14:30 Adaptive Differentially Private Data Stream Publishing in Spatio-temporal Monitoring of IoT
- 15:00 ALEAP: Attention-based LSTM with Event Embedding for Attack Projection
2b: Computer Networks
- 13:30 Cooperative Fair Bandwidth Scaling in Contention-based Wireless Networks using Time Token Bucket
- 14:00 QuickR: A Novel Routing Strategy for Wireless Mobile Information-centric Networks
- 14:30 Exploiting Social Network Characteristics for Efficient Routing in Ocean Vessel Ad Hoc Networks
- 15:00 Accelerating QUIC's Connection Establishment on High-Latency Access Networks
- Short Paper
- 15:15 A Comprehensive Study of Accelerating IPv6 Deployment
- Short Paper
Tuesday, October 29 15:30 - 16:00
Coffee Break
Tuesday, October 29 16:00 - 18:00
3a: Deep Learning
- 16:00 Towards Industrial IoT-AR Systems using Deep Learning-Based Object Pose Estimation
- 16:30 A Deep Learning Approach to Dynamic Passive RTT Prediction Model for TCP
- 17:00 Topology-aware Sparse Allreduce for Large-scale Deep Learning
- 17:30 Energy and Delay Co-aware Computation Offloading with Deep Learning in Fog Computing Networks
- Short Paper
3b: Security - Hide and Seek
- 16:00 Deanonymizing Tor in a Stealthy Way
- 16:30 Identify OS from Encrypted Traffic with TCP/IP Stack Fingerprinting
- 17:00 A Byte-level CNN Method to Detect DNS Tunnels
- 17:30 VPGA: an SDN-based Location Privacy Zones Placement Scheme for Vehicular Networks
- Short Paper
- 17:45 Trust-based Model with Protection Against RSU Attacks in Vehicular Networks
- Short Paper
Tuesday, October 29 18:00 - 20:00
Reception with Posters (Atrium Lounge)
- A C++ Library for Tensor Decomposition
- IoT meets distributed AI - Deployment scenarios of Bonseyes AI applications on FIWARE
- reZig: Decompose a Collision via Reference Waveform
- Scheduling Dependent Tasks in Edge Networks
- CLR: A Classification of DNS Tunnel Based on Logistic Regression
- High-Precision Adaptive Slope Compensation Circuit for System-on-Chip Power Management
- Contract-network Protocol: An Efficient Communication Protocol for Distributed Ledger Technology
- CAN't - An ISOBUS Privacy Proxy for Collaborative Smart Farming
- Mining Cross-platform User Behaviors for Demographic Attribute Inference
Wednesday, October 30
Wednesday, October 30 8:00 - 8:30
Registration
Wednesday, October 30 8:30 - 9:30
Keynote: "The many layers of delay requirements"
Abstract: The term "distributed interactive application" today seems old-fashioned today since Cloudification has even turned humble word processing tasks into distributed interactive activities. Consequently, the property of being both interactive and distributed is frequently forgotten to the detriment of end users, who experience a lack of performance. Among gamers, the term "lag" has been coined for this, a catch-all phrase for all problems that end users experience as delay while interacting with an application.
The simplified term can hide excessive round-trip times, but it could also hide bandwidth limitations, processing delays or virtualisation overhead. In fact, any attempt at dealing with delay does first require that we understand the multitude of delays that can affect experience. Applications may be affected negatively by startup delays, rebuffering delays, rendering delays, processing delays, per-byte latency or load finishing time. The relevant kind of delay is application-specific, while the impact on user experience is application- as well as context-specific.
Research and development are continuously working to make improvements to all layers that make up distributed systems. Proposals for new generic architectures or architectural changes, can easily focus on a few of these faces of delay, satisfying a set of applications, while forgetting others that are equally valid .
The keynote attempts to bring structure to the many views on delay. We structure delay demands of applications by the kind of delay that matters to them and provide an insight into user experience studies for several of them. From there, we cast light onto recent and ongoing infrastructure developments, especially at the network and transport layer, and discuss their potential for fulfilling delay requirements.
Wednesday, October 30 9:30 - 10:00
Coffee Break
Wednesday, October 30 10:00 - 12:00
4a: Caching
- 10:00 GPUs Cache Performance Estimation using Reuse Distance Analysis
- 10:30 Emulate Processing of Assorted Database Server Applications on Flash-Based Storage in Datacenter Infrastructures
- 11:00 Data Heat Prediction in Storage Systems Using Behavior Specific Prediction Models
- 11:30 An Almost-zero Latency Lightweight Mechanism for Caching Decision in ICN Content Router
4b: Security - Network Intrusion Detection
- 10:00 Efficient Attack Correlation and Identification of Attack Scenarios based on Network-Motifs
- 10:30 A New C&C Channel Detection Framework Using Heuristic Rule and Transfer Learning
- 11:00 Autonomous Detection of Synchronization Attacks in the Industrial Internet Of Things
- 11:30 Exploiting temperature-varied ECU fingerprints for source identification in in-vehicle network intrusion detection
Wednesday, October 30 12:00 - 13:30
Lunch
Wednesday, October 30 13:30 - 15:30
5a: System Performance & Testbeds
- 13:30 Quantitative Analysis of Mobile Application User Interface Design
- 14:00 An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis
- 14:30 piFogBed: A Fog Computing Testbed Based on Raspberry Pi
- Short Paper
- 14:45 Mimic: Fast Recovery from Data Corruption Errors in Stencil Computations
- Short Paper
- 15:00 Integration of Temporal Contextual Information for Robust Energy Disaggregation
- Short Paper
5b: Security - What's going on?
- 13:30 I Know What You Are Doing With Remote Desktop
- 14:00 A Method Based on Hierarchical Spatiotemporal Features for Trojan Traffic Detection
- 14:30 Side-Channel Information Leakage of Traffic Data in Instant Messaging
- 15:00 On Effects of Mobility Management Signalling Based DoS Attacks Against LTE Terminals
Wednesday, October 30 15:30 - 16:00
Coffee Break
Wednesday, October 30 16:00 - 18:00
6a: Edge and Cloud
- 16:00 Cost Efficient Internet Path Tracking Based on Routing Changes Prediction
- 16:30 Jily: Cost-Aware AutoScaling of Heterogeneous GPU for DNN Inference in Public Cloud
- 17:00 Rendering Scheduling Framework in Edge Computing: A Congestion Game-based Approach
- Short Paper
- 17:15 F2MC: Enhancing Data Storage Services with Fog-to-MultiCloud Hybrid Computing
- Short Paper
- 17:30 Improving Latency and Jitter Performance in CDMA-Based Next-Generation Ethernet Passive Optical Networks for 5G Applications
- Short Paper
6b: Constructive Security
- 16:00 A Blockchain-Based Authentication Method with One-Time Password
- 16:30 VoteGeo: An IoT-based Voting Approach to Verify the Geographic Location of Cloud Hosts
- 17:00 Hiding and Trapping: A Deceptive Approach for Defending against Network Reconnaissance with Software-Defined Network
- 17:30 A Stochastic based Physical Layer Security in CRNs: Cognitive Relay to Fusion Center
- Short Paper
- 17:45 Placement optimization of IoT security solutions for edge computing based on graph theory
- Short Paper
Thursday, October 31
Thursday, October 31 8:30 - 10:00
7: Parallel and Distributed Systems
- 8:30 Developing the Parallelization Methods for Finding the All-Pairs Shortest Paths in Distributed Memory Architecture
- 9:00 LT Codes with Feedback: Accelerate the Distributed Matrix-Vector Multiplication with Stragglers
- 9:30 Intelligent IoT Sensing System Based on Compressive Sensing with Adaptively Learned Dictionary
- Short Paper
- 9:45 Automatic Data Quality Enhancement with Expert Knowledge for Mobile Crowdsensing
- Short Paper
Thursday, October 31 10:00 - 10:30
Coffee Break
Thursday, October 31 10:30 - 12:00
8: Machine Learning and beyond
- 10:30 Uncovering Flaming Events on News Media in Social Media
- 11:00 Malicious Domain Detection via Domain Relationship and Graph Models
- 11:30 HS-TCN: A Semi-supervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT
- Short Paper
- 11:45 Typification of Impersonated Accounts on Instagram
- Short Paper