2016 Publications

  1. Keywhan Chung, Charles A. Kamhoua, Kevin A. Kwiat, Zbigniew T. Kalbarczyk and Ravishankar K. Iyer, “Game Theory with Learning for Cyber Security Monitoring”, 17th IEEE International Symposium on High Assurance Systems Engineering (HASE 2016), Orlando, FL, January 7-9, 2016. [full text]
  2. Minas Charalambides, Peter Diges, and Gul Agha, “Parameterized, Concurrent Session Types for Asynchronous Multi-Actor Interactions”, Science of Computer Programming, volume 115-116, pages 100-126, January-February 2016. [full text]
  3. Chris X. Cai, Shayan Saeed, Intranil Gupta, Roy Campbell, and Franck Le, “Phurti: Application and Network-Aware Flow Scheduling for Multi-tenant MapReduce Clusters”, IEEE International Conference on Cloud Engineering (IC2E 2016), Berlin, Germany, April 4-8, 2016. [full text]
  4. Mayank Pundir, Manoj Kumar, Luke Leslie, Indranil Gupta, and Roy H. Campbell, “Supporting On-demand Elasticity in Distributed Graph Processing”, IEEE International Conference on Cloud Engineering (IC2E 2016), Berlin, Germany, April 4-8, 2016. Best Paper Award. [full text]
  5. Le Xu, Boyang Peng, and Indranil Gupta, “Stela: Enabling Stream Processing Systems to Scale-in and Scale-out On-demand” IEEE International Conference on Cloud Engineering (IC2E 2016), Berlin, Germany, April 4-8, 2016. [full text]
  6. Si Liu, Peter Olveczky, Muntasir Raiham Rahman, Jatin Ganhortra, Indranil Gupta, and José Meseguer, “Formal Modeling and Analysis of RAMP Transaction Systems”, 31st ACM Symposium on Applied Computing (SAC 2016), Pisa, Italy, April 4-8, 2016. [full text]
  7. Ehsan Khamespanah, Kirill Mechitov, Marjan Sirjani, and Gul Agha, “Schedulability Analysis of Distributed Real-Time Sensor Network Applications using Actor-based Model Checking”, 23rd International SPIN Symposium on Model Checking of Software (SPIN 2016), Eindhoven, The Netherlands, April 7-8, 2016. [full text]
  8. Atul Bohara, Uttam Thakore, and William H. Sanders, “Intrusion Detection in Enterprise Systems by Combining and Clustering Diverse Monitor Data”, Symposium and Bootcamp on the Science of Security (HotSoS 2016), Pittsburgh, PA, April 20-21, 2016. [full text]
  9. Shadi A. Noghabi, Sriram Subramanian, Priyesh Narayanan, Sivabalan Narayanan, Gopalakrishna Holla, Mammad Zadeh, Tianwei Li, Indranil Gupta, and Roy H. Campbell, “Ambry: LinkedIn’s Scalable Geo-Distributed Object Store”, 2016 ACM SIGMOD/PODS, San Francisco, CA, June 26-July 1, 2016. [full text]
  10. Chris X. Cai, Franck Le, Xin Sun, Geoffrey Xi, Hani Jamjoon, and Roy H. Campbell, “CRONets: Cloud-Routed Overlay Networks”, 36th IEEE International Conference on Distributed and Computing Systems (IGDCS 2016), Nara, Japan, June 27-30, 2016. [full text]
  11. Uttam Thakore, Gabriel A. Weaver and William H. Sanders, “A Quantitative Methodology for Security Monitor Deployment”, 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016), Toulouse, France, June 28-July 1, 2016. Best Paper Award. [full text]
  12. Gul Agha, “Abstractions, Semantic Models and Analysis Tools for Concurrent Systems: Progress and Open Problems”, 14th International Conference on Software Engineering and Formal Methods (SEFM 2016), Vienna, Austria, July 4-8, 2016. [extended abstract]
  13. Peter Csaba Olveczky, “Design and Validation of Cloud Computing Data Stores using Formal Methods”, invited paper, International Symposium on Intelligent Systems and Applications (ISA 2016), Ho Chi Minh City, Vietnam, August 22-23, 2016. [full text]
  14. Muntasir Raihan Rahman, Lewis Tseng, Son Nguyen, Indranil Gupta, and Nitin Vaidya, “Characterizing and Adapting the Consistency-Latency Tradeoff in Distributed Key-value Stores”, ACM Transactions on Autonomous and Adaptive Systems (TAAS), volume 11, issue 3, September 2016. [full text]
  15. Shadi A. Noghabi, Roy H. Campbell, and Indranil Gupta, “Building a Scalable Distributed Online Media Processing Environment”, 42nd International Conference on Very Large Data Bases (VLDB 2016), New Delhi, India, September 5-9, 2016. [full text]
  16. Peter Olveczky, “Design and Validation of the P-Store Replicated Data Store in Maude”, 23rd International Workshop on Algebraic Development Techniques (WADT 2016), Gregynog, Wales, September 21-24, 2016. [abstract]
  17. Ahmad Fawaz, Atul Bohara, Carmen Cheh, and William H. Sanders, “Lateral Movement Detection using Distributed Data Fusion”, 35th Symposium of Reliable Distributed Systems (SRDS 2016), Budapest, Hungary, September 26-29, 2016. [full text]
  18. Keywhan Chung, Valerio Formicola, Alexander Withers, Adam Slagell, Zbigniew Kalbarczyk, and Ravishankar Iyer, “Attacking Supercomputers Through Targeted Alteration of Environmental Control: A Data Driven Case Study,” International Workshop on Cyber-Physical Systems Security, in conjunction with IEEE Conference on Communications and Network Security (CNS 2016), Philadelphia, PA, October 17-19, 2016. [full text]
  19. Marjan Sirjani, Ehsan Khamespanah, Kirill Mechitov, and Gul Agha, “A Compositional Approach for Modeling and Timing Analysis of Wireless Sensor and Actuator Networks”, 9th International Workshop on Compositional Theory and Technology for Real-Time Embedded Systems (CRTS 2016), Porto, Portugal, November 29, 2016. [full text]
  20. Read Sprabery, Zachary Estrada, Zbigniew Kalbarczyk, Ravishankar Iyer, Roy Campbell, and Rakesh Bobba, “Defense in Depth for Virtual Applications Built on Event Based Probing of Untrusted Guests”, Annual Computer Security Applications Conference (ACSAC 2016), Los Angeles, CA, December 5-9, 2016. [poster]
  21. Read Sprabery, Güliz Seray Tuncay, Carl Gunter, and Roy Campbell, “Securely Retrofitting Door Locks for Cheap Control through Mobile Devices”, Annual Computer Security Applications Conference (ACSAC 2016), Los Angeles, CA, December 5-9, 2016. [poster]