The Middleware conference's mission is to facilitate the discussion of innovations and recent scientific advances of middleware systems with a focus on the design, implementation, deployment and evaluation of distributed systems, whether mobile, cloud-based, or geographically distributed. The conference focuses on design principles, programming models, frameworks, and runtime analysis and support. This year's conference continues the long tradition of bringing together academic and industrial participants for vibrant discussions and presentations of cutting-edge research.
Proceeding Downloads
SlimGuard: A Secure and Memory-Efficient Heap Allocator
Attacks on the heap are an increasingly severe threat. State-of-the-art secure dynamic memory allocators can offer protection, however their memory footprint is high, making them suboptimal in many situations. We introduce Slim-Guard, a secure allocator ...
EnclaveCache: A Secure and Scalable Key-value Cache in Multi-tenant Clouds using Intel SGX
With in-memory key-value caches such as Redis and Memcached being a key component for many systems to improve throughput and reduce latency, cloud caches have been widely adopted for small companies to deploy their own cache systems. However, data ...
OS-Augmented Oversubscription of Opportunistic Memory with a User-Assisted OOM Killer
Exploiting opportunistic memory by oversubscription is an appealing approach to improving cluster utilization and throughput. In this paper, we find the efficacy of memory oversubscription depends on whether or not the oversubscribed tasks can be killed ...
On the FaaS Track: Building Stateful Distributed Applications with Serverless Architectures
Serverless computing is an emerging paradigm that greatly simplifies the usage of cloud resources and suits well to many tasks. Most notably, Function-as-a-Service (FaaS) enables programmers to develop cloud applications as individual functions that can ...
Generalized Consensus for Practical Fault Tolerance
Despite extensive research on Byzantine Fault Tolerant (BFT) systems, overheads associated with such solutions preclude widespread adoption. Past efforts such as the Cross Fault Tolerance (XFT) model address this problem by making a weaker assumption ...
Scalable Data-structures with Hierarchical, Distributed Delegation
Scaling data-structures up to the increasing number of cores provided by modern systems is challenging. The quest for scalability is complicated by the non-uniform memory accesses (NUMA) of multi-socket machines that often prohibit the effective use of ...
FfDL: A Flexible Multi-tenant Deep Learning Platform
- K. R. Jayaram,
- Vinod Muthusamy,
- Parijat Dube,
- Vatche Ishakian,
- Chen Wang,
- Benjamin Herta,
- Scott Boag,
- Diana Arroyo,
- Asser Tantawi,
- Archit Verma,
- Falk Pollok,
- Rania Khalaf
Deep learning (DL) is becoming increasingly popular in several application domains and has made several new application features involving computer vision, speech recognition and synthesis, self-driving automobiles, drug design, etc. feasible and ...
Pando: Personal Volunteer Computing in Browsers
The large penetration and continued growth in ownership of personal electronic devices represents a freely available and largely untapped source of computing power. To leverage those, we present Pando, a new volunteer computing tool based on a ...
FabricCRDT: A Conflict-Free Replicated Datatypes Approach to Permissioned Blockchains
With the increased adaption of blockchain technologies, permissioned blockchains such as Hyperledger Fabric provide a robust ecosystem for developing production-grade decentralized applications. However, the additional latency between executing and ...
AccTEE: A WebAssembly-based Two-way Sandbox for Trusted Resource Accounting
Remote computation has numerous use cases such as cloud computing, client-side web applications or volunteer computing. Typically, these computations are executed inside a sandboxed environment for two reasons: first, to isolate the execution in order ...
MooD: MObility Data Privacy as Orphan Disease: Experimentation and Deployment Paper
With the increasing development of handheld devices, Location Based Services (LBSs) became very popular in facilitating users' daily life with a broad range of applications (e.g. traffic monitoring, geo-located search, geo-gaming). However, several ...
Monitorless: Predicting Performance Degradation in Cloud Applications with Machine Learning
Today, software operation engineers rely on application key performance indicators (KPIs) for sizing and orchestrating cloud resources dynamically. KPIs are monitored to assess the achievable performance and to configure various cloud-specific ...
Automating Multi-level Performance Elastic Components for IBM Streams
Streaming applications exhibit abundant opportunities for pipeline parallelism, data parallelism and task parallelism. Prior work in IBM Streams introduced an elastic threading model that sought the best performance by automatically tuning the number of ...
Self-adaptive Executors for Big Data Processing
The demand for additional performance due to the rapid increase in the size and importance of data-intensive applications has considerably elevated the complexity of computer architecture. In response, systems offer pre-determined behaviors based on ...
PrivaTube: Privacy-Preserving Edge-Assisted Video Streaming
Video on Demand (VoD) streaming is the largest source of Internet traffic. Efficient and scalable VoD requires Content Delivery Networks (CDNs) whose cost are prohibitive for many providers. An alternative is to cache and serve video content using end-...
Differential Approximation and Sprinting for Multi-Priority Big Data Engines
Today's big data clusters based on the MapReduce paradigm are capable of executing analysis jobs with multiple priorities, providing differential latency guarantees. Traces from production systems show that the latency advantage of high-priority jobs ...
eSPICE: Probabilistic Load Shedding from Input Event Streams in Complex Event Processing
Complex event processing systems process the input event streams on-the-fly. Since input event rate could overshoot the system's capabilities and results in violating a defined latency bound, load shedding is used to drop a portion of the input event ...
Boosting concurrency in Parallel State Machine Replication
State machine replication (SMR) is a well-known approach to implementing fault-tolerant services, providing high availability and strong consistency. To boost the performance of SMR, some proposals execute independent commands concurrently, while ...
Lazarus: Automatic Management of Diversity in BFT Systems
A long-standing promise of Byzantine Fault-Tolerant (BFT) replication is to maintain the service correctness despite the presence of malicious failures. The key challenge here is how to ensure replicas fail independently, i.e., avoid that a single ...
Combining it all: Cost minimal and low-latency stream processing across distributed heterogeneous infrastructures
Control mechanisms of stream processing applications (SPAs) that ensure latency bounds at minimal runtime cost mostly target a specific infrastructure, e.g., homogeneous nodes. With the growing popularity of the Internet of Things, fog, and edge ...
ProvMark: A Provenance Expressiveness Benchmarking System
- Sheung Chi Chan,
- James Cheney,
- Pramod Bhatotia,
- Thomas Pasquier,
- Ashish Gehani,
- Hassaan Irshad,
- Lucian Carata,
- Margo Seltzer
System level provenance is of widespread interest for applications such as security enforcement and information protection. However, testing the correctness or completeness of provenance capture tools is challenging and currently done manually. In some ...
ReLAQS: Reducing Latency for Multi-Tenant Approximate Queries via Scheduling
Approximate Query Processing has become increasingly popular as larger data sizes have increased query latency in distributed query processing systems. To provide such approximate results, systems return intermediate results and iteratively update these ...
AquaEIS: Middleware Support for Event Identification in Community Water Infrastructures
Real-time event identification is critical in complex distributed infrastructures, e.g., water systems, where failures are difficult to isolate. We present AquaEIS, an event-based middleware tailored to the problem of locating sources of failure (e.g., ...
Switchboard: A Middleware for Wide-Area Service Chaining
Production networks are transitioning from the use of physical middleboxes to virtual network functions (VNFs), which makes it easy to construct highly-customized service chains of VNFs dynamically using software. Wide-area service chains are ...
Medley: A Novel Distributed Failure Detector for IoT Networks
Efficient and correct operation of an IoT network requires the presence of a failure detector and membership protocol amongst the IoT nodes. This paper presents a new failure detector for IoT settings where nodes are connected via a wireless ad-hoc ...
- Proceedings of the 20th International Middleware Conference
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
Middleware '22 | 21 | 8 | 38% |
Middleware '17 | 85 | 20 | 24% |
Middleware '17 | 20 | 7 | 35% |
Middleware '17 | 17 | 12 | 71% |
Middleware Industry '15 | 20 | 4 | 20% |
Middleware '15 | 118 | 23 | 19% |
Middleware '14 | 144 | 27 | 19% |
Middleware '12 | 18 | 13 | 72% |
Middleware '08 | 117 | 21 | 18% |
Middleware '07 | 108 | 22 | 20% |
Middleware '06 | 122 | 21 | 17% |
Middleware '03 | 158 | 25 | 16% |
Overall | 948 | 203 | 21% |