Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3423211acmconferencesBook PagePublication PagesmiddlewareConference Proceedingsconference-collections
Middleware '20: Proceedings of the 21st International Middleware Conference
ACM2020 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
Middleware '20: 21st International Middleware Conference Delft Netherlands December 7 - 11, 2020
ISBN:
978-1-4503-8153-6
Published:
11 December 2020
Sponsors:
ACM, IFIP
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 08 Feb 2025Bibliometrics
Skip Abstract Section
Abstract

This volume contains the proceedings of the International Middleware Conference, which was to take place in Delft, the Netherlands, but due to the developments around COVID-19, is being held as a virtual event on December 7-11, 2020. This year marked the 21st edition of this annual conference, which started in 1998 and since then has evolved into the premier event focusing on the advancement of middleware components. Middleware technologies offer design principles, programming models, frameworks, protocols, and runtime services to support the development and execution of distributed systems. Building such systems remains an ongoing challenge due to their broad scope, increased scale, and complexity.

Skip Table Of Content Section
Prebaking Functions to Warm the Serverless Cold Start

Function-as-service (FaaS) platforms promise a simpler programming model for cloud computing, in which the developers concentrate on writing its applications. In contrast, platform providers take care of resource management and administration. As FaaS ...

research-article
Resilient Cloud-based Replication with Low Latency

Existing approaches to tolerate Byzantine faults in geo-replicated environments require systems to execute complex agreement protocols over wide-area links and consequently are often associated with high response times. In this paper we address this ...

research-article
Practical Active Revocation

We propose Knob, a practical active revocation scheme allowing to efficiently revoke users' access to encrypted data banks stored in public clouds. Knob leverages Trusted Execution Environments and All-or-Nothing Data Transforms in order to re-encrypt ...

research-article
secureTF: A Secure TensorFlow Framework

Data-driven intelligent applications in modern online services have become ubiquitous. These applications are usually hosted in the untrusted cloud computing infrastructure. This poses significant security risks since these applications rely on applying ...

research-article
On Delivery Guarantees in Distributed Content-Based Publish/Subscribe Systems

Distributed overlay-based publish/subscribe systems provide a selective and scalable communication paradigm for connecting components of a distributed application. Existing overlay-based systems only guarantee delivery of notifications to clients that ...

research-article
Open Access
MATCH: A Decentralized Middleware for Fair Matchmaking In Peer-to-Peer Markets

Matchmaking is a core enabling element in peer-to-peer markets. To date, matchmaking is predominantly performed by proprietary algorithms, fully controlled by market operators. This raises fairness concerns as market operators effectively can hide, ...

PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep Learning Clusters

DNN learning jobs are common in today's clusters due to the advances in AI driven services such as machine translation and image recognition. The most critical phase of these jobs for model performance and learning cost is the tuning of hyperparameters. ...

Fast Training of Deep Learning Models over Multiple GPUs

This paper proposes FastT, a transparent module to work with the TensorFlow framework for automatically identifying a satisfying deployment and execution order of operations in DNN models over multiple GPUs, for expedited model training. We propose ...

research-article
BoLT: Barrier-optimized LSM-Tree

Key-value stores such as LevelDB and RocksDB are widely used in various systems due to their high write performance. However, the background compaction operations inherent to the key-value stores are often to blame for write amplification and write ...

research-article
JellyFish: A Fast Skip List with MVCC

Multi-version concurrency control is a widely employed concurrency control mechanism, as it allows non-blocking accesses while providing isolation among transactions. However, maintaining multiple versions increases the latency for both point lookups ...

research-article
Public Access
Consistent and Secure Network Updates Made Practical

Software-defined wide area networking (SD-WAN) enables dynamic network policy control over a large distributed network via network updates. To be practical, network updates must be both consistent, i.e., free of transient errors caused by updates to ...

FLeet: Online Federated Learning via Staleness Awareness and Performance Prediction

Federated Learning (FL) is very appealing for its privacy benefits: essentially, a global model is trained with updates computed on mobile devices while keeping the data of users local. Standard FL infrastructures are however designed to have no energy ...

research-article
TEEMon: A continuous performance monitoring framework for TEEs

Trusted Execution Environments (TEEs), such as Intel Software Guard eXtensions (SGX), are considered as a promising approach to resolve security challenges in clouds. TEEs protect the confidentiality and integrity of application code and data even ...

FeGAN: Scaling Distributed GANs

Existing approaches to distribute Generative Adversarial Networks (GANs) either (i) fail to scale for they typically put the two components of a GAN (the generator and the discriminator) on different machines, inducing significant communication overhead,...

research-article
Poseidon: Safe, Fast and Scalable Persistent Memory Allocator

Persistent memory allocator is an essential component of any Non-Volatile Main Memory (NVMM) application. A slow memory allocator can bottleneck the entire application stack, while an unsecure memory allocator can render applications inconsistent upon ...

research-article
WASP: Wide-area Adaptive Stream Processing

Adaptability is critical for stream processing systems to ensure stable, low-latency, and high-throughput processing of long-running queries. Such adaptability is particularly challenging for wide-area stream processing due to the highly dynamic nature ...

SplitServe: Efficiently Splitting Apache Spark Jobs Across FaaS and IaaS

Due to their lower startup latencies and finer-grain pricing than virtual machines (VMs), Amazon Lambdas and other cloud functions (CFs) have been identified as ideal candidates for handling unexpected spikes in simple, stateless workloads. However, it ...

research-article
SR3: Customizable Recovery for Stateful Stream Processing Systems

Modern stream processing applications need to store and update state along with their processing, and process live data streams in a timely fashion from massive and geo-distributed data sets. Since they run in a dynamic distributed environment and their ...

research-article
Sledge: a Serverless-first, Light-weight Wasm Runtime for the Edge

Emerging IoT applications with real-time latency constraints require new data processing systems operating at the Edge. Serverless computing offers a new compelling paradigm, where a user can execute a small application without handling the operational ...

Fifer: Tackling Resource Underutilization in the Serverless Era

Datacenters are witnessing a rapid surge in the adoption of serverless functions for microservices-based applications. A vast majority of these microservices typically span less than a second, have strict SLO requirements, and are chained together as ...

PASTRAMI: Privacy-preserving, Auditable, Scalable & Trustworthy Auctions for Multiple Items

Decentralised cloud computing platforms enable individuals to offer and rent resources in a peer-to-peer fashion. They must assign resources from multiple sellers to multiple buyers and derive prices that match the interests and capacities of both ...

research-article
A practical approach for updating an integrity-enforced operating system

Trusted computing defines how to securely measure, store, and verify the integrity of software controlling a computer. One of the major challenge that make them hard to be applied in practice is the issue with software updates. Specifically, an ...

research-article
Regaining Lost Seconds: Efficient Page Preloading for SGX Enclaves

Intel SGX is already here, with a strong emphasis on security and privacy. However, it is not free. Studies have shown that it incurs a significant performance overhead to take advantage of the security and privacy enhancement offered by SGX. In ...

Improving the Restore Performance via Physical-Locality Middleware for Backup Systems

Data deduplication as an important middleware plays an essential role in current backup systems due to the high space efficiency, which however suffers from low restore performance, since the chunks are heavily fragmented. Existing systems leverage ...

Xanadu: Mitigating cascading cold starts in serverless function chain deployments

Organization of tasks as workflows are an essential feature to expand the applicability of the serverless computing framework. Existing serverless platforms are either agnostic to function chains (workflows as a composition of functions) or rely on ...

Cost-Effective Data Feeds to Blockchains via Workload-Adaptive Data Replication

Feeding external data to a blockchain, a.k.a. data feed, is an essential task to enable blockchain interoperability and support emerging cross-domain applications. Given the data-intensive nature of real-life feeds (e.g., high-frequency price updates) ...

research-article
Mitigating Stragglers in the Decentralized Training on Heterogeneous Clusters

Decentralized algorithms, e.g., AllReduce, have been widely applied as the synchronization strategy for data-parallel distributed deep learning due to its superior performance over centralized ones. The synchronous Stochastic Gradient Descent (SGD) ...

Coral-Pie: A Geo-Distributed Edge-compute Solution for Space-Time Vehicle Tracking

We present a distributed system architecture which is scalable by design for cross-camera vehicle tracking at video ingestion time dubbed Coral-Pie. To meet the latency bounds for timely processing of every frame at each camera, we associate dedicated ...

An OpenMP Runtime for Transparent Work Sharing Across Cache-Incoherent Heterogeneous Nodes

In this work we present libHetMP, an OpenMP runtime for automatically and transparently distributing parallel computation across heterogeneous nodes. libHetMP targets platforms comprising CPUs with different instruction set architectures (ISA) coupled ...

research-article
DoubleFaceAD: A New Datastore Driver Architecture to Optimize Fanout Query Performance

The broad adoption of fanout queries on distributed datastores has made asynchronous event-driven datastore drivers a natural choice due to reduced multithreading overhead. However, through extensive experiments using the latest datastore drivers (e.g., ...

Recommendations

Acceptance Rates

Overall Acceptance Rate 203 of 948 submissions, 21%
YearSubmittedAcceptedRate
Middleware '2221838%
Middleware '17852024%
Middleware '1720735%
Middleware '17171271%
Middleware Industry '1520420%
Middleware '151182319%
Middleware '141442719%
Middleware '12181372%
Middleware '081172118%
Middleware '071082220%
Middleware '061222117%
Middleware '031582516%
Overall94820321%