Welcome to the poster/demo Proceedings of the 21st ACM/IFIP/USENIX Middleware Conference, which will be held virtually on December 7-11 2020. The poster and demo track offers a venue to escape from the constraints of the traditional slide presentation to demonstrate both early prototypes and mature technologies and to communicate innovative work in progress and preview late-breaking research results in an informal, interactive setting. This year, we accepted three posters and two demos on topics including PubSub, cloud computing, blockchain and quality assessment.
Proceeding Downloads
Hierarchical Topic Aggregation for Geospatial Applications through Processing Extensions in Message Brokers
Publish/subscribe (pub/sub) message brokers are typically operated with multiple tenants and multiple topics per tenant. Messages sent by a producer to a topic are received by consumers who subscribed to the same topic. In many applications, topic ...
Given 2n Eyeballs, All Quality Flaws Are Shallow
We demonstrate the capabilities of the Microservice Artefact Observatory (MAO), a federated software quality assessment middleware. MAO's extensible assessment tools continuously scan for quality flaws, defects and inconsistencies in microservice ...
Version Detection for Software Discovery in the Cloud
With the growth in server traffic and component diversity in cloud systems, administrators face the increasingly onerous task of monitoring system activity. Failure to keep track of the contents of virtual servers can limit overall efficiency and create ...
DynPubSub: A Peer To Peer Overlay For Topic-Based Pub/Sub Systems Deployed at the Edge
There are more and more IoT devices that produce and consume and ever increasing amount of data. Publish-subscribe (Pub/Sub) is a well known paradigm that simplifies the task of exchanging messages, as it decouples the communication between the entities ...
Practical Trade-Offs in Integrity Protection for Binaries via Ethereum
Ensuring the integrity of executable binaries is of vital importance to systems that run and depend on them. Additionally, supply-chain attacks and security related bugs demonstrate that binaries, once deployed, may need to be revoked and replaced with ...
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
Middleware '22 | 21 | 8 | 38% |
Middleware '17 | 85 | 20 | 24% |
Middleware '17 | 20 | 7 | 35% |
Middleware '17 | 17 | 12 | 71% |
Middleware Industry '15 | 20 | 4 | 20% |
Middleware '15 | 118 | 23 | 19% |
Middleware '14 | 144 | 27 | 19% |
Middleware '12 | 18 | 13 | 72% |
Middleware '08 | 117 | 21 | 18% |
Middleware '07 | 108 | 22 | 20% |
Middleware '06 | 122 | 21 | 17% |
Middleware '03 | 158 | 25 | 16% |
Overall | 948 | 203 | 21% |