Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3528535acmconferencesBook PagePublication PagesmiddlewareConference Proceedingsconference-collections
Middleware '22: Proceedings of the 23rd ACM/IFIP International Middleware Conference
ACM2022 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
Middleware '22: 23rd International Middleware Conference Quebec QC Canada November 7 - 11, 2022
ISBN:
978-1-4503-9340-9
Published:
24 October 2022
Sponsors:
ACM, IFIP
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 08 Feb 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
EdgeTune: Inference-Aware Multi-Parameter Tuning

Deep Neural Networks (DNNs) have demonstrated impressive performance on many machine-learning tasks such as image recognition and language modeling, and are becoming prevalent even on mobile platforms. Despite so, designing neural architectures still ...

research-article
GuardiaNN: Fast and Secure On-Device Inference in TrustZone Using Embedded SRAM and Cryptographic Hardware

As more and more mobile/embedded applications employ Deep Neural Networks (DNNs) involving sensitive user data, mobile/embedded devices must provide a highly secure DNN execution environment to prevent privacy leaks. Aimed at securing DNN data, recent ...

research-article
SecureLease: Maintaining Execution Control in The Wild using Intel SGX

Modern software programs have dedicated license-check modules that restrict access to users, who possess valid credentials. They also have a large number of add-on pluggable modules that can be separately purchased and have their dedicated license ...

research-article
Open Access
Improving Concurrent GC for Latency Critical Services in Multi-tenant Systems

For resource utilization efficiency, latency critical (LC) services are commonly co-located with best-effort batch jobs in datacenter servers. Many LC services, such as Cassandra and HBase, run in Java Virtual Machine (JVM). We find that LC services ...

research-article
SplitBFT: Improving Byzantine Fault Tolerance Safety Using Trusted Compartments

Byzantine fault-tolerant agreement (BFT) in a partially synchronous system usually requires 3f + 1 nodes to tolerate f faulty replicas. Due to their high throughput and finality property, BFT algorithms build the core of recent permissioned blockchains. ...

Celestial: Virtual Software System Testbeds for the LEO Edge

As private space companies such as SpaceX and Telesat are building large LEO satellite constellations to provide global broadband Internet access, researchers have proposed to embed compute services within satellite constellations to provide computing ...

ROS-SF: A Transparent and Efficient ROS Middleware using Serialization-Free Message

In recent years, ROS becomes the dominant middleware for robotic systems. The performance of its message-passing paradigm is crucial to the robot's reaction time. However, previous works only focus on efficiency, but ignore the requirement for ...

research-article
Bolt: Fast Inference for Random Forests

Random forests use ensembles of decision trees to boost accuracy for machine learning tasks. However, large ensembles slow down inference on platforms that process each tree in an ensemble individually. We present Bolt, a platform that restructures whole ...

research-article
Open Access
Aergia: leveraging heterogeneity in federated learning systems

Federated Learning (FL) is a popular deep learning approach that prevents centralizing large amounts of data, and instead relies on clients that update a global model using their local datasets. Classical FL algorithms use a central federator that, for ...

research-article
MATEE: multimodal attestation for trusted execution environments

Confidential computing services enable users to run their workloads in Trusted Execution Environments (TEEs) leveraging secure hardware like Intel SGX, and verify them by performing remote attestation. This process offers necessary proof for the ...

research-article
MixNN: protection of federated learning against inference attacks by mixing neural network layers

Machine Learning (ML) has emerged as a core technology to provide learning models to perform complex tasks. Boosted by Machine Learning as a Service (MLaaS), the number of applications relying on ML capabilities is ever increasing. However, ML models are ...

A seer knows best: optimized object storage shuffling for serverless analytics

Serverless platforms offer high resource elasticity and pay-as-you-go billing, making them a compelling choice for data analytics. To craft a "pure" serverless solution, the common practice is to transfer intermediate data between serverless functions ...

Femto-containers: lightweight virtualization and fault isolation for small software functions on low-power IoT microcontrollers

Low-power operating system runtimes used on IoT microcontrollers typically provide rudimentary APIs, basic connectivity and, sometimes, a (secure) firmware update mechanism. In contrast, on less constrained hardware, networked software has entered the ...

research-article
EventChain: a blockchain framework for secure, privacy-preserving event verification

The number of fake news written by bots or malicious actors on social media is rising. One cause is the ability of users to post anything, at any place, at any time. This offers great flexibility, but it also poses the risk that users share ...

research-article
BoFL: bayesian optimized local training pace control for energy efficient federated learning

Federated learning (FL) is a machine learning paradigm that enables a cluster of decentralized edge devices to collaboratively train a shared machine learning model without exposing users' raw data. However, the intensive model training computation is ...

research-article
Public Access
Multi-resource fair allocation for consolidated flash-based caching systems

Using a flash-based layer to serve the caching and buffering needs of multiple workloads has become a common practice. In such settings, resource demands will inevitably exceed available capacity sometimes. "Fair" resource allocation may offer a ...

research-article
Light-GC: a lightweight and efficient garbage collection scheme for embedded file systems

Raw flash file systems are essential in today's cost-sensitive embedded systems and legacy embedded devices. The performance of raw flash file systems is often limited by their inefficient garbage collection (GC) due to the tight capacity of the onboard ...

research-article
Open Access
Slice-Tune: a system for high performance DNN autotuning

Autotuning DNN models prior to their deployment is an essential but time-consuming task. Using expensive (and power-hungry) GPU and TPU accelerators efficiently is also key. Since DNNs do not always use a GPU fully, spatial multiplexing of multiple ...

research-article
Open Access
CGX: adaptive system support for communication-efficient deep learning

The ability to scale out training workloads has been one of the key performance enablers of deep learning. The main scaling approach is data-parallel GPU-based training, which has been boosted by hardware and software support for highly efficient point-...

research-article
Optimizing communication in deep reinforcement learning with XingTian

Deep Reinforcement Learning (DRL) achieves great success in various domains. Communication in today's DRL algorithms takes non-negligible time compared to the computation. However, prior DRL frameworks usually focus on computation management while paying ...

research-article
DCert: towards secure, efficient, and versatile blockchain light clients

Light clients have been widely used in blockchain systems to support lightweight nodes by synchronizing and verifying block headers only. However, there are two major limitations with the current light client design. First, with the ever increasing ...

research-article
ShadowSync: latency long tail caused by hidden synchronization in real-time LSM-tree based stream processing systems

Mission-critical, real-time, continuous stream processing applications that interact with the real world have stringent latency requirements. For example, e-commerce websites like Amazon improve their marketing strategy by performing real-time ...

research-article
Open Access
Reversible conflict-free replicated data types

Conflict-free replicated data types (CRDTs) are popular for optimistic replication and ensuring strong eventual consistency (SEC) in distributed systems. However, reversibility is an underdeveloped functionality for CRDTs, despite its usefulness in ...

research-article
Open Access
Secure and distributed assessment of privacy-preserving GWAS releases

Genome-wide association studies (GWAS) identify correlations between the genetic variants and an observable characteristic such as a disease. Previous works presented privacy-preserving distributed algorithms for a federation of genome data holders that ...

research-article
Open Access
Best Paper
Best Paper
MicroEdge: a multi-tenant edge cluster system architecture for scalable camera processing

With the proliferation of high bandwidth cameras and AR/VR devices, and their increasing use in situation awareness applications, edge computing is gaining prominence to meet the throughput requirements of such applications. This work focuses on camera ...

research-article
Shielding federated learning systems against inference attacks with ARM TrustZone

Federated Learning (FL) opens new perspectives for training machine learning models while keeping personal data on the users premises. Specifically, in FL, models are trained on the users' devices and only model updates (i.e., gradients) are sent to a ...

Contributors
  • University of Bologna
  • School of Higher Technology
  • School of Higher Technology
  • Purdue University
  • Technical University of Madrid
  • University of Bologna
  • School of Higher Technology

Index Terms

  1. Proceedings of the 23rd ACM/IFIP International Middleware Conference
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Acceptance Rates

        Middleware '22 Paper Acceptance Rate 8 of 21 submissions, 38%;
        Overall Acceptance Rate 203 of 948 submissions, 21%
        YearSubmittedAcceptedRate
        Middleware '2221838%
        Middleware '17852024%
        Middleware '1720735%
        Middleware '17171271%
        Middleware Industry '1520420%
        Middleware '151182319%
        Middleware '141442719%
        Middleware '12181372%
        Middleware '081172118%
        Middleware '071082220%
        Middleware '061222117%
        Middleware '031582516%
        Overall94820321%