IEEE International Conference on Parallel and Distributed Systems (IEEE ICPADS 2020)
Conference Opening
Session Chair
Song Guo (The Hong Kong Polytechnic University)
Keynote 1
Resource Allocation and Consensus in Edge Blockchain Systems
Yuanyuan Yang (SUNY Distinguished Professor, Stony Brook University, USA)
Session Chair
Song Guo (The Hong Kong Polytechnic University)
Keynote 2
On Optimal Partitioning and Scheduling of DNNs in Mobile Cloud Computing
Jie Wu (Center for Networked Computing, Temple University, USA)
Session Chair
Jiannong Cao (The Hong Kong Polytechnic University)
Virtual Break
Session Chair
N/A
Learning Algorithm
LTG-LSM: The Optimal Structure in LSM-tree Combined with Reading Hotness
Jiaping Yu, Huahui Chen, Jiangbo Qian and Yihong Dong
Improved MapReduce Load Balancing through Distribution-Dependent Hash Function Optimization
Zafar Ahmad, Sharmila Duppala, Rezaul Chowdhury and Steven Skiena
Our idea is to analyze the observed frequency distribution for the given task so as to identify an optimal offset parameter c to add in the hash function to minimize makespan. For two different bucketing methods �C modulo labeling and consecutive binning �C we present efficient algorithms for finding the optimal value of c. Finally, we present simulation results for both bucketing methods. The results vary with the data distribution and the number of reducers, but generally reduce makespan by 20% on average for power-law distributions, Results are confirmed with experiments on well-known real-world data sets.
Efficient Sparse-Dense Matrix-Matrix Multiplication on GPUs Using the Customized Sparse Storage Format
Shaohuai Shi, Qiang Wang and Xiaowen Chu
Session Chair
Gongpu Chen (Chinese University of Hong Kong)
Algorithms for Cloud Systems
Joint Service Placement and Request Scheduling for Multi-SP Mobile Edge Computing Network
Zhengwei Lei, Hongli Xu, Liusheng Huang and Zeyu Meng
A similarity clustering-based deduplication strategy in cloud storage systems
Saiqin Long, Zhetao Li, Zihao Liu, Qingyong Deng, Sangyoon Oh and Nobuyoshi Komuro
A Fair Task Assignment Strategy for Minimizing Cost in Mobile Crowdsensing
Yujun Liu, Yongjian Yang, En Wang, Wenbin Liu, Dongming Luan, Xiaoying Sun and Jie Wu
Communication-Aware Load Balancing of the LU Factorization over Heterogeneous Clusters
Lucas Leandro Nesi, Lucas Mello Schnorr and Arnaud Legrand
Session Chair
Lei Mo (Southeast University)
Algorithms for Networks
An Efficient Work-Stealing Scheduler for Task Dependency Graph
Chun-Xun Lin, Tsung-Wei Huang and Martin D. F. Wong
LBNN: Perceiving the State Changes of a Core Telecommunications Network via Linear Bayesian Neural Network
Yanying Lin, Kejiang Ye, Ming Chen, Naitian Deng, Tailin Wu, and Cheng-Zhong Xu
A Method to Detecting Artifact Anomalies in A Microservice Architecture
Faisal Fahmi, Pei-Shu Huang and Feng-Jian Wang
Contention resolution on a restrained channel
Elijah Hradovich, Marek Klonowski and Dariusz R. Kowalski
We construct adaptive and full sensing protocols with optimal throughput 1 and almost optimal throughput 1?1/n, respectively, in a constant-restrained channel. By contrast, we show that restricted protocols based on schedules known in advance obtain throughput at most min.
We also support our theoretical analysis by simulation results of our algorithms in systems of moderate, realistic sizes and scenarios, and compare them with popular backoff protocols.
Session Chair
Fei Tong (Southeast University)
Virtual Lunch Break
Session Chair
N/A
Performance Prediction and Optimization
Real-Time Scheduling and Analysis of OpenMP Programs with Spin Locks
He Du, Xu Jiang, Tao Yang, Mingsong Lv and Wang Yi
Predicting Performance Degradation on Adaptive Cache Replacement Policy
Yi Zhang, Ran Cui, Mingsong Lv, Chuanwen Li and Qingxu Deng
Making Inconsistent Components More Efficient For Hybrid B+Trees
Xiongxiong She, Chengliang Wang and Fenghua Tu
Session Chair
Nan Guan (The Hong Kong Polytechnic University)
Edge and Persistent Memory
XOR-Net: An Efficient Computation Pipeline for Binary Neural Network Inference on Edge Devices
Shien Zhu, Luan H. K. Duong, and Weichen Liu
In this paper, we propose XOR-Net as an optimized computation pipeline for binary networks both without and with scaling factors. As XNOR is realized by two instructions XOR and NOT on CPU/GPU platforms, XOR-Net avoids NOT operations by using XOR instead of XNOR, thus reduces bit-wise operations in both aforementioned kinds of binary convolution layers. For the binary convolution with scaling factors, our XOR-Net further rearranges the computation sequence of calculating and multiplying the scaling factors to reduce fullprecision operations. Theoretical analysis shows that XOR-Net reduces one-third of the bit-wise operations compared with traditional binary convolution, and up to 40% of the fullprecision operations compared with XNOR-Net. Experimental results show that our XOR-Net binary convolution without scaling factors achieves up to 135�� speedup and consumes no more than 0.8% energy compared with parallel full-precision convolution. For the binary convolution with scaling factors, XOR-Net is up to 17% faster and 19% more energy-efficient than XNOR-Net.
Load Balance Awared Data Sharing Systems In Heterogeneous Edge Environment
Sheng Chen, Zheng Chen, Siyuan Gu, Baochao Chen, Junjie Xie and Deke Guo
Themis: Malicious Wear Detection and Defense for Persistent Memory File Systems
Wenbin Wang, Chaoshu Yang, Runyu Zhang, Shun Nie, Xianzhang Chen and Duo Liu
Session Chair
Mingsong Lv (Northeastern University)
Federated Learning and Reinforcement Learning
Incentive Mechanism Design for Federated Learning: A Two-stage Stackelberg Game Approach
Guiliang Xiao, Mingjun Xiao, Guoju Gao, Sheng Zhang, Hui Zhao and Xiang Zou
Time Efficient Federated Learning with Semi-asynchronous Communication
Jiangshan Hao, Yanchao Zhao and Jiale Zhang
Multi-agent Fault-tolerant Reinforcement Learning with Noisy Environments
Canhui Luo, Xuan Liu, Xinning Chen and Juan Luo
Decentralized Exploration of a Structured Environment Based on Multi-agent Deep Reinforcement Learning
Dingjie He, Dawei Feng, Hongda Jia and Hui Liu
Session Chair
Dawei Feng (National University of Defense Technology)
Crowd Sourcing and Parallel Acceleration
D2D-Enabled Reliable Data Collection for Mobile Crowd Sensing
Pengfei Wang, Zhen Yu, Chi Lin, Leyou Yang, Yaqing Hou and Qiang Zhang
Improving the Applicability of Visual Peer-to-Peer Navigation with Crowdsourcing
Erqun Dong, Jianzhe Liang, Zeyu Wang, Jingao Xu, Longfei Shangguan, Qiang Ma and Zheng Yang
Massively Parallel Causal Inference of Whole Brain Dynamics at Single Neuron Resolution
Wassapon Watanakeesuntorn, Keichi Takahashi, Kohei Ichikawa, Joseph Park, George Sugihara, Ryousei Takano, Jason Haga and Gerald M. Pao
An Effective Design to Improve the Efficiency of DPUs on FPGA
Yutian Lei, Qingyong Deng, Saiqin Long, Shaohui Liu and Sangyoon Oh
Session Chair
Shigeng Zhang (Central South University)
Localization and Cross-technology Communication
Lightweight Mobile Devices Indoor Location Based on Image Database
Ran Gao, Yanchao Zhao and Maoxing Tang
A Dynamic Escape Route Planning Method for Indoor Multi-floor Buildings Based on Real-time Fire Situation Awareness
Chun Wang, Juan Luo, Cuijun Zhang and Xuan Liu
Mitigating Cross-Technology Interference in Heterogeneous Wireless Networks based on Deep Learning
Weidong Zheng, Junmei Yao and Kaishun Wu
Accelerating PageRank in Shared-Memory for Efficient Social Network Graph Analytics
Baofu Huang, Zhidan Liu and Kaishun Wu
Session Chair
Zhidan Liu (Shenzhen University)
Scheduling in Edge Environment
Using Configuration Semantic Features and Machine Learning Algorithms to Predict Build Result in Cloud-Based Container Environment
Yiwen Wu, Yang Zhang, Bo Ding, Tao Wang and Huaimin Wang
Joint Service Placement and Computation Offloading in Mobile Edge Computing: An Auction-based Approach
Lei Zhang, Zhihao Qu, Baoliu Ye and Bin Tang
Multi-user Edge-assisted Video Analytics Task Offloading Game based on Deep Reinforcement Learning
Yu Chen, Sheng Zhang, Mingjun Xiao, Zhuzhong Qian, Jie Wu and Sanglu Lu
Accelerating Deep Learning Tasks with Optimized GPU-assisted Image Decoding
Lipeng Wang, Qiong Luo and Shengen Yan
Session Chair
Qingyong Deng (Xiangtan University)
Application and Security
Scheduling Rechargeable UAVs for Long Time Barrier Coverage
Zhouqing Han, Xiaojun Zhu and Lijie Xu
Use of Genetic Programming Operators in Data Replication and Fault Tolerance
Syed Mohtashim Abbas Bokhari and Oliver Theel
Multiple Balance Subsets Stacking for Imbalanced Healthcare Datasets
Yachao Shao, Tao Zhao, Xiaoning Wang, Xiaofeng Zou and Xiaoming Fu
Securing App Behaviors in Smart Home: A Human-App Interaction Perspective
Jinlei Li, Yan Meng, Lu Zhou and Haojin Zhu
Session Chair
Pengfei Wang (Dalian University of Technology)
Edge-Cloud Performance
Task Offloading in Trusted Execution Environment empowered Edge Computing
Yuepeng Li, Deze Zeng, Lin Gu, Andong Zhu and Quan Chen
Gecko: Guaranteeing Latency SLO on a Multi-Tenant Distributed Storage System
Zhenyu Leng, Dejun Jiang, Liuying Ma and Jin Xiong
A Learning-based Dynamic Load Balancing Approach for Microservice Systems in Multi-cloud Environment
Jieqi Cui, Pengfei Chen and Guangba Yu
Enhancing Availability for the MEC Service: CVaR-based Computation Offloading
Shengli Pan, Zhiyong Zhang, Tao Xue and Guangmin Hu
Session Chair
Yufeng Zhan (Beijing Institute of Technology)
Performance of Distributed Systems
Intermediate Value Size Aware Coded MapReduce
Yamei Dong, Bin Tang, Baoliu Ye, Zhihao Qu and Sanglu Lu
A Customized Reinforcement Learning based Binary Offloading in Edge Cloud
Yuepeng Li, Lvhao Chen, Deze Zeng and Lin Gu
Optimal Use Of The TCP/IP Stack in User-space Storage Applications with ADQ feature in NIC
Ziye Yang, Ben Walker, James R Harris, Yadong Li, and Gang Cao
Session Chair
Shengli Pan (China University of Geosciences (Wuhan))
Cyber Physical Security
SIC^2: Securing Microcontroller Based IoT Devices with Low-cost Crypto Coprocessors
Bryan Pearson, Cliff Zou, Yue Zhang, Zhen Ling and Xinwen Fu
Intelligent detection algorithm against UAVs' GPS spoofing attack
Shenqing Wang, Jiang Wang��Chunhua Su, and Xinshu Ma
An Efficient and Scalable Sparse Polynomial Multiplication Accelerator for LAC on FPGA
Jipeng Zhang, Zhe Liu, Hao Yang, Junhao Huang and Weibin Wu
Secure and Verifiable Data Access Control Scheme With Policy Update and Computation Outsourcing for Edge Computing
Yue Guan, Songtao Guo, Pan Li and Yuanyuan Yang
Session Chair
Chunpeng Ge (Nanjing University of Aeronautics and Astronautics)
AI and Distributed System Security
Secure Door on Cloud: A Secure Data Transmission Scheme to Protect Kafka's Data
Hanyi Zhang, Liming Fang, Keyu Jiang, Weiting Zhang, Minghui Li and Lu Zhou
A Solution to Data Accessibility Across Heterogeneous Blockchains
Zhihui Wu, Yang Xiao, Enyuan Zhou, Qingqi Pei, and Quan Wang
In this article, we propose a novel general framework for cross-heterogeneous blockchain communication based on a periodical committee rotation mechanism to support information exchange of diverse transactions across multiple heterogeneous blockchain systems. Connecting heterogeneous blockchains through committees has a more robust trust than the notary method. In order to eliminate the impact of downtime nodes in a timely manner, we periodically reorganize the committee and give priority to replacing downed nodes to ensure the reliability of the system. In addition, a message-oriented verification mechanism is designed to improve the rate of trusted intervisit across heterogeneous chains. We have built a prototype of the scheme and conducted simulation experiments on the current mainstream blockchain for message exchange across heterogeneous chains. The results show that our solution has a good performance both in inter-chain access rate and system stability.
PrivAG: Analyzing Attributed Graph Data with Local Differential Privacy
Zichun Liu, Liusheng Huang, Hongli Xu, Wei Yang and Shaowei Wang
Existing studies on protecting private graph data mainly focus on edge local differential privacy(LDP), which might be insufficient in some highly sensitive scenarios. In this paper, we present a novel privacy notion that is stronger than edge LDP, and investigate approaches to analyze attributed graphs under this notion. To neutralize the effect of excessively introduced noise, we propose PrivAG, a privacy-preserving framework that protects attributed graph data in the local setting while providing representative graph statistics. The effectiveness and efficiency of PrivAG framework is validated through extensive experiments.
Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples
Yunzhe Tian, Yingdi Wang, Endong Tong, Wenjia Niu, Liang Chang, Qi Alfred Chen, Gang Li and Jiqiang Liu
A Deep Learning Framework Supporting Model Ownership Protection and Traitor Tracing
Guowen Xu, Hongwei Li, Yuan Zhang, Xiaodong Lin, Robert H. Deng and Xuemin Shen
Session Chair
Yang Xiao (Xidian University)
Made with in Toronto · Privacy Policy · © 2022 Duetone Corp.