dblp: SEC 2019 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


SEC 2019: Arlington, Virginia, USA

jump to- Edgy resource management
- Apps (killer?) at the edge
- Mobile & wearable devices
- The bleeding edge of machine learning
- Robust systems and services
- Poster papers and demos
- ArchEdge: The 2nd workshop on computing architecture for edge computing
- EdgeSP: The second ACM/IEEE workshop on security and privacy in edge computing
- HotWoT 2019: The second ACM/IEEE workshop on hot topics on web of things

- > Home > Conferences and Workshops > SEC
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Songqing Chen, Ryokichi Onishi, Ganesh Ananthanarayanan, Qun Li:
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019, Arlington, Virginia, USA, November 7-9, 2019. ACM 2019, ISBN 978-1-4503-6733-2
Edgy resource management

Shweta Khare, Hongyang Sun, Julien Gascon-Samson, Kaiwen Zhang, Aniruddha Gokhale
, Yogesh D. Barve
, Anirban Bhattacharjee
, Xenofon D. Koutsoukos:
Linearize, predict and place: minimizing the makespan for edge-based stream processing of directed acyclic graphs. 1-14

Jeffrey Helt, Guoyao Feng, Srinivasan Seshan
, Vyas Sekar:
Sandpaper: mitigating performance interference in CDN edge proxies. 30-46

Jonathan McChesney, Nan Wang, Ashish Tanwer, Eyal de Lara, Blesson Varghese:
DeFog: fog computing benchmarks. 47-58
Apps (killer?) at the edge

Liangkai Liu, Jiamin Chen, Marco Brocanelli
, Weisong Shi
:
E2M: an energy-efficient middleware for computer vision applications on autonomous mobile robots. 59-73

Jayson G. Boubin
, Naveen T. R. Babu, Christopher Stewart
, John Chumley, Shiqi Zhang:
Managing edge resources for fully autonomous aerial systems. 74-87

Qi Chen, Xu Ma, Sihai Tang, Jingda Guo, Qing Yang, Song Fu:
F-cooper: feature based cooperative perception for autonomous vehicle edge computing system using 3D point clouds. 88-100

Seyed Yahya Nikouei, Yu Chen, Alexander J. Aved
, Erik Blasch, Timothy R. Faughnan:
I-SAFE: instant suspicious activity identification at the edge using fuzzy decision making. 101-112
Mobile & wearable devices

Dawei Li
, Serafettin Tasci, Shalini Ghosh, Jingwen Zhu, Junting Zhang, Larry P. Heck:
RILOD: near real-time incremental learning for object detection at the edge. 113-126

Yitao Chen, Saman Biookaghazadeh, Ming Zhao
:
Exploring the capabilities of mobile devices in supporting deep learning. 127-138

Yan Lu, Yuanchao Shu
, Xu Tan
, Yunxin Liu, Mengyu Zhou, Qi Chen, Dan Pei
:
Collaborative learning between cloud and end devices: an empirical study on location prediction. 139-151

Junjue Wang, Ziqiang Feng
, Shilpa Anna George, Roger Iyengar, Padmanabhan Pillai, Mahadev Satyanarayanan:
Towards scalable edge-native applications. 152-165
The bleeding edge of machine learning

Weiyu Ju, Dong Yuan, Wei Bao
, Liming Ge, Bing Bing Zhou:
DeepSave: saving DNN inference during handovers on the edge. 166-178

Ke-Jou Hsu, Ketan Bhardwaj, Ada Gavrilovska:
Couper: DNN model slicing for visual analytics containers at the edge. 179-194

Li Zhou, Mohammad Hossein Samavatian, Anys Bacha, Saikat Majumdar, Radu Teodorescu:
Adaptive parallel execution of deep neural networks on heterogeneous edge devices. 195-208

Xingzhou Zhang, Mu Qiao, Liangkai Liu, Yunfei Xu
, Weisong Shi
:
Collaborative cloud-edge computation for personalized driving behavior modeling. 209-221
Robust systems and services

Mbarka Soualhia, Chunyan Fu, Foutse Khomh:
Infrastructure fault detection and prediction in edge cloud environments. 222-235

Rich Wolski, Chandra Krintz, Fatih Bakir, Gareth George, Wei-Tsung Lin:
CSPOT: portable, multi-scale functions-as-a-service for IoT. 236-249

Chanh Nguyen
, Amardeep Mehta, Cristian Klein, Erik Elmroth:
Why cloud applications are not ready for the edge (yet). 250-263

Sandeep D'Souza, Heiko Koehler, Akhilesh Joshi, Satyam Vaghani, Ragunathan (Raj) Rajkumar:
Quartz: time-as-a-service for coordination in geo-distributed systems. 264-279
Poster papers and demos

Kewei Sha
, Youhuizi Li:
ChordEdge: design of chord ring and SDN based edge infrastructure management system: poster. 280-282

Jude Fletcher, David Wallom
:
Deep learning based task scheduling in a cloud RAN enabled edge environment. 283-285

Weibin Ma, Lena Mashayekhy:
Privacy-by-design task offloading for UAV-mounted cloudlets. 286-288

Yuan Li
, Haili Wang
, Bill P. Buckles:
Traffic congestion assessment based on street level data for on-edge deployment. 289-291

Dixit Bhatta
, Lena Mashayekhy:
Cost-aware cloudlet placement in edge computing systems. 292-294

Ping Du, Akihiro Nakao, Zhaoxia Sun, Lei Zhong, Ryokichi Onishi:
Deep learning-based C/U plane separation architecture for automotive edge computing. 295-297

Peining Zhen, Bin Liu, Yuan Cheng, Hai-Bao Chen, Hao Yu
:
Fast video facial expression recognition by deeply tensor-compressed LSTM neural network on mobile device. 298-300

Nadim Tellez, Miguel Jimeno, Augusto Salazar
, Elias David NiƱo Ruiz:
Container-based architecture for optimal face-recognition tasks in edge computing. 301-303

Daniel Benditkis, Aviv Keren, Liron Mor-Yosef, Tomer Avidor, Neta Shoham, Nadav Tal-Israel:
Distributed deep neural network training on edge devices. 304-306

Thomas Rausch
, Philipp Raith, Padmanabhan Pillai, Schahram Dustdar
:
A system for operating energy-aware cloudlets: demo. 307-309

Naveen T. R. Babu, Christopher Stewart
:
Revisiting online scheduling for AI-driven internet of things. 310-312

Tian Guo, Robert J. Walls, Samuel S. Ogden:
EdgeServe: efficient deep learning model caching at the edge. 313-315

Zichen Zhu, Nan Jiang, Tian Guo, Sheng Wei:
Virtual reality streaming at the edge: a power perspective: poster. 316-318

Nicholas J. Mitchell, Kazi Zunnurhain:
Google cloud platform security. 319-322

Xiaojie Zhang
, Saptarshi Debroy:
Adaptive task offloading over wireless in mobile edge computing. 323-325

Amit Samanta
, Yong Li:
Cost-effective microservice scaling at edge: poster. 326-328

Eduardo Romero, Christopher Stewart
, Nathaniel Morris:
Fast inference services for alternative deep learning structures. 329-331

Ang Li, Chunpeng Wu, Yiran Chen, Bin Ni:
An efficient edge-assisted mobile system for video photorealistic style transfer: poster abstract. 332-333

An Wang, Zili Zha, Yang Guo, Songqing Chen:
A SDN-based network layer for edge computing: poster. 334-336

Yao Liu, Chao Zhou, Shuoqian Wang, Mengbai Xiao:
FFmpeg360 for 360-degree videos: edge-based transcoding, view rendering, and visual quality comparison: poster. 337-339

Zhuwei Qin, Fuxun Yu, Xiang Chen:
Task-adaptive incremental learning for intelligent edge devices. 340-341

Chenchen Liu:
A neuromorphic GAN system for intelligent computing on edge. 342-343
ArchEdge: The 2nd workshop on computing architecture for edge computing

Ang Li, Chunpeng Wu, Yiran Chen, Bin Ni:
An efficient mobile-edge collaborative system for video photorealistic style transfer. 344-345

Qingyu Liu, Haibo Zeng, Lingjia Liu, Minghua Chen
:
Delay-constrained offloading of computationally intensive workloads in edge computing. 346

Kangjun Bai, Shiya Liu, Yang Yi:
High speed and energy efficient deep neural network for edge computing. 347-349

Junchao Ma, Hao-Hsuan Chang
, Pingzhi Fan, Lingjia Liu:
Machine learning enabled distributed mobile edge computing network. 350-351

Changchi Shuai, Keni Qiu:
PAPS: power budget-aware pipeline scheduling for an embedded ReRAM-based accelerator. 352-353

Zhe Zhou
, Xintong Li, Guangyu Sun:
Accelerate service live migration in resource-limited edge computing systems. 354-355

Jonathon Edstrom, Hritom Das
, Yiwen Xu, Na Gong:
Embedded sensory data memory optimization for IoT edge inference with privacy, accuracy, and energy efficiency. 357
EdgeSP: The second ACM/IEEE workshop on security and privacy in edge computing

Reza Tourani, Austin Bos, Satyajayant Misra, Flavio Esposito:
Towards security-as-a-service in multi-access edge. 358-363

Sonali Sen Baidya, Rattikorn Hewett:
SDN-based edge computing security: detecting and mitigating flow rule attacks. 364-370

Mohammadreza Ashouri, Christoph Kreitz:
Scalayzer: a portable tool for vulnerability analysis in scala. 371-376

Yiwei Lu, Mahesh Kumar K., Noman Mohammed, Yang Wang:
Homoglyph attack detection with unpaired data. 377-382

Abhishek Roy, Anshuman Chhabra, Charles A. Kamhoua, Prasant Mohapatra:
A moving target defense against adversarial machine learning. 383-388

Jiyu Chen
, Heqing Huang, Hao Chen
:
Informer: irregular traffic detection for containerized microservices RPC in the real world. 389-394
HotWoT 2019: The second ACM/IEEE workshop on hot topics on web of things

Abrar S. Alrumayh, Sarah M. Lehman
, Chiu C. Tan:
ABACUS: audio based access control utility for smarthomes. 395-400

Danda B. Rawat
, Naveen Naik Sapavath
, Min Song:
Performance evaluation of deception system for deceiving cyber adversaries in adaptive virtualized wireless networks. 401-406

George Xylomenos, Evangelos Zafeiratos, Marios Prokopakis:
Keyword-based information retrieval for the WoT. 407-412

Jinchun Choi, Afsah Anwar, Hisham Alasmary
, Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen:
IoT malware ecosystem in the wild: a glimpse into analysis and exposures. 413-418

Kyoung-Don Kang:
Towards efficient real-time decision support at the edge. 419-424

Naveen T. R. Babu, Christopher Stewart
:
Energy, latency and staleness tradeoffs in AI-driven IoT. 425-430

Xiaohui Peng, Weisong Shi
:
Zone of control: the basic computing unit for web of everything. 431-436

Yutao Tang, Zhengrui Qin, Shanhe Yi
, Qun Li
:
Virtual machine migration for IoT applications. 437-442

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






