Poster Session

Accepted Posters from Open Call for Posters
  • Toward On-demand Nested Virtualization for Live-Refreshing Cloud Systems, Ryosuke Yasuoka (University of Tsukuba), Takaaki Fukai and Takahiro Shinagawa (The University of Tokyo)
    Abstract (pdf), Teaser (pdf), Poster (pdf), Video (mp4)
  • A Multi-variant Execution Environment for In-memory Databases, Shuhei Enomoto and Hiroshi Yamada (Tokyo University of Agriculture and Technology)
    Abstract (pdf), Teaser (pdf), Poster (pdf), Video (mp4)
  • Lambada: Interactive Data Analytics on Cold Data using Serverless Cloud Infrastructure, Ingo Müller, Renato Marroquín, and Gustavo Alonso (ETH Zurich)
    Abstract (pdf), Teaser (pdf), Poster (pdf), Video (mp4)
  • Dissecting QUIC implementation performance, Xiangrui Yang (National University of Defense Technology), Lars Eggert (NetApp), Jorg Ott (Technische Universität München), Steve Uhlig (Queen Mary University of London), Zhigang Sun (National University of Defense Technology), Gianni Antichi (Queen Mary University of London)
    Abstract (pdf), Teaser (pdf), Poster (pdf), Video (mp4)
  • TEE-based Scalable and Cheat Resistant Online Video Game Architecture, Terufumi Hata, Pierre-Louis Aublin, Kenji Kono (Keio University)
    Abstract (pdf), Teaser (pdf), Poster (pdf), Video (mp4)
  • AE-NIDS : Automated Evolving SDN-based Network Intrusion Detection System, Suyeol Lee and Seungwon Shin (KAIST)
    Abstract (pdf), Teaser (pdf), Poster (pdf), Video (mp4)
  • Persistent Memory: Questions You Should Ask, Tony Mason (University of British Columbia)
    Abstract (pdf), Teaser (pdf), Poster (pdf), Video (mp4)
  • Smart Data Filtering in the RIPE Atlas Measurement Platform, Spyridon-Andreas Siskos (University Of Crete/ICS-FORTH), Petros Gigis (University College London/ICS-FORTH), Lefteris Manassakis (ICS-FORTH), Xenofontas Dimitropoulos (University Of Crete/ICS-FORTH)
    Abstract (pdf), Teaser (pdf), Poster (pdf), Video (mp4)
  • In-Storage Data Transformations for Enforceable Privacy, Claudiu Mihali, Anca Hangan, and Gheorghe Sebestyen (Technical University of Cluj-Napoca), Zsolt Istvan (IMDEA Software Institute)
    Abstract (pdf), Teaser (pdf), Poster (pdf), Video (mp4)
  • A Secure Network Stack for the Untrusted Cloud, Keita Aihara, Pierre-Louis Aublin, and Kenji Kono (Keio University)
    Abstract (pdf), Teaser (pdf), Poster (pdf), Video (mp4)
  • ART: Learning Operation Tree Patterns for Cloud Remediation, Hongyi Huang and Wenfei Wu (Tsinghua University)
    Abstract (pdf), Teaser (pdf), Poster (pdf), Video (mov)
  • Optimizing Intel Data Direct I/O Technology for Multi-hundred-gigabit Networks, Amir Roozbeh (KTH Royal Institute of Technology/Ericsson), Alireza Farshin, Gerald Q. Maguire Jr., and Dejan Kostić (KTH Royal Institute of Technology)
    Abstract (pdf), Teaser (pdf), Poster (pdf), Video (mp4)
  • Performance-aware cluster scheduling, Diana Andreea Popescu and Andrew W. Moore (University of Cambridge)
    Abstract (pdf), Teaser (pdf), Poster (pdf), Video (mp4)
  • Finesse: Kernel Bypass for File Systems, Matheus Stolet and Tony Mason (University of British Columbia)
    Abstract (pdf), Teaser (pdf), Poster (pdf), Video (mp4)
Accepted Posters from Main Track
  • RAIDP: ReplicAtion with Intra-Disk Parity. Eitan Rosenfeld, Aviad Zuck (Technion – Israel Institute of Technology), Nadav Amit (VMware Research), Michael Factor (IBM Research), Dan Tsafrir (Technion & VMware Research). Poster (pdf)
  • Experiences of Landing Machine Learning onto Market-Scale Mobile Malware Detection. Hao Lin, Liangyi Gong, Zhenhua Li (Tsinghua University), Feng Qian (University of Minnesota – Twin Cities), Zifan Zhang (Tsinghua University & Tencent Co. Ltd.), Qi Alfred Chen (University of California), Zhiyun Qian (UC Riverside), Yunhao Liu (MSU & Tsinghua University). Abstract (pdf), Teaser (pdf), Poster (pdf), Video (mp4)
  • EvenDB: Optimizing Key-Value Storage for Spatial Locality. Eran Gilad, Edward Bortnikov, Anastasia Braginsky, Yonatan Gottesman. Eshcar Hillel (Yahoo Research), Idit Keidar (Technion and Yahoo Research), Nurit Moscovici (Outbrain), Rana Shahout (Technion). Poster (pdf)
  • Avoiding Scheduler Subversion using Scheduler-Cooperative Locks. Yuvraj Patel, Leon Yang, Leo Prasath Arulraj, Andrea Arpaci-Dusseau, Remzi Arpaci-Dusseaur, Michael Swift (University of Wisconsin-Madison). Poster (pdf)
  • StRoM: Smart Remote Memory. David Sidler (Microsoft Corporation), Zeke Wang (Collaborative Innovation Center of Artificial Intelligence Zhejiang University and Systems Group Department of Computer Science ETH Zürich), Monica Chiosa, Amit Kulkarni (ETH Zürich), Gustavo Alonso (Systems Group, Department of Computer Science ETH Zürich). Poster (pdf)