LEADER 08220nam 22005775 450 001 9910592983503321 005 20251225212317.0 010 $a9783031160929 010 $a3031160924 024 7 $a10.1007/978-3-031-16092-9 035 $a(MiAaPQ)EBC7080712 035 $a(Au-PeEL)EBL7080712 035 $a(CKB)24782723600041 035 $a(PPN)26495291X 035 $a(BIP)85611684 035 $a(BIP)85277715 035 $a(DE-He213)978-3-031-16092-9 035 $a(EXLCZ)9924782723600041 100 $a20220905d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDistributed Applications and Interoperable Systems $e22nd IFIP WG 6.1 International Conference, DAIS 2022, Held as Part of the 17th International Federated Conference on Distributed Computing Techniques, DisCoTec 2022, Lucca, Italy, June 13-17, 2022, Proceedings /$fedited by David Eyers, Spyros Voulgaris 205 $a1st ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2022. 215 $a1 online resource (204 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13272 311 08$aPrint version: Eyers, David Distributed Applications and Interoperable Systems Cham : Springer International Publishing AG,c2022 9783031160912 320 $aIncludes bibliographical references and index. 327 $aIntro -- Foreword -- Preface -- Organization -- Contents -- Blockchains and Cryptocurrencies -- An Evaluation of Blockchain Application Requirements and Their Satisfaction in Hyperledger Fabric -- 1 Introduction -- 2 Related Work -- 3 Background -- 4 Methodology -- 5 Requirements Analysis -- 5.1 Electronic Voting (EVote) -- 5.2 Supply Chains (IBM Food Trust and GoDirect Trade) -- 5.3 Healthcare (Change Healthcare) -- 5.4 Banking (VISA B2B Connect) -- 6 How HLF Meets Enterprise Requirements -- 6.1 Resilience Requirements -- 6.2 Performance Requirements -- 7 Performance Evaluation -- 7.1 Multi Ordering Services Performance -- 7.2 Mixed Workloads -- 7.3 Discussion -- 8 Conclusion -- References -- Using SGX for Meta-Transactions Support in Ethereum DApps -- 1 Introduction -- 2 Background -- 3 Basic Solution Design -- 4 Discussion and Open Directions -- 5 Conclusion -- References -- Understanding Cryptocoins Trends Correlations -- 1 Introduction -- 2 Background -- 3 Preliminary Evaluation -- 4 Related Work -- 5 Conclusion and Future Work -- References -- Rebop: Reputation-Based Incentives in Committee-Based Blockchains -- 1 Introduction -- 2 Committee-Based Blockchains -- 3 System and Protocol Model -- 4 Attacks and Incentives -- 5 Rebop: Reputation-Based Reward Opportunity -- 6 Incentive Analysis -- 6.1 Baseline Analysis -- 6.2 Collusion Resistance of Rebop -- 6.3 Preventing Byzantine Attacks -- 7 Simulation Results -- 7.1 Resistance Against Colluding Processes -- 7.2 Byzantine Resistance -- 8 Related Works -- 9 Conclusion -- References -- Fault Tolerance -- Lesser Evil: Embracing Failure to Protect Overall System Availability -- 1 Introduction -- 2 Problem Statement -- 3 Erlang -- 4 Lesser Evil -- 4.1 Entities -- 4.2 Badness -- 4.3 Strategy -- 4.4 Compensating Actions -- 4.5 Architecture -- 4.6 Discussion -- 4.7 Note on Applicability -- 5 Evaluation. 327 $a5.1 Test Subject -- 5.2 Configuration -- 5.3 Experiments -- 5.4 Results -- 5.5 Conclusion and Limitations -- 5.6 Threats to Validity -- 6 Related Work -- 7 Conclusion -- References -- Failure Root Cause Analysis for Microservices, Explained -- 1 Introduction -- 2 Motivating Scenario -- 3 Declarative Failure Root Cause Analysis -- 4 Prototype Implementation -- 5 Evaluation -- 6 Related Work -- 7 Conclusions -- References -- Trusted Execution, Deep Learning, and IoT -- Attestation Mechanisms for Trusted Execution Environments Demystified -- 1 Introduction -- 2 Attestation -- 2.1 Local Attestation -- 2.2 Remote Attestation -- 2.3 Mutual Attestation -- 3 Issuing Attestations Using TEEs -- 3.1 TEE Cornerstone Features -- 3.2 Trusted Environments and Remote Attestation -- 3.3 Intel SGX -- 3.4 Arm TrustZone Architectures -- 3.5 AMD SEV -- 3.6 RISC-V Architectures -- 4 Future Work -- 5 Conclusion -- References -- Accelerate Model Parallel Deep Learning Training Using Effective Graph Traversal Order in Device Placement -- 1 Introduction -- 2 Preliminaries -- 2.1 Device Placement -- 2.2 Placeto -- 2.3 Graph Traversal Order -- 3 Graph Traversal Orders in Device Placement -- 3.1 Challenges in Device Placement -- 3.2 Impact of Graph Traversal Orders -- 4 Evaluation -- 4.1 Datasets -- 4.2 Experiment Setup -- 4.3 Results and Analysis -- 4.4 Discussion and Guidelines -- 5 Related Work -- 6 Conclusion -- References -- Analysis of the Impact of Interaction Patterns and IoT Protocols on Energy Consumption of IoT Consumer Applications -- 1 Introduction -- 2 Consuming IoT Applications: Architecture, Interaction Patterns and Protocols -- 2.1 Distributed IoT Architecture -- 2.2 Interaction Patterns -- 2.3 IoT Protocols -- 3 Related Work -- 4 Experimental Methodology -- 4.1 Experimental Setup -- 4.2 Process to Isolate the Communication Energy Consumption. 327 $a4.3 Experimental Plan -- 4.4 Threats to Validity -- 5 Analysis -- 5.1 (RQ1) Impact of the Interaction Pattern -- 5.2 (RQ2) Impact of the Application Protocol -- 5.3 (RQ3) Impact of the QoS in MQTT -- 5.4 (RQ4) Impact of the Payload -- 5.5 Guidelines for IoT Consumer Application Designers -- 6 Conclusions -- References -- Elastic and Scalable Systems -- The HDFS Replica Placement Policies: A Comparative Experimental Investigation -- 1 Introduction -- 2 Data Replication in HDFS -- 2.1 Block Re-replication -- 2.2 Replica Rearrangement -- 3 Replica Placement Policies -- 4 Related Work -- 5 Experimentation -- 5.1 First Stage: Data Load -- 5.2 Second Stage: Block Re-replication -- 5.3 Third Stage: Replica Rearrangement -- 6 Conclusions and Future Work -- References -- An Elastic and Scalable Topic-Based Pub/Sub System Using Deep Reinforcement Learning -- 1 Introduction -- 2 System Architecture and Model -- 2.1 Apache Kafka -- 2.2 System Architecture and Model -- 3 Proposed Methodology -- 3.1 Deep Reinforcement Learning -- 3.2 Scaling Decisions -- 4 Evaluation -- 5 Related Work -- 6 Conclusions -- References -- Invited Paper -- Challenges in Automated Measurement of Pedestrian Dynamics -- 1 Introduction -- 2 Automated Measurement of Pedestrian Behavior -- 3 Protecting Privacy Through Detection k-anonymity -- 3.1 Approach -- 3.2 Evaluation -- 3.3 Reflection -- 4 Protecting Privacy Through Homomorphically Encrypted Bloom Filters -- 4.1 Approach -- 4.2 Evaluation -- 4.3 Reflection -- 5 Other Challenges -- 5.1 Behavior of Carry-On Devices and (non)overlapping Sensor Ranges -- 5.2 MAC-Address Randomization -- 5.3 Stationary Versus Nonstationary Devices -- 6 Conclusions -- References -- Author Index. 330 $aThis book constitutes the refereed proceedings of the 22nd IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems, DAIS 2022, held in Lucca, Italy, in June 2022, as part of the 17th International Federated Conference on Distributed Computing Techniques, DisCoTec 2022. The 9 full papers and 2 short papers presented in this book were carefully reviewed and selected from 19 submissions. DAIS addresses all practical and conceptual aspects of distributed applications, including their design, modeling, implementation and operation, the supporting middleware, appropriate software engineering methodologies and tools, as well as experimental studies and applications. . 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13272 606 $aSoftware engineering 606 $aSoftware Engineering 615 0$aSoftware engineering. 615 14$aSoftware Engineering. 676 $a004.6782 676 $a004.36 702 $aEyers$b David 702 $aVoulgaris$b Spyros 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910592983503321 996 $aDistributed Applications and Interoperable Systems$9772211 997 $aUNINA