IC2E/IoTDI 2018 Program Room Plaza Int’l Date Time Columbia Columbia Columbia Challenger 40-41 Challenger 38-39 Ballroom G 37 36 34 Level 3 Level 3 Convention Level 3 Level 3 Level 3 Level IC2E Workshop 1 IC2E Workshop 2 IoTDI Workshop 1 IoTDI Workshop 2 (Globe-IoT) (Container) (SocialSens) (IoTSec)

Opening remarks Opening remarks 8:30 AM - 8:45 AM 8:30 AM – 8:45 AM Opening: Timothy P Hanratty, Welcome Remarks Keynote 1: “High-Level Keynote: “Container Security” ARL Interoperability in IoT” Salman Baset 8:45 AM – 9:45 AM 8:30 – Damla Turgut, University of IC2E Tutorial 1 8:45 AM - 10:00 AM Keynote: “The Role of 10:00pm Central Florida (Blockchain) Keynote Talk: “Understanding Modeling and Simulation in and Engineering Social IoT Security Research” Signals: A Network- and Data- Prof. David M. Nicol, Driven Perspective” Univeristy of Illinois at Prof. Radu Marculescu, Urbana-Champaign Carnegie Mellon University 9:45 AM – 10:00 AM Q & A Coffee Break IC2E Workshop 1 IC2E Workshop 2 IoTDI Workshop 1 IoTDI Workshop 2 (Globe-IoT: Development (Container) (SocialSens) (IoTSec) Methodologies) Containerizing for Vision Discussions (Session Session I: Attacks and A Metamodel Framework for heterogeneous HPC Chair: Lu Su) Defenses Edge-based Smart applications in the Cloud 10:30 AM - 12 :00 P M 10:30 AM – 10:50 AM Environments Authors: Malik Khan Yuan Gong and Christian Authors: Franco and Anne C. Elster Operating in the New Poellabauer. An Overview of Cicirelli, Giancarlo Fortino, Information Environment: An Vulnerabilities of Voice Antonio Guerrieri, Alessandro Container-based Performance Army Vision of Social Sensing? Controlled Systems Mercuri, Giandomenico Evaluation: A Survey and Authors: Sue Kase and Spezzano and Andrea Vinci Challenges Elizabeth Bowman 10:50 AM – 11:10 AM Authors: Naylor G. Bachiega, Abhinav Mohanty, Islam Micro-intelligence for the IoT: Paulo S. L. Souza, Sarita M. The Future of Deception: Obaidat, Fadi Yilmaz and SE Challenges and Practice in Bruschi and Simone Do R. S. Machine-Generated and Meera Sridhar. Control- LPaaS de Souza Manipulated Images, Video, hijacking Vulnerabilities in IoT Authors:Roberta Calegari, and Audio? Firmware: A Brief Survey Giovanni Ciatto, Stefano Container Memory Allocation Authors: Jonathan Bakdash, Mariani, Enrico Denti Discrepancies: An Char Sample, Monica Rankin, 11:10 AM – 11:30 AM and Andrea Omicini Investigation on Memory Murat Kantarcioglu, Jennifer Daniel Sanchez and Bogdan Utilization Gaps for Holmes, Sue Kase, Erin Copos. Cognitive CoAP-XED: Enabling Relaxed Container-Based Application Zaroukian and Boleslaw Enhancement as an Attack Requests to IoT Sensing Deployments Szymanski Surface Resources Authors: Garrett Lahmann, Authors: Bruno Costa, Paulo Thom McCann and Wes Lloyd. Veracity Enriched Event 11:30 AM – 11:50 AM Pires and Flavia Delicato Extraction Hui Lin. SDN-based In-network Authors: Ning Yu and Graham Honeypot: Preemptively Horwood Disrupt and Mislead Attacks 10:30 – (Globe-IoT: Application IC2E Tutorial 1 in IoT Network 12:00pm Services) (Blockchain) Understanding Multi-stage, Multi-modal, Multimedia 11:50 AM – 12:10 PM SCDIoT: Social Cross-Domain events in Social Media Chen Cao, Le Guan, Peng Liu, IoT enabling Application-to- Authors: Vadim Kagan and Neng Gao, Jingqiang Lin and Application Communications Siva Subrahmanian Ji Xiang. Hey, You, Keep away Authors: Yasir Saleem, Noel from My Device: Remotely Crespi and Pasquale Pace Improving Trustworthiness of Implanting a Virus Expeller to Human Sensing Data via Open Defeat Mirai on IoT Devices Exploiting IoT Data and Smart Data City services for Chronic Authors: Mikkel Kjærgaard, Obstructive Pulmonary Fisayo Caleb Sangogboye, Diseases Risk Factors Anooshmita Das and Jens Monitoring Hjort Schwee Authors: David Sarabia Jacome, Andreu Belsa Design of Scalable IoT Pellicer, Carlos Enrique Palau Platform using Hazard Sensor, Salvador and Manuel Esteve Open and Social Data Domingo Authors: Su-Seong Chai and Dongjun Suh

Realizing the full potential of (infra-)structures for inter- agency communication before, during, and after disasters using the example of APAN (All Partners Access Network) Authors: Ly Dinh and Jana Diesner Lunch Buffet (Room: Plaza International Ballroom G) IC2E Workshop 1 IC2E Workshop 3 IoTDI Workshop 1 IoTDI Workshop 2 (Globe-IoT) (Blockchain) (SocialSens) (IoTSec)

Keynote 2: “IoT Software Welcome remarks Social Sensing: Technical Session II: Causality, Services Provisioning over Advances, Challenges, and Redaction and Legal Fog-Cloud Systems” (Blockchain: Improving Risks (Session Chair: Sue frameworks Amir Taherkordi Blockchain Technology) Kase) 1:30 PM – 1:50 PM 1:00 PM - 2:00 PM Ioannis Agadakos, Gabriela Supporting Private Data on Ciocarlie, Bogdan Copos, (Globe-IoT: Interoperability) Hyperledger Fabric with Analysis of Driver Behavior in Tancrede Lepoint, Ulf Secure Multiparty Times of Crisis Lindqvist and Michael Flow-based programing Computation. Authors: Manda Winlaw, Locasto. Butterfly Effect: interoperability solution for Authors: Fabrice Alycia Perkins and Allaa R. Causality from Chaos in the IoT Platform Applications Benhamouda, Shai Halevi and Hilal IoT AuthorsAndreu Belsa Tzipora Halevi. Pellicer, David Sarabia Privacy preserving, crowd 1:50 PM – 2:10 PM Jácome, Carlos Enrique Palau Thwarting Unwanted sourced crime Hawkes Soteris Demetriou, Nathaniel Salvador and Manuel Esteve Blockchain Content Insertion. processes D. Kaufman, Jonah Baim, Domingo Authors: Roman Matzutt, Authors: George Mohler Adam J. Goldsher and Carl A. Martin Henze, Jan Henrik Gunter. Toward an Extensible

Tuesday, April 2018 17, April Tuesday, Towards a Resource Slice Ziegeldorf, Jens Hiller and Detecting Label Errors in Framework for Redaction Interoperability Hub for IoT Klaus Wehrle. Crowd-Sourced Smartphone Authors: Hong-Linh Truong Sensor Data 2:10 PM – 2:30 PM 1:30 – IC2E Tutorial 2 Authors: Xiao Bo, Christian Sudip Vhaduri and Christian 3:00pm A Methodology for (FECBench) Poellabauer, Megan K. Poellabauer. Implicit Integrating O’brien, Chaithanya Krishna Authentication in Wearables Platforms Mummidisetty and Arun Using Multiple Biometrics Authors: Claudio Jayaraman Savaglio, Giancarlo Fortino, 2:30 PM – 2:50 PM Wilma Russo and Raffaele Leadership of Data Andrew Weyl and George Gravina Annotation Teams Williamson. A Multinational Authors: Ian Mcculloh, James Legal Examination of Burck, Josef Behling, Michael Individual Security Risks Burks and Jonathon Parker Related to the Internet of Things Panel #1: Physics of Information Propagation (Moderator: Tarek Abdelzaher) 2:00 PM - 3:00 PM

Vadim Kagan, Sentimetrix Ivan Garibay, University of Central Florida George Mohler, Indiana University Purdue University Indianapolis Mark Orr, Virginia Tech Coffee Break (Challenger Foyer) IC2E Workshop 1 IC2E Workshop 3 IoTDI Workshop 1 IoTDI Workshop 2 (Globe-IoT: Networking) (Blockchain: Applications) (SocialSens) (IoTSec)

Time-scheduled Network BlockCIS---A Blockchain-based Social Sensing: Leveraging 3:30 PM – 3:50 PM Evaluation based on Cyber Insurance System. Digital Social Trace Data Giovani Gracioli, Murray Interference Authors: Tancrède Lepoint, (Session Chair: Jana Diesner) Dunne and Sebastian Authors: Tim van der Lee, Karim Eldefrawy and Gabriela 3:30 PM - 4:30 PM Fischmeister. A Comparison of Antonio Liotta and Georgios Ciocarlie. Data Streaming Frameworks Exarchakos Effects of Social Media for Anomaly Detection in A Cloud Data Movement Involvement, Context, and Embedded Systems DYNAMO: Distributed leisure Policy Architecture Based on Data-Type on Opinion Yacht-carried sensor-Network Smart Contracts and the Formation 3:50 PM – 4:00 PM for Atmosphere and Marine Ethereum Blockchain Authors: Derrik Asher, Justine Safa Boudabous, Stephan data crOwdsourcing Authors: Stephen Kirkman Caylor and Alexis Neigel Clémençon, OnsJelassi and applications and Richard Newman. Mariona Caros Roca. A secure Authors: Raffaele Montella, 5 Steps to Make Art Museums IoT architecture for streaming Sokol Kosta and Ian Foster Double-Blind Consent-Driven Tweet Influentially data analysis and anomaly Data Sharing on Blockchain. Authors: Marco Furini, detection Practical criteria for Authors: Kumar Bhaskaran, Federica Mandreoli, Riccardo scheduling CPU-bound jobs in Peter Ilfrich, Praveen Martoglia and Manuela 4:10 PM – 4:30 PM mobile devices at the edge Jayachandran, Apurva Kumar, Montangero Ebelechukwu Nwafor, Andre Authors: Matías Hirsch, Dain Liffman, Fabian Lim, Campbell and Gedare Bloom. Cristian Mateos and Alejandro Karthik Nandakumar, Identification of Landscape Anomaly-based Intrusion Zunino Zhengquan Qin, Venkatraman Preferences by using Social Detection of IoT Device Sensor 3:30 – IC2E Tutorial 2 Ramakrishna, Chun Hui Suen, Media Analysis Data using Provenance 5:00pm (FECBench) Ernie Teo and Christian Authors: Ankit Rai, Barbara Graphs Vecchiola. Minsker, Jana Diesner, Karrie Karahalios and Yicheng Sun 4:30 PM – 4:50 PM Hamed Haddadi, Vassilis Public Health and Social Christophides, Renata Cruz Media: Language Analysis of Teixeira, Kenjiro Cho, Shigeya Vaccine Conversations Suzuki and Adrian Perri g . Authors: Marco Furini and SIOTOME: An Edge-ISP Gabriele Menegoni Collaborative Architecture for IoT Security Panel #2: Internet of Social and Physical Things: 4:50 PM – 5:00 PM Applications and Challenges Concluding Remarks (Moderator: Jana Diesner) 4:30 PM - 5:30 PM

Tancrede Le Point, SRI International Ning Yu, LEIDOS Klara Nahrstedt, University of Illiniois at Urbana Champaign Chenyang Lu, Washingon University at St. Louis Moises Sudit, University at Buffalo 6:00 – Reception, 8:00pm Posters, Demos (Setup time for posters and demo is from 2pm to 5:30pm) Room Date Time Plaza International Ballroom D Plaza International Ballroom EF Challenger 40-41 Convention Level Convention Level Level 3 8:30- 9:00am Joint Opening Remarks

9:00 – 10:00am Keynote: : a New Disruptive Force Speaker: Mahadev Satyanarayanan, Carnegie Mellon University

Coffee Break 10:30 – IC2E – Session 1 IoTDI – Session 1 12:00pm (Fault Tolerance & Security) (IoT & Applications)

Understanding Real-World Timeout Problems in Cloud Cook over IP: Adapting TCP for Cordless Kitchen Appliances Server Systems Shruthi Kashyap, Vijay S. Rao, R. Venkatesha Prasad (TU Delft) Authors: Ting Dai, Jingzhu He, and Xiaohui Gu (North Toine Staring (Philips Research) Carolina State University) and Shan Lu (University of Chicago) An Automatic and Accurate Real-time Localization System for Firefighters Hybrid Adaptive Checkpointing for Virtual Machine Fault Jinyang Li (University of Science and Technology of China), Tolerance Zhiheng Xie (University of Virginia), Xiaoshan Sun, Jian Tang, Authors: Abel Souza (Umeå University), Alessandro Hengchang Liu (University of Science and Technology of Vittorio Papadopoulos (Mälardalen University), Luis China), John Stankovic (University of Virginia) Tomás Bolivar and David Gilbert (Red Hat Inc.), and Johan Tordsson (Umeå University) DAMON: A Data Authenticity Monitoring System for Diabetes Management STANlite -- a database engine for secure data processing at William Young, John Corbett, Matthew Gerber, Stephen rack-scale level Patek, Lu Feng (University of Virginia) Authors: V. A. Sartakov and N. Weichbrodt (TU Braunschweig), S. Krieter (Otto-von-Guericke-University of Magdeburg), T. Leich (Harz University of Applied Sciences), and R. Kapitza (TU Braunschweig)

(Short) Scheduling, Isolation, and Cache Allocation: A Side- Channel Defense Authors: Read Sprabery and Konstantin Evchenko (University of Illinois at Urbana-Champaign), Abhilash Raj and Rakesh B. Bobba (Oregon State University), and Sibin Mohan and Roy Campbell (University of Illinois at Urbana- Champaign) Lunch Buffet (Room: Plaza International Ballroom G) 1:30 – 3:00pm Panel Discussion

Topic: "Implications of AI on IoT and Cloud Systems" Moderator: Klara Nahrstedt (UIUC) Panelists:

Wednesday, April 18, 2018 18, April Wednesday, Lotzi Boloni (UCF) Roy Campbell (UIUC) Lucy Cherkasova (HP) Radu Marculescu (CMU) Coffee break 3:30 – 5:00pm IC2E – Session 2 IoTDI – Session 2 (Cloud Services & Tools) (IoT & Activities)

Automatic Dependency Management for Scientific UnTran: Recognizing Unseen Activities with Unlabeled data Applications on Clusters using Transfer Learning Authors: Benjamin Tovar, Nicholas Hazekamp, Nathaniel Md Abdullah Al Hafiz Khan, Ni rm al ya Roy (University of Kremer-Herman, and Douglas Thain (University of Notre Maryland Baltimore County) Dame) Kestrel: Video Analytics for Augmented Multi-Camera Vehicle Tracking Causal Order in AWS Lambda Applications Tracking Authors: Wei-Tsung Lin, Chandra Krintz, Rich Wolski, an d Hang Qiu, Xiaochen Liu (University of Southern California), Michael Zhang (UC Santa Barbara) and Xiaogang Cai, Swati Rallapalli (IBM Research), Archith J. Bency (UCSB), Rahul Tongjun Li, and Weijin Xu (Hu awei ) Urgaonkar (Amazon), B.S. Manjunath (UCSB), Ramesh Govindan (University of Southern California), Kevin Chan M2: Malleable Metal as a Service (ARL) Authors: Apoorve Mohan (Northeastern University), Ata Turk (Boston University), Ravi S. Gudimetla (Red Hat), Sahil MARBLE: Mobile Using a Distributed BLE Tikale, Jason Hennessey, and Ugur Kaynar (Boston Beacon Infrastructure University), Gene Cooperman and Peter Desnoyers Chong Shao, Bashima Islam, Shahriar Nirjon(University of (Northeastern University), and Orran Krieger (Boston North Carolina at Chapel Hill) University)

(Short) MAKER as a Service: Moving HPC applications to Jetstream Cloud Authors: Nicholas Hazekamp (University of Notre Dame), Upendra Kumar Devisetty (Cyverse), Nirav Merchant (The University of Arizona), and Douglas Thain (University of Notre Dame) 9:00-10:00am Keynote: Data Intelligence and Analytics at Alibaba Speaker: Jingren Zhou, Alibaba Group Coffee Break 10:30 – IC2E – Session 3 IoTDI – Session 3 12:00pm (VMs and Containers) (IoT & Fault Tolerance/Safety)

Deterministic Container Resource Management in RIDE: A Resilient IoT Data Exchange Middleware Leveraging Derivative Clouds SDN and Edge Cloud Resources Authors: Chandra Prakash, Prashanth, Umesh Bellur, and Kyle Benson, Guoxi Wang (University of California, Irvine), Purushottam Kulkarni (Indian Institute of Technology Young-Jin Kim (Nokia Bell Labs), Nal i ni Venkatasubramanian Bombay) (University of California, Irvine)

Cross-layer Optimization for Virtual Machine Resource Brume - A Horizontally Scalable and Fault Tolerant Building Management Operating System Authors: Ming Zhao (Arizona State University), Lixi Wang Almir Mehanovic, Thomas Heine Rasmussen, Mikkel Baun (Amazon.com), Yun Lv (BeihangUniversity), and Jing Xu Kjærgaard (University of Southern Denmark) (Google) Hardware-based Online Self-diagnosis for Faulty Device (Short) Identification in Large-scale IoT Systems UniGuard: Protecting Unikernels using Intel SGX Junghee Lee, Monobrata Debnath, Amit Patki, Mostafa Hasan Authors: Ioannis Sfyrakis and Thomas Groß (Newcastle (University of Texas at San Antonio), Chrysostomos University) Nicopoulos (University of Cyprus)

(Short) An Online Virtual Machine Placement Algorithm in an Over-Committed Cloud Authors: Siqi Ji, Ming Da Li, Ni anni an Ji, and Baochun Li (Electrical and Computer Engineering, University of Toronto) Lunch Buffet (Room: Plaza International Ballroom G) 1:30-3:00pm IC2E – Industry Session 1 IoTDI – Session 4 (Case Studies) (IoT & Security)

Massive-Scale Deployments in Cloud: the Case of Sentinel: Secure Mode Profiling and Enforcement for OpenStack Networking, Embedded Systems Authors: Jesus Llorente Santos and Maël Kimmerlin Paul D. Martin (Harbor Labs), David Russel (Johns Hopkins University), Malek Ben Salem (Accenture), Stephen Geospatial Analytics in the Large for Monitoring Depth of Checkoway (University of Illinois Chicago), Avi Rubin (Johns Cover for Buried Pipeline Infrastructure, Authors: Michael Hopkins University) Hornacek, Daniel Schall, Philipp Glira, Sebastian Geiger, Andreas Egger, Andrei Filip, Claudia Windisch and Mike Bark: Securing the Internet of Things with Default-Off

Thursday, April 19, 2018 19, April Thursday, Liepe Networking James Hong, Amit Levy, Laurynas Riliskis, Philip Levis ()

Security Vulnerabilities in LoRaWAN Xueying Yang (Delft University of Technology), Evgenios Karampatzakis (Brightsight), Christian Doerr, Fernando Kuipers (Delft University of Technology) Coffee Break 3:30 – 5:00pm IC2E – Industry Session 2 IoTDI – Session 5 (Security and Privacy, and Short Papers) (IoT & Privacy and Safety)

Giving Customers Control over Their Data: Integrating a LogSafe: Secure and Scalable Data Logger for IoT Devices Policy Language into the Cloud, Hung Nguyen, Radoslav Ivanov, Linh Thi Xuan Phan, Oleg Authors: Jens Hiller, Maël Kimmerlin, Max Plauth, Sep p o Sokolsky, James Weimer, Insup Lee (University of Heikkilä, Stefan Klauck, Ville Lindfors, Felix Eberhardt, Pennsylvania) Dariusz Bursztynowski, Jesus Llorente Santos, Oliver Hohlfeld and Klaus Wehrle Privacy-Preserving Personal Model Training Sandra Servia-Rodriguez, Liang Wang, Jianxin R. Zhao, Richard Scalable Key Management for Distributed Cloud Storage, Mortier (University of Cambridge), Hamed Haddadi (Imperial Authors: Mathias Bjoerkqvist, Christian Cachin, Felix College London) Engelmann and Alessandro Sorniotti Replacement Autoencoder: A Privacy-Preserving Algorithm (SHORT) Serving deep learning models in a serverless for Sensory Data Analysis platform, Authors: Vatche Ishakian, Vinod Muthusamy and Mohammad Malekzadeh, Richard G. Clegg (Queen Mary Aleksander Slominski University of London), Hamed Haddadi (Imperial College London) (SHORT) Architecture for Analysis of Streaming Data, Authors: Sheik Hoque and Andriy Miranskyy 7:00-9:00pm Banquet (Room: Plaza International Ballroom G) 9:00 – 10:00am Keynote: Time to Retire Linux (and C) in IoT Devices Speaker: Lin Zhong, Rice University Coffee Break 10:30 – IC2E – Session 4 IoTDI – Session 6 12:00pm (Resource Management and Scheduling) (IoT & Energy)

OPTiC: Opportunistic Graph Processing in Multi-Tenant Workload Shaping Energy Optimizations with Predictable Clusters Performance for Mobile Sensing Authors: Muntasir Raihan Rahman (Microsoft), Indranil Farley Lai, Marjan Radi, Octav Chipara (University of Iowa), Gupta (University of Illinois Urbana-Champaign), Akash William Grisworld (University of California, San Diego) Kapoor (Princeton University), and Haozhen Ding (Airbnb) From Energy Audits to Monitoring Megawatt Loads: A Deadline-Aware Scheduling and Routing for Inter- Flexible and Deployable Power Metering System Datacenter Multicast Transfers Bradford Campbell (University of Virginia), Ye-sheng Kuo Authors: Siqi Ji, Shuhao Liu, and Baochun Li (Electrical and (Samsara), Prabal Dutta (University of California at Berkeley) Computer Engineering, University of Toronto) SEHS: Simultaneous Energy Harvesting and Sensing using (Short) Piezoelectric Energy Harvester Empya: Saving Energy in the Face of Varying Workloads Dong Ma, Guohao Lan, Weitao Xu, Mahbub Hassan, Wen Hu Authors: Christopher Eibel, Thao-Nguyen Do, Robert (University of New South Wales) Meißner, and Tobias Distler (Friedrich-Alexander- Universität Erlangen-Nürnberg (FAU))

(Short) Heterogeneous Resource Reservation Authors: David Breitgand, Ofer Biran, Dean Lorenz, Michael Masin, and Eran Raichstein (IBM Research -- Haifa), Ilyas Iyoob (IBM), and Avi Weit (IBM Research -- Haifa)

Lunch Break 1:30 – 3:00pm IC2E – Session 5 IoTDI – Session 7 IC2E Doctoral Symposium (Performance Evaluation and Modeling) (IoT & Transportation) Session 1

Towards an Adaptive, Fully Automated Performance Online Load Control and Balancing for Electric Vehicle A Data Movement Policy Framework for Modeling Methodology for Cloud Applications Charging Improving Trust in the Cloud Using Smart Authors: Ioannis Giannakopoulos (National Technical Fanxin Kong (University of Pennsylvania), Xu e Liu (McGill Contracts and Blockchains University of Athens), Dimitrios Tsoumakos (Ionian University), Insup Lee (University of Pennsylvania) Authors: Stephen S Kirkman (University of University), and Nectarios Koziris (National Technical Florida) University of Athens) Planning Electric Vehicle Charging Stations based on User Charging Behavior Monitoring Path Discovery for Supporting Serverless Computing: An Investigation of Factors Jinyang Li, Xiaoshan Sun, Qi Liu (University of Science and Indirect Monitoring of Cloud Services Influencing Microservice Performance Technology of China), Wei Zheng (Comprehend (Suzhou) Authors: Heng Zhang, Salman Manzoor, and Authors: Wes Lloyd (University of Washington, Tacoma), Information Technology Inc.), Hengchang Liu (University of Neeraj Suri (Technische Universität Shruti Ramesh (Microsoft), Swetha Chinthalapati and Lan Science and Technology of China), John Stankovic (University Darmstadt, Germany) Ly (University of Washington, Tacoma), and Shrideep of Virginia) Pallickara (Colorado State University) PAWS: A Wearable Acoustic System for Pedestrian Safety (Short) Daniel de Godoy (Columbia University), Bashima Islam An Experimental Analysis of PaaS Users Parameters on (University of North Carolina at Chapel Hill), Stephen Xia l 20, 2018 Applications Energy Consumption (Columbia University), Md Tamzeed Islam (University of Authors: David Guyon (University of Rennes 1), Anne- North Carolina at Chapel Hill), Rishikanth Chandrasekaran Cécile Orgerie (CNRS, IRISA), and Christine Morin (Inria) (Columbia University), Yen-Chun Chen , Shahriar Nirjon (University of North Carolina at Chapel Hill), Peter Kinget, (Short) Xiaofan Jiang (Columbia University)

Friday, Apri Friday, A Precise Model for Google Cloud Platform Authors: Stéphanie Challita, Faiez Zalila, Christophe Gourdin, and Philippe Merle (Inria Lille -Nord Europe)

Coffee Break

3:30 – 5:00pm IC2E – Session 6 IoTDI – Session 8 IC2E Doctoral Symposium (Edge Computing and Storage) (Short Papers) Session 2

(Short) Tethys: Collecting Sensor Data without Infrastructure, Trust, Threat Modeling and Analysis for the Cloud Cloud-based or On-device: An Empirical Study of Mobile or Maintenance Ecosystem Deep Inference Holly Chiang, James Hong, Kevin Kiningham, Laurynas Riliskis, Authors Salman Manzoor, Heng Zhang, Authors: Tian Guo (Worcester Polytechnic Institute) Philip Levis, Mark Horowitz (Standford University) and Neeraj Suri (Technische Universität Darmstadt, Germany) (Short) Integrating Low-Power Wide-Area Networks in White Spaces EMMA: Distributed QoS-Aware MQTT Middleware for Mahbubur Rahman, Abusayeed Saifullah (Wayne State Tuning Performance of Spark Programs Edge Computing Applications University) Authors: Hong Zhang, Zixia Liu, and Liqiang Authors: Thomas Rausch, Stefan Nastic, and Schahram Real-Time Wireless Routing for Industrial Internet of Things Wang (University of Central Florida) Dustdar (TU Wien) Chengjie Wu, Dolvara Gunatilaka (Washington University in (Short) St. Louis), Mo Sha (SUNY Binghamton), Chenyang Lu A Sample Average Approximation-Based Parallel Algorithm (Washington University in St. Louis) for Application Placement in Edge Computing Systems Authors: Hossein Badri, Tayebeh Bahreini, Daniel Grosu, Cyber-Physical Scheduling for Predictable Reliability of Inter- and Kai Yang (Wayne State University) Vehicle Communications Chuan Li (Wayne State University), Hongwei Zhang (Iowa (Short) State University), Jayanthi Rao (Ford Research), Le Yi Wang, Feasibility Study of Location-Conscious Multi-Site Erasure- George Yin (Wayne State University) Coded Storage for Disaster Recovery Authors: Keitaro Uehara (Hitachi Ltd., Research & Development Group) and Yih-Farn Robin Chen, Matti Hiltunen, Kaustubh Joshi, and Richard Schlichting (AT&T Labs-Research)

(Short) Toward Transparent Data Management in Multi-layer Storage Hierarchy of HPC Systems Authors: Bharti Wadhwa (Virginia Tech), Suren Byan (Lawrence Berkeley National Laboratory), and Ali R. Butt (Virginia Tech)

(Short) Analyzing Privacy Policies of Zero Knowledge Cloud Storage Applications on Mobile Devices Authors: Rawan Baalous, Ronald Poet, and Timothy Storer (University of Glasgow)

5:00 – 5:15pm IC2E – Closing Remarks IoTDI – Closing Remarks