callback( { "result":{ "query":":facetid:toc:\"db/conf/middleware/middleware2014.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"73.55" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"28", "@dc":"28", "@oc":"28", "@id":"43401721", "text":":facetid:toc:db/conf/middleware/middleware2014.bht" } }, "hits":{ "@total":"28", "@computed":"28", "@sent":"28", "@first":"0", "hit":[{ "@score":"1", "@id":"3917279", "info":{"authors":{"author":[{"@pid":"131/6740","text":"Masoud Saeida Ardekani"},{"@pid":"09/5760","text":"Pierre Sutra"},{"@pid":"s/MarcShapiro","text":"Marc Shapiro 0001"}]},"title":"G-DUR: a middleware for assembling, analyzing, and improving transactional protocols.","venue":"Middleware","pages":"13-24","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/ArdekaniSS14","doi":"10.1145/2663165.2663336","ee":"https://doi.org/10.1145/2663165.2663336","url":"https://dblp.org/rec/conf/middleware/ArdekaniSS14"}, "url":"URL#3917279" }, { "@score":"1", "@id":"3917281", "info":{"authors":{"author":[{"@pid":"117/2238","text":"Gaurab Basu"},{"@pid":"41/7549","text":"Shripad Nadgowda"},{"@pid":"23/669","text":"Akshat Verma"}]},"title":"LVD: lean virtual disks.","venue":"Middleware","pages":"25-36","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/BasuNV14","doi":"10.1145/2663165.2663322","ee":"https://doi.org/10.1145/2663165.2663322","url":"https://dblp.org/rec/conf/middleware/BasuNV14"}, "url":"URL#3917281" }, { "@score":"1", "@id":"3917282", "info":{"authors":{"author":[{"@pid":"144/7821","text":"Samuel Benz"},{"@pid":"06/3627","text":"Parisa Jalili Marandi"},{"@pid":"90/2612","text":"Fernando Pedone"},{"@pid":"54/2229","text":"Benoît Garbinato"}]},"title":"Building global and scalable systems with atomic multicast.","venue":"Middleware","pages":"169-180","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/BenzMPG14","doi":"10.1145/2663165.2663323","ee":"http://doi.acm.org/10.1145/2663165.2663323","url":"https://dblp.org/rec/conf/middleware/BenzMPG14"}, "url":"URL#3917282" }, { "@score":"1", "@id":"3917284", "info":{"authors":{"author":[{"@pid":"35/8319","text":"Pramod Bhatotia"},{"@pid":"44/3421","text":"Umut A. Acar"},{"@pid":"27/2404","text":"Flavio Paiva Junqueira"},{"@pid":"87/6689","text":"Rodrigo Rodrigues 0001"}]},"title":"Slider: incremental sliding window analytics.","venue":"Middleware","pages":"61-72","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/BhatotiaAJR14","doi":"10.1145/2663165.2663334","ee":"https://doi.org/10.1145/2663165.2663334","url":"https://dblp.org/rec/conf/middleware/BhatotiaAJR14"}, "url":"URL#3917284" }, { "@score":"1", "@id":"3917287", "info":{"authors":{"author":[{"@pid":"27/4142","text":"Antoine Boutet"},{"@pid":"89/2770","text":"Davide Frey"},{"@pid":"g/RachidGuerraoui","text":"Rachid Guerraoui"},{"@pid":"86/676","text":"Anne-Marie Kermarrec"},{"@pid":"154/4369","text":"Rhicheek Patra"}]},"title":"HyRec: leveraging browsers for scalable recommenders.","venue":"Middleware","pages":"85-96","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/BoutetFGKP14","doi":"10.1145/2663165.2663315","ee":"https://doi.org/10.1145/2663165.2663315","url":"https://dblp.org/rec/conf/middleware/BoutetFGKP14"}, "url":"URL#3917287" }, { "@score":"1", "@id":"3917292", "info":{"authors":{"author":[{"@pid":"91/10521","text":"César Cañas"},{"@pid":"12/4550-1","text":"Kaiwen Zhang 0001"},{"@pid":"k/BettinaKemme","text":"Bettina Kemme"},{"@pid":"k/JorgKienzle","text":"Jörg Kienzle"},{"@pid":"j/HansArnoJacobsen","text":"Hans-Arno Jacobsen"}]},"title":"Publish/subscribe network designs for multiplayer games.","venue":"Middleware","pages":"241-252","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/CanasZKKJ14","doi":"10.1145/2663165.2663337","ee":"https://doi.org/10.1145/2663165.2663337","url":"https://dblp.org/rec/conf/middleware/CanasZKKJ14"}, "url":"URL#3917292" }, { "@score":"1", "@id":"3917296", "info":{"authors":{"author":[{"@pid":"140/9578","text":"Dazhao Cheng"},{"@pid":"38/618","text":"Jia Rao"},{"@pid":"117/8957","text":"Yanfei Guo"},{"@pid":"13/6395-2","text":"Xiaobo Zhou 0002"}]},"title":"Improving MapReduce performance in heterogeneous environments with adaptive task tuning.","venue":"Middleware","pages":"97-108","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/ChengRGZ14","doi":"10.1145/2663165.2666089","ee":"https://doi.org/10.1145/2663165.2666089","url":"https://dblp.org/rec/conf/middleware/ChengRGZ14"}, "url":"URL#3917296" }, { "@score":"1", "@id":"3917302", "info":{"authors":{"author":[{"@pid":"119/6371","text":"William Culhane"},{"@pid":"21/2983","text":"K. R. Jayaram"},{"@pid":"14/4443","text":"Patrick Eugster"}]},"title":"Fast, expressive top-k matching.","venue":"Middleware","pages":"73-84","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/CulhaneJE14","doi":"10.1145/2663165.2663326","ee":"https://doi.org/10.1145/2663165.2663326","url":"https://dblp.org/rec/conf/middleware/CulhaneJE14"}, "url":"URL#3917302" }, { "@score":"1", "@id":"3917304", "info":{"authors":{"author":[{"@pid":"70/9867","text":"Tudor David"},{"@pid":"g/RachidGuerraoui","text":"Rachid Guerraoui"},{"@pid":"26/6645","text":"Maysam Yabandeh"}]},"title":"Consensus inside.","venue":"Middleware","pages":"145-156","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/DavidGY14","doi":"10.1145/2663165.2663321","ee":"https://doi.org/10.1145/2663165.2663321","url":"https://dblp.org/rec/conf/middleware/DavidGY14"}, "url":"URL#3917304" }, { "@score":"1", "@id":"3917306", "info":{"authors":{"author":[{"@pid":"83/11337","text":"Sebastian Ertel"},{"@pid":"f/PascalFelber","text":"Pascal Felber"}]},"title":"A framework for the dynamic evolution of highly-available dataflow programs.","venue":"Middleware","pages":"157-168","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/ErtelF14","doi":"10.1145/2663165.2663320","ee":"https://doi.org/10.1145/2663165.2663320","url":"https://dblp.org/rec/conf/middleware/ErtelF14"}, "url":"URL#3917306" }, { "@score":"1", "@id":"3917310", "info":{"authors":{"author":[{"@pid":"35/4089","text":"Saeed Ghanbari"},{"@pid":"62/7405","text":"Ali B. Hashemi"},{"@pid":"a/CristianaAmza","text":"Cristiana Amza"}]},"title":"Stage-aware anomaly detection through tracking log points.","venue":"Middleware","pages":"253-264","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/GhanbariHA14","doi":"10.1145/2663165.2663319","ee":"https://doi.org/10.1145/2663165.2663319","url":"https://dblp.org/rec/conf/middleware/GhanbariHA14"}, "url":"URL#3917310" }, { "@score":"1", "@id":"3917312", "info":{"authors":{"author":[{"@pid":"g/SGhandeharizadeh","text":"Shahram Ghandeharizadeh"},{"@pid":"i/SandyIrani","text":"Sandy Irani"},{"@pid":"154/4385","text":"Jenny Lam"},{"@pid":"116/4711","text":"Jason Yap"}]},"title":"CAMP: a cost adaptive multi-queue eviction policy for key-value stores.","venue":"Middleware","pages":"289-300","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/GhandeharizadehILY14","doi":"10.1145/2663165.2663317","ee":"https://doi.org/10.1145/2663165.2663317","url":"https://dblp.org/rec/conf/middleware/GhandeharizadehILY14"}, "url":"URL#3917312" }, { "@score":"1", "@id":"3917313", "info":{"authors":{"author":[{"@pid":"g/SGhandeharizadeh","text":"Shahram Ghandeharizadeh"},{"@pid":"116/4711","text":"Jason Yap"},{"@pid":"33/5182","text":"Hieu Nguyen"}]},"title":"Strong consistency in cache augmented SQL systems.","venue":"Middleware","pages":"181-192","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/GhandeharizadehYN14","doi":"10.1145/2663165.2663318","ee":"https://doi.org/10.1145/2663165.2663318","url":"https://dblp.org/rec/conf/middleware/GhandeharizadehYN14"}, "url":"URL#3917313" }, { "@score":"1", "@id":"3917314", "info":{"authors":{"author":[{"@pid":"75/8194","text":"Cristiano Giuffrida"},{"@pid":"145/2121","text":"Calin Iorgulescu"},{"@pid":"t/AndrewSTanenbaum","text":"Andrew S. Tanenbaum"}]},"title":"Mutable checkpoint-restart: automating live update for generic server programs.","venue":"Middleware","pages":"133-144","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/GiuffridaIT14","doi":"10.1145/2663165.2663328","ee":"https://doi.org/10.1145/2663165.2663328","url":"https://dblp.org/rec/conf/middleware/GiuffridaIT14"}, "url":"URL#3917314" }, { "@score":"1", "@id":"3917319", "info":{"authors":{"author":[{"@pid":"54/10502","text":"Souleiman Hasan"},{"@pid":"60/2291","text":"Edward Curry"}]},"title":"Thematic event processing.","venue":"Middleware","pages":"109-120","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/HasanC14","doi":"10.1145/2663165.2663335","ee":"https://doi.org/10.1145/2663165.2663335","url":"https://dblp.org/rec/conf/middleware/HasanC14"}, "url":"URL#3917319" }, { "@score":"1", "@id":"3917320", "info":{"authors":{"author":[{"@pid":"33/9465","text":"Sachin Hirve"},{"@pid":"09/7950","text":"Roberto Palmieri"},{"@pid":"61/2985","text":"Binoy Ravindran"}]},"title":"Archie: a speculative replicated transactional system.","venue":"Middleware","pages":"265-276","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/HirvePR14","doi":"10.1145/2663165.2666090","ee":"https://doi.org/10.1145/2663165.2666090","url":"https://dblp.org/rec/conf/middleware/HirvePR14"}, "url":"URL#3917320" }, { "@score":"1", "@id":"3917322", "info":{"authors":{"author":[{"@pid":"21/2983","text":"K. R. Jayaram"},{"@pid":"42/6618","text":"David Safford"},{"@pid":"58/3945","text":"Upendra Sharma"},{"@pid":"71/3018","text":"Vijay K. Naik"},{"@pid":"01/2416","text":"Dimitrios E. Pendarakis"},{"@pid":"64/4055","text":"Shu Tao"}]},"title":"Trustworthy geographically fenced hybrid clouds.","venue":"Middleware","pages":"37-48","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/JayaramSSNPT14","doi":"10.1145/2663165.2666091","ee":"https://doi.org/10.1145/2663165.2666091","url":"https://dblp.org/rec/conf/middleware/JayaramSSNPT14"}, "url":"URL#3917322" }, { "@score":"1", "@id":"3917326", "info":{"authors":{"author":[{"@pid":"65/10800","text":"David Koll"},{"@pid":"l/JunLi1","text":"Jun Li 0001"},{"@pid":"33/4231","text":"Xiaoming Fu 0001"}]},"title":"SOUP: an online social network by the people, for the people.","venue":"Middleware","pages":"193-204","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/KollLF14","doi":"10.1145/2663165.2663324","ee":"https://doi.org/10.1145/2663165.2663324","url":"https://dblp.org/rec/conf/middleware/KollLF14"}, "url":"URL#3917326" }, { "@score":"1", "@id":"3917331", "info":{"authors":{"author":[{"@pid":"63/4811","text":"Pedro García López"},{"@pid":"69/1023","text":"Marc Sánchez Artigas"},{"@pid":"154/4309","text":"Sergi Toda"},{"@pid":"137/8856","text":"Cristian Cotes"},{"@pid":"154/4314","text":"John Lenton"}]},"title":"StackSync: bringing elasticity to dropbox-like file synchronization.","venue":"Middleware","pages":"49-60","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/LopezATCL14","doi":"10.1145/2663165.2663332","ee":"https://doi.org/10.1145/2663165.2663332","url":"https://dblp.org/rec/conf/middleware/LopezATCL14"}, "url":"URL#3917331" }, { "@score":"1", "@id":"3917334", "info":{"authors":{"author":[{"@pid":"85/8782","text":"Amiya Kumar Maji"},{"@pid":"64/3670","text":"Subrata Mitra"},{"@pid":"61/5024","text":"Bowen Zhou"},{"@pid":"57/95","text":"Saurabh Bagchi"},{"@pid":"23/669","text":"Akshat Verma"}]},"title":"Mitigating interference in cloud services by middleware reconfiguration.","venue":"Middleware","pages":"277-288","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/MajiMZBV14","doi":"10.1145/2663165.2663330","ee":"https://doi.org/10.1145/2663165.2663330","url":"https://dblp.org/rec/conf/middleware/MajiMZBV14"}, "url":"URL#3917334" }, { "@score":"1", "@id":"3917336", "info":{"authors":{"author":[{"@pid":"154/4273","text":"Abhinav Mehrotra"},{"@pid":"40/8912","text":"Veljko Pejovic"},{"@pid":"54/5541","text":"Mirco Musolesi"}]},"title":"SenSocial: a middleware for integrating online social networks and mobile sensing data streams.","venue":"Middleware","pages":"205-216","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/MehrotraPM14","doi":"10.1145/2663165.2663331","ee":"https://doi.org/10.1145/2663165.2663331","url":"https://dblp.org/rec/conf/middleware/MehrotraPM14"}, "url":"URL#3917336" }, { "@score":"1", "@id":"3917345", "info":{"authors":{"author":[{"@pid":"150/5224","text":"Ajaykrishna Raghavan"},{"@pid":"97/3628","text":"Abhishek Chandra"},{"@pid":"52/4225","text":"Jon B. Weissman"}]},"title":"Tiera: towards flexible multi-tiered cloud storage instances.","venue":"Middleware","pages":"1-12","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/RaghavanCW14","doi":"10.1145/2663165.2663333","ee":"https://doi.org/10.1145/2663165.2663333","url":"https://dblp.org/rec/conf/middleware/RaghavanCW14"}, "url":"URL#3917345" }, { "@score":"1", "@id":"3917346", "info":{"authors":{"author":[{"@pid":"38/8473","text":"Navaneeth Rameshan"},{"@pid":"n/LNavarroM","text":"Leandro Navarro 0001"},{"@pid":"00/5726","text":"Enric Monte"},{"@pid":"47/1386","text":"Vladimir Vlassov"}]},"title":"Stay-Away, protecting sensitive applications from performance interference.","venue":"Middleware","pages":"301-312","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/RameshanNMV14","doi":"10.1145/2663165.2663327","ee":"https://doi.org/10.1145/2663165.2663327","url":"https://dblp.org/rec/conf/middleware/RameshanNMV14"}, "url":"URL#3917346" }, { "@score":"1", "@id":"3917348", "info":{"authors":{"author":[{"@pid":"154/4328","text":"Ajay Saini"},{"@pid":"60/7906","text":"Arash Rezaei"},{"@pid":"46/2933-1","text":"Frank Mueller 0001"},{"@pid":"01/1703","text":"Paul Hargrove"},{"@pid":"32/308","text":"Eric Roman"}]},"title":"Affinity-aware checkpoint restart.","venue":"Middleware","pages":"121-132","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/SainiRMHR14","doi":"10.1145/2663165.2663325","ee":"https://doi.org/10.1145/2663165.2663325","url":"https://dblp.org/rec/conf/middleware/SainiRMHR14"}, "url":"URL#3917348" }, { "@score":"1", "@id":"3917354", "info":{"authors":{"author":[{"@pid":"93/7946","text":"Muhammad Adnan Tariq"},{"@pid":"25/4201","text":"Boris Koldehofe"},{"@pid":"154/4287","text":"Sukanya Bhowmik"},{"@pid":"r/KurtRothermel","text":"Kurt Rothermel"}]},"title":"PLEROMA: a SDN-based high performance publish/subscribe middleware.","venue":"Middleware","pages":"217-228","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/TariqKBR14","doi":"10.1145/2663165.2663338","ee":"https://doi.org/10.1145/2663165.2663338","url":"https://dblp.org/rec/conf/middleware/TariqKBR14"}, "url":"URL#3917354" }, { "@score":"1", "@id":"3917357", "info":{"authors":{"author":[{"@pid":"23/669","text":"Akshat Verma"},{"@pid":"154/4352","text":"Juhi Bagrodia"},{"@pid":"97/9978","text":"Vimmi Jaiswal"}]},"title":"Virtual machine consolidation in the wild.","venue":"Middleware","pages":"313-324","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/VermaBJ14","doi":"10.1145/2663165.2663316","ee":"https://doi.org/10.1145/2663165.2663316","url":"https://dblp.org/rec/conf/middleware/VermaBJ14"}, "url":"URL#3917357" }, { "@score":"1", "@id":"3917359", "info":{"authors":{"author":[{"@pid":"52/328-2","text":"Di Wu 0002"},{"@pid":"61/3234","text":"Qiang Liu"},{"@pid":"48/2168","text":"Yuan Zhang"},{"@pid":"m/JulieAMcCann","text":"Julie A. McCann"},{"@pid":"23/838","text":"Amelia Regan"},{"@pid":"66/1875","text":"Nalini Venkatasubramanian"}]},"title":"CrowdWiFi: efficient crowdsensing of roadside WiFi networks.","venue":"Middleware","pages":"229-240","year":"2014","type":"Conference and Workshop Papers","access":"closed","key":"conf/middleware/WuLZMRV14","doi":"10.1145/2663165.2663329","ee":"https://doi.org/10.1145/2663165.2663329","url":"https://dblp.org/rec/conf/middleware/WuLZMRV14"}, "url":"URL#3917359" }, { "@score":"1", "@id":"3962859", "info":{"authors":{"author":[{"@pid":"11/1262","text":"Laurent Réveillère"},{"@pid":"88/4130","text":"Lucy Cherkasova"},{"@pid":"97/1881","text":"François Taïani"}]},"title":"Proceedings of the 15th International Middleware Conference, Bordeaux, France, December 8-12, 2014","venue":"Middleware","publisher":"ACM","year":"2014","type":"Editorship","key":"conf/middleware/2014","ee":"http://dl.acm.org/citation.cfm?id=2663165","url":"https://dblp.org/rec/conf/middleware/2014"}, "url":"URL#3962859" } ] } } } )