skip to main content
10.1145/3565386acmconferencesBook PagePublication PagesmiddlewareConference Proceedingsconference-collections
Middleware Demos and Posters '22: Proceedings of the 23rd International Middleware Conference Demos and Posters
ACM2022 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
Middleware '22: 23rd International Middleware Conference Quebec Quebec City Canada November 7 - 11, 2022
ISBN:
978-1-4503-9931-9
Published:
22 November 2022
Sponsors:
In-Cooperation:
USENIX Assoc, IFIP
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 20 Feb 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
demonstration
Public Access
Scalable distributed microservices for autonomous UAV swarms: poster abstract

Unmanned aerial vehicles (UAV) are revolutionizing critical industries. Their inexpensive and accessible nature makes them useful for a number of broad applications including agriculture, infrastructure inspection, and more. In response to this ...

poster
On-the-fly autoencoders as subscriptions for face detection on a publish/subscribe system: poster abstract

This paper presents a publish/subscribe system that accepts sample face images from the subscribers to autoencode a person in emergent pursuit or tracking. Autoencoders trained on the fly based on a convolutional neural network are deployed to publish/...

poster
OrderlessChain: a CRDT-enabled blockchain without total global order of transactions: poster abstract

Blockchains often use coordination-based consensus protocols to offer trust in a Byzantine environment and to serialize transactions to preserve the application's invariants. However, coordination can be a performance bottleneck. There exist application-...

poster
OrderlessFL: a CRDT-enabled permissioned blockchain for federated learning: poster abstract

Industries produce a large amount of data that can improve Machine Learning models. However, due to privacy issues, the data cannot be shared. Several Federated Learning (FL) systems have been introduced as private alternatives without considering ...

poster
A design of architecture for reconfigurable software-defined device middleware: poster abstract

To provide various services to highly heterogeneous and massive IoT devices in the era of 5G communication and beyond, a structural architecture is essential. Although individual consumer IoT solutions provide simple management features, they are still ...

poster
Homomorphic matching on publish/subscribe brokers based on simple integer partition and factorization for secret forwarding: poster abstract

We introduce a novel homomorphic matching scheme for forwarding publications to interested subscribers through content-based brokers without exposing private information. We generate private homomorphic encryption keys using a time-based one-time ...

demonstration
IoT-opt: the swiss army knife to model and validate the performance of IoT products: demo abstract

Building an IoT solution is a highly time-consuming, costly and complex task that requires several iterations of prototyping to find and evaluate a large set of hardware and software configurations that can optimize the IoT product's performance, e.g., ...

poster
OrderlessFile: a CRDT-enabled permissioned blockchain for file storage: poster abstract

Cloud storage has gained popularity as an affordable and available cloud-based file storage. However, despite its apparent advantages, clients must rely on cloud providers to safely and securely store the files. A few blockchain-based file storage ...

demonstration
TrustedCloud: a framework for the run-time trust state analysis of a virtual machine in cloud environment: demo abstract

Applications executing in the cloud are prone to numerous attacks including network, malware and data manipulation which are not immediately apparent. The Dwell Time for an attack to be noticed is currently 211 days where human error is reported to be a ...

poster
Deep learning driven anomaly based intrusion detection system for IoT: poster abstract

We propose a hybrid framework of machine learning and deep learning networks for efficient classification of attacks and anomalies. The machine learning algorithms are adopted to distinguish between normal data and anomaly data. The deep networks, on ...

Contributors
  • School of Higher Technology
  • University of Bologna
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

Overall Acceptance Rate 203 of 948 submissions, 21%
YearSubmittedAcceptedRate
Middleware '2221838%
Middleware '17852024%
Middleware '1720735%
Middleware '17171271%
Middleware Industry '1520420%
Middleware '151182319%
Middleware '141442719%
Middleware '12181372%
Middleware '081172118%
Middleware '071082220%
Middleware '061222117%
Middleware '031582516%
Overall94820321%