Search Results - "Do, Le Quoc"
-
1
ApproxIoT: Approximate Analytics for Edge Computing
Published in 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) (01-07-2018)“…IoT-enabled devices continue to generate a massive amount of data. Transforming this continuously arriving raw data into timely insights is critical for many…”
Get full text
Conference Proceeding -
2
Trust Management as a Service: Enabling Trusted Execution in the Face of Byzantine Stakeholders
Published in 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01-06-2020)“…Trust is arguably the most important challenge for critical services both deployed as well as accessed remotely over the network. These systems are exposed to…”
Get full text
Conference Proceeding -
3
Cost-based Virtual Machine Scheduling for Data-as-a-Service
Published in J.UCS (Annual print and CD-ROM archive ed.) (01-01-2023)“…Data-as-a-Service (DaaS) is a branch of cloud computing that supports "querying the Web". Due to its ultrahigh scale, it is essential to establish rules when…”
Get full text
Journal Article -
4
PrivApprox: Privacy-Preserving Stream Analytics
Published in Informatik-Spektrum (01-10-2019)Get full text
Journal Article -
5
UniCrawl: A Practical Geographically Distributed Web Crawler
Published in 2015 IEEE 8th International Conference on Cloud Computing (01-06-2015)“…As the wealth of information available on the web keeps growing, being able to harvest massive amounts of data has become a major challenge. Web crawlers are…”
Get full text
Conference Proceeding Journal Article -
6
LEGaTO: Low-Energy, Secure, and Resilient Toolset for Heterogeneous Computing
Published in Design, Automation and Test in Europe Conference and Exhibition (DATE), Grenoble, France (2020)“…The LEGaTO project leverages task-based programming models to provide a software ecosystem for Made in-Europe heterogeneous hardware composed of CPUs, GPUs,…”
Get full text
Conference Proceeding -
7
TRIGLAV: Remote Attestation of the Virtual Machine's Runtime Integrity in Public Clouds
Published in 2021 IEEE 14th International Conference on Cloud Computing (CLOUD) (01-09-2021)“…Trust is of paramount concern for tenants to deploy their security-sensitive services in the cloud. The integrity of virtual machines (VMs) in which these…”
Get full text
Conference Proceeding -
8
Accelerating Transfer Learning with Near-Data Computation on Cloud Object Stores
Published 01-11-2024“…Storage disaggregation underlies today's cloud and is naturally complemented by pushing down some computation to storage, thus mitigating the potential network…”
Get full text
Journal Article -
9
A practical approach for updating an integrity-enforced operating system
Published 05-01-2021“…Trusted computing defines how to securely measure, store, and verify the integrity of software controlling a computer. One of the major challenges that make…”
Get full text
Journal Article -
10
TICAL: Trusted and Integrity-protected Compilation of AppLications
Published in 2024 19th European Dependable Computing Conference (EDCC) (08-04-2024)“…During the past few years, we have witnessed various efforts to provide confidentiality and integrity for applications running in untrusted environments such…”
Get full text
Conference Proceeding -
11
Credentials as a Service Providing Self Sovereign Identity as a Cloud Service Using Trusted Execution Environments
Published in 2021 IEEE International Conference on Cloud Engineering (IC2E) (01-10-2021)“…With increasing digitization, more and more people use their identification credentials for accessing online services; which increases concern for data…”
Get full text
Conference Proceeding -
12
Synergia: Hardening High-Assurance Security Systems with Confidential and Trusted Computing
Published 12-05-2022“…Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, SAC 2022 High-assurance security systems require strong isolation from the untrusted world…”
Get full text
Journal Article -
13
secureTF: A Secure TensorFlow Framework
Published 20-01-2021“…Pages 44-59, 2020 Data-driven intelligent applications in modern online services have become ubiquitous. These applications are usually hosted in the untrusted…”
Get full text
Journal Article -
14
DoLen: User-Side Multi-cloud Application Monitoring
Published in 2014 International Conference on Future Internet of Things and Cloud (01-08-2014)“…Cloud computing is a popular platform offering computation, storage and communication resources as a service. Monitoring the performance and behavior of…”
Get full text
Conference Proceeding -
15
Tutorial: Elastic and Fault Tolerant Event Stream Processing using StreamMine3G
Published in 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing (01-12-2013)“…The massive amount of new data being generated each day by data sources such as smartphones and sensor devices calls for new techniques to process such…”
Get full text
Conference Proceeding -
16
Scalable Network Traffic Classification Using Distributed Support Vector Machines
Published in 2015 IEEE 8th International Conference on Cloud Computing (01-06-2015)“…Internet traffic has increased dramatically in recent years due to the popularization of the Internet and the appearance of wireless Internet mobile devices…”
Get full text
Conference Proceeding Journal Article -
17
Scalable and Real-Time Deep Packet Inspection
Published in 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing (01-12-2013)“…Internet traffic has continued to grow at a spectacular rate over the past ten years. Understanding and managing network traffic have become an important issue…”
Get full text
Conference Proceeding -
18
PrivApprox: Privacy-Preserving Stream Analytics: Extended Abstract
Published in Informatik-Spektrum (01-10-2019)Get full text
Journal Article -
19
SecFL: Confidential Federated Learning using TEEs
Published 03-10-2021“…Federated Learning (FL) is an emerging machine learning paradigm that enables multiple clients to jointly train a model to take benefits from diverse datasets…”
Get full text
Journal Article -
20
LEGaTO: Low-Energy, Secure, and Resilient Toolset for Heterogeneous Computing
Published in 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE) (01-03-2020)“…The LEGaTO project leverages task-based programming models to provide a software ecosystem for Made in-Europe heterogeneous hardware composed of CPUs, GPUs,…”
Get full text
Conference Proceeding