Search Results - "Do Le Quoc"

Refine Results
  1. 1

    ApproxIoT: Approximate Analytics for Edge Computing by Wen, Zhenyu, Quoc, Do Le, Bhatotia, Pramod, Chen, Ruichuan, Lee, Myungjin

    “…IoT-enabled devices continue to generate a massive amount of data. Transforming this continuously arriving raw data into timely insights is critical for many…”
    Get full text
    Conference Proceeding
  2. 2

    Trust Management as a Service: Enabling Trusted Execution in the Face of Byzantine Stakeholders by Gregor, Franz, Ozga, Wojciech, Vaucher, Sebastien, Pires, Rafael, Le Quoc, Do, Arnautov, Sergei, Martin, Andre, Schiavoni, Valerio, Felber, Pascal, Fetzer, Christof

    “…Trust is arguably the most important challenge for critical services both deployed as well as accessed remotely over the network. These systems are exposed to…”
    Get full text
    Conference Proceeding
  3. 3

    Cost-based Virtual Machine Scheduling for Data-as-a-Service by Oliveira, Ana Cristina Alves de, Spohn, Marco Aurélio, Fetzer, Christof, Do, Le Quoc, Martin, André

    “…Data-as-a-Service (DaaS) is a branch of cloud computing that supports "querying the Web". Due to its ultrahigh scale, it is essential to establish rules when…”
    Get full text
    Journal Article
  4. 4
  5. 5

    UniCrawl: A Practical Geographically Distributed Web Crawler by Do Le Quoc, Fetzer, Christof, Felber, Pascal, Riviere, Etienne, Schiavoni, Valerio, Sutra, Pierre

    “…As the wealth of information available on the web keeps growing, being able to harvest massive amounts of data has become a major challenge. Web crawlers are…”
    Get full text
    Conference Proceeding Journal Article
  6. 6
  7. 7

    TRIGLAV: Remote Attestation of the Virtual Machine's Runtime Integrity in Public Clouds by Ozga, Wojciech, Le Quoc, Do, Fetzer, Christof

    “…Trust is of paramount concern for tenants to deploy their security-sensitive services in the cloud. The integrity of virtual machines (VMs) in which these…”
    Get full text
    Conference Proceeding
  8. 8

    Accelerating Transfer Learning with Near-Data Computation on Cloud Object Stores by Petrescu, Diana, Guirguis, Arsany, Quoc, Do Le, Picorel, Javier, Guerraoui, Rachid, Dinu, Florin

    Published 01-11-2024
    “…Storage disaggregation underlies today's cloud and is naturally complemented by pushing down some computation to storage, thus mitigating the potential network…”
    Get full text
    Journal Article
  9. 9

    A practical approach for updating an integrity-enforced operating system by Ozga, Wojciech, Quoc, Do Le, Fetzer, Christof

    Published 05-01-2021
    “…Trusted computing defines how to securely measure, store, and verify the integrity of software controlling a computer. One of the major challenges that make…”
    Get full text
    Journal Article
  10. 10

    TICAL: Trusted and Integrity-protected Compilation of AppLications by Krahn, Robert, Paul, Nikson Kanti, Gregor, Franz, Le Quoc, Do, Brito, Andrey, Martin, Andre, Fetzer, Christof

    “…During the past few years, we have witnessed various efforts to provide confidentiality and integrity for applications running in untrusted environments such…”
    Get full text
    Conference Proceeding
  11. 11

    Credentials as a Service Providing Self Sovereign Identity as a Cloud Service Using Trusted Execution Environments by Siddiqui, Hira, Idrees, Mujtaba, Gudymenko, Ivan, Quoc, Do Le, Fetzer, Christof

    “…With increasing digitization, more and more people use their identification credentials for accessing online services; which increases concern for data…”
    Get full text
    Conference Proceeding
  12. 12

    Synergia: Hardening High-Assurance Security Systems with Confidential and Trusted Computing by Ozga, Wojciech, Faqeh, Rasha, Quoc, Do Le, Gregor, Franz, Dragone, Silvio, Fetzer, Christof

    Published 12-05-2022
    “…Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, SAC 2022 High-assurance security systems require strong isolation from the untrusted world…”
    Get full text
    Journal Article
  13. 13

    secureTF: A Secure TensorFlow Framework by Quoc, Do Le, Gregor, Franz, Arnautov, Sergei, Kunkel, Roland, Bhatotia, Pramod, Fetzer, Christof

    Published 20-01-2021
    “…Pages 44-59, 2020 Data-driven intelligent applications in modern online services have become ubiquitous. These applications are usually hosted in the untrusted…”
    Get full text
    Journal Article
  14. 14

    DoLen: User-Side Multi-cloud Application Monitoring by Do Le Quoc, Yazdanov, Lenar, Fetzer, Christof

    “…Cloud computing is a popular platform offering computation, storage and communication resources as a service. Monitoring the performance and behavior of…”
    Get full text
    Conference Proceeding
  15. 15

    Tutorial: Elastic and Fault Tolerant Event Stream Processing using StreamMine3G by Martin, Andre, Le Quoc, Do

    “…The massive amount of new data being generated each day by data sources such as smartphones and sensor devices calls for new techniques to process such…”
    Get full text
    Conference Proceeding
  16. 16

    Scalable Network Traffic Classification Using Distributed Support Vector Machines by Quoc, Do Le, D'Alessandro, Valerio, Park, Byungchul, Romano, Luigi, Fetzer, Christof

    “…Internet traffic has increased dramatically in recent years due to the popularization of the Internet and the appearance of wireless Internet mobile devices…”
    Get full text
    Conference Proceeding Journal Article
  17. 17

    Scalable and Real-Time Deep Packet Inspection by Le Quoc, Do, Martin, Andre, Fetzer, Christof

    “…Internet traffic has continued to grow at a spectacular rate over the past ten years. Understanding and managing network traffic have become an important issue…”
    Get full text
    Conference Proceeding
  18. 18
  19. 19

    SecFL: Confidential Federated Learning using TEEs by Quoc, Do Le, Fetzer, Christof

    Published 03-10-2021
    “…Federated Learning (FL) is an emerging machine learning paradigm that enables multiple clients to jointly train a model to take benefits from diverse datasets…”
    Get full text
    Journal Article
  20. 20