Distributed Applications and Interoperable Systems
暂无分享,去创建一个
[1] Valerio Schiavoni,et al. Security, Performance and Energy Trade-Offs of Hardware-Assisted Memory Protection Mechanisms , 2018, 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS).
[2] Sarvar Patel,et al. Practical Secure Aggregation for Federated Learning on User-Held Data , 2016, ArXiv.
[3] Márk Jelasity,et al. Defining and understanding smartphone churn over the internet: A measurement study , 2014, 14-th IEEE International Conference on Peer-to-Peer Computing.
[4] Scott Shenker,et al. Spark: Cluster Computing with Working Sets , 2010, HotCloud.
[5] Márk Jelasity,et al. PeerSim: A scalable P2P simulator , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.
[6] Carlos V. Rozas,et al. Innovative instructions and software model for isolated execution , 2013, HASP '13.
[7] István Hegedüs,et al. Gossip learning with linear models on fully distributed data , 2011, Concurr. Comput. Pract. Exp..
[8] Valerio Schiavoni,et al. SAFETHINGS: Data Security by Design in the IoT , 2017, 2017 13th European Dependable Computing Conference (EDCC).
[9] Reynold Xin,et al. Apache Spark , 2016 .
[10] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[11] Blaise Agüera y Arcas,et al. Communication-Efficient Learning of Deep Networks from Decentralized Data , 2016, AISTATS.
[12] István Hegedüs,et al. Robust Fully Distributed Minibatch Gradient Descent with Privacy Preservation , 2018, Secur. Commun. Networks.
[13] Patrick Th. Eugster,et al. STYX: Stream Processing with Trustworthy Cloud-based Execution , 2016, SoCC.
[14] Anne-Marie Kermarrec,et al. Gossip-based peer sampling , 2007, TOCS.
[15] Fahimuddin Shaik,et al. Signal and Image Processing in Medical Applications , 2016 .
[16] A. Malliani,et al. Heart rate variability. Standards of measurement, physiological interpretation, and clinical use , 1996 .
[17] Marc'Aurelio Ranzato,et al. Large Scale Distributed Deep Networks , 2012, NIPS.
[18] Bobby Bhattacharjee,et al. SeCloak: ARM Trustzone-based Mobile Peripheral Control , 2018, MobiSys.
[19] Daniel Gruss,et al. Nethammer: Inducing Rowhammer Faults through Network Requests , 2018, 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[20] Thomas F. Wenisch,et al. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution , 2018, USENIX Security Symposium.
[21] Shay Gueron,et al. A Memory Encryption Engine Suitable for General Purpose Processors , 2016, IACR Cryptol. ePrint Arch..
[22] A. Asuncion,et al. UCI Machine Learning Repository, University of California, Irvine, School of Information and Computer Sciences , 2007 .
[23] Davide Anguita,et al. A Public Domain Dataset for Human Activity Recognition using Smartphones , 2013, ESANN.
[24] Jinjun Chen,et al. DPBSV -- An Efficient and Secure Scheme for Big Sensing Data Stream , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[25] M. Nash,et al. ECG signal classification for the detection of cardiac arrhythmias using a convolutional recurrent neural network , 2018, Physiological measurement.
[26] Brigitte Leeners,et al. Respiratory and cardiac monitoring at night using a wrist wearable optical system , 2017, 2018 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).
[27] Alexander L. Wolf,et al. SABER: Window-Based Hybrid Stream Processing for Heterogeneous Architectures , 2016, SIGMOD Conference.
[28] Stefan Mangard,et al. Malware Guard Extension: Using SGX to Conceal Cache Attacks , 2017, DIMVA.
[29] Srinivas Devadas,et al. Intel SGX Explained , 2016, IACR Cryptol. ePrint Arch..
[30] Ali Ghodsi,et al. Drizzle: Fast and Adaptable Stream Processing at Scale , 2017, SOSP.
[31] Peter Richtárik,et al. Federated Learning: Strategies for Improving Communication Efficiency , 2016, ArXiv.
[32] Jim Dowling,et al. Through the wormhole: Low cost, fresh peer sampling for the Internet , 2013, IEEE P2P 2013 Proceedings.
[33] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[34] Gábor Danner,et al. Token Account Algorithms: The Best of the Proactive and Reactive Worlds , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).
[35] Gábor Danner,et al. Robust Decentralized Mean Estimation with Limited Communication , 2018, Euro-Par.
[36] Scott Shenker,et al. Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters , 2012, HotCloud.
[37] Hongyu Miao,et al. StreamBox: Modern Stream Processing on a Multicore Machine , 2017, USENIX Annual Technical Conference.
[38] Rupak Majumdar,et al. MrCrypt: static analysis for secure cloud computations , 2013, OOPSLA.
[39] Joseph K. Bradley,et al. Spark SQL: Relational Data Processing in Spark , 2015, SIGMOD Conference.
[40] F. Shaffer,et al. An Overview of Heart Rate Variability Metrics and Norms , 2017, Front. Public Health.
[41] Olivier Chételat,et al. Classification of Cardiac Arrhythmias from Single Lead ECG with a Convolutional Recurrent Neural Network , 2019, BIOSIGNALS.
[42] Craig Gentry,et al. Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..
[43] N. Asokan,et al. Open-TEE -- An Open Virtual Trusted Execution Environment , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[44] Periyasamy Paramasivam,et al. Mobile secure data protection using eMMC RPMB partition , 2015, 2015 International Conference on Computing and Network Communications (CoCoNet).
[45] Valerio Schiavoni,et al. SecureStreams: A Reactive Middleware Framework for Secure Data Stream Processing , 2017, DEBS.
[46] JelasityMárk,et al. Robust Decentralized Low-Rank Matrix Decomposition , 2016 .
[47] Adrian Tarniceriu,et al. Evaluation of the beat-to-beat detection accuracy of PulseOn wearable optical heart rate monitor , 2015, 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).