Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Inference in Machine Learning Services Using Trusted Execution Environments., , , , and . CoRR, (2019)KNOWME: a case study in wireless body area sensor network design., , , , , , , , , and 3 other author(s). IEEE Commun. Mag., 50 (5): 116-125 (2012)Call graph prefetching for database applications., , and . ACM Trans. Comput. Syst., 21 (4): 412-444 (2003)DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware., , and . CoRR, (2022)A privacy mechanism for mobile-based urban traffic monitoring., , , , and . Pervasive Mob. Comput., (2015)FLIXR: Embedding Index Into Flash Translation Layer in SSDs., , , , and . IEEE Trans. Computers, 72 (1): 250-263 (2023)An efficient sequential consistency implementation with dynamic race detection for GPUs., and . J. Parallel Distributed Comput., (May 2024)Adaptive Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning., , , , , and . IPDPS, page 628-638. IEEE, (2022)Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs., , , , , , , and . MILCOM, page 102-107. IEEE, (2021)PageORAM: An Efficient DRAM Page Aware ORAM Strategy., , and . MICRO, page 91-107. IEEE, (2022)