Authors
|
Title
|
Puya Memarzia, Virendra C. Bhavsar, Suprio Ray |
In-memory Aggregation for Big Data Analytics |
Mark Thom, Gerhard W. Dueck, Kenneth B. Kent, Daryl Maier |
Pervasive, Secure Sharing of Language Runtimes in Cloud Applications |
Georgiy Krylov, Petar Jelenkovic, Gerhard W. Dueck, Kenneth B. Kent, Daryl Maier |
AOT compilation in OMR: Relocations |
Dayton J Allen, David Bremner, DeVerne Jones, Daryl Maier, Mark Stoodley, Leonardo Banderali |
Python on OMR |
Eric Coffin, Scott Young, Kenneth B. Kent, Marius Pirvu, Vijay Sundaresan |
Boosting MicroJIT – a Lightweight Just-In-Time Compiler |
A. Taware, K. B. Kent, G. W. Dueck, & Charlie Gracie |
Cold Object Identification, Sequestration and Revitalization |
Maria Patrou, Kenneth B. Kent, Michael Dawson |
Scaling Parallelism under CPU-intensive Loads in Node.js |
Hillary J. Soontiens, Jean-Philippe Legault, Aaron G. Graham, Kenneth B. Kent, Daryl Maier, Kazuhiro Konno |
AArch64 Support for the OMR Language Runtime Toolkit |
Jean-Philippe Legault, Aaron G. Graham, Kenneth B. Kent, Daryl Maier |
Containerized Cross Platform Development for the New Age Polyglot |
Rahul Roychowdhury,Dr Eric Aubanel,Dr Suprio Ray,Charlie Gracie |
Multiprocessing in Python to exploit Multi-core Hardware |
Kay Boldt, Arash Habibi Lashkari, Ali A. Ghorbani |
Detection and characterization of multi-layer encryption traffic (VPN through Tor) using AI |
Rongxing Lu |
AGREE: Efficient and Privacy-preserving Speaker Recognition for Internet of Things |
Hassan Mahdikhani, Rasoul Shahsavarifar, Rongxing Lu, David Bremner |
Privacy-Preserving Simplicial Depth Query over Outsourced Cloud Platform |
Rongxing Lu |
A New Communication-Efficient Privacy-Preserving Range Query Scheme in Fog-Enhanced IoT |
Jason Chang, Rongxing Lu |
Achieving Privacy-Preserving Edit Distance Query in Cloud and Its Application on Genomic Data |
Son Luong, Rongxing Lu |
A Blockchain-Based Privacy-Preserving Medical Insurance Storage System |
Yandong Zheng, Rongxing Lu, Xue Yang, Jun Shao |
Achieving Efficient and Privacy-Preserving Top-k Query over Vertically Distributed Data Sources |
Yandong Zheng, Rongxing Lu, Jun Shao |
Achieving Efficient and Privacy-Preserving k-NN Query for Outsoured eHealthcare Data |
naNasrin Eshraghi Ivari, Kenneth B. Kent |
Improving the Verilog-to-Routing FPGA CAD flow |
Scott Young, Kenneth B. Kent |
Verilog Static Loop Unrolling Support in Odin II |
Britta Sennewald, Arash Habibi Lashkari, Ali A. Ghorbani |
Authorship attribution within different Dark Web forums by using statistical analysis of strings |
Chenghao Xu, Wei Song |
Intelligent Data Collection and Dissemination Application with Wi-Fi Direct |
Aaron G. Graham, Jean-Philippe Legault, Maria Patrou, Kenneth B. Kent |
Improved Synthesis and Simulation for FPGAs: ODIN II for VTR 8.0 and Beyond |
Xichen Zhang, Ali A. Ghorbani |
Human Factors in Cybersecurity: Issues and Challenges in Big Data |
Xi Tao, Wei Song |
Efficient Path Planning and Truthful Incentive Mechansim Design for Mobile Crowdsensing |
Haoru Xing, Wei Song |
Collaborative Content Distribution in 5G Mobile Networks with Edge Caching |
Shlomi linoy, Hassan Mahdikhani, Suprio Ray, Rongxing Lu, Natalia Stakhanova, i Ghorbani |
Scalable Privacy-Preserving Query Processing Over Ethereum Blockchain |
Ali Hakimi Parizi, Paul Cook |
Evaluating Cross-lingual Sub-word Embeddings |
Mahdi D. Firoozjaei, Ali A. Ghorbani |
Location Privacy issues with the online Services |
Vedang Goswami, Scott Bateman |
Artificial Landmarks for Spatial Interfaces |
Xichen Zhang, Ali A. Ghorbani |
An overview of online fake news: characterization, detection, and discussion |
Iman Sharafaldin, Ali A. Ghorbani |
A Novel Visual Anomaly Detection Method |
Kwasi Boakye-Boateng, Arash Habibi Lashkari, Ali A. Ghorbani |
Application of One-Time Pad in Security of Substation Automation Systems |
Alex Demmings, Kasey Dionne, Connor Wilson, Scott Bateman |
No Contact Navigation: Developing Gesture Sets for Navigational Tasks |
Aaron Tabor, Scott Bateman, Erik Scheme, m.c. schraefel |
Designing Guided Breathing Technology: Enhancing Cognitive Performance in the Workplace |
Mohammed Al-Darwbi, Arash Lashkari, Ali Ghorbani |
NetFlowScope: A novel Intrusion Detection Systems |
Reyhan Pradantyo, Scott Bateman |
What Are Video-Game Baddies? Observing and Evaluating Player Perception on Video-Game Villain Designs |
Jeremie Boudreau, Ian Sadler, Caleb Smith |
jerbou_etal_poster-sb |
Nasim Maleki, Ali Ghorbani |
Simulating Phishing Email through Graph Database Models |
Hamid Azimy, Ali Ghorbani |
Competitive Selfish Bitcoin Mining |
Samaneh Mahdavifar, Ali A. Ghorbani |
Android Malware Detection Utilizing Translucent Deep Neural Network |