Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Daniar Heri Kurniawan"'
Publikováno v:
2022 IEEE 15th International Conference on Cloud Computing (CLOUD).
Publikováno v:
SIGCOMM
Conventional wisdom states that to improve quality of experience (QoE), web service providers should reduce the median or other percentiles of server-side delays. This work shows that doing so can be inefficient due to user heterogeneity in how the d
Autor:
Chen Tian, Aarti Gupta, Shan Lu, Haryadi S. Gunawi, Satria Priambada, Huan Ke, Cesar A. Stuardo, Dikaimin Simon, Feng Ye, Tanakorn Leesatapornwongsa, Daniar Heri Kurniawan, Jeffrey F. Lukman, Riza O. Suminto
Publikováno v:
EuroSys
We present a fast and scalable testing approach for datacenter/cloud systems such as Cassandra, Hadoop, Spark, and ZooKeeper. The uniqueness of our approach is in its ability to overcome the path/state-space explosion problem in testing workloads wit
Autor:
Yani Widyani, Daniar Heri Kurniawan
Publikováno v:
2017 6th International Conference on Electrical Engineering and Informatics (ICEEI).
Sci-Learn is a website-based application that can be accessed at https://www.sci-learn.com. There are three types of functionalities in this software: general e-Learning functionality, social networking functionality, and functionalities that impleme
Autor:
Haryadi S. Gunawi, Cesar A. Stuardo, Maheswara Rao G. Uma, Vincentius Martin, Daniar Heri Kurniawan, Alexandra Clark, Bo Fu, Riza O. Suminto, Huan Ke, Tanakorn Leesatapornwongsa
Publikováno v:
SoCC
We reveal loopholes of Speculative Execution (SE) implementations under a unique fault model: node-level network throughput degradation. This problem appears in many data-parallel frameworks such as Hadoop MapReduce and Spark. To address this, we pre
Autor:
Rinaldi Munir, Daniar Heri Kurniawan
Publikováno v:
2016 International Conference On Advanced Informatics: Concepts, Theory And Application (ICAICTA).
Technology is a key of innovation in any aspect of this modern era. In every technology, data becomes the most important asset to be protected. Many encryption algorithms are widely available and used in information security. Encryption can provide s