Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Thomas M. Kroeger"'
Autor:
Janet Vorobyeva, Daniel R. Delayo, Michael A. Bender, Martín Farach-Colton, Prashant Pandey, Cynthia A. Phillips, Shikha Singh, Eric D. Thomas, Thomas M. Kroeger
Publikováno v:
Cluster Computing. 25:2893-2914
Autor:
Prashant Pandey, Thomas M. Kroeger, Jonathan W. Berry, Cynthia A. Phillips, Michael A. Bender, Martin Farach-Colton, Rob Johnson, Shikha Singh
Publikováno v:
SIGMOD Conference
Given an input stream of size N, a φ-heavy hitter is an item that occurs at least φ N times in S. The problem of finding heavy-hitters is extensively studied in the database literature. We study a real-time heavy-hitters variant in which an element
Publikováno v:
ICNC
Network designers, planners, and security professionals increasingly rely on large-scale virtual testbeds to emulate networks and make decisions about real-world deployments. However, there has been limited research on how well these virtual testbeds
Autor:
Thomas M. Kroeger, Justin Jacobs, Michael A. Bender, Martin Farach-Colton, Justin Raizes, Jonathan W. Berry, Helen Xu, Cynthia A. Phillips, Alexandra Porter, Prashant Pandey, Samuel McCauley, Tyler Mayer, David Zage, Shikha Singh, Rob Johnson
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d59565905affe2642d4c94969924ff1b
https://doi.org/10.2172/1528756
https://doi.org/10.2172/1528756
Publikováno v:
ICNC
Malicious actors are increasingly using TLS to evade deep packet inspection (DPI). In response, vendors and enterprises have turned to man-in-the-middle (MITM) proxies to enable security monitoring of encrypted traffic. This approach not only breaks
Autor:
Thomas M. Kroeger, Ahmed Amer, Ethan L. Miller, Jehan-Francois Paris, Darrell D. E. Long, Thomas Schwarz
Publikováno v:
MASCOTS
Stored data needs to be protected against device failure and irrecoverable sector read errors, yet doing so at exabyte scale can be challenging given the large number of failures that must be handled. We have developed RESAR (Robust, Efficient, Scala
Autor:
Bertrand Simon, Michael A. Bender, Rob Johnson, Thomas M. Kroeger, David Zage, Jonathan W. Berry, Samuel McCauley, Shikha Singh, Cynthia A. Phillips
Publikováno v:
Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems
Principle of Database Systems (PODS 2016)
Principle of Database Systems (PODS 2016), Jun 2016, San Francisco, United States. ⟨10.1145/2902251.2902276⟩
PODS
Principle of Database Systems (PODS 2016)
Principle of Database Systems (PODS 2016), Jun 2016, San Francisco, United States. ⟨10.1145/2902251.2902276⟩
PODS
International audience; We present history-independent alternatives to a B-tree, the primary indexing data structure used in databases. A data structure is history independent (HI) if it is impossible to deduce any information by examining the bit re
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1acc63032c9a15974c3d950c0fe026fe
https://inria.hal.science/hal-01326312/document
https://inria.hal.science/hal-01326312/document
Publikováno v:
ICNC
Data security and availability for operational use are frequently seen as conflicting goals. Research on searchable encryption and homomorphic encryption are a start, but they typically build from encryption methods that, at best, provide protections