|
Authors
|
Title
|
| Puya Memarzia, Virendra C. Bhavsar, Suprio Ray |
In-memory Aggregation for Big Data Analytics |
| Mark Thom, Gerhard W. Dueck, Kenneth B. Kent, Daryl Maier |
Pervasive, Secure Sharing of Language Runtimes in Cloud Applications |
| Georgiy Krylov, Petar Jelenkovic, Gerhard W. Dueck, Kenneth B. Kent, Daryl Maier |
AOT compilation in OMR: Relocations |
| Dayton J Allen, David Bremner, DeVerne Jones, Daryl Maier, Mark Stoodley, Leonardo Banderali |
Python on OMR |
| Eric Coffin, Scott Young, Kenneth B. Kent, Marius Pirvu, Vijay Sundaresan |
Boosting MicroJIT – a Lightweight Just-In-Time Compiler |
| A. Taware, K. B. Kent, G. W. Dueck, & Charlie Gracie |
Cold Object Identification, Sequestration and Revitalization |
| Maria Patrou, Kenneth B. Kent, Michael Dawson |
Scaling Parallelism under CPU-intensive Loads in Node.js |
| Hillary J. Soontiens, Jean-Philippe Legault, Aaron G. Graham, Kenneth B. Kent, Daryl Maier, Kazuhiro Konno |
AArch64 Support for the OMR Language Runtime Toolkit |
| Jean-Philippe Legault, Aaron G. Graham, Kenneth B. Kent, Daryl Maier |
Containerized Cross Platform Development for the New Age Polyglot |
| Rahul Roychowdhury,Dr Eric Aubanel,Dr Suprio Ray,Charlie Gracie |
Multiprocessing in Python to exploit Multi-core Hardware |
| Kay Boldt, Arash Habibi Lashkari, Ali A. Ghorbani |
Detection and characterization of multi-layer encryption traffic (VPN through Tor) using AI |
| Rongxing Lu |
AGREE: Efficient and Privacy-preserving Speaker Recognition for Internet of Things |
| Hassan Mahdikhani, Rasoul Shahsavarifar, Rongxing Lu, David Bremner |
Privacy-Preserving Simplicial Depth Query over Outsourced Cloud Platform |
| Rongxing Lu |
A New Communication-Efficient Privacy-Preserving Range Query Scheme in Fog-Enhanced IoT |
| Jason Chang, Rongxing Lu |
Achieving Privacy-Preserving Edit Distance Query in Cloud and Its Application on Genomic Data |
| Son Luong, Rongxing Lu |
A Blockchain-Based Privacy-Preserving Medical Insurance Storage System |
| Yandong Zheng, Rongxing Lu, Xue Yang, Jun Shao |
Achieving Efficient and Privacy-Preserving Top-k Query over Vertically Distributed Data Sources |
| Yandong Zheng, Rongxing Lu, Jun Shao |
Achieving Efficient and Privacy-Preserving k-NN Query for Outsoured eHealthcare Data |
| naNasrin Eshraghi Ivari, Kenneth B. Kent |
Improving the Verilog-to-Routing FPGA CAD flow |
| Scott Young, Kenneth B. Kent |
Verilog Static Loop Unrolling Support in Odin II |
| Britta Sennewald, Arash Habibi Lashkari, Ali A. Ghorbani |
Authorship attribution within different Dark Web forums by using statistical analysis of strings |
| Chenghao Xu, Wei Song |
Intelligent Data Collection and Dissemination Application with Wi-Fi Direct |
| Aaron G. Graham, Jean-Philippe Legault, Maria Patrou, Kenneth B. Kent |
Improved Synthesis and Simulation for FPGAs: ODIN II for VTR 8.0 and Beyond |
| Xichen Zhang, Ali A. Ghorbani |
Human Factors in Cybersecurity: Issues and Challenges in Big Data |
| Xi Tao, Wei Song |
Efficient Path Planning and Truthful Incentive Mechansim Design for Mobile Crowdsensing |
| Haoru Xing, Wei Song |
Collaborative Content Distribution in 5G Mobile Networks with Edge Caching |
| Shlomi linoy, Hassan Mahdikhani, Suprio Ray, Rongxing Lu, Natalia Stakhanova, i Ghorbani |
Scalable Privacy-Preserving Query Processing Over Ethereum Blockchain |
| Ali Hakimi Parizi, Paul Cook |
Evaluating Cross-lingual Sub-word Embeddings |
| Mahdi D. Firoozjaei, Ali A. Ghorbani |
Location Privacy issues with the online Services |
| Vedang Goswami, Scott Bateman |
Artificial Landmarks for Spatial Interfaces |
| Xichen Zhang, Ali A. Ghorbani |
An overview of online fake news: characterization, detection, and discussion |
| Iman Sharafaldin, Ali A. Ghorbani |
A Novel Visual Anomaly Detection Method |
| Kwasi Boakye-Boateng, Arash Habibi Lashkari, Ali A. Ghorbani |
Application of One-Time Pad in Security of Substation Automation Systems |
| Alex Demmings, Kasey Dionne, Connor Wilson, Scott Bateman |
No Contact Navigation: Developing Gesture Sets for Navigational Tasks |
| Aaron Tabor, Scott Bateman, Erik Scheme, m.c. schraefel |
Designing Guided Breathing Technology: Enhancing Cognitive Performance in the Workplace |
| Mohammed Al-Darwbi, Arash Lashkari, Ali Ghorbani |
NetFlowScope: A novel Intrusion Detection Systems |
| Reyhan Pradantyo, Scott Bateman |
What Are Video-Game Baddies? Observing and Evaluating Player Perception on Video-Game Villain Designs |
| Jeremie Boudreau, Ian Sadler, Caleb Smith |
jerbou_etal_poster-sb |
| Nasim Maleki, Ali Ghorbani |
Simulating Phishing Email through Graph Database Models |
| Hamid Azimy, Ali Ghorbani |
Competitive Selfish Bitcoin Mining |
| Samaneh Mahdavifar, Ali A. Ghorbani |
Android Malware Detection Utilizing Translucent Deep Neural Network |