Author of the publication

Towards Trusted Result Verification in Mass Data Processing Service.

, , , , and . IEICE Trans. Commun., 97-B (1): 19-28 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Approach for Untrusted Code Execution., , and . ICICS, volume 4861 of Lecture Notes in Computer Science, page 398-411. Springer, (2007)JCDTA: The Data Trading Archtecture Design in JointCloud Computing., , , , , and . ICPADS, page 1063-1068. IEEE, (2018)Policy Based Self-Adaptive Scheme in Pervasive Computing., , , , and . Wirel. Sens. Netw., 1 (1): 48-55 (2009)Towards High Performance and High Availability Clusters of Archived Stream., , , and . APWeb/WAIM, volume 4505 of Lecture Notes in Computer Science, page 876-883. Springer, (2007)A Exploratory Study of @-Mention in GitHub's Pull-Requests., , , and . APSEC (1), page 343-350. IEEE Computer Society, (2014)Harnessing the crowd wisdom for software trustworthiness.. ACM SIGSOFT Softw. Eng. Notes, 43 (1): 1-6 (2018)Triply Stochastic Gradients on Multiple Kernel Learning., , , , and . UAI, AUAI Press, (2017)Exploring the Relationship Between Developer Activities and Profile Images on GitHub., , , and . Internetware, page 7:1-7:10. ACM, (2019)A supervised approach for tag hierarchy construction in open source communities., , , , and . Internetware, page 148-152. ACM, (2015)Exploring the Use of @-mention to Assist Software Development in GitHub., , , , and . Internetware, page 83-92. ACM, (2015)