From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Survey of State Management in Big Data Processing Systems., , и . CoRR, (2017)SQL/AA: Executing SQL on an Asymmetric Architecture., , и . Proc. VLDB Endow., 7 (13): 1625-1628 (2014)TrustedMR: A Trusted MapReduce System Based on Tamper Resistance Hardware., , и . OTM Conferences, том 9415 из Lecture Notes in Computer Science, стр. 38-56. Springer, (2015)Key Exchange Protocol in the Trusted Data Servers Context., , и . CoRR, (2015)OST-Tree: An Access Method for Obfuscating Spatio-Temporal Data in Location Based Services., , и . NTMS, стр. 1-5. IEEE, (2011)Privacy-Preserving Query Execution using Tamper Resistant Hardware. Design and Performance Considerations. (Exécution de requêtes respectueuses de la vie privée grâce à l'utilisation de matériel sécurisé).. Versailles Saint-Quentin-en-Yvelines University, France, (2015)Bob-Tree: An Efficient B + -Tree Based Index Structure for Geographic-Aware Obfuscation., , и . ACIIDS (1), том 6591 из Lecture Notes in Computer Science, стр. 109-118. Springer, (2011)Exécution sécurisée de requêtes avec agrégats sur des données distribuées., , и . Ingénierie des Systèmes d Inf., 19 (4): 118-143 (2014)Privacy-Preserving Query Execution using a Decentralized Architecture and Tamper Resistant Hardware., , и . EDBT, стр. 487-498. OpenProceedings.org, (2014)