Author of the publication

Edgelet Computing: Pushing Query Processing and Liability at the Extreme Edge of the Network.

, , , and . CCGRID, page 160-169. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chip-Secured Data Access: Confidential Data on Untrusted Servers., and . VLDB, page 131-142. Morgan Kaufmann, (2002)PicoDBMS: Scaling Down Database Technique for the Smartcard., , , and . BDA, (2000)Key Exchange Protocol in the Trusted Data Servers Context., , and . CoRR, (2015)Object Query Services for Telecommunication Networks., , and . EDBT, volume 1057 of Lecture Notes in Computer Science, page 490-493. Springer, (1996)Dictatorial Transaction Processing: Atomic Commitment Without Veto Right., , and . Distributed Parallel Databases, 11 (3): 239-268 (2002)Personal Data Management Systems: The security and functionality standpoint., , , , , , and . Inf. Syst., (2019)Géode: un gestionnaire d'objets extensible orienté grande mémoire., , and . BDA, page 267-284. INRIA, (1988)TrustedMR: A Trusted MapReduce System Based on Tamper Resistance Hardware., , and . OTM Conferences, volume 9415 of Lecture Notes in Computer Science, page 38-56. Springer, (2015)Database Graph Views: A Practical Model to Manage Persistent Graphs., , , and . BDA, INRIA, (1994)A Non-Blocking Single-Phase Commit Protocol for Rigorous Participants., and . BDA, (1997)