Computing on encrypted data and its applicability to a coalition operations environmentGraham BentFlavio Bergamaschiet al.2015SPIE Defense + Security 2015
An Efficient Method for Reliability Evaluation of Data Storage SystemsIlias IliadisVinodh Venkatesan2015CTRQ 2015
Host Trait Prediction of Metagenomic Data for Topology-Based VisualizationLaxmi ParidaNiina Haiminenet al.2015ICDCIT 2015
Stream as you go: The case for incremental data access and processing in the cloudRomeo KienzlerRémy Bruggmannet al.2012ICDE 2012
Towards a Homomorphic Machine Learning Big Data Pipeline for the Financial Services SectorOliver MastersHamish Huntet al.2020RWC 2020
SysFlow: Scalable System Telemetry for Improved Security AnalyticsFred AraujoTeryl Taylor2020FloCon 2020
An easy-plane anisotropy dominant stochastic magnetic tunnel junction as a circuit entropy sourceJonathan Sun2024INTERMAG 2024
Unleashing the Power of DRA (Dynamic Resource Allocation) for Just-in-Time GPU SlicingAbhishek MalvankarOlivier Tardieu2024KubeCon EU 2024
Zero Trust Hardware Architectures: when we “never trust”, what can we do to “always verify?”Mengmei YeSandhya Koteshwara2022WISE 2022