default search action
David M. Eyers
Person information
- affiliation: University of Otago, Dunedin, New Zealand
- affiliation (PhD 2005): University of Cambridge, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Alistair Knott, Dino Pedreschi, Toshiya Jitsuzumi, Susan Leavy, David M. Eyers, Tapabrata Chakraborti, Andrew Trotman, Sundar Sundareswaran, Ricardo Baeza-Yates, Przemyslaw Biecek, Adrian Weller, Paul D. Teal, Subhadip Basu, Mehmet Haklidir, Virginia Morini, Stuart Russell, Yoshua Bengio:
AI content detection in the emerging information ecosystem: new obligations for media and tech companies. Ethics Inf. Technol. 26(4): 63 (2024) - [j24]Alistair Knott, Dino Pedreschi, Toshiya Jitsuzumi, Susan Leavy, David M. Eyers, Tapabrata Chakraborti, Andrew Trotman, Sundar Sundareswaran, Ricardo Baeza-Yates, Przemyslaw Biecek, Adrian Weller, Paul D. Teal, Subhadip Basu, Mehmet Haklidir, Virginia Morini, Stuart Russell, Yoshua Bengio:
Correction: AI content detection in the emerging information ecosystem: new obligations for media and tech companies. Ethics Inf. Technol. 26(4): 71 (2024) - [j23]Ferruccio Damiani, David M. Eyers, Anna Philippou:
Preface for the special issue on tool papers of the 17th International Federated Conference on Distributed Computing Techniques, DisCoTec 2022. Sci. Comput. Program. 235: 103096 (2024) - [c94]Mahdi Arghavani, Haibo Zhang, David M. Eyers, Abbas Arghavani:
SUSS: Improving TCP Performance by Speeding Up Slow-Start. SIGCOMM 2024: 151-165 - [c93]Avigyan Bhattacharya, Tapabrata Chakraborti, Subhadip Basu, Alistair Knott, Dino Pedreschi, Raja G. Chatila, Susan Leavy, David M. Eyers, Paul D. Teal, Przemyslaw Biecek:
Towards a crowdsourced framework for online hate speech moderation - a case study in the Indian political scenario. WebSci (Companion) 2024: 75-84 - [i9]Soo-Yee Lim, Sidhartha Agrawal, Xueyuan Han, David M. Eyers, Dan O'Keeffe, Thomas Pasquier:
Securing Monolithic Kernels using Compartmentalization. CoRR abs/2404.08716 (2024) - 2023
- [j22]Alistair Knott, Dino Pedreschi, Raja Chatila, Tapabrata Chakraborti, Susan Leavy, Ricardo Baeza-Yates, David M. Eyers, Andrew Trotman, Paul D. Teal, Przemyslaw Biecek, Stuart Russell, Yoshua Bengio:
Generative AI models should include detection mechanisms as a condition for public release. Ethics Inf. Technol. 25(4): 55 (2023) - [c92]Vasily A. Sartakov, Lluís Vilanova, Munir Geden, David M. Eyers, Takahiro Shinagawa, Peter R. Pietzuch:
ORC: Increasing Cloud Memory Density via Object Reuse with Capabilities. OSDI 2023: 573-587 - 2022
- [c91]Pradeesh Parameswaran, Andrew Trotman, Veronica Liesaputra, David M. Eyers:
Reproducibility and Automation of the Appraisal Taxonomy. COLING 2022: 3731-3740 - [c90]Mashal Abbas, Shahpar Khan, Abdul Monum, Fareed Zaffar, Rashid Tahir, David M. Eyers, Hassaan Irshad, Ashish Gehani, Vinod Yegneswaran, Thomas Pasquier:
PACED: Provenance-based Automated Container Escape Detection. IC2E 2022: 261-272 - [c89]Vasily A. Sartakov, Lluís Vilanova, David M. Eyers, Takahiro Shinagawa, Peter R. Pietzuch:
CAP-VMs: Capability-Based Isolation and Sharing in the Cloud. OSDI 2022: 597-612 - [e8]David M. Eyers, Spyros Voulgaris:
Distributed Applications and Interoperable Systems: 22nd IFIP WG 6.1 International Conference, DAIS 2022, Held as Part of the 17th International Federated Conference on Distributed Computing Techniques, DisCoTec 2022, Lucca, Italy, June 13-17, 2022, Proceedings. Lecture Notes in Computer Science 13272, Springer 2022, ISBN 978-3-031-16092-9 [contents] - [i8]Vasily A. Sartakov, Lluís Vilanova, David M. Eyers, Takahiro Shinagawa, Peter R. Pietzuch:
CAP-VMs: Capability-Based Isolation and Sharing for Microservices. CoRR abs/2202.05732 (2022) - 2021
- [j21]Leila Eskandari, Jason Mair, Zhiyi Huang, David M. Eyers:
I-Scheduler: Iterative scheduling for distributed stream processing systems. Future Gener. Comput. Syst. 117: 219-233 (2021) - [j20]Pradeesh Parameswaran, Andrew Trotman, Veronica Liesaputra, David M. Eyers:
Detecting the target of sarcasm is hard: Really?? Inf. Process. Manag. 58(4): 102599 (2021) - [c88]Sophie Zareei, Dave Kelbe, Pascal Sirguey, Steven Mills, David M. Eyers:
Virtual ground control for survey-grade terrain modelling from satellite imagery. IVCNZ 2021: 1-6 - [c87]Vasily A. Sartakov, Daniel O'Keeffe, David M. Eyers, Lluís Vilanova, Peter R. Pietzuch:
Spons & Shields: practical isolation for trusted execution. VEE 2021: 186-200 - [e7]Nigel Stanger, Brendon J. Woodford, Michael Winikoff, David M. Eyers, Veronica Liesaputra Joachim, Daniel Alencar da Costa, Andrew Trotman:
ACSW '21: 2021 Australasian Computer Science Week Multiconference, Dunedin, New Zealand, 1-5 February, 2021. ACM 2021, ISBN 978-1-4503-8956-3 [contents] - [e6]David Bermbach, Everton Cavalcante, Stéphane Delbruel, David M. Eyers:
M4IoT@Middleware 2021: Proceedings of the 8th International Workshop on Middleware and Applications for the Internet of Things, Virtual Event, Canada, December 6 - 10, 2021. ACM 2021, ISBN 978-1-4503-9167-2 [contents] - 2020
- [c86]Dan O'Keeffe, Asma Vranaki, Thomas F. J.-M. Pasquier, David M. Eyers:
Facilitating plausible deniability for cloud providers regarding tenants' activities using trusted execution. IC2E 2020: 59-65 - [c85]Mahdi Arghavani, Haibo Zhang, David M. Eyers, Abbas Arghavani:
StopEG: Detecting when to stop exponential growth in TCP slow-start. LCN 2020: 77-87
2010 – 2019
- 2019
- [j19]Thomas F. J.-M. Pasquier, David M. Eyers, Jean Bacon:
Personal data and the internet of things. Commun. ACM 62(6): 32-34 (2019) - [j18]David M. Eyers, Avigdor Gal, Hans-Arno Jacobsen, Matthias Weidlich:
Introduction to the Special Issue on Integrating Process-oriented and Event-based Systems. Inf. Syst. 81: 179-180 (2019) - [j17]Jason Mair, Zhiyi Huang, David M. Eyers:
Manila: Using a densely populated PMC-space for power modelling within large-scale systems. Parallel Comput. 82: 37-56 (2019) - [c84]Pradeesh Parameswaran, Andrew Trotman, Veronica Liesaputra, David M. Eyers:
Detecting Target of Sarcasm using Ensemble Methods. ALTA 2019: 197-203 - [c83]Luming Wan, David M. Eyers, Haibo Zhang:
Evaluating the Impact of Network Latency on the Safety of Blockchain Transactions. Blockchain 2019: 194-201 - [c82]Mahdi Amiri-Kordestani, David M. Eyers, Zhiyi Huang, Morteza Biglari-Abhari:
TrustZone for Supervised Asymmetric Multiprocessing Systems. PDCAT 2019: 334-339 - [c81]Thomas F. J.-M. Pasquier, David M. Eyers, Margo I. Seltzer:
From Here to Provtopia. Poly/DMAH@VLDB 2019: 54-67 - [i7]Thomas F. J.-M. Pasquier, David M. Eyers, Jean Bacon:
Viewpoint | Personal Data and the Internet of Things: It is time to care about digital provenance. CoRR abs/1904.00156 (2019) - 2018
- [j16]Leila Eskandari, Jason Mair, Zhiyi Huang, David M. Eyers:
T3-Scheduler: A topology and Traffic aware two-level Scheduler for stream processing systems in a heterogeneous cluster. Future Gener. Comput. Syst. 89: 617-632 (2018) - [j15]Xiaolong Shen, Yong Dou, Steven Mills, David M. Eyers, Huan Feng, Zhiyi Huang:
Distributed sparse bundle adjustment algorithm based on three-dimensional point partition and asynchronous communication. Frontiers Inf. Technol. Electron. Eng. 19(7): 889-904 (2018) - [j14]Thomas F. J.-M. Pasquier, Jatinder Singh, Julia E. Powles, David M. Eyers, Margo I. Seltzer, Jean Bacon:
Data provenance to audit compliance with privacy policy in the Internet of Things. Pers. Ubiquitous Comput. 22(2): 333-344 (2018) - [j13]Huan Feng, David M. Eyers, Steven Mills, Yongwei Wu, Zhiyi Huang:
Principal Component Analysis Based Filtering for Scalable, High Precision k-NN Search. IEEE Trans. Computers 67(2): 252-267 (2018) - [c80]Thomas F. J.-M. Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David M. Eyers, Jean Bacon, Margo I. Seltzer:
Runtime Analysis of Whole-System Provenance. CCS 2018: 1601-1616 - [c79]Leila Eskandari, Jason Mair, Zhiyi Huang, David M. Eyers:
Iterative Scheduling for Distributed Stream Processing Systems. DEBS 2018: 234-237 - [c78]Pierre-Louis Aublin, Florian Kelbert, Dan O'Keeffe, Divya Muthukumaran, Christian Priebe, Joshua Lind, Robert Krahn, Christof Fetzer, David M. Eyers, Peter R. Pietzuch:
LibSEAL: revealing service integrity violations using trusted execution. EuroSys 2018: 24:1-24:15 - [e5]Annika Hinze, David M. Eyers, Martin Hirzel, Matthias Weidlich, Sukanya Bhowmik:
Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems, DEBS 2018, Hamilton, New Zealand, June 25-29, 2018. ACM 2018 [contents] - [i6]Thomas F. J.-M. Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David M. Eyers, Jean Bacon, Margo I. Seltzer:
Runtime Analysis of Whole-System Provenance. CoRR abs/1808.06049 (2018) - [i5]David M. Eyers, Christopher Millard, Margo I. Seltzer, Jatinder Singh:
Towards Accountable Systems (Dagstuhl Seminar 18181). Dagstuhl Reports 8(4): 126-163 (2018) - 2017
- [j12]Thomas F. J.-M. Pasquier, Jatinder Singh, David M. Eyers, Jean Bacon:
Camflow: Managed Data-Sharing for Cloud Services. IEEE Trans. Cloud Comput. 5(3): 472-484 (2017) - [c77]Thomas F. J.-M. Pasquier, Xueyuan Han, Mark Goldstein, Thomas Moyer, David M. Eyers, Margo I. Seltzer, Jean Bacon:
Practical whole-system provenance capture. SoCC 2017: 405-418 - [c76]Leila Eskandari, Jason Mair, Zhiyi Huang, David M. Eyers:
A Topology and Traffic Aware Two-Level Scheduler for Stream Processing Systems in a Heterogeneous Cluster. Euro-Par Workshops 2017: 68-79 - [c75]Thomas F. J.-M. Pasquier, David M. Eyers, Jean Bacon:
PHP2Uni: Building Unikernels Using Scripting Language Transpilation. IC2E 2017: 197-203 - [c74]Rahul Chini Dwarakanath, Boris Koldehofe, Yashas Bharadwaj, The An Binh Nguyen, David M. Eyers, Ralf Steinmetz:
TrustCEP: Adopting a Trust-Based Approach for Distributed Complex Event Processing. MDM 2017: 30-39 - [c73]Joshua Lind, Christian Priebe, Divya Muthukumaran, Dan O'Keeffe, Pierre-Louis Aublin, Florian Kelbert, Tobias Reiher, David Goltzsche, David M. Eyers, Rüdiger Kapitza, Christof Fetzer, Peter R. Pietzuch:
Glamdring: Automatic Application Partitioning for Intel SGX. USENIX ATC 2017: 285-298 - [e4]Thaís Vasconcelos Batista, Stéphane Delbruel, David Bermbach, David M. Eyers, Danny Hughes, Chantal Taconet, Erik Wittern:
Proceedings of the 4th Workshop on Middleware and Applications for the Internet of Things, M4IoT@Middleware 2017, Las Vegas, NV, USA, December 11, 2017. ACM 2017, ISBN 978-1-4503-5170-6 [contents] - [i4]Thomas F. J.-M. Pasquier, Xueyuan Han, Mark Goldstein, Thomas Moyer, David M. Eyers, Margo I. Seltzer, Jean Bacon:
Practical Whole-System Provenance Capture. CoRR abs/1711.05296 (2017) - [i3]Matthew McKague, David M. Eyers:
Anonymous contribution of data. IACR Cryptol. ePrint Arch. 2017: 44 (2017) - 2016
- [j11]Jatinder Singh, Thomas F. J.-M. Pasquier, Jean Bacon, Hajoon Ko, David M. Eyers:
Twenty Security Considerations for Cloud-Supported Internet of Things. IEEE Internet Things J. 3(3): 269-284 (2016) - [j10]Yuelong Li, Jigang Wu, Yawen Chen, Jason Mair, David M. Eyers, Zhiyi Huang:
Power Neighboring Interval Matching Based PMC Integration. J. Circuits Syst. Comput. 25(8): 1650086:1-1650086:17 (2016) - [c72]Leila Eskandari, Zhiyi Huang, David M. Eyers:
P-Scheduler: adaptive hierarchical scheduling in apache storm. ACSW 2016: 26 - [c71]Thomas F. J.-M. Pasquier, Jatinder Singh, Jean Bacon, David M. Eyers:
Information Flow Audit for PaaS Clouds. IC2E 2016: 42-51 - [c70]Thomas F. J.-M. Pasquier, David M. Eyers:
Information Flow Audit for Transparency and Compliance in the Handling of Personal Data. IC2E Workshops 2016: 112-117 - [c69]Huan Feng, David M. Eyers, Steven Mills, Yongwei Wu, Zhiyi Huang:
PCAF: Scalable, High Precision k-NN Search Using Principal Component Analysis Based Filtering. ICPP 2016: 638-647 - [c68]Jason Mair, Zhiyi Huang, David M. Eyers:
Manila: Using a Densely Populated PMC-Space for Power Modelling within Large-Scale Systems. ICPP Workshops 2016: 210-219 - [c67]Hajoon Ko, Jatinder Singh, Thomas F. J.-M. Pasquier, Changyu Dong, David M. Eyers, Jean Bacon:
Information Flow Control with Minimal Tag Disclosure. ICC 2016 2016: 17:1-17:4 - [c66]Lahiru Ariyasinghe, Zhiyi Huang, Haibo Zhang, David M. Eyers:
VPAP: VBR Pattern Aware Playback Buffering for video streaming. ITNAC 2016: 53-58 - [c65]Jatinder Singh, Thomas F. J.-M. Pasquier, Jean Bacon, Julia E. Powles, Raluca Diaconu, David M. Eyers:
Big ideas paper: Policy-driven middleware for a legally-compliant Internet of Things. Middleware 2016: 13 - [c64]Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, André Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'Keeffe, Mark Stillwell, David Goltzsche, David M. Eyers, Rüdiger Kapitza, Peter R. Pietzuch, Christof Fetzer:
SCONE: Secure Linux Containers with Intel SGX. OSDI 2016: 689-703 - [c63]Thomas F. J.-M. Pasquier, Jean Bacon, Jatinder Singh, David M. Eyers:
Data-Centric Access Control for Cloud Computing. SACMAT 2016: 81-88 - [i2]David M. Eyers, Avigdor Gal, Hans-Arno Jacobsen, Matthias Weidlich:
Integrating Process-Oriented and Event-Based Systems (Dagstuhl Seminar 16341). Dagstuhl Reports 6(8): 21-64 (2016) - 2015
- [j9]Xiaoxin Tang, Zhiyi Huang, David M. Eyers, Steven Mills, Minyi Guo:
Scalable Multicore k-NN Search via Subspace Clustering for Filtering. IEEE Trans. Parallel Distributed Syst. 26(12): 3449-3460 (2015) - [c62]Matt Crane, Andrew Trotman, David M. Eyers:
Improving Throughput of a Pipeline Model Indexer. ADCS 2015: 2:1-2:4 - [c61]Jason Mair, Zhiyi Huang, David M. Eyers, Yawen Chen:
Quantifying the Energy Efficiency Challenges of Achieving Exascale Computing. CCGRID 2015: 943-950 - [c60]Divya Muthukumaran, Dan O'Keeffe, Christian Priebe, David M. Eyers, Brian Shand, Peter R. Pietzuch:
FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications. CCS 2015: 603-615 - [c59]Jatinder Singh, Thomas F. J.-M. Pasquier, Jean Bacon, David M. Eyers:
Integrating Messaging Middleware and Information Flow Control. IC2E 2015: 54-59 - [c58]A. S. M. Ashraful Alam, David M. Eyers, Zhiyi Huang:
Helping secure robots in WSN environments by monitoring WSN software updates for intrusions. ICARA 2015: 223-229 - [c57]Yawen Chen, Jason Mair, Zhiyi Huang, David M. Eyers, Haibo Zhang:
A State-Based Energy/Performance Model for Parallel Applications on Multicore Computers. ICPP Workshops 2015: 230-239 - [c56]Xiaoxin Tang, Zhiyi Huang, David M. Eyers, Steven Mills, Minyi Guo:
Efficient Selection Algorithm for Fast k-NN Search on GPUs. IPDPS 2015: 397-406 - [c55]Huan Feng, Steven Mills, David M. Eyers, Xiaolong Shen, Zhiyi Huang:
Optimal space subdivision for parallel approximate nearest neighbour determination. IVCNZ 2015: 1-6 - [i1]Thomas F. J.-M. Pasquier, Jatinder Singh, David M. Eyers, Jean Bacon:
CamFlow: Managed Data-sharing for Cloud Services. CoRR abs/1506.04391 (2015) - 2014
- [j8]Jason Mair, David M. Eyers, Zhiyi Huang, Haibo Zhang:
Myths in power estimation with Performance Monitoring Counters. Sustain. Comput. Informatics Syst. 4(2): 83-93 (2014) - [j7]Jean Bacon, David M. Eyers, Thomas F. J.-M. Pasquier, Jatinder Singh, Ioannis Papagiannis, Peter R. Pietzuch:
Information Flow Control for Secure Cloud Computing. IEEE Trans. Netw. Serv. Manag. 11(1): 76-89 (2014) - [c54]Christian Priebe, Divya Muthukumaran, Dan O'Keeffe, David M. Eyers, Brian Shand, Rüdiger Kapitza, Peter R. Pietzuch:
CloudSafetyNet: Detecting Data Leakage between Cloud Tenants. CCSW 2014: 117-128 - [c53]Thomas F. J.-M. Pasquier, Jean Bacon, David M. Eyers:
FlowK: Information Flow Control for the Cloud. CloudCom 2014: 70-77 - [c52]Jatinder Singh, Jean Bacon, David M. Eyers:
Policy enforcement within emerging distributed, event-based systems. DEBS 2014: 246-255 - [c51]Xiaoxin Tang, Steven Mills, David M. Eyers, Kai-Cheung Leung, Zhiyi Huang, Minyi Guo:
Data filtering for scalable high-dimensional k-NN search on multicore systems. HPDC 2014: 305-310 - [c50]Jason Mair, Zhiyi Huang, David M. Eyers, Haibo Zhang:
PMC-Based Power Modelling with Workload Classification on Multicore Systems. ICPP Workshops 2014: 129-138 - [c49]Campbell Young, David M. Eyers, Steven Mills:
Parallel and Distributed Mosaic Seamline Estimation. IVCNZ 2014: 37 - [c48]Sebastian Frischbier, Erman Turan, Michael Gesmann, Alessandro Margara, David M. Eyers, Patrick Th. Eugster, Peter R. Pietzuch, Alejandro P. Buchmann:
Effective Runtime Monitoring of Distributed Event-Based Enterprise Systems with ASIA. SOCA 2014: 41-48 - 2013
- [c47]Sebastian Frischbier, Alessandro Margara, Tobias Freudenreich, Patrick Eugster, David M. Eyers, Peter R. Pietzuch:
Aggregation for implicit invocations. AOSD 2013: 109-120 - [c46]Jason Mair, Zhiyi Huang, David M. Eyers, Haibo Zhang:
Myths in PMC-Based Power Estimation. EE-LSDS 2013: 35-50 - [c45]David M. Eyers, Giovanni Russello:
Toward Unified and Flexible Security Policies Enforceable within the Cloud. DAIS 2013: 181-186 - [c44]David Evans, David M. Eyers:
Poster: Converging runtime and historic detection of areas of congestion within an urban bus network. DEBS 2013: 345-346 - [c43]Xiaoxin Tang, Steven Mills, David M. Eyers, Kai-Cheung Leung, Zhiyi Huang, Minyi Guo:
Performance Bottlenecks in Manycore Systems: A Case Study on Large Scale Feature Matching within Image Collections. HPCC/EUC 2013: 985-995 - [c42]Xiaoxin Tang, Steven Mills, David M. Eyers, Zhiyi Huang, Kai-Cheung Leung, Minyi Guo:
Performance Tuning on Multicore Systems for Feature Matching within Image Collections. ICPP 2013: 718-727 - [c41]Kai-Cheung Leung, David M. Eyers, Xiaoxin Tang, Steven Mills, Zhiyi Huang:
Investigating large-scale feature matching using the Intel® Xeon Phi™ coprocessor. IVCNZ 2013: 148-153 - [c40]Steven Mills, David M. Eyers, Kai-Cheung Leung, Xiaoxin Tang, Zhiyi Huang:
Large-scale feature matching with distributed and heterogeneous computing. IVCNZ 2013: 208-213 - [e3]David M. Eyers, Karsten Schwan:
Middleware 2013 - ACM/IFIP/USENIX 14th International Middleware Conference, Beijing, China, December 9-13, 2013, Proceedings. Lecture Notes in Computer Science 8275, Springer 2013, ISBN 978-3-642-45064-8 [contents] - 2012
- [c39]David Evans, David M. Eyers, Jean Bacon:
A model of information flow control to determine whether malfunctions cause the privacy invasion. MPM@EuroSys 2012: 2:1-2:6 - [c38]David M. Eyers, Tobias Freudenreich, Alessandro Margara, Sebastian Frischbier, Peter R. Pietzuch, Patrick Eugster:
Living in the present: on-the-fly information processing in scalable web architectures. CloudCP@EuroSys 2012: 6:1-6:6 - [c37]David Evans, David M. Eyers:
Efficient Data Tagging for Managing Privacy in the Internet of Things. GreenCom 2012: 244-248 - 2011
- [j6]David M. Eyers, Ramani Routray, Rui Zhang, Douglas Willcocks, Peter R. Pietzuch:
Configuring large-scale storage using a middleware with machine learning. Concurr. Comput. Pract. Exp. 23(17): 2063-2077 (2011) - [c36]Rui Zhang, Ramani Routray, David M. Eyers, David D. Chambliss, Prasenjit Sarkar, Douglas Willcocks, Peter R. Pietzuch:
IO Tetris: Deep Storage Consolidation for the Cloud via Fine-Grained Workload Analysis. IEEE CLOUD 2011: 700-707 - [c35]Jatinder Singh, David M. Eyers, Jean Bacon:
Disclosure control in multi-domain publish/subscribe systems. DEBS 2011: 159-170 - [c34]Petr Hosek, Matteo Migliavacca, Ioannis Papagiannis, David M. Eyers, David Evans, Brian Shand, Jean Bacon, Peter R. Pietzuch:
SafeWeb: A Middleware for Securing Ruby-Based Web Applications. Middleware 2011: 491-511 - [c33]Bhaskar Ashoka, David M. Eyers, Zhiyi Huang:
Handover Delay in Mobile WiMAX: A Simulation Study. PDCAT 2011: 305-312 - [e2]David M. Eyers, Opher Etzion, Avigdor Gal, Stanley B. Zdonik, Paul Vincent:
Proceedings of the Fifth ACM International Conference on Distributed Event-Based Systems, DEBS 2011, New York, NY, USA, July 11-15, 2011. ACM 2011, ISBN 978-1-4503-0423-8 [contents] - [e1]David M. Eyers:
Proceedings of the 8th Middleware Doctoral Symposium of the 12th ACM/IFIP/USENIX International Middleware Conference, Lisbon, Portugal, 12 December 2011. ACM 2011, ISBN 978-1-4503-1072-7 [contents] - 2010
- [c32]David M. Eyers, Luis Vargas, Jatinder Singh, Ken Moody, Jean Bacon:
Relational database support for event-based middleware functionality. DEBS 2010: 160-171 - [c31]Jean Bacon, David Evans, David M. Eyers, Matteo Migliavacca, Peter R. Pietzuch, Brian Shand:
Enforcing End-to-End Application Security in the Cloud - (Big Ideas Paper). Middleware 2010: 293-312 - [c30]Matteo Migliavacca, Ioannis Papagiannis, David M. Eyers, Brian Shand, Jean Bacon, Peter R. Pietzuch:
Distributed Middleware Enforcement of Event Flow Security Policy. Middleware 2010: 334-354 - [c29]Ramani Routray, Rui Zhang, David M. Eyers, Douglas Willcocks, Peter R. Pietzuch, Prasenjit Sarkar:
Policy Generation Framework for Large-Scale Storage Infrastructures. POLICY 2010: 65-72 - [c28]David Evans, David M. Eyers, Jean Bacon:
Linking Policies to the Spatial Environment. POLICY 2010: 73-76 - [c27]David Evans, David M. Eyers:
Efficient Policy Checking across Administrative Domains. POLICY 2010: 146-153 - [c26]Matteo Migliavacca, Ioannis Papagiannis, David M. Eyers, Brian Shand, Jean Bacon, Peter R. Pietzuch:
DEFCON: High-Performance Event Processing with Information Security. USENIX ATC 2010 - [p1]Jean Bacon, David M. Eyers, Jatinder Singh:
Securing Event-Based Systems. Principles and Applications of Distributed Event-Based Systems 2010: 119-139
2000 – 2009
- 2009
- [j5]Steven O. Kimbrough, Alan S. Abrahams, Andrew J. I. Jones, David M. Eyers, Jean Bacon:
Introducing the fair and logical trade project. Int. J. Bus. Process. Integr. Manag. 4(3): 174-186 (2009) - [j4]Alan S. Abrahams, David M. Eyers, Jean Bacon:
Structured storage of legal precedents using a minimal deontic ontology, for computer assisted legal document querying. Int. J. Metadata Semant. Ontologies 4(3): 196-211 (2009) - [j3]Jean Bacon, David M. Eyers, Jatinder Singh, Brian Shand, Matteo Migliavacca, Peter R. Pietzuch:
Security in Multi-domain Event-based Systems (Sicherheit in ereignis-basierten Mehrdomänensystemen). it Inf. Technol. 51(5): 277-284 (2009) - [c25]Ioannis Papagiannis, Matteo Migliavacca, Peter R. Pietzuch, Brian Shand, David M. Eyers, Jean Bacon:
PrivateFlow: decentralised information flow control in event based middleware. DEBS 2009 - [c24]David M. Eyers, Ramani Routray, Rui Zhang, Douglas Willcocks, Peter R. Pietzuch:
Towards a middleware for configuring large-scale storage infrastructures. MGC@Middleware 2009: 3 - [c23]David M. Eyers, Ben Roberts, Jean Bacon, Ioannis Papagiannis, Matteo Migliavacca, Peter R. Pietzuch, Brian Shand:
Event-processing middleware with information flow control. Middleware (Companion) 2009: 32 - 2008
- [c22]Jean Bacon, David M. Eyers, Jatinder Singh, Peter R. Pietzuch:
Access control in publish/subscribe systems. DEBS 2008: 23-34 - [c21]David Evans, David M. Eyers:
Deontic logic for modelling data flow and use compliance. MPAC 2008: 19-24 - [c20]Jatinder Singh, David M. Eyers, Jean Bacon:
Controlling historical information dissemination in publish/subscribe. Middleware Security 2008: 34-39 - [c19]Jatinder Singh, David M. Eyers, Jean Bacon:
Credential management in event-driven healthcare systems. Middleware (Companion) 2008: 48-53 - [c18]David M. Eyers, Sriram Srinivasan, Ken Moody, Jean Bacon:
Compile-Time Enforcement of Dynamic Security Policies. POLICY 2008: 119-126 - [c17]David M. Eyers, Andrew J. I. Jones, Steven O. Kimbrough:
On Logic and Standards for Structuring Documents. WEB 2008: 172-186 - 2007
- [j2]Lauri I. W. Pesonen, David M. Eyers, Jean Bacon:
Access Control in Decentralised Publish/Subscribe Systems. J. Networks 2(2): 57-67 (2007) - [c16]Lauri I. W. Pesonen, David M. Eyers, Jean Bacon:
Encryption-enforced access control in dynamic multi-domain publish/subscribe networks. DEBS 2007: 104-115 - [c15]Peter R. Pietzuch, David M. Eyers, Samuel Kounev, Brian Shand:
Towards a common API for publish/subscribe. DEBS 2007: 152-157 - 2006
- [j1]David M. Eyers, Jean Bacon, Ken Moody:
OASIS role-based access control for electronic health records. IEE Proc. Softw. 153(1): 16-23 (2006) - [c14]Lauri I. W. Pesonen, David M. Eyers, Jean Bacon:
A Capability-Based Access Control Architecture for Multi-Domain Publish/Subscribe Systems. SAINT 2006: 222-228 - 2005
- [b1]David Michael Eyers:
Active privilege management for distributed access control systems. University of Cambridge, UK, 2005 - [c13]Jean Bacon, David M. Eyers, Ken Moody, Lauri I. W. Pesonen:
Securing Publish/Subscribe for Multi-domain Systems. Middleware 2005: 1-20 - 2004
- [c12]András Belokosztolszki, Ken Moody, David M. Eyers:
A Formal Model for Hierarchical Policy Contexts. POLICY 2004: 127-136 - [c11]Steve Neely, Helen Lowe, David M. Eyers, Jean Bacon, Julian Newman, Xiaofeng Gong:
An architecture for supporting vicarious learning in a distributed environment. SAC 2004: 963-970 - [c10]Nathan Dimmock, András Belokosztolszki, David M. Eyers, Jean Bacon, Ken Moody:
Using trust and risk in role-based access control policies. SACMAT 2004: 156-162 - 2003
- [c9]David M. Eyers:
'Ambiguous Live' - Exploring Collaborative, Dynamic Control of MIDI Sequencers. CMMR 2003: 54-63 - [c8]András Belokosztolszki, David M. Eyers, Peter R. Pietzuch, Jean Bacon, Ken Moody:
Role-based access control for publish/subscribe middleware architectures. DEBS 2003 - [c7]David M. Eyers, Ken Moody:
Credential negotiation with limited disclosure via iterative range refinement in an unordered space. DEXA Workshops 2003: 427-431 - [c6]András Belokosztolszki, David M. Eyers, Ken Moody:
Policy Contexts: Controlling Information Flow in Parameterised RBAC. POLICY 2003: 99-110 - [c5]András Belokosztolszki, David M. Eyers, Wei Wang, Ken Moody:
Policy Storage for Role-Based Access Control Systems. WETICE 2003: 196-201 - 2002
- [c4]David M. Eyers, John Shepherd, Raymond K. Wong:
PoX: Merging Prolog and XML databases. ADCS 2002 - [c3]András Belokosztolszki, David M. Eyers:
Shielding RBAC Infrastructures from Cyberterrorism. DBSec 2002: 3-14 - [c2]Alan S. Abrahams, David M. Eyers, Jean Bacon:
An asynchronous rule-based approach for business process automation using obligations. ACM SIGPLAN Workshop on Rule-Based Programming 2002: 93-103 - [c1]Alan S. Abrahams, David M. Eyers, Jean Bacon:
A Coverage-Determination Mechanism for Checking Business Contracts against Organizational Policies. TES 2002: 97-106
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint