متابعة
Julian James Stephen
Julian James Stephen
IBM T.J. Watson Labs
بريد إلكتروني تم التحقق منه على ibm.com
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
From the cloud to the atmosphere: Running MapReduce across data centers
C Jayalath, J Stephen, P Eugster
IEEE transactions on computers 63 (1), 74-87, 2013
1542013
Encyclopedia of cloud computing
S Murugesan, I Bojanova
John Wiley & Sons, 2016
942016
Practical {Confidentiality} Preserving Big Data Analysis
JJ Stephen, S Savvides, R Seidel, P Eugster
6th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 14), 2014
502014
Styx: Stream processing with trustworthy cloud-based execution
JJ Stephen, S Savvides, V Sundaram, MS Ardekani, P Eugster
Proceedings of the Seventh ACM Symposium on Cloud Computing, 348-360, 2016
322016
Program analysis for secure big data processing
J James Stephen, S Savvides, R Seidel, P Eugster
Proceedings of the 29th acm/ieee international conference on automated …, 2014
262014
Universal cross-cloud communication
C Jayalath, J Stephen, P Eugster
IEEE Transactions on Cloud Computing 2 (2), 103-116, 2014
242014
Assured cloud-based data analysis with ClusterBFT
JJ Stephen, P Eugster
ACM/IFIP/USENIX International Conference on Distributed Systems Platforms …, 2013
202013
Selecting from computing nodes for correlating events
DJ Gmach, A AuYoung, R Block, JK Radhakrishnan, S Pramanik, ...
US Patent 10,419,457, 2019
142019
Ensuring confidentiality in the cloud of things
P Eugster, S Kumar, S Savvides, JJ Stephen
IEEE Pervasive Computing 18 (1), 10-18, 2019
142019
Secure data types: A simple abstraction for confidentiality-preserving data analytics
S Savvides, JJ Stephen, MS Ardekani, V Sundaram, P Eugster
Proceedings of the 2017 Symposium on Cloud Computing, 479-492, 2017
132017
Distributed real-time event analysis
JJ Stephen, D Gmach, R Block, A Madan, A AuYoung
2015 IEEE International Conference on Autonomic Computing, 11-20, 2015
132015
Big data analytics beyond the single datacenter
P Eugster, C Jayalath, K Kogan, J Stephen
Computer 50 (6), 60-68, 2017
112017
Identifying sensitive data risks in cloud-based enterprise deployments based on graph analytics
JJ Stephen, TA Habeck, A Natarajan
US Patent 11,727,142, 2023
82023
Atmosphere: A universal cross-cloud communication infrastructure
C Jayalath, JJ Stephen, P Eugster
Middleware 2013: ACM/IFIP/USENIX 14th International Middleware Conference …, 2013
62013
Dependable cloud resources with guardian
B Abusalah, D Schatzlein, JJ Stephen, MS Ardekani, P Eugster
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
52017
Design of an operating system with in-memory kernel
JJ Stephen
2010 International Conference on Recent Trends in Information …, 2010
52010
Changing the way the world works: IBM Research’s “5 in 5”
A Krishna, AI Trustworthy, N Körtge, G Dittmann, S Dragone, PG Kannan, ...
Quantum, 2024
32024
C3PO: Cloud-based Confidentiality-preserving Continuous Query Processing
S Savvides, S Kumar, JJ Stephen, P Eugster
ACM Transactions on Privacy and Security 25 (1), 1-36, 2021
32021
Potential research leads in cryopreservation of fish gametes
CJ Betsy, J Stephen, S Kumar
Int J Res Fish Aquac 4 (3), 108-111, 2014
22014
Identifying sensitive data risks in cloud-based enterprise deployments based on graph analytics
JJ Stephen, TA Habeck, A Natarajan
US Patent 12,229,311, 2025
12025
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20