David W. Archer

According to our database1, David W. Archer authored at least 20 papers between 1987 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications.
IACR Cryptology ePrint Archive, 2019

From Keys to Databases - Real-World Applications of Secure Multi-Party Computation.
IACR Cryptology ePrint Archive, 2018

Feedback-Guided Anomaly Discovery via Online Optimization.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

Detecting Cyberattack Entities from Audit Data via Multi-View Anomaly Detection with Feedback.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Maturity and Performance of Programmable Secure Computation.
IEEE Security & Privacy, 2016

5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs.
IACR Cryptology ePrint Archive, 2016

Provenance Segmentation.
Proceedings of the 8th USENIX Workshop on the Theory and Practice of Provenance, 2016

Computing with Data Privacy: Steps toward Realization.
IEEE Security & Privacy, 2015

Diagnosing Advanced Persistent Threats: A Position Paper.
Proceedings of the 26th International Workshop on Principles of Diagnosis (DX-2015) co-located with 9th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes (Safeprocess 2015), Paris, France, August 31, 2015

Application-Scale Secure Multiparty Computation.
Proceedings of the Programming Languages and Systems, 2014

User Trust and Judgments in a Curated Database with Explicit Provenance.
Proceedings of the In Search of Elegance in the Theory and Practice of Computation, 2013

A Conceptual Model and Predicate Language for Data Selection and Projection Based on Provenance.
Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, 2010

Ensemble PDP-8: eight principles for distributed portals.
Proceedings of the 2010 Joint International Conference on Digital Libraries, 2010

Enabling revisitation of fine-grained clinical information.
Proceedings of the ACM International Health Informatics Symposium, 2010

A Framework for Fine-grained Data Integration and Curation, with Provenance, in a Dataspace.
Proceedings of the First Workshop on the Theory and Practice of Provenance, 2009

Definition and Formalization of Entity Resolution Functions for Everyday Information Integration.
Proceedings of the Semantics in Data and Knowledge Bases, Third International Workshop, 2008

Superimposed Information Architecture for Digital Libraries.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2008

Capturing Users' Everyday, Implicit Information Integration Decisions.
Proceedings of the Challenges in Conceptual Modelling. Tutorials, posters, panels and industrial contributions at the 26th International Conference on Conceptual Modeling, 2007

The instruction parsing microarchitecture of the CVAX microprocessor.
Proceedings of the 20st Annual Workshop and Symposium on Microprogramming and Microarchitecture, 1987