David W. Archer
According to our database1, David W. Archer authored at least 20 papers between 1987 and 2019.
Legend:Book In proceedings Article PhD thesis Other
RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications.
IACR Cryptology ePrint Archive, 2019
From Keys to Databases - Real-World Applications of Secure Multi-Party Computation.
IACR Cryptology ePrint Archive, 2018
Feedback-Guided Anomaly Discovery via Online Optimization.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018
Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018
Detecting Cyberattack Entities from Audit Data via Multi-View Anomaly Detection with Feedback.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018
Maturity and Performance of Programmable Secure Computation.
IEEE Security & Privacy, 2016
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs.
IACR Cryptology ePrint Archive, 2016
Proceedings of the 8th USENIX Workshop on the Theory and Practice of Provenance, 2016
Computing with Data Privacy: Steps toward Realization.
IEEE Security & Privacy, 2015
Diagnosing Advanced Persistent Threats: A Position Paper.
Proceedings of the 26th International Workshop on Principles of Diagnosis (DX-2015) co-located with 9th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes (Safeprocess 2015), Paris, France, August 31, 2015
Application-Scale Secure Multiparty Computation.
Proceedings of the Programming Languages and Systems, 2014
User Trust and Judgments in a Curated Database with Explicit Provenance.
Proceedings of the In Search of Elegance in the Theory and Practice of Computation, 2013
A Conceptual Model and Predicate Language for Data Selection and Projection Based on Provenance.
Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, 2010
Ensemble PDP-8: eight principles for distributed portals.
Proceedings of the 2010 Joint International Conference on Digital Libraries, 2010
Enabling revisitation of fine-grained clinical information.
Proceedings of the ACM International Health Informatics Symposium, 2010
A Framework for Fine-grained Data Integration and Curation, with Provenance, in a Dataspace.
Proceedings of the First Workshop on the Theory and Practice of Provenance, 2009
Definition and Formalization of Entity Resolution Functions for Everyday Information Integration.
Proceedings of the Semantics in Data and Knowledge Bases, Third International Workshop, 2008
Superimposed Information Architecture for Digital Libraries.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2008
Capturing Users' Everyday, Implicit Information Integration Decisions.
Proceedings of the Challenges in Conceptual Modelling. Tutorials, posters, panels and industrial contributions at the 26th International Conference on Conceptual Modeling, 2007
The instruction parsing microarchitecture of the CVAX microprocessor.
Proceedings of the 20st Annual Workshop and Symposium on Microprogramming and Microarchitecture, 1987