Ellick Chan

According to our database1, Ellick Chan authored at least 23 papers between 2004 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Does Form Follow Function? An Empirical Exploration of the Impact of Deep Neural Network Architecture Design on Hardware-Specific Acceleration.
CoRR, 2021

2019
Machine: The New Art Connoisseur.
CoRR, 2019

2018
Collaborative Perception for Automated Vehicles Leveraging Vehicle-to-Vehicle Communications.
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018

2013
Distributed security policy conformance.
Comput. Secur., 2013

Understanding the Challenges with Medical Data Segmentation for Privacy.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013

2012
Tracking Rootkit Footprints with a Practical Memory Analysis System.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

2011
A framework for live forensics
PhD thesis, 2011

Characterizing Data Structures for Volatile Forensics.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

2010
Forenscope: a framework for live forensics.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
An Automatic User Study Demo in Indoor Environments and Its Privacy Implications.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

MITHRA: Multiple data independent tasks on a heterogeneous resource architecture.
Proceedings of the 2009 IEEE International Conference on Cluster Computing, August 31, 2009

2008
Cloaker: Hardware Supported Rootkit Concealment.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

A Parallel Implementation of K-Means Clustering on GPUs.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2008

CuriOS: Improving Reliability through Operating System Structure.
Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, 2008

Using rhythmic nonces for puzzle-based DoS resistance.
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, 2008

BootJacker: compromising computers using forced restarts.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Supporting Adaptive Application Mobility.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

iKernel: Isolating Buggy and Malicious Device Drivers Using Hardware Virtualization Support.
Proceedings of the Third IEEE International Symposium on Dependable, 2007

2006
Exception Handling in the Choices Operating System.
Proceedings of the Advanced Topics in Exception Handling Techniques (the book grow out of ECOOP workshops), 2006

2005
Applying Active Space Principles to Active Classrooms.
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 2005

Gaia Microserver: An Extendable Mobile Middleware Platform.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

eFuzion: development of a pervasive educational system.
Proceedings of the 10th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2005

2004
Expanding Education through Active Space Collaboration.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004


  Loading...