Hugues Mercier

Orcid: 0000-0001-9348-4515

According to our database1, Hugues Mercier authored at least 35 papers between 2005 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Fair and Efficient Gossip in Hyperledger Fabric.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

FaultSee: Reproducible Fault Injection in Distributed Systems.
Proceedings of the 16th European Dependable Computing Conference, 2020

2019
Blockchain-Based Metadata Protection for Archival Systems.
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019

Convolutional LPDC codes for Distributed Storage Systems.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Trust and Privacy in Development of Publish/Subscribe Systems.
Proceedings of the Information Systems Development: Information Systems Beyond 2020, 2019

From Confidential kNN Queries to Confidential Content-based Publish/Subscribe.
Proceedings of the 14th International Conference on Software Technologies, 2019

2018
STeP-Archival: Storage Integrity and Tamper Resistance Using Data Entanglement.
IEEE Trans. Inf. Theory, 2018

Mind the Gap: Autonomous Detection of Partitioned MANET Systems using Opportunistic Aggregation.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018

RECAST: Random Entanglement for Censorship-Resistant Archival STorage.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

SGX-FS: Hardening a File System in User-Space with Intel SGX.
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018

2017
Optimal epidemic dissemination.
CoRR, 2017

SafeFS: a modular architecture for secure user-space file systems: one FUSE to rule them all.
Proceedings of the 10th ACM International Systems and Storage Conference, 2017

Brief Announcement: Optimal Address-Oblivious Epidemic Dissemination.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017

Worst-case, information and all-blocks locality in distributed storage systems: an explicit comparison.
Proceedings of the 15th Canadian Workshop on Information Theory, 2017

2016
Confidentiality-Preserving Publish/Subscribe: A Survey.
ACM Comput. Surv., 2016

Have a Seat on the ErasureBench: Easy Evaluation of Erasure Coding Libraries for Distributed Storage Systems.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems Workshops, 2016

On the Cost of Safe Storage for Public Clouds: An Experimental Evaluation.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

Reliability-bandwidth tradeoffs for distributed storage allocations.
Proceedings of the IEEE International Symposium on Information Theory, 2016

A Performance Evaluation of Erasure Coding Libraries for Cloud-Based Data Stores - (Practical Experience Report).
Proceedings of the Distributed Applications and Interoperable Systems, 2016

2015
Efficient Key Updates through Subscription Re-encryption for Privacy-Preserving Publish/Subscribe.
Proceedings of the 16th Annual Middleware Conference, Vancouver, BC, Canada, December 07, 2015

EpTO: An Epidemic Total Order Algorithm for Large-Scale Distributed Systems.
Proceedings of the 16th Annual Middleware Conference, Vancouver, BC, Canada, December 07, 2015

STEP-archival: Storage integrity and anti-tampering using data entanglement.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Efficient and Confidentiality-Preserving Content-Based Publish/Subscribe with Prefiltering.
IEEE Transactions on Dependable and Secure Computing, 2015

2014
Low complexity decoding of variable length source-channel codes.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
Performance/Security Tradeoffs for Content-Based Routing Supported by Bloom Filters.
Proceedings of the Structural Information and Communication Complexity, 2013

2012
Bounds on the Capacity of Discrete Memoryless Channels Corrupted by Synchronization and Substitution Errors.
IEEE Trans. Inf. Theory, 2012

Infrastructure Provisioning for Scalable Content-Based Routing: Framework and Analysis.
Proceedings of the 11th IEEE International Symposium on Network Computing and Applications, 2012

Thrifty privacy: efficient support for privacy-preserving publish/subscribe.
Proceedings of the Sixth ACM International Conference on Distributed Event-Based Systems, 2012

2011
Tight Capacity Bounds for Discrete Memoryless Channels with Synchronization Errors, Additive Noise, and Large Alphabets.
Proceedings of IEEE International Conference on Communications, 2011

2010
A survey of error-correcting codes for channels with symbol synchronization errors.
IEEE Commun. Surv. Tutorials, 2010

2009
Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks.
IEEE Trans. Wirel. Commun., 2009

2008
Worst Case Nonzero-Error Interactive Communication.
IEEE Trans. Inf. Theory, 2008

On the Number of Subsequences When Deleting Symbols From a String.
IEEE Trans. Inf. Theory, 2008

2006
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Worst-case randomized interactive communication.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005


  Loading...