Hugues Mercier

According to our database1, Hugues Mercier
  • authored at least 22 papers between 2006 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Efficient and Confidentiality-Preserving Content-Based Publish/Subscribe with Prefiltering.
IEEE Trans. Dependable Sec. Comput., 2017

Confidentiality-Preserving Publish/Subscribe: A Survey.
CoRR, 2017

SafeFS: a modular architecture for secure user-space file systems: one FUSE to rule them all.
Proceedings of the 10th ACM International Systems and Storage Conference, 2017

2016
Confidentiality-Preserving Publish/Subscribe: A Survey.
ACM Comput. Surv., 2016

Have a Seat on the ErasureBench: Easy Evaluation of Erasure Coding Libraries for Distributed Storage Systems.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems Workshops, 2016

On the Cost of Safe Storage for Public Clouds: An Experimental Evaluation.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

Reliability-bandwidth tradeoffs for distributed storage allocations.
Proceedings of the IEEE International Symposium on Information Theory, 2016

A Performance Evaluation of Erasure Coding Libraries for Cloud-Based Data Stores - (Practical Experience Report).
Proceedings of the Distributed Applications and Interoperable Systems, 2016

2015
Efficient Key Updates through Subscription Re-encryption for Privacy-Preserving Publish/Subscribe.
Proceedings of the 16th Annual Middleware Conference, Vancouver, BC, Canada, December 07, 2015

EpTO: An Epidemic Total Order Algorithm for Large-Scale Distributed Systems.
Proceedings of the 16th Annual Middleware Conference, Vancouver, BC, Canada, December 07, 2015

STEP-archival: Storage integrity and anti-tampering using data entanglement.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2014
Low complexity decoding of variable length source-channel codes.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
Performance/Security Tradeoffs for Content-Based Routing Supported by Bloom Filters.
Proceedings of the Structural Information and Communication Complexity, 2013

2012
Bounds on the Capacity of Discrete Memoryless Channels Corrupted by Synchronization and Substitution Errors.
IEEE Trans. Information Theory, 2012

Infrastructure Provisioning for Scalable Content-Based Routing: Framework and Analysis.
Proceedings of the 11th IEEE International Symposium on Network Computing and Applications, 2012

Thrifty privacy: efficient support for privacy-preserving publish/subscribe.
Proceedings of the Sixth ACM International Conference on Distributed Event-Based Systems, 2012

2011
Tight Capacity Bounds for Discrete Memoryless Channels with Synchronization Errors, Additive Noise, and Large Alphabets.
Proceedings of IEEE International Conference on Communications, 2011

2010
A survey of error-correcting codes for channels with symbol synchronization errors.
IEEE Communications Surveys and Tutorials, 2010

2009
Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks.
IEEE Trans. Wireless Communications, 2009

2008
Worst Case Nonzero-Error Interactive Communication.
IEEE Trans. Information Theory, 2008

On the Number of Subsequences When Deleting Symbols From a String.
IEEE Trans. Information Theory, 2008

2006
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006


  Loading...