Ruichuan Chen

According to our database1, Ruichuan Chen authored at least 34 papers between 2007 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Approximate Computing for Stream Analytics.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Privacy-Preserving Data Analytics.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Will Serverless Computing Revolutionize NFV?
Proceedings of the IEEE, 2019

2018
SAND: Towards High-Performance Serverless Computing.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

ApproxIoT: Approximate Analytics for Edge Computing.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

ApproxJoin: Approximate Distributed Joins.
Proceedings of the ACM Symposium on Cloud Computing, 2018

2017
Building and Analyzing a Global Co-Authorship Network Using Google Scholar Data.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

PrivApprox: Privacy-Preserving Stream Analytics.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Sieve: actionable insights from monitored metrics in distributed systems.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, Las Vegas, NV, USA, December 11, 2017

StreamApprox: approximate computing for stream analytics.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, Las Vegas, NV, USA, December 11, 2017

Towards Reliable Application Deployment in the Cloud.
Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, 2017

2016
Online Algorithm for Approximate Quantile Queries on Sliding Windows.
Proceedings of the Experimental Algorithms - 15th International Symposium, 2016

AnonRep: Towards Tracking-Resistant Anonymous Reputation.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

2014
Heading Off Correlated Failures through Independence-as-a-Service.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

2013
SplitX: high-performance private analytics.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

A holistic immune system against active P2P worms.
Proceedings of the International Conference on Information Networking 2013, 2013

An untold story of redundant clouds: making your service deployment truly reliable.
Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, 2013

2012
Towards Statistical Queries over Distributed Private User Data.
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012

Non-tracking web analytics.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Bring order to online social networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Social Trust and Reputation in Online Social Networks.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

What's in a Name: A Study of Names, Gender Inference, and Gender Behavior in Facebook.
Proceedings of the Database Systems for Adanced Applications, 2011

SMALTA: practical and near-optimal FIB aggregation.
Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, 2011

Address-based route reflection.
Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, 2011

2009
Securing key issuing in peer-to-peer networks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

A holistic mechanism against file pollution in peer-to-peer networks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?.
Proceedings of the Proceedings P2P 2009, 2009

SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks.
Proceedings of the Fifth International Conference on Networking and Services, 2009

SpamResist: Making Peer-to-Peer Tagging Systems Robust to Spam.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks.
Proceedings of the Proceedings P2P'08, 2008

WebIBC: Identity Based Cryptography for Client Side Security in Web Applications.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks.
Proceedings of the Euro-Par 2008, 2008

2007
Hybrid Overlay Structure Based on Virtual Node.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007


  Loading...