From the cloud to the atmosphere: Running MapReduce across data centers C Jayalath, J Stephen, P Eugster IEEE transactions on computers 63 (1), 74-87, 2013 | 144 | 2013 |
Encyclopedia of cloud computing S Murugesan, I Bojanova John Wiley & Sons, 2016 | 88 | 2016 |
Practical {Confidentiality} Preserving Big Data Analysis JJ Stephen, S Savvides, R Seidel, P Eugster 6th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 14), 2014 | 52 | 2014 |
Styx: Stream processing with trustworthy cloud-based execution JJ Stephen, S Savvides, V Sundaram, MS Ardekani, P Eugster Proceedings of the Seventh ACM Symposium on Cloud Computing, 348-360, 2016 | 30 | 2016 |
Program analysis for secure big data processing J James Stephen, S Savvides, R Seidel, P Eugster Proceedings of the 29th acm/ieee international conference on automated …, 2014 | 27 | 2014 |
Universal cross-cloud communication C Jayalath, J Stephen, P Eugster IEEE Transactions on Cloud Computing 2 (2), 103-116, 2014 | 25 | 2014 |
Assured cloud-based data analysis with ClusterBFT JJ Stephen, P Eugster ACM/IFIP/USENIX International Conference on Distributed Systems Platforms …, 2013 | 21 | 2013 |
Ensuring confidentiality in the cloud of things P Eugster, S Kumar, S Savvides, JJ Stephen IEEE Pervasive Computing 18 (1), 10-18, 2019 | 14 | 2019 |
Selecting from computing nodes for correlating events DJ Gmach, A AuYoung, R Block, JK Radhakrishnan, S Pramanik, ... US Patent 10,419,457, 2019 | 13 | 2019 |
Distributed real-time event analysis JJ Stephen, D Gmach, R Block, A Madan, A AuYoung 2015 IEEE International Conference on Autonomic Computing, 11-20, 2015 | 13 | 2015 |
Secure data types: A simple abstraction for confidentiality-preserving data analytics S Savvides, JJ Stephen, MS Ardekani, V Sundaram, P Eugster Proceedings of the 2017 Symposium on Cloud Computing, 479-492, 2017 | 12 | 2017 |
Big data analytics beyond the single datacenter P Eugster, C Jayalath, K Kogan, J Stephen Computer 50 (6), 60-68, 2017 | 11 | 2017 |
Atmosphere: A universal cross-cloud communication infrastructure C Jayalath, JJ Stephen, P Eugster Middleware 2013: ACM/IFIP/USENIX 14th International Middleware Conference …, 2013 | 6 | 2013 |
Dependable cloud resources with guardian B Abusalah, D Schatzlein, JJ Stephen, MS Ardekani, P Eugster 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 5 | 2017 |
Identifying sensitive data risks in cloud-based enterprise deployments based on graph analytics JJ Stephen, TA Habeck, A Natarajan US Patent 11,727,142, 2023 | 4 | 2023 |
Design of an operating system with in-memory kernel JJ Stephen 2010 International Conference on Recent Trends in Information …, 2010 | 4 | 2010 |
Changing the way the world works: IBM Research’s “5 in 5” A Krishna, AI Trustworthy, H Liljestrand, H Jamjoom, M Hicks, N Asokan, ... IBM, 2019 | 3 | 2019 |
C3PO: Cloud-based Confidentiality-preserving Continuous Query Processing S Savvides, S Kumar, JJ Stephen, P Eugster ACM Transactions on Privacy and Security 25 (1), 1-36, 2021 | 2 | 2021 |
Potential research leads in cryopreservation of fish gametes CJ Betsy, J Stephen, S Kumar Int J Res Fish Aquac 4 (3), 108-111, 2014 | 2 | 2014 |
Interminable Flows: A Generic, Joint, Customizable Resiliency Model for Big-Data Streaming Platforms B Abusalah, TM Qadah, JJ Stephen, P Eugster IEEE Access 11, 10762-10776, 2023 | 1 | 2023 |