David M. Eyers

Orcid: 0000-0002-7284-8006

Affiliations:
  • University of Otago, Dunedin, New Zealand
  • University of Cambridge, UK (PhD 2005)


According to our database1, David M. Eyers authored at least 126 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Correction: AI content detection in the emerging information ecosystem: new obligations for media and tech companies.
Ethics Inf. Technol., December, 2024

AI content detection in the emerging information ecosystem: new obligations for media and tech companies.
Ethics Inf. Technol., December, 2024

Preface for the special issue on tool papers of the 17th International Federated Conference on Distributed Computing Techniques, DisCoTec 2022.
Sci. Comput. Program., 2024

Securing Monolithic Kernels using Compartmentalization.
CoRR, 2024

Towards a crowdsourced framework for online hate speech moderation - a case study in the Indian political scenario.
Proceedings of the Companion Publication of the 16th ACM Web Science Conference, 2024

SUSS: Improving TCP Performance by Speeding Up Slow-Start.
Proceedings of the ACM SIGCOMM 2024 Conference, 2024

2023
Generative AI models should include detection mechanisms as a condition for public release.
Ethics Inf. Technol., December, 2023

ORC: Increasing Cloud Memory Density via Object Reuse with Capabilities.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023

2022
CAP-VMs: Capability-Based Isolation and Sharing for Microservices.
CoRR, 2022

CAP-VMs: Capability-Based Isolation and Sharing in the Cloud.
Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation, 2022

PACED: Provenance-based Automated Container Escape Detection.
Proceedings of the IEEE International Conference on Cloud Engineering, 2022

Reproducibility and Automation of the Appraisal Taxonomy.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

2021
Detecting the target of sarcasm is hard: Really??
Inf. Process. Manag., 2021

I-Scheduler: Iterative scheduling for distributed stream processing systems.
Future Gener. Comput. Syst., 2021

Spons & Shields: practical isolation for trusted execution.
Proceedings of the VEE '21: 17th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2021

Virtual ground control for survey-grade terrain modelling from satellite imagery.
Proceedings of the 36th International Conference on Image and Vision Computing New Zealand, 2021

2020
StopEG: Detecting when to stop exponential growth in TCP slow-start.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

Facilitating plausible deniability for cloud providers regarding tenants' activities using trusted execution.
Proceedings of the 2020 IEEE International Conference on Cloud Engineering, 2020

2019
Manila: Using a densely populated PMC-space for power modelling within large-scale systems.
Parallel Comput., 2019

Introduction to the Special Issue on Integrating Process-oriented and Event-based Systems.
Inf. Syst., 2019

Viewpoint | Personal Data and the Internet of Things: It is time to care about digital provenance.
CoRR, 2019

Personal data and the internet of things.
Commun. ACM, 2019

From Here to Provtopia.
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2019

TrustZone for Supervised Asymmetric Multiprocessing Systems.
Proceedings of the 20th International Conference on Parallel and Distributed Computing, 2019

Evaluating the Impact of Network Latency on the Safety of Blockchain Transactions.
Proceedings of the IEEE International Conference on Blockchain, 2019

Detecting Target of Sarcasm using Ensemble Methods.
Proceedings of the The 17th Annual Workshop of the Australasian Language Technology Association, 2019

2018
Principal Component Analysis Based Filtering for Scalable, High Precision k-NN Search.
IEEE Trans. Computers, 2018

Data provenance to audit compliance with privacy policy in the Internet of Things.
Pers. Ubiquitous Comput., 2018

Distributed sparse bundle adjustment algorithm based on three-dimensional point partition and asynchronous communication.
Frontiers Inf. Technol. Electron. Eng., 2018

T3-Scheduler: A topology and Traffic aware two-level Scheduler for stream processing systems in a heterogeneous cluster.
Future Gener. Comput. Syst., 2018

Towards Accountable Systems (Dagstuhl Seminar 18181).
Dagstuhl Reports, 2018

LibSEAL: revealing service integrity violations using trusted execution.
Proceedings of the Thirteenth EuroSys Conference, 2018

Iterative Scheduling for Distributed Stream Processing Systems.
Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems, 2018

Runtime Analysis of Whole-System Provenance.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Camflow: Managed Data-Sharing for Cloud Services.
IEEE Trans. Cloud Comput., 2017

Anonymous contribution of data.
IACR Cryptol. ePrint Arch., 2017

Glamdring: Automatic Application Partitioning for Intel SGX.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

TrustCEP: Adopting a Trust-Based Approach for Distributed Complex Event Processing.
Proceedings of the 18th IEEE International Conference on Mobile Data Management, 2017

PHP2Uni: Building Unikernels Using Scripting Language Transpilation.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

A Topology and Traffic Aware Two-Level Scheduler for Stream Processing Systems in a Heterogeneous Cluster.
Proceedings of the Euro-Par 2017: Parallel Processing Workshops, 2017

Practical whole-system provenance capture.
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017

2016
Power Neighboring Interval Matching Based PMC Integration.
J. Circuits Syst. Comput., 2016

Twenty Security Considerations for Cloud-Supported Internet of Things.
IEEE Internet Things J., 2016

Integrating Process-Oriented and Event-Based Systems (Dagstuhl Seminar 16341).
Dagstuhl Reports, 2016

Data-Centric Access Control for Cloud Computing.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

SCONE: Secure Linux Containers with Intel SGX.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016

Big ideas paper: Policy-driven middleware for a legally-compliant Internet of Things.
Proceedings of the 17th International Middleware Conference, Trento, Italy, December 12, 2016

VPAP: VBR Pattern Aware Playback Buffering for video streaming.
Proceedings of the 26th International Telecommunication Networks and Applications Conference, 2016

Information Flow Control with Minimal Tag Disclosure.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016

PCAF: Scalable, High Precision k-NN Search Using Principal Component Analysis Based Filtering.
Proceedings of the 45th International Conference on Parallel Processing, 2016

Information Flow Audit for PaaS Clouds.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering, 2016

Information Flow Audit for Transparency and Compliance in the Handling of Personal Data.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016

P-Scheduler: adaptive hierarchical scheduling in apache storm.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

2015
Scalable Multicore k-NN Search via Subspace Clustering for Filtering.
IEEE Trans. Parallel Distributed Syst., 2015

Optimal space subdivision for parallel approximate nearest neighbour determination.
Proceedings of the 2015 International Conference on Image and Vision Computing New Zealand, 2015

Efficient Selection Algorithm for Fast k-NN Search on GPUs.
Proceedings of the 2015 IEEE International Parallel and Distributed Processing Symposium, 2015

A State-Based Energy/Performance Model for Parallel Applications on Multicore Computers.
Proceedings of the 44th International Conference on Parallel Processing Workshops, 2015

Helping secure robots in WSN environments by monitoring WSN software updates for intrusions.
Proceedings of the 6th International Conference on Automation, Robotics and Applications, 2015

Integrating Messaging Middleware and Information Flow Control.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Quantifying the Energy Efficiency Challenges of Achieving Exascale Computing.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015

Improving Throughput of a Pipeline Model Indexer.
Proceedings of the 20th Australasian Document Computing Symposium, 2015

2014
Information Flow Control for Secure Cloud Computing.
IEEE Trans. Netw. Serv. Manag., 2014

Myths in power estimation with Performance Monitoring Counters.
Sustain. Comput. Informatics Syst., 2014

Effective Runtime Monitoring of Distributed Event-Based Enterprise Systems with ASIA.
Proceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications, 2014

Parallel and Distributed Mosaic Seamline Estimation.
Proceedings of the 29th International Conference on Image and Vision Computing New Zealand, 2014

PMC-Based Power Modelling with Workload Classification on Multicore Systems.
Proceedings of the 43rd International Conference on Parallel Processing Workshops, 2014

Data filtering for scalable high-dimensional k-NN search on multicore systems.
Proceedings of the 23rd International Symposium on High-Performance Parallel and Distributed Computing, 2014

Policy enforcement within emerging distributed, event-based systems.
Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, 2014

FlowK: Information Flow Control for the Cloud.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

CloudSafetyNet: Detecting Data Leakage between Cloud Tenants.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

2013
Large-scale feature matching with distributed and heterogeneous computing.
Proceedings of the 28th International Conference on Image and Vision Computing New Zealand, 2013

Investigating large-scale feature matching using the Intel® Xeon Phi™ coprocessor.
Proceedings of the 28th International Conference on Image and Vision Computing New Zealand, 2013

Performance Tuning on Multicore Systems for Feature Matching within Image Collections.
Proceedings of the 42nd International Conference on Parallel Processing, 2013

Performance Bottlenecks in Manycore Systems: A Case Study on Large Scale Feature Matching within Image Collections.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Poster: Converging runtime and historic detection of areas of congestion within an urban bus network.
Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems, 2013

Toward Unified and Flexible Security Policies Enforceable within the Cloud.
Proceedings of the Distributed Applications and Interoperable Systems, 2013

Myths in PMC-Based Power Estimation.
Proceedings of the Energy Efficiency in Large Scale Distributed Systems, 2013

Aggregation for implicit invocations.
Proceedings of the Aspect-Oriented Software Development, 2013

2012
Efficient Data Tagging for Managing Privacy in the Internet of Things.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

Living in the present: on-the-fly information processing in scalable web architectures.
Proceedings of the 2nd International Workshop on Cloud Computing Platforms, 2012

A model of information flow control to determine whether malfunctions cause the privacy invasion.
Proceedings of the First Workshop on Measurement, Privacy, and Mobility, 2012

2011
Configuring large-scale storage using a middleware with machine learning.
Concurr. Comput. Pract. Exp., 2011

Handover Delay in Mobile WiMAX: A Simulation Study.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

SafeWeb: A Middleware for Securing Ruby-Based Web Applications.
Proceedings of the Middleware 2011, 2011

Disclosure control in multi-domain publish/subscribe systems.
Proceedings of the Fifth ACM International Conference on Distributed Event-Based Systems, 2011

IO Tetris: Deep Storage Consolidation for the Cloud via Fine-Grained Workload Analysis.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
DEFCON: High-Performance Event Processing with Information Security.
Proceedings of the 2010 USENIX Annual Technical Conference, 2010

Policy Generation Framework for Large-Scale Storage Infrastructures.
Proceedings of the POLICY 2010, 2010

Linking Policies to the Spatial Environment.
Proceedings of the POLICY 2010, 2010

Efficient Policy Checking across Administrative Domains.
Proceedings of the POLICY 2010, 2010

Distributed Middleware Enforcement of Event Flow Security Policy.
Proceedings of the Middleware 2010 - ACM/IFIP/USENIX 11th International Middleware Conference, Bangalore, India, November 29, 2010

Enforcing End-to-End Application Security in the Cloud - (Big Ideas Paper).
Proceedings of the Middleware 2010 - ACM/IFIP/USENIX 11th International Middleware Conference, Bangalore, India, November 29, 2010

Relational database support for event-based middleware functionality.
Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems, 2010

Securing Event-Based Systems.
Proceedings of the Principles and Applications of Distributed Event-Based Systems, 2010

2009
Security in Multi-domain Event-based Systems (Sicherheit in ereignis-basierten Mehrdomänensystemen).
it Inf. Technol., 2009

Structured storage of legal precedents using a minimal deontic ontology, for computer assisted legal document querying.
Int. J. Metadata Semant. Ontologies, 2009

Introducing the fair and logical trade project.
Int. J. Bus. Process. Integr. Manag., 2009

Towards a middleware for configuring large-scale storage infrastructures.
Proceedings of the 7th International Workshop on Middleware for Grids, 2009

Event-processing middleware with information flow control.
Proceedings of the Middleware 2008, 2009

PrivateFlow: decentralised information flow control in event based middleware.
Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, 2009

2008
On Logic and Standards for Structuring Documents.
Proceedings of the Designing E-Business Systems. Markets, Services, and Networks, 2008

Compile-Time Enforcement of Dynamic Security Policies.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Controlling historical information dissemination in publish/subscribe.
Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008, 2008

Credential management in event-driven healthcare systems.
Proceedings of the Middleware 2008, 2008

Deontic logic for modelling data flow and use compliance.
Proceedings of the 6th International Workshop on Middleware for Pervasive and Ad-hoc Computing (MPAC 2008), 2008

Access control in publish/subscribe systems.
Proceedings of the Second International Conference on Distributed Event-Based Systems, 2008

2007
Access Control in Decentralised Publish/Subscribe Systems.
J. Networks, 2007

Towards a common API for publish/subscribe.
Proceedings of the 2007 Inaugural International Conference on Distributed Event-Based Systems, 2007

Encryption-enforced access control in dynamic multi-domain publish/subscribe networks.
Proceedings of the 2007 Inaugural International Conference on Distributed Event-Based Systems, 2007

2006
OASIS role-based access control for electronic health records.
IEE Proc. Softw., 2006

A Capability-Based Access Control Architecture for Multi-Domain Publish/Subscribe Systems.
Proceedings of the 2006 International Symposium on Applications and the Internet (SAINT 2006), 2006

2005
Active privilege management for distributed access control systems.
PhD thesis, 2005

Securing Publish/Subscribe for Multi-domain Systems.
Proceedings of the Middleware 2005, ACM/IFIP/USENIX, 6th International Middleware Conference, Grenoble, France, November 28, 2005

2004
Using trust and risk in role-based access control policies.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

An architecture for supporting vicarious learning in a distributed environment.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

A Formal Model for Hierarchical Policy Contexts.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

2003
Policy Storage for Role-Based Access Control Systems.
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003

Policy Contexts: Controlling Information Flow in Parameterised RBAC.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

Credential negotiation with limited disclosure via iterative range refinement in an unordered space.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

Role-based access control for publish/subscribe middleware architectures.
Proceedings of the 2nd International Workshop on Distributed Event-Based Systems, 2003

'Ambiguous Live' - Exploring Collaborative, Dynamic Control of MIDI Sequencers.
Proceedings of the Computer Music Modeling and Retrieval, International Symposium, 2003

2002
A Coverage-Determination Mechanism for Checking Business Contracts against Organizational Policies.
Proceedings of the Technologies for E-Services, Third International Workshop, 2002

An asynchronous rule-based approach for business process automation using obligations.
Proceedings of the 2002 ACM SIGPLAN Workshop on Rule-Based Programming, 2002

Shielding RBAC Infrastructures from Cyberterrorism.
Proceedings of the Research Directions in Data and Applications Security, 2002

PoX: Merging Prolog and XML databases.
Proceedings of the ADCS 2002, 2002


  Loading...