David W. Archer

Orcid: 0000-0002-1705-3630

Affiliations:
  • Galois Inc., Portland, OR, USA


According to our database1, David W. Archer authored at least 28 papers between 1987 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enabling Development of an Extensible, Multi-Perspective Ontology.
Proceedings of the 18th IEEE International Conference on Semantic Computing, 2024

2023
BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

UN Handbook on Privacy-Preserving Computation Techniques.
CoRR, 2023

Aviation Certification Powered by the Semantic Web Stack.
Proceedings of the Semantic Web - ISWC 2023, 2023

RACK: A Semantic Model and Triplestore for Curation of Assurance Case Evidence.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2023 Workshops, 2023

2022
BASALISC: Flexible Asynchronous Hardware Accelerator for Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2022

A Semantic Reference Model for Capturing System Development and Evaluation.
Proceedings of the 16th IEEE International Conference on Semantic Computing, 2022

2021
The Cost of IEEE Arithmetic in Secure Computation.
IACR Cryptol. ePrint Arch., 2021

2019
RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications.
IACR Cryptol. ePrint Arch., 2019

2018
From Keys to Databases - Real-World Applications of Secure Multi-Party Computation.
Comput. J., 2018

Feedback-Guided Anomaly Discovery via Online Optimization.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

Detecting Cyberattack Entities from Audit Data via Multi-View Anomaly Detection with Feedback.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2016
Maturity and Performance of Programmable Secure Computation.
IEEE Secur. Priv., 2016

5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs.
IACR Cryptol. ePrint Arch., 2016

Provenance Segmentation.
Proceedings of the 8th USENIX Workshop on the Theory and Practice of Provenance, 2016

2015
Computing with Data Privacy: Steps toward Realization.
IEEE Secur. Priv., 2015

Diagnosing Advanced Persistent Threats: A Position Paper.
Proceedings of the 26th International Workshop on Principles of Diagnosis (DX-2015) co-located with 9th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes (Safeprocess 2015), Paris, France, August 31, 2015

2014
Application-Scale Secure Multiparty Computation.
Proceedings of the Programming Languages and Systems, 2014

2013
User Trust and Judgments in a Curated Database with Explicit Provenance.
Proceedings of the In Search of Elegance in the Theory and Practice of Computation, 2013

2010
A Conceptual Model and Predicate Language for Data Selection and Projection Based on Provenance.
Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, 2010

Ensemble PDP-8: eight principles for distributed portals.
Proceedings of the 2010 Joint International Conference on Digital Libraries, 2010

Enabling revisitation of fine-grained clinical information.
Proceedings of the ACM International Health Informatics Symposium, 2010

2009
A Framework for Fine-grained Data Integration and Curation, with Provenance, in a Dataspace.
Proceedings of the First Workshop on the Theory and Practice of Provenance, 2009

2008
Definition and Formalization of Entity Resolution Functions for Everyday Information Integration.
Proceedings of the Semantics in Data and Knowledge Bases, Third International Workshop, 2008

Superimposed Information Architecture for Digital Libraries.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2008

2007
Capturing Users' Everyday, Implicit Information Integration Decisions.
Proceedings of the Challenges in Conceptual Modelling. Tutorials, posters, panels and industrial contributions at the 26th International Conference on Conceptual Modeling, 2007

1987
The instruction parsing microarchitecture of the CVAX microprocessor.
Proceedings of the 20st Annual Workshop and Symposium on Microprogramming and Microarchitecture, 1987


  Loading...