Marc X. Makkes

Orcid: 0000-0003-4222-4152

According to our database1, Marc X. Makkes authored at least 38 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Secure and Private Vertical Federated Learning for Predicting Personalized CVA Outcomes.
Proceedings of the Artificial Intelligence in Medicine - 22nd International Conference, 2024

2023
Funding Large Projects with a Blockchain Based Automated Fractional Reserve Currency.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2023

2022
Calibrating the performance and security of blockchains via information propagation delays: revisiting an old approach with a new perspective.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

An Ontological Exploration of Central Bank Digital Currency Governance Design.
Proceedings of the 35th Bled eConference - Digital Restructuring and Human (Re)action, June 26, 2022

2021
A Decentralized Fair Governance Model for Permissionless Blockchain Systems (short paper).
Proceedings of the International Workshop on Value Modelling and Business Ontologies Bolzano, 2021

2020
The Banking Industry Underestimates Costs of Cloud Migrations.
Proceedings of the 22nd IEEE Conference on Business Informatics, 2020

Governance in Peer-to-Peer Networks Is a Design Problem (short paper).
Proceedings of 14th International Workshop on Value Modelling and Business Ontologies, 2020

Exploring Governance in a Decentralized Energy Trading Eco-System.
Proceedings of the 33rd Bled eConference: Enabling Technology for a Sustainable Society, 2020

2019
Dietcoin: Hardening Bitcoin Transaction Verification Process For Mobile Devices.
Proc. VLDB Endow., 2019

A multiple attribute relative quality measure based on the harmonic and arithmetic mean.
Oper. Res., 2019

Apex: a High-Performance Hierarchical Distributed Ledger.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

A Programming Framework for Heterogeneous Stream Analytics.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Aves: A Decision Engine for Energy-efficient Stream Analytics across Low-power Devices.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Dietcoin: shortcutting the Bitcoin verification process for your smartphone.
CoRR, 2018

RideMatcher: Peer-to-Peer Matching of Passengers for Efficient Ridesharing.
Proceedings of the 18th IEEE/ACM International Symposium on Cluster, 2018

2017
Execution time estimation for workflow scheduling.
Future Gener. Comput. Syst., 2017

SenseLE: Exploiting Spatial Locality in Decentralized Sensing Environments.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

P^2-SWAN: Real-Time Privacy Preserving Computation for IoT Ecosystems.
Proceedings of the 1st IEEE International Conference on Fog and Edge Computing, 2017

Kea: A Computation Offloading System for Smartphone Sensor Data.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2017

2016
Bringing secure Bitcoin transactions to your smartphone.
Proceedings of the 15th International Workshop on Adaptive and Reflective Middleware, 2016

2015
Car2x with software defined networks, network functions virtualization and supercomputers technical and scientific preparations for the Amsterdam Arena telecoms fieldlab.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

Fast packet forwarding engine based on software circuits.
Proceedings of the 12th ACM International Conference on Computing Frontiers, 2015

2014
Internet factories: Creating application-specific networks on-demand.
Comput. Networks, 2014

Execution time estimation for workflow scheduling.
Proceedings of the 9th Workshop on Workflows in Support of Large-Scale Science, 2014

Smart cyber infrastructure for big data processing.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2014

Storage to energy: Modeling the carbon emission of storage task offloading between data centers.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
A decision framework for placement of applications in clouds that minimizes their carbon footprint.
J. Cloud Comput., 2013

Intercloud Architecture Framework for Heterogeneous Multi-Provider Cloud based Infrastructure Services Provisioning.
Int. J. Next Gener. Comput., 2013

Multi-data-types interval decision diagrams for XACML evaluation engine.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

MeTRO: Low Latency Network Paths with Routers-on-Demand.
Proceedings of the Euro-Par 2013: Parallel Processing Workshops, 2013

Deployment Strategies for Distributed Applications on Cloud Computing Infrastructures.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Towards an Operating System for Intercloud.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
Intercloud Architecture for interoperability and integration.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
Hardware Trojan Side-Channels Based on Physical Unclonable Functions.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

2010
Efficient Implementation of the Orlandi Protocol Extended Version.
IACR Cryptol. ePrint Arch., 2010

Efficient Implementation of the Orlandi Protocol.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Flowchart description of security primitives for Controlled Physical Unclonable Functions.
IACR Cryptol. ePrint Arch., 2009

Simplification of Controlled PUF primitives.
Proceedings of the Foundations for Forgery-Resilient Cryptographic Hardware, 05.07., 2009


  Loading...