Searched for: contributor%3A%22Decouchant%2C+J%C3%A9r%C3%A9mie+%28graduation+committee%29%22
(1 - 20 of 35)

Pages

Leveraging Fine-grained Telemetry Data for the Detection and Prevention of Vulnerability Exploits
Leveraging Fine-grained Telemetry Data for the Detection and Prevention of Vulnerability Exploits
Go With The Flow: Fault-Tolerant Decentralized Training of Large Language Models
Go With The Flow: Fault-Tolerant Decentralized Training of Large Language Models: Decentralised Training of Large Language Models
StateFL: State Channels Powered Federated Learning
StateFL: State Channels Powered Federated Learning
Beyond obfuscation: Signature-based and relocation-resistant vulnerability detection in Uber JARs
Beyond obfuscation: Signature-based and relocation-resistant vulnerability detection in Uber JARs
Optimizing Database Joins
Optimizing Database Joins: Cost Models and Benchmarking for CPU and GPU Systems
Optimised Private Set Intersection for Vertical Federated Tree Models
Optimised Private Set Intersection for Vertical Federated Tree Models
Integrating Blockchain Technology with Project Management System in the AEC Sector
Integrating Blockchain Technology with Project Management System in the AEC Sector
Searchable Symmetric Encryption Attacks
Searchable Symmetric Encryption Attacks: More power with more knowledge
Unmasking the Power of Trigger Intensity in Federated Learning
Unmasking the Power of Trigger Intensity in Federated Learning: Exploring Trigger Intensities in Backdoor Attacks
TabVFL: Improving Latent Representation Learning in Vertical Federated Learning
TabVFL: Improving Latent Representation Learning in Vertical Federated Learning
Online state migration in modern stream processing engines
Online state migration in modern stream processing engines
Unlocking the Potential of Document Recovery in Injection Attacks against SSE
Unlocking the Potential of Document Recovery in Injection Attacks against SSE: Inject Less, Recover More
Multi-server Asynchronous Federated Learning
Multi-server Asynchronous Federated Learning
Impact of replacing TCP by QUIC in Tor on website fingerprinting resistance
Impact of replacing TCP by QUIC in Tor on website fingerprinting resistance
Blockchain-Based Verifiable and Privacy-Preserving Machine Learning Inference
Blockchain-Based Verifiable and Privacy-Preserving Machine Learning Inference
Combining SAT solvers with heuristic ideas for solving RCPSP with logical constraints
Combining SAT solvers with heuristic ideas for solving RCPSP with logical constraints: An exploration of variable ordering heuristics impact on solving RCPSP-log
Augmenting VSIDS heuristic for the RCPSP/t by initializing activity values using domain-specific information
Augmenting VSIDS heuristic for the RCPSP/t by initializing activity values using domain-specific information
Why Midas would be a terrible secretary
Why Midas would be a terrible secretary: Using a greedy approach to enhance SAT for the Preemptive Resource-Constrained project scheduling problem with set up time
Combinatorial optimization for job sequencing with one common and multiple secondary resources by using a SAT solver augmented with a domain-specific heuristic
Combinatorial optimization for job sequencing with one common and multiple secondary resources by using a SAT solver augmented with a domain-specific heuristic
Integration of variable selection heuristics into a MaxSAT solver for solving the multi-mode resource-constrained project scheduling problem
Integration of variable selection heuristics into a MaxSAT solver for solving the multi-mode resource-constrained project scheduling problem
Searched for: contributor%3A%22Decouchant%2C+J%C3%A9r%C3%A9mie+%28graduation+committee%29%22
(1 - 20 of 35)

Pages