Author image not provided
 Quanghieu Vu

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article12.32
Citation Count271
Publication count22
Publication years2005-2016
Available for download6
Average downloads per article979.67
Downloads (cumulative)5,878
Downloads (12 Months)603
Downloads (6 Weeks)38
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


22 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 22
Result page: 1 2

Sort by:

1 published by ACM
May 2016 ACM Transactions on Internet Technology (TOIT): Volume 16 Issue 3, August 2016
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 5,   Downloads (12 Months): 79,   Downloads (Overall): 240

Full text available: PDFPDF
This article introduces a dynamic cloud-based marketplace of near-realtime human sensing data (MARSA) for different stakeholders to sell and buy near-realtime data. MARSA is designed for environments where information technology (IT) infrastructures are not well developed but the need to gather and sell near-realtime data is great. To this end, ...
Keywords: Internet of Things, cost model, data contract, platform

2 published by ACM
July 2015 ACM Computing Surveys (CSUR): Volume 48 Issue 1, September 2015
Publisher: ACM
Bibliometrics:
Citation Count: 7
Downloads (6 Weeks): 25,   Downloads (12 Months): 466,   Downloads (Overall): 2,461

Full text available: PDFPDF
The cloud computing paradigm has become a mainstream solution for the deployment of business processes and applications. In the public cloud vision, infrastructure, platform, and software services are provisioned to tenants (i.e., customers and service providers) on a pay-as-you-go basis. Cloud tenants can use cloud resources at lower prices, and ...
Keywords: cloud computing, transparency, Assurance, survey, security

3
November 2014 Electronic Commerce Research: Volume 14 Issue 3, November 2014
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 1

According to several surveys studied by both cloud computing providers and security solution providers, security concerns, in particular data security, are the main reasons for people's reluctance to employ cloud computing. In this paper, we address the concern of data security by introducing SECRESO, a SEcure storage model for Cloud ...
Keywords: Reed---Solomon, Erasure code, Cloud computing, Data security

4
April 2013 The Computer Journal: Volume 56 Issue 4, April 2013
Publisher: Oxford University Press
Bibliometrics:
Citation Count: 0

We put forward a notion of forward security for stateful public-key encryption against state exposure and chosen ciphertext attack. This new notion is important in mobile applications in which small devices that perform ‘stateful encryptions’ are vulnerable to attacks which can result in the compromise of internal states. We precisely ...

5
December 2012 CLOUDCOM '12: Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom)
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Peer-to-Peer (P2P) systems are generally known as open and free systems since resources are often contributed from voluntary participants. Their limitation, however, is that they only support simple resource sharing such as file (storage) sharing and bandwidth sharing. On the other hand, based on virtualization techniques, cloud computing provides a ...
Keywords: Cloud computing,Peer to peer computing,Servers,Computer architecture,Conferences,Prototypes,Eucalyptus,P2P,Cloud Computing,Platform

6
June 2012 SERVICES '12: Proceedings of the 2012 IEEE Eighth World Congress on Services
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

Cloud computing technology has become popular of late due to several advantages it has compared to traditional computing models. For example, cloud computing helps users to save a significant amount of cost that is related to infrastructure investment, management, and maintenance. Furthermore, since cloud computing offers agility, flexibility, and scalability, ...

7
March 2012 AINA '12: Proceedings of the 2012 IEEE 26th International Conference on Advanced Information Networking and Applications
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 7

Cloud computing based Data-as-a-Service (DaaS) has become popular. Several data assets have been released in DaaSes across different cloud platforms. Nevertheless, there are no well-defined ways to describe DaaSes and their associated data assets. On the one hand, existing DaaS providers simply use HTML documents to describe their service. This ...
Keywords: Cloud computing, Data-as-a-Service (DaaS), data marketplace, service and data description, discovery

8
September 2011 EC2ND '11: Proceedings of the 2011 Seventh European Conference on Computer Network Defense
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 3

The traditional approach for detecting information leaks is to generate fingerprints of sensitive data, by partitioning and hashing it, and then comparing these fingerprints against outgoing documents. Unfortunately, this approach incurs a high computation cost as every part of document needs to be checked. As a result, it is not ...
Keywords: privacy, information leaks, fingerprinting

9
April 2011 ICDE '11: Proceedings of the 2011 IEEE 27th International Conference on Data Engineering
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 7

When users submit new queries to a distributed stream processing system (DSPS), a query planner must allocate physical resources, such as CPU cores, memory and network bandwidth, from a set of hosts to queries. Allocation decisions must provide the correct mix of resources required by queries, while achieving an efficient ...

10
December 2009
Bibliometrics:
Citation Count: 10

Peer-to-peer (P2P) technology, or peer computing, is a paradigm that is viewed as a potential technology for redesigning distributed architectures and, consequently, distributed processing. Yet the scale and dynamism that characterize P2P systems demand that we reexamine traditional distributed technologies. A paradigm shift that includes self-reorganization, adaptation and resilience is ...

11
October 2009 AP2PS '09: Proceedings of the 2009 First International Conference on Advances in P2P Systems
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Replication is often used in distributed hash tables (DHTs) to reduce the latency of query requests. For read-write objects, replicas are commonly kept up-to-date by having a master node maintain physical pointers to replica hosts. Since these links are based on IP addresses, they must be updated whenever a linked ...
Keywords: P2P, DHT, Replication, Cost model

12
August 2009 Euro-Par '09: Proceedings of the 15th International Euro-Par Conference on Parallel Processing
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 2

Similarity search in metric spaces over centralized systems has been significantly studied in the database research community. However, not so much work has been done in the context of P2P networks. This paper introduces SiMPSON: a P2P system supporting similarity search in metric spaces. The aim is to answer queries ...

13
April 2009 IEEE Transactions on Knowledge and Data Engineering: Volume 21 Issue 4, April 2009
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 2

Over the pass few years, peer-to-peer (P2P) systems have rapidly grown in popularity and become a dominant means for sharing resources. In these systems, load balancing is a key challenge because nodes are often heterogeneous. While several load balancing schemes have been proposed in the literature, these solutions are typically ...
Keywords: Overlay Network, Peer-to-Peer, Framework, Load Balancing, Histogram, DHT, Overlay Network, Load Balancing, Peer-to-Peer, DHT, Framework, Histogram

14
March 2009 ICDE '09: Proceedings of the 2009 IEEE International Conference on Data Engineering
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Traditionally, distributed databases assume that the small) set of nodes participating in a query is known apriori, the data is well placed, and the statistics are readily available. However, these assumptions are no longer valid in a Peer-based DataBase Management System (PDBMS). As such, it is a challenge to process ...
Keywords: Adaptive Multi-Join, P2P

15
January 2009 The VLDB Journal — The International Journal on Very Large Data Bases: Volume 18 Issue 1, January 2009
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 18
Downloads (6 Weeks): 1,   Downloads (12 Months): 4,   Downloads (Overall): 261

Full text available: PDFPDF
This paper looks at the processing of skyline queries on peer-to-peer (P2P) networks. We propose Skyframe, a framework for efficient skyline query processing in P2P systems, which addresses the challenges of quick response time, low network communication cost and query load balancing among peers. Skyframe consists of two querying methods: ...
Keywords: Peer-to-peer systems, Framework, Optimization, Load balancing, Skyline query processing

16
December 2008 Data & Knowledge Engineering: Volume 67 Issue 3, December, 2008
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 2

One of the major challenges in Peer-to-Peer (P2P) file sharing systems is to support content-based search. Although there have been some proposals to address this challenge, they share the same weakness of using either servers or super-peers to keep global knowledge, which is required to identify importance of terms to ...
Keywords: Information retrieval, Term aggregation and classification, Content-based search, Peer-to-Peer computing, Adaptive indexing

17 published by ACM
June 2008 SIGMOD '08: Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Publisher: ACM
Bibliometrics:
Citation Count: 12
Downloads (6 Weeks): 0,   Downloads (12 Months): 11,   Downloads (Overall): 796

Full text available: PDFPDF
While database management systems offer a comprehensive solution to data storage, they require deep knowledge of the schema, as well as the data manipulation language, in order to perform effective retrieval. Since these requirements pose a problem to lay or occasional users, several methods incorporate keyword search (KS) into relational ...
Keywords: distributed databases, keyword search, relational databases, information retrieval, database summary, graph

18
April 2008 ICDE '08: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1


19
September 2007 NPC '07: Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

In this paper, we propose a method to support contentbased search, one of the challenges in Peer-to-Peer file sharing system. The proposed method is based on a hybrid structure, which is a combination of a Chord ring and a balanced tree. The tree is used to aggregate and classify terms ...

20 published by ACM
June 2006 SIGMOD '06: Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Publisher: ACM
Bibliometrics:
Citation Count: 30
Downloads (6 Weeks): 2,   Downloads (12 Months): 14,   Downloads (Overall): 1,187

Full text available: PDFPDF
Peer-to-Peer systems have recently become a popular means to share resources. Effective search is a critical requirement in such systems, and a number of distributed search structures have been proposed in the literature. Most of these structures provide "log time search" capability, where the logarithm is taken base 2. That ...
Keywords: system architecture, peer-to-peer, multi-way tree structure



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us