About
System software architecture, programming language design, optimizing compiler…
Articles by Ike
Activity
-
November’s Artifact of the Month: iPod (2nd Generation) Apple wasn’t the first to create a digital music player, but its low-cost miniature 1-inch…
November’s Artifact of the Month: iPod (2nd Generation) Apple wasn’t the first to create a digital music player, but its low-cost miniature 1-inch…
Liked by Ike Nassi
-
We are deeply saddened by the passing of Joel Primack, a visionary scholar and distinguished emeritus professor at University of California, Santa…
We are deeply saddened by the passing of Joel Primack, a visionary scholar and distinguished emeritus professor at University of California, Santa…
Liked by Ike Nassi
Experience
Education
-
Stony Brook University
-
-
Activities and Societies: Dorm Resident Assistant, Introspect (newspaper), Freshman Orientation, Crew.
-
-
-
-
-
-
-
Volunteer Experience
Publications
-
End-to-end confidentiality for a message warehousing service using Identity-Based Encryption
Data Engineering Workshops (ICDEW), 2010 IEEE 26th International Conference
More and more classes of devices become capable of connecting to the Internet. Due to the observation that a point-to-point communication is insufficient for many non-interactive application integration scenarios we assume the existence of a logically centralized message warehousing service, which clients can use to deposit and retrieve messages. The particular challenge in this context is that a client depositing messages can only describe eligible receiving clients using their characterizing…
More and more classes of devices become capable of connecting to the Internet. Due to the observation that a point-to-point communication is insufficient for many non-interactive application integration scenarios we assume the existence of a logically centralized message warehousing service, which clients can use to deposit and retrieve messages. The particular challenge in this context is that a client depositing messages can only describe eligible receiving clients using their characterizing attributes and does not know their specific identities. The depositing client still wants to prevent exposure of the message content to the message warehousing service. We explore how this many-to-many integration between devices and enterprise systems can achieve end-to-end information confidentiality using a solution based on Identity-Based Encryption.
Other authorsSee publication -
A Framework for an In-depth Comparison of Scale-up and Scale-out
The 2013 International Workshop on Data-Intensive Scalable Computing Systems at Supercomputing ’13 (DISCS-2013)
When data grows too large, we scale to larger systems, either by scaling out or up. It is understood that scale-out and scale-up have different complexities and bottlenecks but a thorough comparison of the two architectures is challenging because of the diversity of their programming interfaces, their significantly different system environments, and their sensitivity to workload specifics. In this paper, we propose a novel comparison framework based on MapReduce that accounts for the…
When data grows too large, we scale to larger systems, either by scaling out or up. It is understood that scale-out and scale-up have different complexities and bottlenecks but a thorough comparison of the two architectures is challenging because of the diversity of their programming interfaces, their significantly different system environments, and their sensitivity to workload specifics. In this paper, we propose a novel comparison framework based on MapReduce that accounts for the application, its requirements, and its input size by considering input, software, and hardware parameters. Part of this framework requires implementing scale-out properties on scale-up and we discuss the complex trade-offs, interactions, and dependencies of these properties for two specific case studies (word count and sort). This work lays the foundation for future work in quantifying design decisions and in building a system that automatically compares architectures and selects the best one.
Other authorsSee publication
Patents
-
System and method for deriving business processes
Issued US 8108234
Embodiments of the present invention improve derivation of business processes. In one embodiment, the present invention includes a method of deriving business processes, the method comprising accessing a plurality of event logs, accessing predefined domain rules, associating the event logs with one or more business processes using a first plurality of the domain rules, and deriving a specification for one or more business processes based on a second plurality of the domain rules.
Other inventorsSee patent
Projects
Languages
-
English
-
Organizations
-
ACM, IEEE, Computer HIstory Museum
-
- Present
Recommendations received
3 people have recommended Ike
Join now to viewMore activity by Ike
-
As Duarte grew, I’d hear feedback that decisions were made too slowly, which confused me. In reality, we didn’t have a system to recognize when the…
As Duarte grew, I’d hear feedback that decisions were made too slowly, which confused me. In reality, we didn’t have a system to recognize when the…
Liked by Ike Nassi
-
HOLIDAY GREETINGS AS WE HEAD ABROAD 🎊🥂🌹 As 2025 winds down and we fly abroad, Kalpana Mohan and I send our holiday greetings in advance to all…
HOLIDAY GREETINGS AS WE HEAD ABROAD 🎊🥂🌹 As 2025 winds down and we fly abroad, Kalpana Mohan and I send our holiday greetings in advance to all…
Liked by Ike Nassi
-
This would be a funny story if it actually wasn’t so problematic. Please let me know what you think about this. I had an excellent experience with…
This would be a funny story if it actually wasn’t so problematic. Please let me know what you think about this. I had an excellent experience with…
Liked by Ike Nassi
-
Some organizational changes in my group that I would like to make public. To better align cybersecurity defense of Microsoft, our customers, partners…
Some organizational changes in my group that I would like to make public. To better align cybersecurity defense of Microsoft, our customers, partners…
Liked by Ike Nassi
-
Over 10 years ago, we set out to prove that company building could be engineered, not left to chance. Back then, eyebrows were raised, and questions…
Over 10 years ago, we set out to prove that company building could be engineered, not left to chance. Back then, eyebrows were raised, and questions…
Liked by Ike Nassi
-
The time has finally come to transition to "life after work". First TO DO is to update this picture 😉 Lots of memories between HP, ... 44 years…
The time has finally come to transition to "life after work". First TO DO is to update this picture 😉 Lots of memories between HP, ... 44 years…
Liked by Ike Nassi
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content