Search for persons
X
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
2
ELECTRON: An Architectural Framework for Securing the Smart..:
, In:
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
3
Privacy-Preserving Record Linkage Using Local Sensitive Has..:
, In:
?
Cyber-Physical Security for Critical Infrastructures Protection; Lecture Notes in Computer Science ,
4
A Cloud-Based Anomaly Detection for IoT Big Data:
, In:
?
Proceedings of the 10th ACM International Systems and Storage Conference ,
5
Big data analysis of cloud storage logs using spark:
, In:
?
Proceedings of the 51st Annual Design Automation Conference ,
6
Verification of Transactional Memory in POWER8:
, In:
?
Proceedings of the 51st Annual Design Automation Conference ,
7
Using a High-Level Test Generation Expert System for Testin..:
, In:
?
Proceedings of the 48th Design Automation Conference ,
8
Leveraging pre-silicon verification resources for the post-..:
, In:
?
Proceedings of the 48th Design Automation Conference ,
9
Threadmill : a post-silicon exerciser for multi-threaded..:
, In:
?
Proceedings of the 44th annual Design Automation Conference ,
10
A framework for the validation of processor architecture co..:
, In:
?
Proceedings of the 42nd annual Design Automation Conference ,
11
VLIW : a case study of parallelism verification:
, In:
?
Proceedings of the 42nd annual Design Automation Conference ,
12