Review of National Cybersecurity Policies. | 0 | 0.34 | 2018 |
O-Glasses: Visualizing X86 Code From Binary Using A 1d-Cnn | 0 | 0.34 | 2018 |
n-ROPdetector: Proposal of a Method to Detect the ROP Attack Code on the Network | 2 | 0.44 | 2014 |
Message from SAINT 2007 Workshops Chairs | 0 | 0.34 | 2007 |
Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax, VA, USA, November 2, 2007 | 8 | 5.53 | 2007 |
Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006 | 8 | 11.86 | 2006 |
Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005 | 12 | 1.89 | 2005 |
Evaluation of MRB garbage collection parallel logic programming architectures | 6 | 0.54 | 1990 |
Design and performance of a coherent cache for parallel logic programming architectures | 7 | 0.69 | 1989 |
Research and Development of the Parallel Inference System in the Intermediate Stage of the FGCS Project | 3 | 0.62 | 1988 |
Lazy Reference Counting: An Incremental Garbage Collection Method for Parallel Inference Machines | 9 | 0.65 | 1988 |
Macro-Call Instruction for the Efficient KL1 Implementation on PIM | 1 | 0.37 | 1988 |
Overview of the Parallel Inference Machine Architecture (PIM) | 11 | 1.20 | 1988 |
KL1 Execution Model for PIM Cluster with Shared Memory | 13 | 1.99 | 1987 |
Towards a high performance parallel inference machine—the intermediate stage plan of PIM | 0 | 0.34 | 1986 |
Highly Parallel Inference Engine PIE: Goal Rewriting Model and Machine Architecture | 15 | 2.15 | 1984 |