CFFS: A Persistent Memory File System for Contiguous File Allocation With Fine-Grained Metadata | 0 | 0.34 | 2022 |
Lagrange interpolation-driven access control mechanism: Towards secure and privacy-preserving fusion of personal health records | 0 | 0.34 | 2022 |
Improved Trickle Algorithm Toward Low Power and Better Route for the RPL Routing Protocol | 0 | 0.34 | 2022 |
Detecting and Scoring Equipment Faults in Real Time During Semiconductor Test Processes | 0 | 0.34 | 2021 |
Provable Secure Group Key Establishment Scheme for Fog Computing | 0 | 0.34 | 2021 |
Grid Structure Attention for Natural Language Interface to Bash Commands | 0 | 0.34 | 2020 |
A Novel Gaming Video Encoding Process Using In-Game Motion Vectors | 0 | 0.34 | 2020 |
Data Reduction for real-time bridge vibration data on Edge | 0 | 0.34 | 2019 |
An Approach to the Design of Specific Hardware Circuits from C Programs. | 0 | 0.34 | 2018 |
Distributed Continuous Control With Meta Learning On Robotic Arms | 0 | 0.34 | 2018 |
BLE Tree Networks for Sensor Devices in Internet of Things. | 0 | 0.34 | 2017 |
PhishBox: An Approach for Phishing Validation and Detection. | 0 | 0.34 | 2017 |
Streaming Analytics Processing In Manufacturing Performance Monitoring And Prediction | 0 | 0.34 | 2017 |
Learning Cross-Domain Disentangled Deep Representation with Supervision from A Single Domain. | 1 | 0.37 | 2017 |
An Android Malware Detection Approach Using Bayesian Inference | 0 | 0.34 | 2016 |
The Concept Of Attack Scenarios And Its Applications In Android Malware Detection | 0 | 0.34 | 2016 |
An adaptive network intrusion detection approach for the cloud environment | 0 | 0.34 | 2015 |
An Fpga Memory Hierarchy For High-Level Synthesized Opencl Kernels | 0 | 0.34 | 2015 |
Machine Learning Based Hybrid Behavior Models for Android Malware Analysis | 6 | 0.43 | 2015 |
A hybrid multiple-character transition finite-automaton for string matching engine. | 0 | 0.34 | 2015 |
PFBF: Pre-Filtered Bloom Filters. | 0 | 0.34 | 2014 |
An Embedded NIDS with Multi-core Aware Packet Capture | 1 | 0.35 | 2013 |
An efficient multicharacter transition string-matching engine based on the aho-corasick algorithm | 7 | 0.46 | 2013 |
Mobile agent application and integration in electronic anamnesis system. | 3 | 0.42 | 2012 |
The enhancement of security in healthcare information systems. | 9 | 0.65 | 2012 |
Embedded Network Intrusion Detection Systems with a Multi-core Aware Packet Capture Module | 3 | 0.40 | 2011 |
A Data Parallel Approach to XML Parsing and Query | 3 | 0.38 | 2011 |
An in-place search algorithm for the resource constrained scheduling problem during high-level synthesis | 4 | 0.43 | 2010 |
An in-place search algorithm for the resource constrained scheduling problem during high-level synthesis | 4 | 0.43 | 2010 |
Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems | 3 | 0.43 | 2010 |
Heuristic algorithm for the resource constrained scheduling problem during high-level synthesis. | 0 | 0.34 | 2009 |
Access Control and Key Management Scheme Based on Bilinear Pairings over Elliptic Curves for Mobile Agent | 1 | 0.36 | 2009 |
An enhanced uplink scheduling algorithm for video traffic transmission in IEEE 802.16 BWA systems | 0 | 0.34 | 2009 |
Choosing the kernel parameters for support vector machines by the inter-cluster distance in the feature space | 49 | 1.52 | 2009 |
Adaptive Neighbor Caching for Fast BSS Transition Using IEEE 802.11k Neighbor Report | 2 | 0.40 | 2008 |
Crossing Heterogeneous Grid Systems with a Single Sign-On Scheme Based on a P2P Layer | 1 | 0.35 | 2008 |
The modified grid location service for mobile ad-hoc networks | 0 | 0.34 | 2007 |
Embedded Hardware/Software Design and Cosimulation using User Mode Linux and SystemC | 4 | 0.50 | 2007 |
Choosing the Kernel Parameters for the Directed Acyclic Graph Support Vector Machines | 0 | 0.34 | 2007 |
Energy Saving Based on CPU Voltage Scaling and Hardware Software Partitioning | 1 | 0.36 | 2007 |
Layered peer to peer streaming using hidden Markov models | 0 | 0.34 | 2007 |
A Dependable Outbound Bandwidth Based Approach for Peer to Peer Media Streaming | 1 | 0.35 | 2006 |
Choosing the Parameters of 2-norm Soft Margin Support Vector Machines According to the Cluster Validity | 0 | 0.34 | 2006 |
Transmission range designation broadcasting methods for wireless ad hoc networks | 0 | 0.34 | 2006 |
Choosing the Kernel parameters of Support Vector Machines According to the Inter-cluster Distance | 8 | 0.74 | 2006 |
A weighting initialization strategy for weighted support vector machines | 3 | 0.44 | 2005 |
Local Repair Mechanisms for On-Demand Routing in Mobile Ad hoc Networks | 8 | 0.75 | 2005 |
A Dynamic Node Degree Management Scheme for Energy-efficient Routing Protocols in Wireless Ad Hoc Networks | 1 | 0.36 | 2005 |
Dynamic Scheduling Methods for Computational Grid Environments | 16 | 0.73 | 2005 |
Training algorithms for fuzzy support vector machines with noisy data | 66 | 2.54 | 2004 |