A multi-level architecture for hardware Trojan and vulnerability runtime detection and response towards cryptographic IP. | 0 | 0.34 | 2022 |
Partial Reconfiguration for Run-time Memory Faults and Hardware Trojan Attacks Detection | 0 | 0.34 | 2022 |
Elastic adaptive prefetching for non-volatile cache in IoT terminals | 0 | 0.34 | 2022 |
Rdams: An Efficient Run-Time Approach For Memory Fault And Hardware Trojans Detection | 2 | 0.40 | 2021 |
A Recommendation System to Facilitate Business Process Modeling. | 5 | 0.45 | 2017 |
Deep Learning of Graphs with Ngram Convolutional Neural Networks. | 9 | 0.53 | 2017 |
Enterprise Pattern: integrating the business process into a unified enterprise model of modern service company | 8 | 0.47 | 2017 |
Don't Fire Me, a Kernel Autoregressive Hybrid Model for Optimal Layoff Plan | 0 | 0.34 | 2016 |
Run JTA in JTang: Modeling in Artifact-Centric Model and Running in Activity-Centric Environment | 1 | 0.35 | 2015 |
Jointly Learning Sentiment, Keyword and Opinion Leader in Social Reviews. | 1 | 0.34 | 2015 |
A Framework for Transmission Cost Aware Service Selection | 1 | 0.41 | 2015 |
Icebreaker: A Platform for Service Dependency Detection. | 0 | 0.34 | 2015 |
An Efficient Recommendation Method for Improving Business Process Modeling. | 52 | 1.31 | 2014 |
A Dynamic Feature-Based Security Detector In Wireless Sensor Network Transceiver | 0 | 0.34 | 2014 |
Improved affine partition algorithm for compile-time and runtime performance | 0 | 0.34 | 2011 |
Towards Functional Dynamic Reconfiguration for Service-Based Applications | 4 | 0.42 | 2011 |