Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Scalable Implementation of Malware Detection Based on Network Connection Behaviors., , , , , and . CyberC, page 59-66. IEEE Computer Society, (2013)A Topic Detection Method Based on Microblog Weight., and . CyberC, page 209-212. IEEE Computer Society, (2015)Test Plan Design for Software Configuration Testing., , , , , and . Software Engineering Research and Practice, page 686-692. CSREA Press, (2003)Compiler-Assisted Refresh Minimization for Volatile STT-RAM Cache., , , , , and . IEEE Trans. Computers, 64 (8): 2169-2181 (2015)Cooperating Write Buffer Cache and Virtual Memory Management for Flash Memory Based Systems., , and . IEEE Real-Time and Embedded Technology and Applications Symposium, page 147-156. IEEE Computer Society, (2011)Design and implementation of GIS by ComGIS: A case study in National Earthen Site Geographic Information System., , and . Geoinformatics, page 1-4. IEEE, (2010)PUMA: Pseudo unified memory architecture for single-ISA heterogeneous multi-core systems., , , , , and . RTCSA, page 1-10. IEEE Computer Society, (2014)Context saliency based image summarization., , , , and . ICME, page 270-273. IEEE, (2009)Migration-aware loop retiming for STT-RAM based hybrid cache for embedded systems., , , , and . ASAP, page 83-86. IEEE Computer Society, (2013)cUpdate: Updating Software-Defined Networks with the Least Traffic Migration., , , , , and . BDCloud, page 87-92. IEEE, (2015)