Author of the publication

Enhancing security of NVM-based main memory with dynamic Feistel network mapping.

, , , , , , , and . Frontiers of IT & EE, 19 (7): 847-863 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating GPGPU Memory Performance Through the C-AMAT Model., , , and . MCHPC@SC, page 35-39. ACM, (2017)Performance Modeling for Spark Using SVM., , , , , and . CCBD, page 127-131. IEEE Computer Society, (2016)Enhancing security of NVM-based main memory with dynamic Feistel network mapping., , , , , , , and . Frontiers of IT & EE, 19 (7): 847-863 (2018)Configuring in-memory cluster computing using random forest., , , , , and . Future Generation Comp. Syst., (2018)Shorter On-Line Warmup for Sampled Simulation of Multi-threaded Applications., , , , , , and . ICPP, page 350-359. IEEE Computer Society, (2015)Finite-Time Boundedness Analysis of Uncertain CGNNs with Multiple Delays., , , and . ISNN (1), volume 6063 of Lecture Notes in Computer Science, page 611-618. Springer, (2010)PCantorSim: Accelerating parallel architecture simulation through fractal-based sampling., , , , , , , and . TACO, 10 (4): 49:1-49:24 (2013)Corpus callosum MR image classification., , , , and . Knowl.-Based Syst., 23 (4): 330-336 (2010)Finding Frequent Subgraphs in Longitudinal Social Network Data Using a Weighted Graph Mining Approach., , and . ADMA (1), volume 6440 of Lecture Notes in Computer Science, page 405-416. Springer, (2010)Text Classification using Graph Mining-based Feature Extraction., , , and . SGAI Conf., page 21-34. Springer, (2009)