Author of the publication

Design and Implementation of an Efficient Communication Protocol Based on Hyper Transport.

, , , , and . GCC, page 320-325. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network., , , , and . Appl. Intell., 49 (8): 3016-3026 (2019)Bidirectional IndRNN malicious webpages detection algorithm based on convolutional neural network and attention mechanism., , , , , and . Journal of Intelligent and Fuzzy Systems, 38 (2): 1929-1941 (2020)Combining multi-features with a neural joint model for Android malware detection., , , , and . Journal of Intelligent and Fuzzy Systems, 38 (2): 2151-2163 (2020)RFI suppression in SAR based on clutter estimation., , , and . IGARSS, page 1995-1998. IEEE, (2013)Failure Detection in P2P-Grid Environments., and . ICDCS Workshops, page 369-374. IEEE Computer Society, (2012)A Mechanism Based on Netfilter for Live TCP Migration in Cluster., , , , and . GCC, page 218-222. IEEE Computer Society, (2010)Energy-oriented dynamic SPM allocation based on time-slotted Cache conflict graph., , , and . DATE, page 598-601. IEEE, (2010)An outer-inner fuzzy cellular automata algorithm for dynamic uncertainty multi-project scheduling problem., , , , , and . Soft Comput., 19 (8): 2111-2132 (2015)Structured Probabilistic Pruning for Deep Convolutional Neural Network Acceleration., , , and . CoRR, (2017)Structured Pruning for Efficient ConvNets via Incremental Regularization., , , and . CoRR, (2018)