CORC

浏览/检索结果: 共30条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Hardware-Enhanced Protection for the Runtime Data Security in Embedded Systems 期刊论文
ELECTRONICS, 2019, 卷号: 8
作者:  Wang, Weike;  Zhang, Xiaobing;  Hao, Qiang;  Zhang, Zhun;  Xu, Bin
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/30
Approximation guarantees of evolutionary optimization on the minimum crossing spanning tree problem 期刊论文
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 卷号: 22, 页码: 409-417
作者:  Zhang, Jianping;  Zhou, Hong;  Gao, Huimin
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/30
Invited paper: Beagle: A new framework for smart contracts taking account of law 会议论文
Proceedings - 13th IEEE International Conference on Service-Oriented System Engineering, SOSE 2019, 10th International Workshop on Joint Cloud Computing, JCC 2019 and 2019 IEEE International Workshop on Cloud Computing in Robotic Systems, CCRS 2019, 2019-04-04
作者:  Tsai, W.-T.;  Ge, N.;  Jiang, J.;  Feng, K.;  He, J.
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/30
A novel index system describing program runtime characteristics for workload consolidation 期刊论文
FRONTIERS OF COMPUTER SCIENCE, 2019, 卷号: 13, 页码: 489-499
作者:  Wang, Lin;  Qian, Depei;  Wang, Rui;  Luan, Zhongzhi;  Yang, Hailong
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
A survey of software runtime monitoring 会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS
作者:  Gao, L.;  Lu, M.;  Li, L.;  Pan, C.
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/30
The runtime system problem identification method based on log analysis 会议论文
Proceedings - International Conference on Computer Communications and Networks, ICCCN
作者:  Liu, Y.;  Lv, J.;  Ma, S.;  Yao, W.
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/30
The Runtime System Problem Identification Method Based on Log Analysis 会议论文
2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018-01-01
作者:  Liu, Yanfang;  Lv, Jianghua;  Ma, Shilong;  Yao, Wentao
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
A Fine-Grained Hardware Security Approach for Runtime Code Integrity in Embedded Systems 期刊论文
JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2018, 卷号: 24, 页码: 515-536
作者:  Wang, Xiang;  Wang, Weike;  Xu, Bin;  Du, Pei;  Li, Lin
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
Runtime Models for Analysing and Evaluating Quality Attributes of Self-Adaptive Software: A Survey 会议论文
12TH INTERNATIONAL CONFERENCE ON RELIABILITY, MAINTAINABILITY, AND SAFETY (ICRMS 2018), 2018-01-01
作者:  Gu, Tingyang;  Lu, Minyan;  Li, Luyi
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/30
Exploring potentials of NAND-like spintronics MRAM for cache design (Invited) 会议论文
2018 14th IEEE International Conference on Solid-State and Integrated Circuit Technology, ICSICT 2018 - Proceedings
作者:  Wu, B.;  Zhang, B.;  Xu, Y.;  Wang, Z.;  Liu, D.
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30


©版权所有 ©2017 CSpace - Powered by CSpace