Author of the publication

An Effectiveness Model for Enterprise Architecture Methodologies.

, , , , and . Int. J. Enterp. Inf. Syst., 11 (2): 50-64 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ReDCrypt: Real-Time Privacy-Preserving Deep Learning Inference in Clouds Using FPGAs., , , and . ACM Trans. Reconfigurable Technol. Syst., 11 (3): 21:1-21:21 (2018)RISE: An Automated Framework for Real-Time Intelligent Video Surveillance on FPGA., , and . ACM Trans. Embed. Comput. Syst., 16 (5s): 158:1-158:18 (2017)SWANN: Small-World Architecture for Fast Convergence of Neural Networks., , and . IEEE J. Emerg. Sel. Topics Circuits Syst., 11 (4): 575-585 (2021)DeepMarks: A Secure Fingerprinting Framework for Digital Rights Management of Deep Learning Models., , , , and . ICMR, page 105-113. ACM, (2019)DeepSigns: An End-to-End Watermarking Framework for Ownership Protection of Deep Neural Networks., , and . ASPLOS, page 485-497. ACM, (2019)Going deeper than deep learning for massive data analytics under physical constraints., , and . CODES+ISSS, page 17:1-17:3. ACM, (2016)DeepAttest: an end-to-end attestation framework for deep neural networks., , , , and . ISCA, page 487-498. ACM, (2019)With Shared Microexponents, A Little Shifting Goes a Long Way., , , , , , , , , and 12 other author(s). ISCA, page 83:1-83:13. ACM, (2023)Performance Comparison of Contemporary DNN Watermarking Techniques., , , , and . CoRR, (2018)Current Issues on Enterprise Architecture Implementation Methodology., , , and . WorldCIST (2), volume 276 of Advances in Intelligent Systems and Computing, page 239-246. Springer, (2014)