Author of the publication

Energy Reduction of BTB by Focusing on Number of Branches per Cache Line.

, , and . J. Inf. Process., 24 (3): 492-503 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Privacy Information Abuse by Android Apps from API Call Logs., , , and . IWSEC, volume 11049 of Lecture Notes in Computer Science, page 143-157. Springer, (2018)Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition., , , and . ICISSP, page 325-332. SCITEPRESS, (2020)A Stage-Level Recovery Scheme in Scalable Pipeline Modules for High Dependability., , and . IWIA, page 21-29. IEEE, (2010)Malware Detection Using Gradient Boosting Decision Trees with Customized Log Loss Function., , , and . ICOIN, page 273-278. IEEE, (2021)Energy Reduction of BTB by Focusing on Number of Branches per Cache Line., , and . J. Inf. Process., 24 (3): 492-503 (2016)Cyber Attack Stage Tracing System based on Attack Scenario Comparison., , , , and . ICISSP, page 587-594. SCITEPRESS, (2022)Malware Detection using Attributed CFG Generated by Pre-trained Language Model with Graph Isomorphism Network., , , and . COMPSAC, page 1495-1501. IEEE, (2022)Identification of Cybersecurity Specific Content Using the Doc2Vec Language Model., , , and . COMPSAC (1), page 396-401. IEEE, (2019)A Minimal Roll-Back Based Recovery Scheme for Fault Toleration in Pipeline Processors., , , , , and . PRDC, page 237-238. IEEE Computer Society, (2010)An Automated ACL Generation System for Secure Internal Network., , , and . COMPSAC Workshops, page 559-564. IEEE Computer Society, (2016)978-1-4673-8845-0.