Author of the publication

ILP security optimization method for embedded systems with timing constraints.

, , , , and . CSIIRW, page 38. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Head Record Cache Structure to Improve the Operations on Big Files in Cloud Storage Servers., , , , , and . HPCC/CSS/ICESS, page 46-51. IEEE, (2015)Online energy-saving algorithm for sensor networks in dynamic changing environments., , , , , , and . J. Embed. Comput., 3 (4): 289-298 (2009)Energy minimization for heterogeneous wireless sensor networks., , , , and . J. Embed. Comput., 3 (2): 109-117 (2009)Authentication Study for Brain-Based Computer Interfaces Using Music Stimulations., and . ICA3PP (3), volume 12454 of Lecture Notes in Computer Science, page 663-675. Springer, (2020)On services pushing and caching in high-speed train by using converged broadcasting and cellular networks., , , , , and . BMSB, page 1-7. IEEE, (2017)AI and Machine Learning for Industrial Security With Level Discovery Method., , , and . IEEE Internet Things J., 8 (8): 6167-6177 (2021)Reconfigurable Hardware Generation for Tensor Flow Models of CNN Algorithms on a Heterogeneous Acceleration Platform., , , , , , , , , and 4 other author(s). SmartCom, volume 11344 of Lecture Notes in Computer Science, page 87-96. Springer, (2018)Research on Sentiment Dictionary Based on Sentiment Analysis in News Domain., , , , and . BigDataSecurity, page 117-122. IEEE, (2021)Security-Aware Efficient Mass Distributed Storage Approach for Cloud Systems in Big Data., , and . BigDataSecurity/HPSC/IDS, page 140-145. IEEE, (2016)Robust H∞ fusion filtering for discrete-time nonlinear delayed systems with missing measurement., , , and . ACC, page 6803-6808. IEEE, (2010)