Author of the publication

Trusted Bytecode Virtual Machine Module: A Novel Method for Dynamic Remote Attestation in Cloud Computing.

, , , , , and . Int. J. Comput. Intell. Syst., 5 (5): 924-932 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PruX: Communication Pruning of Parallel BFS in the Graph 500 Benchmark., , , and . ICA3PP (1), volume 11334 of Lecture Notes in Computer Science, page 106-121. Springer, (2018)Optimal region gradated fusion based automatic image stitching for industrial systems., , , , , and . ICIT, page 1-7. IEEE, (2022)Optimizing Pointwise Convolutions on Multi-core DSPs., , , , and . ICA3PP (7), volume 14493 of Lecture Notes in Computer Science, page 209-223. Springer, (2023)Towards Effective Depthwise Convolutions on ARMv8 Architecture., , , , , , and . CoRR, (2022)Parallel convolution algorithm using implicit matrix multiplication on multi-core CPUs., , , and . IJCNN, page 1-7. IEEE, (2019)Model Provenance Management in MLOps Pipeline., , , and . ICCDE, page 45-50. ACM, (2022)An Active Data Leakage Prevention Model for Insider Threat., , , , and . IPTC, page 39-42. IEEE Computer Society, (2011)A Novel Vertical Fragmentation Method for Privacy Protection Based on Entropy Minimization in a Relational Database., , , and . Symmetry, 10 (11): 637 (2018)Edge Network Routing Protocol Base on Target Tracking Scenario., , , , , , and . Mob. Networks Appl., 26 (6): 2230-2241 (2021)RiskQ: Risk-sensitive Multi-Agent Reinforcement Learning Value Factorization., , , , , , , and . CoRR, (2023)