Author of the publication

The Design and Implementation of Crossbar in SMP Symmetrical Multi-processor System.

, , and . ISCSCT (1), page 626-629. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computer Evidence Analysis Technology Based on Weighted Frequent Pattern Growth Algorithm., , , , , and . ICAIS (3), volume 11634 of Lecture Notes in Computer Science, page 430-441. Springer, (2019)Network Storage Covert Channel Detection Based on Data Joint Analysis., , , , and . ICCCS (4), volume 11066 of Lecture Notes in Computer Science, page 346-357. Springer, (2018)BCI-CFI: A context-sensitive control-flow integrity method based on branch correlation integrity., , , , , and . Inf. Softw. Technol., (2021)Efficient Cache Strategy for Face Recognition System., , , , and . ICBDC, page 108-113. ACM, (2020)A Firmware Code Gene Extraction Technology for IoT Terminal., , , and . IEEE Access, (2019)An Information Intelligent Search Method for Computer Forensics Based on Text Similarity., , , , and . ICCSP, page 79-83. ACM, (2020)Unpaired Domain Transfer for Data Augment in Face Recognition., , , , and . IEEE Access, (2020)Research on the Algorithm of Decrypting Encrypted Synchronous Sequential Machine., , , and . ISCSCT (1), page 599-602. IEEE Computer Society, (2008)The Design and Implementation of Crossbar in SMP Symmetrical Multi-processor System., , and . ISCSCT (1), page 626-629. IEEE Computer Society, (2008)Hardware Threat: The Challenge of Information Security., , , and . ISCSCT (1), page 517-520. IEEE Computer Society, (2008)