Author of the publication

Blacklist Core: Machine-Learning Based Dynamic Operating-Performance-Point Blacklisting for Mitigating Power-Management Security Attacks.

, , , , and . ISLPED, page 5:1-5:6. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying Cosine Series to XML Structural Join Size Estimation., , , , and . DEXA, volume 4080 of Lecture Notes in Computer Science, page 761-770. Springer, (2006)C3SRAM: In-Memory-Computing SRAM Macro Based on Capacitive-Coupling Computing., , , and . ESSCIRC, page 131-134. IEEE, (2019)An Empirical Study of Qualities of Association Rules from a Statistical View Point., , , and . CATA, page 404-409. ISCA, (2005)Estimating XML Structural Join Size Quickly and Economically., , , , and . ICDE, page 62. IEEE Computer Society, (2006)Blacklist Core: Machine-Learning Based Dynamic Operating-Performance-Point Blacklisting for Mitigating Power-Management Security Attacks., , , , and . ISLPED, page 5:1-5:6. ACM, (2018)K-Nearest Neighbor Hardware Accelerator Using In-Memory Computing SRAM., , , , and . ISLPED, page 1-6. IEEE, (2019)Microwatt end-to-End digital neural signal processing systems for motor intention decoding., , , , and . DATE, page 1008-1013. IEEE, (2017)A neuromorphic neural spike clustering processor for deep-brain sensing and stimulation systems., , , , and . ISLPED, page 91-97. IEEE, (2015)Applying cosine series to join size estimation., , and . CIKM, page 227-228. ACM, (2005)Efficient Processing of XML Twig Pattern: A Novel One-Phase Holistic Solution., , , , and . DEXA, volume 4653 of Lecture Notes in Computer Science, page 87-97. Springer, (2007)