CSpace

浏览/检索结果: 共3条,第1-3条 帮助

已选(0)清除 条数/页:   排序方式:
A dependence graph pattern mining method for processor performance analysis 期刊论文
PERFORMANCE EVALUATION, 2024, 卷号: 164, 页码: 20
作者:  Zheng, Yawen;  Han, Chenji;  Zhang, Tingting;  Zhang, Fuxin;  Wang, Jian
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Performance analysis  Critical path analysis  Micro-execution dependence graph  Sequential pattern mining  High average utility  
Causality reasoning about network events for detecting stealthy malware activities 期刊论文
COMPUTERS & SECURITY, 2016, 卷号: 58, 页码: 180-198
作者:  Zhang, Hao;  Yao, Danfeng (Daphne);  Rarnakrishnan, Naren;  Zhang, Zhibin
收藏  |  浏览/下载:49/0  |  提交时间:2019/12/13
Network security  Anomaly detection  Stealthy maiware  Traffic analysis  Dependence analysis  Machine learning classification  
Dependence-based Multi-level Tracing and Replay for Wireless Sensor Networks Debugging 期刊论文
ACM SIGPLAN NOTICES, 2011, 卷号: 46, 期号: 5, 页码: 91-100
作者:  Wang, Man;  Li, Zhiyuan;  Li, Feng;  Feng, Xiaobing;  Bagchi, Saurabh;  Lu, Yung-Hsiang
收藏  |  浏览/下载:67/0  |  提交时间:2019/12/16
Algorithms  Reliability  Wireless sensor network  program debugging  invariants  dependence analysis  resource constrains