CSpace

浏览/检索结果: 共7条,第1-7条 帮助

已选(0)清除 条数/页:   排序方式:
A dependence graph pattern mining method for processor performance analysis 期刊论文
PERFORMANCE EVALUATION, 2024, 卷号: 164, 页码: 20
作者:  Zheng, Yawen;  Han, Chenji;  Zhang, Tingting;  Zhang, Fuxin;  Wang, Jian
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Performance analysis  Critical path analysis  Micro-execution dependence graph  Sequential pattern mining  High average utility  
Deep spatial-temporal travel time prediction model based on trajectory feature 期刊论文
COMPUTERS & ELECTRICAL ENGINEERING, 2023, 卷号: 110, 页码: 12
作者:  Sheng, Zhaoyu;  Lv, Zhiqiang;  Li, Jianbo;  Xu, Zhihao
收藏  |  浏览/下载:19/0  |  提交时间:2023/12/04
Travel time prediction  Trajectory feature  Traffic condition  Spatial correlation  Temporal dependence  
Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2021, 卷号: 70, 期号: 7, 页码: 963-978
作者:  Zhao, Lutan;  Li, Peinan;  Hou, Rui;  Huang, Michael C.;  Liu, Peng;  Zhang, Lixin;  Meng, Dan
收藏  |  浏览/下载:36/0  |  提交时间:2021/12/01
Security  Hazards  Micromechanical devices  Microarchitecture  Out of order  Registers  Spectre vulnerabilities defense  security dependence  speculative execution side-channel vulnerabilities  
Locating Software Faults Based on Minimum Debugging Frontier Set 期刊论文
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2017, 卷号: 43, 期号: 8, 页码: 760-776
作者:  Li, Feng;  Li, Zhiyuan;  Huo, Wei;  Feng, Xiaobing
收藏  |  浏览/下载:44/0  |  提交时间:2019/12/12
Fault localization  minimum debugging frontier set  sparse symbolic exploration  dynamic dependence graph  
Causality reasoning about network events for detecting stealthy malware activities 期刊论文
COMPUTERS & SECURITY, 2016, 卷号: 58, 页码: 180-198
作者:  Zhang, Hao;  Yao, Danfeng (Daphne);  Rarnakrishnan, Naren;  Zhang, Zhibin
收藏  |  浏览/下载:49/0  |  提交时间:2019/12/13
Network security  Anomaly detection  Stealthy maiware  Traffic analysis  Dependence analysis  Machine learning classification  
Dependence-based Multi-level Tracing and Replay for Wireless Sensor Networks Debugging 期刊论文
ACM SIGPLAN NOTICES, 2011, 卷号: 46, 期号: 5, 页码: 91-100
作者:  Wang, Man;  Li, Zhiyuan;  Li, Feng;  Feng, Xiaobing;  Bagchi, Saurabh;  Lu, Yung-Hsiang
收藏  |  浏览/下载:67/0  |  提交时间:2019/12/16
Algorithms  Reliability  Wireless sensor network  program debugging  invariants  dependence analysis  resource constrains  
The information entropy of rough relational databases 期刊论文
ROUGH SETS, FUZZY SETS, DATA MINING, AND GRANULAR COMPUTING, 2003, 卷号: 2639, 页码: 320-324
作者:  Sui, YF;  Xia, YM;  Wang, J
收藏  |  浏览/下载:70/0  |  提交时间:2019/12/16
rough set  relational database  entropy  dependence