Cited By
View all- Setiawan WThounaojam YNarayan A(2020)GWAD: Greedy Workflow Graph Anomaly Detection Framework for System Traces2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)10.1109/SMC42975.2020.9282938(2790-2796)Online publication date: 11-Oct-2020
- Zadeh MSalem MKumar NCutulenco GFischmeister SMitra TReineke J(2014)SiPTAProceedings of the 14th International Conference on Embedded Software10.1145/2656045.2656071(1-10)Online publication date: 12-Oct-2014
- Hashemi MForoozannejad MGhiasi S(2013)Throughput-memory footprint trade-off in synthesis of streaming software on embedded multiprocessorsACM Transactions on Embedded Computing Systems10.1145/2539036.253904213:3(1-26)Online publication date: 24-Dec-2013
- Show More Cited By