839181_634335443613367500
Mobile computing
MAIA Intelligence named Most Promising Startup
Securing-embedded-smart-cameras-with-trusted-computing_2011_Eurasip-Journal-on-Wireless-Communications-and-Networking
PITSaC 2013
Amphisbaena: Modeling Two Orthogonal Ways to Hunt on Heterogeneous Many-cores an analytical performance model for boosting performance Jun Ma, Guihai Yan,
Knowledge Engineering Data mining &. we must find a tool to automatically People have no time to look at this data ! We are deluged by data ! This magic.
Cryptography (Chapter 14) Presented By Jeff Shinsky April 13, 2004.
Jun Ma, Guihai Yan, Yinhe Han and Xiaowei Li State Key Laboratory of Computer Architecture
Cryptography (Chapter 14)
Simple search methods for finding a Nash equilibrium Ryan Porter, Eugene Nudelman, and Yoav Shoham Games and Economic Behavior, Vol. 63, Issue 2. pp. 642-661,