8 papers:
- DAC-2014-LiuHM #detection #hardware #statistics
- Hardware Trojan Detection through Golden Chip-Free Statistical Side-Channel Fingerprinting (YL, KH, YM), p. 6.
- DATE-2014-HanKNV #learning
- A deep learning methodology to proliferate golden signoff timing (SSH, ABK, SN, ASV), pp. 1–6.
- SAC-2014-ParkH #analysis #network #performance
- Performance analysis of the golden-SM in the V2V network (MCP, DSH), pp. 1739–1740.
- FSE-2010-BanerjeeRHL #debugging #implementation
- Golden implementation driven software debugging (AB, AR, JAH, ZL), pp. 177–186.
- KDD-2003-AliK #clustering #divide and conquer #using #web
- Golden Path Analyzer: using divide-and-conquer to cluster Web clickstreams (KA, SPK), pp. 349–358.
- HT-1998-NanardNK #design pattern #hypermedia #reuse
- Pushing Reuse in Hypermedia Design: Golden Rules, Design Patterns and Constructive Templates (MN, JN, PK), pp. 11–20.
- CSEE-1994-Modesitt #re-engineering
- When the Golden Arches Gang Aft Agley: Incorporating Software Engineering into Computer Science (KLM), pp. 35–61.
- CAV-1991-Huttel #branch #decidability #process #similarity
- Silence is Golden: Branching Bisimilarity is Decidable for Context-Free Processes (HH), pp. 2–12.