Search Constraints
« Previous |
51 - 60 of 350
|
Next »
Search Results
Select an image to start the slideshow
Towards Automated Analysis of Microarchitectural Attacks using Machine Learning
1 of 10
Improving the Performance of Dynamic Electromyogram-to-Force Models for the Hand-Wrist and Multiple Fingers
2 of 10
Age of Information in Multi-Hop Status Update Systems: Fundamental Bounds and Scheduling Policy Design
3 of 10
Micro-architectural Threats to Modern Computing Systems
4 of 10
Applications of Fully Homomorphic Encryption
5 of 10
Hybrid DES-based Vehicular Network Simulator with Multichannel Operations
6 of 10
Understanding and Countermeasures against IoT Physical Side Channel Leakage
7 of 10
Optimal Electromyogram Modeling and Processing During Active Contractions and Rest
8 of 10
Channel Estimation Error, Oscillator Stability And Wireless Power Transfer In Wireless Communication With Distributed Reception Networks
9 of 10
A Highly Digital VCO-Based ADC With Lookup-Table-Based Background Calibration
10 of 10