Search Constraints
« Previous |
1 - 20 of 214
|
Next »
Search Results
Select an image to start the slideshow
Investigating the Practical Limits of Rowhammer Attacks
1 of 20
Chaos in Memory: A Comprehensive Analysis of Register and Stack Variable Corruption
2 of 20
Enhancing Wireless Technologies with Machine Learning
3 of 20
Evaluation of Machine Learning Methods on Large-Scale Spatio-temporal Data for Photovoltaic Power Prediction
4 of 20
Large-Scale Characterization and Optimization of Bistable Rings
5 of 20
On the Selection of Simulation Methods for Implementing Wireless Channel Models
6 of 20
Implementing Emulated Communication Models for Hybrid and Dynamic Network Topologies
7 of 20
Side-channel Testing Infrastructures in Preand Post-Silicon Settings
8 of 20
Design and Evaluation of Bit-sliced Neural Network and Post-Quantum Implementations
9 of 20
Opportunistic RF Localization of Tire Pressure Monitoring System Transmissions
10 of 20
Cholinergic Wireless Photometry Device for Measurement of Neurontransmitter Markers in the Basal Forebrain and Hippocampus
11 of 20
Machine Learning Estimation of COVID-19 Social Distance Using Smartphone Sensor Data
12 of 20
Hardware Simulation of Embedded Software Fault Attacks: How to SimpliFI Processor Fault Vulnerability Evaluation
13 of 20
An Experimental Framework for Outdoor E-band Millimeter Wave Transmission Evaluation
14 of 20
Logic Design of Point Cloud Based Convolutional Neural Network Accelerators
15 of 20
Development of the Boundary Element Fast Multipole Method for Quasistatic Electromagnetic Modeling of the Brain
16 of 20
A Reinforcement Learning Approach To Optimize the MLC Prefetcher Aggressiveness at Run-Time
17 of 20
Evaluation of Drone Based Localization Via a Real-Time Emulation Environment
18 of 20
Bluetooth Packet Capture and Analysis Using Wireless Product Testbed
19 of 20
Control Barrier Functions for Safe CPS Under Sensor Faults and Attacks
20 of 20