Search Constraints
« Previous |
21 - 40 of 343
|
Next »
Search Results
Select an image to start the slideshow
Software-Induced Fault Attacks on Post-Quantum Signature Schemes
1 of 20
MoM modeling of metal-dielectric structures using volume integral equations
2 of 20
Novel Concepts for RF Surface Coils with Integrated Receivers
3 of 20
Noise Analysis and Simulation of a Sub-Pixel Analog to Digital Voltage-To-Frequency Converter for use with IR Focal Plane Arrays
4 of 20
Analysis of Distributed Resources Potential Impacts on Electric System Efficacy
5 of 20
On Random Sampling for Compliance Monitoring in Opportunistic Spectrum Access Networks
6 of 20
On LTE Security: Closing the Gap Between Standards and Implementation
7 of 20
Cross-Comparison of Three Electromyogram Decomposition Algorithms Assessed with Simulated and Experimental Data
8 of 20
A Highly Digital VCO-Based ADC With Lookup-Table-Based Background Calibration
9 of 20
Cross-Layer Vulnerability Analysis of System-on-Chip against Physical Hardware Attacks
10 of 20
Deep Learning Binary Neural Network on an FPGA
11 of 20
Empirical RF Propagation Modeling of Human Body Motions for Activity Classification
12 of 20
An Assessment of Available Software Defined Radio Platforms Utilizing Iterative Algorithms
13 of 20
Optimal Strategies in Jamming Resistant Uncoordinated Frequency Hopping Systems
14 of 20
Sidelobe Suppression and Agile Transmission Techniques for Multicarrier-based Cognitive Radio Systems
15 of 20
An Inertial-Optical Tracking System for Quantitative, Freehand, 3D Ultrasound
16 of 20
Rapid Prototyping Interface for Software Defined Radio Experimentation
17 of 20
Lightweight Cryptography Meets Threshold Implementation: A Case Study for SIMON
18 of 20
Low Power Elliptic Curve Cryptography
19 of 20
Design of a Mobile Transceiver for Precision Indoor Location
20 of 20