31 – 40 of 67
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2023
-
Mark
Low-power Acceleration of Convolutional Neural Networks using Near Memory Computing on a RISC-V SoC
(2023)
- Other contribution › Master's thesis
- 2022
-
Mark
Secure Ownership Transfer for Resource Constrained IoT Infrastructures
(2022) 6th International Conference on Information Systems Security and Privacy, ICISSP 2020 In Communications in Computer and Information Science 1545 CCIS. p.22-47
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Solving Exact Cover Instances with Molecular-Motor-Powered Network-Based Biocomputation
- Contribution to journal › Article
-
Mark
Compression of Activation Signals from Split Deep Neural Network
(2022) 14th IEEE Latin-American Conference on Communications, LATINCOM 2022 In 2022 IEEE Latin-American Conference on Communications, LATINCOM 2022
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Bifrost : A Secure, Scalable and Efficient File Sharing System Based on Dual Deduplication
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An Application Specific Vector Processor for Efficient Massive MIMO Processing
- Contribution to journal › Article
-
Mark
CatNap : Leveraging Generic MPC for Actively Secure Privacy-enhancing Proximity Testing with a Napping Party
(2022) 19th International Conference on Security and Cryptography, SECRYPT 2022 In Proceedings of the International Conference on Security and Cryptography 1. p.237-248
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Very large-scale diffraction investigations enabled by a matrix-multiplication facilitated radial and azimuthal integration algorithm : MatFRAIA
- Contribution to journal › Article
-
Mark
Advantages of binary stochastic synapses for hardware spiking neural networks with realistic memristors
- Contribution to journal › Article
- 2021
-
Mark
Using Program Analysis to Identify the Use of Vulnerable Functions
(2021) p.520-530
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
