From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the performance of averaged optimal routing., , и . CISS, стр. 1-6. IEEE, (2012)Using Information Flow to Design an ISA that Controls Timing Channels., , и . CSF, стр. 272-287. IEEE, (2019)Systematic Security Assessment at an Early Processor Design Stage., , , и . TRUST, том 6740 из Lecture Notes in Computer Science, стр. 154-171. Springer, (2011)Towards Fast, Adaptive, and Hardware-Assisted User-Space Scheduling., , , , , , , , и . CoRR, (2023)MgX: Near-Zero Overhead Memory Protection with an Application to Secure DNN Acceleration., , , и . CoRR, (2020)Verifiable Access Control for Augmented Reality Localization and Mapping., , , , , , и . CoRR, (2022)GuardNN: Secure DNN Accelerator for Privacy-Preserving Deep Learning., , , и . CoRR, (2020)STAMP: Lightweight TEE-Assisted MPC for Efficient Privacy-Preserving Machine Learning., , , , и . CoRR, (2022)Information Flow Control in Machine Learning through Modular Model Architecture., , , , , , , , , и . CoRR, (2023)AEGIS: a single-chip secure processor.. Massachusetts Institute of Technology, Cambridge, MA, USA, (2005)ndltd.org (oai:dspace.mit.edu:1721.1/34469).