From post

Architectures for efficient face authentication in embedded systems.

, , , и . DATE Designers' Forum, стр. 1-6. European Design and Automation Association, Leuven, Belgium, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dynamic Binary Instrumentation-Based Framework for Malware Defense., , и . DIMVA, том 5137 из Lecture Notes in Computer Science, стр. 64-87. Springer, (2008)Finding and Evaluating Parameters for BGV., , , , и . AFRICACRYPT, том 14064 из Lecture Notes in Computer Science, стр. 370-394. Springer, (2023)Risk Estimation for a Secure & Usable User Authentication Mechanism for Mobile Passenger ID Devices., , , , , и . CAMAD, стр. 173-178. IEEE, (2022)MILP-aided Cryptanalysis of Round Reduced ChaCha., , и . IACR Cryptology ePrint Archive, (2017)Neighbor stranger discrimination: a new defense mechanism against Internet DDOS attacks., , , и . AICCSA, стр. 95. IEEE Computer Society, (2005)NNBits: Bit Profiling with a Deep Learning Ensemble Based Distinguisher., , , , и . CT-RSA, том 13871 из Lecture Notes in Computer Science, стр. 493-523. Springer, (2023)Survey on Fully Homomorphic Encryption, Theory, and Applications., , , , , и . IACR Cryptol. ePrint Arch., (2022)ML-FEED: Machine Learning Framework for Efficient Exploit Detection., , , , и . TPS-ISA, стр. 140-149. IEEE, (2022)Modular Inverse for Integers using Fast Constant Time GCD Algorithm and its Applications., , , , , и . FPL, стр. 122-129. IEEE, (2021)GPU4SNN: GPU-Based Acceleration for Spiking Neural Network Simulations., , , и . PPAM (1), том 13826 из Lecture Notes in Computer Science, стр. 399-413. Springer, (2022)