Personensuche
X
?
2023 Design, Automation & Test in Europe Conference & Exhibition (DATE) ,
1
Narrowing the Synthesis Gap: Academic FPGA Synthesis is Cat..:
, In:
?
2023 International VLSI Symposium on Technology, Systems and Applications (VLSI-TSA/VLSI-DAT) ,
2
Overview of scalable transfer approaches to enable epitaxia..:
, In:
?
2022 Conference on Lasers and Electro-Optics Pacific Rim (CLEO-PR) ,
3
Vacuum Ultraviolet Light-Generating Metalens:
, In:
?
2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS) ,
4
Security Assessment for Zenbo Robot Using Drozer and mobSF ..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
5
EasyPQC: Verifying Post-Quantum Cryptography:
, In:
?
Proceedings of the 15th International Conference on Availability, Reliability and Security ,
6
4P based forensics investigation framework for smart connec..:
, In:
?
2020 IEEE Aerospace Conference ,
7
The Earth Surface Mineral Dust Source Investigation: An Ear..:
, In:
?
2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS) ,
8
A Scheduling Approach to Incremental Maintenance of Datalog..:
, In:
?
2020 IEEE International Conference on Networking, Sensing and Control (ICNSC) ,
9
A Prototype of Privacy Identification System for Smart Toy ..:
, In:
?
2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) ,
10
Duckiepond: An Open Education and Research Environment for ..:
, In:
?
Atlas of Ecosystem Services ,
11
Rice Ecosystem Services in South-East Asia: The LEGATO Proj..:
, In:
?
2019 12th CMI Conference on Cybersecurity and Privacy (CMI) ,
12
A Privacy-Preserving Context Ontology (PPCO) for Smart Conn..:
, In:
?
2019 IEEE International Symposium on Technologies for Homeland Security (HST) ,
13
Recognizing Radicalization Indicators in Text Documents Usi..:
, In:
?
2019 First International Conference on Graph Computing (GC) ,
14
Investigative Graph Search using Graph Databases:
, In:
?
Distributed, Ambient and Pervasive Interactions; Lecture Notes in Computer Science ,
15