Search for persons
X
?
Monitoring and Control of Electrical Power Systems Using Machine Learning Techniques ,
6
Contributors:
, In:
?
Applied Reconfigurable Computing. Architectures, Tools, and Applications; Lecture Notes in Computer Science ,
9
Cryptographic Security Through a Hardware Root of Trust:
, In:
?
Proceedings of the 11th International Workshop on Cooperative and Human Aspects of Software Engineering ,
10
An exploratory study for scoping software product lines in ..:
, In:
?
Lecture Notes in Computer Science; Experimental IR Meets Multilinguality, Multimodality, and Interaction ,
11
Using Authorship Embeddings to Understand Writing Style in ..:
, In:
?
2022 International Joint Conference on Neural Networks (IJCNN) ,
12
Generating Authorship Embeddings with Transformers:
, In:
?
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022); Lecture Notes in Networks and Systems ,
13
Android Malware Detection Through a Pre-trained Model for C..:
, In:
?
Intelligent Data Engineering and Automated Learning – IDEAL 2021; Lecture Notes in Computer Science ,
15