Login / Signup
Code-Based Cryptography for Confidential Inference on FPGAs: An End-to-End Methodology.
Rupesh Raj Karn
Johann Knechtel
Ozgur Sinanoglu
Published in:
ISQED (2024)
Keyphrases
</>
end to end
congestion control
multipath
wireless ad hoc networks
admission control
high bandwidth
application layer
rate allocation
transport layer
real world
sliding window
video streams
ad hoc networks
hardware implementation
internet protocol