Login / Signup
Shielding non-trusted IPs in SoCs.
Festus Hategekimana
Taylor J. L. Whitaker
Md Jubaer Hossain Pantho
Christophe Bobda
Published in:
FPL (2017)
Keyphrases
</>
distributed environment
trusted computing
network connection
database
machine learning
real time
real world
social networks
case study
cooperative
expert systems
multiresolution
probabilistic model
operating system