Secure Information Processing during System-Level: Exploration of an Optimized Trojan Secured Datapath for CDFGs during HLS Based on User Constraints.
Anirban SenguptaSaumya BhadauriaPublished in: iNIS (2015)
Keyphrases
- information processing
- user authentication
- human brain
- decision making
- web intelligence
- knowledge processing
- human intelligence
- working memory
- cognitive architecture
- cognitive science
- human beings
- databases
- granular computing
- information systems
- data management
- natural language processing
- end users
- user interface
- cognitive functions
- information transfer
- cognitive neuroscience
- cognitive processing
- bayesian networks
- artificial intelligence
- real world