Results 211 to 220 of about 410,193 (245)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the WESS'15: Workshop on Embedded Systems Security, 2015
Evaluating approaches to hardware Trojan detection often involves the use of benchmark hardware designs in order to maintain comparability and reproducibility of experiments. However, such benchmark designs may have to be adjusted to the tool chain that is used for evaluation.
Christian Krieg, Daniel Neubacher
openaire +2 more sources
Evaluating approaches to hardware Trojan detection often involves the use of benchmark hardware designs in order to maintain comparability and reproducibility of experiments. However, such benchmark designs may have to be adjusted to the tool chain that is used for evaluation.
Christian Krieg, Daniel Neubacher
openaire +2 more sources
Cooking, Celebrity Chefs, and Public Chef Intellectuals
Communication and Critical/Cultural Studies, 2015In her excellent book, Citizen Critics, Rosa Eberly theorizes the classroom as a protopublic space, a space in which students may “engage in the praxis of rhetoric, an art whose telos is krisis, or...
Justin Eckstein, Anna M. Young
openaire +1 more source
Le chef de l’État, chef des armées
Civitas Europa, 2017Cette étude s’intéressera aux questions relatives à la sécurité intérieure et à la défense. Ces questions ont suscité un regain d’intérêt ces dernières années eu égard aux contextes national et international marqués par des événements tragiques (notamment les attentats terroristes).
openaire +1 more source
Proceedings of the working conference on Advanced visual interfaces - AVI '06, 2006
Franca Garzotto, Luca Megale
openaire +1 more source
Franca Garzotto, Luca Megale
openaire +1 more source

