Results 141 to 150 of about 1,364,067 (299)
Computer security for data collection technologies. [PDF]
Cobb C +5 more
europepmc +1 more source
Laboratory projects for promoting hands-on learning in a computer security course [PDF]
Janice E. Huss
openalex +1 more source
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone +11 more
wiley +1 more source
Computer Security Incident Response Team Effectiveness: A Needs Assessment. [PDF]
Van der Kleij R, Kleinhuis G, Young H.
europepmc +1 more source
Transforming Cellulose Into Functional Three‐Dimensional Structures
Cellulose is promising for replacing synthetic polymers due to its excellent mechanical properties and low cost. This review highlights the recent advancements in transforming cellulose into functional 3D structures, including liquid gels and porous materials.
Xia Sun +5 more
wiley +1 more source
EMRlog method for computer security for electronic medical records with logic and data mining. [PDF]
Martínez Monterrubio SM +2 more
europepmc +1 more source
Report: 4th ACM Conference On Computer and Communications Security [PDF]
Donald J. Reifer
openalex +1 more source
The chemical composition and band alignment are systematically investigated at the TiO2/InP heterointerface. Thin TiO2 films are deposited by ALD on atomically ordered, P‐terminated p‐InP(100). By combining UPS, XPS, and ab initio molecular dynamics, the atomistic structure and electronic alignment are revealed.
Mohammad Amin Zare Pour +11 more
wiley +1 more source
A color image encryption scheme utilizing a logistic-sine chaotic map and cellular automata
The rapid advancement of 5G technology has led to a significant increase in the generation and transmission of visual image data, underscoring the growing need for robust privacy protection.
Shiji Sun +5 more
doaj +1 more source

