Results 271 to 280 of about 13,284 (309)
Some of the next articles are maybe not open access.
Molecular imaging in oncology: Current impact and future directions
Ca-A Cancer Journal for Clinicians, 2022Steven P Rowe, Martin G Pomper
exaly
Dynamical memristors for higher-complexity neuromorphic computing
Nature Reviews Materials, 2022Suhas Kumar +2 more
exaly
New Electronics, 2019
Data is the key to any business and Intertrust's suite of computing products looks to better manage and understand it, as CEO Talal Shamoon explains to New Electronics
openaire +1 more source
Data is the key to any business and Intertrust's suite of computing products looks to better manage and understand it, as CEO Talal Shamoon explains to New Electronics
openaire +1 more source
2018
Relying on computer simulations and trusting their results is key for the epistemic future of this new research methodology. The questions that interest us in this chapter are how do researchers typically build reliability on computer simulations? and what exactly would it mean to trust results of computer simulations?
openaire +1 more source
Relying on computer simulations and trusting their results is key for the epistemic future of this new research methodology. The questions that interest us in this chapter are how do researchers typically build reliability on computer simulations? and what exactly would it mean to trust results of computer simulations?
openaire +1 more source
2019
This chapter introduces various ideas to deal with insider attacks using the research directions, which are discussed in earlier chapters such as remote attestation, sealed storage, and integrity measurement. Trusted computing dependent on hardware root of trust has been produced by industry to secure computing frameworks and billions of end points ...
openaire +1 more source
This chapter introduces various ideas to deal with insider attacks using the research directions, which are discussed in earlier chapters such as remote attestation, sealed storage, and integrity measurement. Trusted computing dependent on hardware root of trust has been produced by industry to secure computing frameworks and billions of end points ...
openaire +1 more source
Analogue computing with metamaterials
Nature Reviews Materials, 2020Farzad Zangeneh-Nejad +2 more
exaly
2008
Der Mangel an Sicherheit und Verlasslichkeit in den heutigen vernetzten IT-Systemen hat in den letzten 20 Jahren zu immer intensiveren und komplexeren Angriffen auf die Sicherheit der Computer-Infrastruktur gefuhrt. Besonders in der PC-Welt mit ihrer tiefen Vernetzung und dem Einsatz von SW, die auf diese stark zunehmenden Angriffe nicht vorbereitet ...
openaire +1 more source
Der Mangel an Sicherheit und Verlasslichkeit in den heutigen vernetzten IT-Systemen hat in den letzten 20 Jahren zu immer intensiveren und komplexeren Angriffen auf die Sicherheit der Computer-Infrastruktur gefuhrt. Besonders in der PC-Welt mit ihrer tiefen Vernetzung und dem Einsatz von SW, die auf diese stark zunehmenden Angriffe nicht vorbereitet ...
openaire +1 more source

