IoT security, privacy and trust in home-sharing economy via blockchain
The phenomenal growth of Internet-services has created a vibrant new domain for sharing
economy. Millions of users around the world share personal services and possessions with …
economy. Millions of users around the world share personal services and possessions with …
INSPECT: Investigating Supply Chain and Cyber-Physical Security of Battery Systems
Battery-operated applications have been ubiquitous all over the world ranging from power-
intensive electric cars down to low-power smart terminals and embedded devices …
intensive electric cars down to low-power smart terminals and embedded devices …
In-Memory Compute with Off-the-Shelf DRAMs and Efficient On-Chip Data Supply for Heterogeneous SoCs
F Gao - 2024 - search.proquest.com
In-memory computing has long been promised as a solution to the “Memory Wall” problem.
Unfortunately, performing computations with memory resources either has relied on …
Unfortunately, performing computations with memory resources either has relied on …
[PDF][PDF] First demonstration of reconfigurable and low-power strong physical unclonable function empowered by FeFET cycle-to-cycle variation
Physical unclonable functions (PUFs) are of immense potential in authentication
applications for 16 numerous Internet of Things (IoT) devices. For creditable and lightweight …
applications for 16 numerous Internet of Things (IoT) devices. For creditable and lightweight …
Self Adaptive Reinforcement Learning for High-Dimensional Stochastic Systems with Application to Robotic Control
SJA Raza - 2021 - stars.library.ucf.edu
A long standing goal in the field of artificial intelligence (AI) is to develop agents that can
perceive richer problem space and effortlessly plan their activity in minimal duration. Several …
perceive richer problem space and effortlessly plan their activity in minimal duration. Several …