106 results on '"Kamakoti, V."'
Search Results
2. Snoopy: A Webpage Fingerprinting Framework with Finite Query Model for Mass-Surveillance
3. Integrating Explainable AI with Infrared Imaging and Deep Learning for Breast Cancer Detection.
4. iPyrDAE: Image Pyramid-Based Denoising Autoencoder for Infrared Breast Images
5. PERI: A Posit Enabled RISC-V Core
6. SUNDEW: An Ensemble of Predictors for Case-Sensitive Detection of Malware.
7. Net-Police: A network patrolling service for effective mitigation of volumetric DDoS attacks
8. Clinical Thermography for Breast Cancer Screening: A Systematic Review on Image Acquisition, Segmentation, and Classification.
9. Theoretical Lower Bound for Border Length Minimization Problem
10. ProMAC: A proactive model predictive control based MAC protocol for cognitive radio vehicular networks
11. RaDaR: A Real-Word Dataset for AI powered Run-time Detection of Cyber-Attacks
12. Snoopy: A Webpage Fingerprinting Framework With Finite Query Model for Mass-Surveillance
13. FadingBF: A Bloom Filter With Consistent Guarantees for Online Applications
14. Snoopy: A Webpage Fingerprinting Framework with Finite Query Model for Mass-Surveillance
15. PERI
16. A RISC-V Processor Designed For Security
17. Karna: A Gate-Sizing based Security Aware EDA Flow for Improved Power Side-Channel Attack Protection
18. PERI: A Configurable Posit Enabled RISC-V Core.
19. PROLEMus: A Proactive Learning-Based MAC Protocol Against PUEA and SSDF Attacks in Energy Constrained Cognitive Radio Networks
20. MLTimer: Leakage Power Minimization in Digital Circuits Using Machine Learning and Adaptive Lazy Timing Analysis
21. A scalable pseudo-exhaustive search for fault diagnosis in microfluidic biochips
22. Optimal Don’t Care Filling for Minimizing Peak Toggles During At-Speed Stuck-At Testing
23. Collaborative Access Decisions: Why Has My Decision Not Been Enforced?
24. An Accuracy Tunable Non-Boolean Co-Processor Using Coupled Nano-Oscillators
25. Optimal Don’t Care Filling for Minimizing Peak Toggles During At-Speed Stuck-At Testing
26. Approximate Error Detection With Stochastic Checkers
27. Theoretical Lower Bound for Border Length Minimization Problem
28. SHAKTI Processors: An Open-Source Hardware Initiative
29. ChADD: An ADD Based Chisel Compiler with Reduced Syntactic Variance
30. Impact of multi-Vt technique in eliminating thermal runaway during testing of 3D chips
31. DFT Assisted Techniques for Peak Launch-to-Capture Power Reduction during Launch-On-Shift At-Speed Testing
32. DFT Assisted Techniques for Peak Launch-to-Capture Power Reduction during Launch-On-Shift At-Speed Testing
33. SHAKTI-F: A Fault Tolerant Microprocessor Architecture
34. Country-wide Long-term Event Detection and Classification Mechanisms Using Spatiotemporal BGP Prefix Data.
35. ProWATCh
36. SER mitigation technique through selective flip-flop replacement
37. Best is the Enemy of Good: Design Techniques for Low Power Tunable Approximate Application Specific Integrated Chips Targeting Media-Based Applications
38. Generating synthetic benchmark circuits for accelerated life testing of field programmable gate arrays using genetic algorithm and particle swarm optimization
39. Framework for Selective Flip-Flop Replacement for Soft Error Mitigation
40. A Review of Algorithms for Border Length Minimization Problem
41. "GOOD FUNDING CAN HELP US CATCH UP WITH ADVANCED AI WORLD?".
42. ProWATCh: A Proactive Cross-Layer Workload-Aware Temperature Management Framework for Low-Power Chip Multi-Processors.
43. Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast Encryption
44. Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach
45. Detection of SQLite Database Vulnerabilities in Android Apps
46. Towards Useful Anomaly Detection for Back Office Networks
47. Reed-Muller Code Based Symmetric Key Fully Homomorphic Encryption Scheme
48. Honeypot Deployment in Broadband Networks
49. Feature Selection for Effective Botnet Detection Based on Periodicity of Traffic
50. Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.