238 results on '"Chandy, John A."'
Search Results
2. A framework for evaluating security risk in system design
3. Exploring the Coverage of Existing Hardware Vulnerabilities in Community Standards
4. Elevated Plasma Soluble ST2 Levels are Associated With Neuronal Injury and Neurocognitive Impairment in Children With Cerebral Malaria
5. Framework for Design Exploration of Secure Embedded System Development
6. Influence of Error on Hamming Weights for ASCA
7. Error Tolerant ASCA on FPGA
8. Exploring the Coverage of Existing Hardware Vulnerabilities in Community Standards
9. Single low-dose primaquine for blocking transmission of Plasmodium falciparum malaria – a proposed model-derived age-based regimen for sub-Saharan Africa
10. Sero-catalytic and Antibody Acquisition Models to Estimate Differing Malaria Transmission Intensities in Western Kenya
11. Compute-in-Memory SRAM Cell Using Multistate Spatial Wavefunction Switched (SWS)-Quantum Dot Channel (QDC) FET
12. Low Pass Filter PUF: Authentication of Printed Circuit Boards Based on Resistor and Capacitor Variations
13. Multi-State 2-Bit CMOS Logic Using n- and p-Quantum Well Channel Spatial Wavefunction Switched (SWS) FETs
14. An Overview of DRAM-Based Security Primitives
15. Quantum Dot Floating Gate Nonvolatile Random Access Memory Using Ge Quantum Dot Channel for Faster Erasing
16. Error Tolerant ASCA on FPGA
17. Influence of Error on Hamming Weights for ASCA
18. Exploring Methods of Authentication for the Internet of Things
19. Active Storage Networks for Accelerating K-Means Data Clustering
20. Translation of AADL model to security attack tree (TAMSAT) to SMART evaluation of monetary security risk
21. Translation of AADL model to security attack tree (TAMSAT) to SMART evaluation of monetary security risk.
22. Economic evaluation of postdischarge malaria chemoprevention in preschool children treated for severe anaemia in Malawi, Kenya, and Uganda: A cost-effectiveness analysis
23. Cache Locking and Encryption to Prevent Memory Snooping in Embedded Systems
24. Extracting Vulnerabilities from GitHub Commits
25. What Can Twins Teach Us About Malaria Epidemiology?
26. Distributed object oriented data structures and algorithms for VLSI CAD
27. 2-Dilated flattened butterfly: A nonblocking switching topology for high-radix networks
28. Implementation of Six Bit ADC and DAC Using Quantum Dot Gate Non-Volatile Memory
29. ATTEST: ATTributes-based Extendable STorage
30. Towards the Use of a Smartphone Imaging-Based Tool for Point-of-Care Detection of Asymptomatic Low-Density Malaria Parasitemia
31. Fabrication and Circuit Modeling of NMOS Inverter Based on Quantum Dot Gate Field-Effect Transistors
32. FPGA based string matching for network processing applications
33. RAID0.5: design and implementation of a low cost disk array data protection method
34. Harmful Algal Bloom Interception, Treatment, and Transformation System, 'HABITATS' : pilot research study phase I - summer 2019
35. Dual actuator logging disk architecture and modeling
36. Bit2RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory
37. A CAM-based keyword match processor architecture
38. Integrated Circuit Authentication Based on Resistor and Capacitor Variations of a Low Pass Filter (LoPUF).
39. FLASH: FPGA Locality-Aware Sensitive Hash for Nearest Neighbor Search and Clustering Application
40. A Holistic Approach to Cyber Physical Systems Security and Resilience
41. SMART: security model adversarial risk-based tool for systems security design evaluation
42. Embedded Systems Authentication and Encryption Using Strong PUF Modeling
43. Additional file 1: of Zinc for Infection Prevention in Sickle Cell Anemia (ZIPS): study protocol for a randomized placebo-controlled trial in Ugandan children with sickle cell anemia
44. Anti-Reverse Engineering Techniques for Integrated Circuits and Electronics Hardware
45. Imaging of childhood torticollis due to atlanto-axial rotatory fixation
46. An evaluation of parallel simulated annealing strategies with application to standard cell placement
47. The paradigm compiler for distributed-memory multicomputers
48. Distributed object oriented data structures and algorithms for VLSI CAD
49. Electronics Authentication using a Low Pass Filter PUF
50. Key Generation for Hardware Obfuscation Using Strong PUFs
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.