Presented on November 7, 2018 at 6:00 p.m. in the Georgia Tech Hotel and Conference Center, room 236.Xiangyun Lei is a graduate research assistant at the Georgia Institute of Technology with extensive experience in the processing and visualization of complex data.Runtime: 03:14 minute
Wireless sensor network (WSN) can be used as a solution to find out the position of an object that c...
Nowadays accurate personal identification is becoming more and more important. Usual means smart car...
The provided data were collected at the first floor of building 11 of the University of Minho, Portu...
9th Annual Cyber Security Summit, held June 6-8, 2017 at the Von Braun Center in Huntsville, Alabama...
Presented on November 7, 2018 at 6:00 p.m. in the Georgia Tech Hotel and Conference Center, room 236...
Presented on August 8, 2019 at 11:00 a.m. in the ISyE Main Building, Room 228 as part of the Foundat...
Presented on April 16, 2019 at 3:30 p.m. in the Klaus Advanced Computing Building, Room 1116.Present...
Presented on August 22, 2019 at 11:30 a.m.-1:00 p.m. in the Technology Square Research Building (TSR...
Presented on August 29, 2019 at 11:30 a.m.-1:00 p.m. in the Technology Square Research Building (TSR...
This repository contains artifacts of the paper Eavesdropping User Credentials via GPU Side Channels...
Presented on October 20, 2011 from 11:00 am to 12:00 noon in the Georgia Tech Architecture Library.R...
A detailed description of our dataset can be found here: Nor Hisham, A.N.; Ng, Y.H.; Tan, C.K.; Chi...
Presented on September 6, 2016 at the Klaus Advanced Computing Building, Room 1116W, Georgia Institu...
Location Based Services (LBS) are an important permissive technology and it have wide range of appli...
The widespread use of personal verification systems based on fingerprints has shown some security we...
Wireless sensor network (WSN) can be used as a solution to find out the position of an object that c...
Nowadays accurate personal identification is becoming more and more important. Usual means smart car...
The provided data were collected at the first floor of building 11 of the University of Minho, Portu...
9th Annual Cyber Security Summit, held June 6-8, 2017 at the Von Braun Center in Huntsville, Alabama...
Presented on November 7, 2018 at 6:00 p.m. in the Georgia Tech Hotel and Conference Center, room 236...
Presented on August 8, 2019 at 11:00 a.m. in the ISyE Main Building, Room 228 as part of the Foundat...
Presented on April 16, 2019 at 3:30 p.m. in the Klaus Advanced Computing Building, Room 1116.Present...
Presented on August 22, 2019 at 11:30 a.m.-1:00 p.m. in the Technology Square Research Building (TSR...
Presented on August 29, 2019 at 11:30 a.m.-1:00 p.m. in the Technology Square Research Building (TSR...
This repository contains artifacts of the paper Eavesdropping User Credentials via GPU Side Channels...
Presented on October 20, 2011 from 11:00 am to 12:00 noon in the Georgia Tech Architecture Library.R...
A detailed description of our dataset can be found here: Nor Hisham, A.N.; Ng, Y.H.; Tan, C.K.; Chi...
Presented on September 6, 2016 at the Klaus Advanced Computing Building, Room 1116W, Georgia Institu...
Location Based Services (LBS) are an important permissive technology and it have wide range of appli...
The widespread use of personal verification systems based on fingerprints has shown some security we...
Wireless sensor network (WSN) can be used as a solution to find out the position of an object that c...
Nowadays accurate personal identification is becoming more and more important. Usual means smart car...
The provided data were collected at the first floor of building 11 of the University of Minho, Portu...