Poster

Kleptography in Authentication Protocols: Why is it Still Possible?

Compute-efficient neural network architecture optimization by a genetic algorithm

Scheduling Moldable Parallel Streaming Tasks on Heterogeneous Platforms with Frequency Scaling