Search

Search Funnelback University

Search powered by Funnelback
1 - 2 of 2 search results for `Using RFID`
  1. Fully-matching results

  2. Department of Computer Science and Technology – Security Group: Past…

    https://www.cl.cam.ac.uk/research/security/meetings/past-presentations.html
    17 Jun 2024: Jeff Yan: Collusion prevention and detection – a case study using online Bridge (20 min). ... 2006-03-31. Jeff Yan: Enhancing signature-based collaborative spam detection. 2006-04-21. JoonWoong Kim: Remark on HB protocol: RFID protocol using LPN.
  3. FedConv: A Learning-on-Model Paradigm for Heterogeneous Federated…

    https://www.cl.cam.ac.uk/~qy258/assets/files/paper/24-MobiSys-FedConv.pdf
    16 Jun 2024: We evaluatethe model using the server-side IID test data and non-IID client-sidetest data. ... Runtime performance: 1) Memory footprint: the real-time GPUmemory usage is monitored using the PyTorch CUDA Toolkit.

Refine your results

Search history

Recently clicked results

Recently clicked results

Your click history is empty.

Recent searches

Recent searches

Your search history is empty.