Search
Search Funnelback University
- Refined by:
- Date: Past month
1 -
2 of
2
search results for `Using RFID`
Fully-matching results
-
Department of Computer Science and Technology – Security Group: Past…
https://www.cl.cam.ac.uk/research/security/meetings/past-presentations.html17 Jun 2024: Jeff Yan: Collusion prevention and detection – a case study using online Bridge (20 min). ... 2006-03-31. Jeff Yan: Enhancing signature-based collaborative spam detection. 2006-04-21. JoonWoong Kim: Remark on HB protocol: RFID protocol using LPN. -
FedConv: A Learning-on-Model Paradigm for Heterogeneous Federated…
https://www.cl.cam.ac.uk/~qy258/assets/files/paper/24-MobiSys-FedConv.pdf16 Jun 2024: We evaluatethe model using the server-side IID test data and non-IID client-sidetest data. ... Runtime performance: 1) Memory footprint: the real-time GPUmemory usage is monitored using the PyTorch CUDA Toolkit.
Refine your results
clear all
Date
Search history
Recently clicked results
Recently clicked results
Your click history is empty.
Recent searches
Recent searches
Your search history is empty.