Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Deepak Unnikrishnan"'
Autor:
Deepak Unnikrishnan
Publikováno v:
Research Handbook on Law and Literature ISBN: 9781839102264
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::87c54f2fbbee1644517d4e6c97fea022
https://doi.org/10.4337/9781839102264.00032
https://doi.org/10.4337/9781839102264.00032
Autor:
Deepak Unnikrishnan
Publikováno v:
Building Sharjah
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d05896432b3ac9f9b742f3c91b8e377a
https://doi.org/10.1515/9783035622775-011
https://doi.org/10.1515/9783035622775-011
Autor:
Deepak Unnikrishnan
‘Unnikrishnan refuses to occupy a single style or register, as if to inoculate the reader against settling on any one idea of what the U.A.E. is, or of what it means… [It] works wonders, jolting the readerly brain away from abstraction and direct
Autor:
Tilman Wolf, Deepak Unnikrishnan, Kekai Hu, Harikrishnan Kumarapillai Chandrikakutty, Russell Tessier
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 12:652-664
As the Internet becomes integrated into nearly all aspects of everyday life, its reliability grows in importance. This vital communication resource, which has become an inviting target for attackers, must be protected with the same vigor as the end-s
Autor:
Deepak Unnikrishnan
'Guest workers of the United Arab Emirates embody multiple worlds and identities and long for home in a fantastical debut work of fiction, winner of the inaugural Restless Books Prize for New Immigrant Writing.… An enchanting, unparalleled anthem o
Autor:
Lixin Gao, Ramakrishna Vadlamani, Yong Liao, Russell Tessier, Deepak Unnikrishnan, Jeremie Crenne
Publikováno v:
IEEE Transactions on Computers. 62:2476-2488
Network virtualization presents a powerful approach to share physical network infrastructure among multiple virtual networks. Recent advances in network virtualization advocate the use of field-programmable gate arrays (FPGAs) as flexible high perfor
Publikováno v:
FPT
Iterative algorithms represent a pervasive class of data mining, web search and scientific computing applications. In iterative algorithms, a final result is derived by performing repetitive computations on an input data set. Existing techniques to p
Autor:
Jérémie Crenne, Romain Vaslin, Jean-Philippe Diguet, Guy Gogniat, Russell Tessier, Deepak Unnikrishnan
Publikováno v:
ACM Transactions on Embedded Computing Systems
ACM Transactions on Embedded Computing Systems (TECS)
ACM Transactions on Embedded Computing Systems (TECS), ACM, 2013
ACM Transactions on Embedded Computing Systems (TECS)
ACM Transactions on Embedded Computing Systems (TECS), ACM, 2013
System security is an increasingly important design criterion for many embedded systems. These systems are often portable and more easily attacked than traditional desktop and server computing systems. Key requirements for system security include def