来自专业的译者、企业、网页和免费的翻译库。
dirección: professor of electrical engineering
address: professor of electrical engineering
最后更新: 2016-11-30
使用频率: 1
质量:
helsinki university of technology, department of electrical engineering.
helsinki university of technology, department of electrical engineering.
最后更新: 2016-03-03
使用频率: 1
质量:
* "scanning the past: a history of electrical engineering from the past".
* "scanning the past: a history of electrical engineering from the past".
最后更新: 2016-03-03
使用频率: 1
质量:
警告:包含不可见的HTML格式
basic vocational knowledge ? circuits, formulas and tables ? electrical engineering crystal lehr? und.
12 ????????? vol.16-3 ??-2 ???????????????????????? ?????????????.
最后更新: 2018-02-13
使用频率: 1
质量:
después de estudiar electrónica y familiarizarse con los principios del radar como miembro de la real fuerza aérea durante la segunda guerra mundial, completó su formación en el faraday house electrical engineering college en londres.
after studying electronics and getting familiarized with the radar principles as a member of the royal airforce during world war ii, he completed his training at the farady house electrical engineering college in london.
最后更新: 2018-02-13
使用频率: 1
质量:
* arthur kennelly (1912) application of hyperbolic functions to electrical engineering problems* william mueller, "exploring precalculus", § the number e, hyperbolic trigonometry.
* arthur kennelly (1912) application of hyperbolic functions to electrical engineering problems* william mueller, "exploring precalculus", § the number e, hyperbolic trigonometry.
最后更新: 2016-03-03
使用频率: 1
质量:
警告:包含不可见的HTML格式
1–9* rajat subhra chakraborty, somnath paul y swarup bhunia: "on-demand transparency for improving hardware trojan detectability", department of electrical engineering and computer science, case western reserve university, cleveland, oh, usa* yier jin y yiorgos makris: "hardware trojan detection using path delay fingerprint", department of electrical engineering yale university, new haven* reza rad, mohammad tehranipoor y jim plusquellic: "sensitivity analysis to hardware trojans using power supply transient signals", 1st ieee international workshop on hardware-oriented security and trust (host'08), 2008* dakshi agrawal, selcuk baktir, deniz karakoyunlu, pankaj rohatgi y berk sunar: "trojan detection using ic fingerprinting", ibm t.j. watson research center, yorktown heights, electrical \& computer engineering worcester polytechnic institute, worcester, massachusetts, nov 10, 2006* xiaoxiao wang, mohammad tehranipoor y jim plusquellic: "detecting malicious inclusions in secure hardware, challenges and solutions", 1st ieee international workshop on hardware-oriented security and trust (host'08), 2008* miron abramovici y paul bradley: "integrated circuit security - new threats and solutions"* zheng gong y marc x. makkes: "hardware trojan side-channels based on physical unclonable functions" - wistp 2011== referencias ==== enlaces externos ==
1–9* rajat subhra chakraborty, somnath paul and swarup bhunia: on-demand transparency for improving hardware trojan detectability, department of electrical engineering and computer science, case western reserve university, cleveland, oh, usa* yier jin and yiorgos makris: hardware trojan detection using path delay fingerprint, department of electrical engineering yale university, new haven* reza rad, mohammad tehranipoor and jim plusquellic: sensitivity analysis to hardware trojans using power supply transient signals, 1st ieee international workshop on hardware-oriented security and trust (host'08), 2008* dakshi agrawal, selcuk baktir, deniz karakoyunlu, pankaj rohatgi and berk sunar: trojan detection using ic fingerprinting, ibm t.j. watson research center, yorktown heights, electrical \& computer engineering worcester polytechnic institute, worcester, massachusetts, nov 10, 2006* xiaoxiao wang, mohammad tehranipoor and jim plusquellic: detecting malicious inclusions in secure hardware, challenges and solutions, 1st ieee international workshop on hardware-oriented security and trust (host'08), 2008* miron abramovici and paul bradley: integrated circuit security - new threats and solutions* zheng gong and marc x. makkes: hardware trojan side-channels based on physical unclonable functions - information security theory and practice.
最后更新: 2016-03-03
使用频率: 1
质量:
警告:包含不可见的HTML格式