Rene Leuken
187 records found
1
Authored
Design for a TCP/IP transparent FPGA-based network diode
To what extent is it possible to implement a network diode on an FPGA under realistic network environments, using the Transmission Control Protocol?
Hardware-Based Methods for Memory Acquisition
Analysis and Improvements
Some server hosters facilitate cyber crime either intentionally (so called “bulletproof hosters”) or unintentionally (“bad hosters”). When dealing with uncooperative hosters during forensic investigations, it may sometimes be necessary to collect data or info ...
Population Step Forward Encoding Algorithm
Improving the signal encoding accuracy and efficiency of spike encoding algorithms
N-shot Training Methodology
For Spiking Neural Networks(SNNs)
Source-Synchronous Interface with All-Digital Data Recovery
A Low-cost Efficient Design
ρ-VEX ASIC
The Design of an ASIC for a Dynamically Reconfigurable VLIW Processor with 24-port Register File
A f ...
Contributed
Design for a TCP/IP transparent FPGA-based network diode
To what extent is it possible to implement a network diode on an FPGA under realistic network environments, using the Transmission Control Protocol?
Design for a TCP/IP transparent FPGA-based network diode
To what extent is it possible to implement a network diode on an FPGA under realistic network environments, using the Transmission Control Protocol?
Design for a TCP/IP transparent FPGA-based network diode
To what extent is it possible to implement a network diode on an FPGA under realistic network environments, using the Transmission Control Protocol?
Hardware-Based Methods for Memory Acquisition
Analysis and Improvements
Some server hosters facilitate cyber crime either intentionally (so called “bulletproof hosters”) or unintentionally (“bad hosters”). When dealing with uncooperative hosters during forensic investigations, it may sometimes be necessary to collect data or info ...
Hardware-Based Methods for Memory Acquisition
Analysis and Improvements
Some server hosters facilitate cyber crime either intentionally (so called “bulletproof hosters”) or unintentionally (“bad hosters”). When dealing with uncooperative hosters during forensic investigations, it may sometimes be necessary to collect data or info ...
Hardware-Based Methods for Memory Acquisition
Analysis and Improvements
Some server hosters facilitate cyber crime either intentionally (so called “bulletproof hosters”) or unintentionally (“bad hosters”). When dealing with uncooperative hosters during forensic investigations, it may sometimes be necessary to collect data or info ...
Population Step Forward Encoding Algorithm
Improving the signal encoding accuracy and efficiency of spike encoding algorithms
Population Step Forward Encoding Algorithm
Improving the signal encoding accuracy and efficiency of spike encoding algorithms
Physical Characterization of Asynchronous Logic Library
A Design of AER Transmitter and Its Characterization and Back-end Design Flow
N-shot Training Methodology
For Spiking Neural Networks(SNNs)
N-shot Training Methodology
For Spiking Neural Networks(SNNs)
Source-Synchronous Interface with All-Digital Data Recovery
A Low-cost Efficient Design
ρ-VEX ASIC
The Design of an ASIC for a Dynamically Reconfigurable VLIW Processor with 24-port Register File
A f ...
ρ-VEX ASIC
The Design of an ASIC for a Dynamically Reconfigurable VLIW Processor with 24-port Register File
A f ...