LEADER 02000nam 2200577 a 450 001 9910452267403321 005 20200520144314.0 010 $a0-300-19482-X 010 $a1-299-16001-8 035 $a(CKB)2550000001001349 035 $a(EBL)3421139 035 $a(SSID)ssj0000821833 035 $a(PQKBManifestationID)11447049 035 $a(PQKBTitleCode)TC0000821833 035 $a(PQKBWorkID)10879957 035 $a(PQKB)10175451 035 $a(MiAaPQ)EBC3421139 035 $a(Au-PeEL)EBL3421139 035 $a(CaPaEBR)ebr10659311 035 $a(CaONFJC)MIL447251 035 $a(OCoLC)923602411 035 $a(EXLCZ)992550000001001349 100 $a20121026d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aEarthmasters$b[electronic resource] $ethe dawn of the age of climate engineering /$fClive Hamilton 210 $aNew Haven $cYale University Press$d2013 215 $a1 online resource (261 p.) 300 $aDescription based upon print version of record. 311 $a0-300-18667-3 320 $aIncludes bibliographical references and index. 327 $a""Contents""; ""Figures and Tables""; ""Preface""; ""Acknowledgements""; ""1 Why Geoengineering?""; ""2 Sucking Carbon""; ""3 Regulating Sunlight""; ""4 The Players and the Public""; ""5 Promethean Dreams""; ""6 Atmospheric Geopolitics""; ""7 Ethical Anxieties""; ""8 This Goodly Frame""; ""Notes""; ""Index"" 606 $aWeather control 606 $aClimate change mitigation 606 $aEnvironmental geotechnology 608 $aElectronic books. 615 0$aWeather control. 615 0$aClimate change mitigation. 615 0$aEnvironmental geotechnology. 676 $a551.68 700 $aHamilton$b Clive$0288902 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910452267403321 996 $aEarthmasters$92273218 997 $aUNINA LEADER 01180nam a2200253 i 4500 001 991001728049707536 008 060628s2005 it 001 0 ita d 020 $a8834857976 035 $ab13418038-39ule_inst 040 $aDip.to Studi Giuridici$bita 082 0 $a342.45052$220 100 1 $aAnzon, Adele$0149134 245 13$aLe potestà legislative dello Stato e delle regioni :$bappendice di aggiornamento al volume: I poteri delle regioni nella transizione dal modello originario al nuovo assetto costituzionale /$cAdele Anzon Demmig 260 $aTorino :$bGiappichelli,$cc2005 300 $avii, 121 p. ;$c24 cm. 650 4$aRegione$xPotere legislativo 651 4$aItalia$xCostituzioni politiche$xRiforma$d1948 740 22$aI poteri delle regioni nella transizione dal modello originario al nuovo assetto costituzionale 907 $a.b13418038$b02-04-14$c28-06-06 912 $a991001728049707536 945 $aLE027 342.45 ANZ01.03$g1$i2027000122677$lle027$o-$pE10.00$q-$rl$s- $t0$u5$v1$w5$x0$y.i14259709$z28-06-06 996 $aPotestà legislative dello Stato e delle regioni$91091890 997 $aUNISALENTO 998 $ale027$b28-06-06$cm$da $e-$fita$git $h3$i0 LEADER 03876nam 22007095 450 001 9910627259803321 005 20251113185652.0 010 $a981-19-4017-7 024 7 $a10.1007/978-981-19-4017-0 035 $a(MiAaPQ)EBC7088008 035 $a(Au-PeEL)EBL7088008 035 $a(CKB)24837145900041 035 $a(PPN)264953673 035 $a(OCoLC)1345585543 035 $a(DE-He213)978-981-19-4017-0 035 $a(EXLCZ)9924837145900041 100 $a20220915d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDeep Learning for Computational Problems in Hardware Security $eModeling Attacks on Strong Physically Unclonable Function Circuits /$fby Pranesh Santikellur, Rajat Subhra Chakraborty 205 $a1st ed. 2023. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2023. 215 $a1 online resource (92 pages) 225 1 $aStudies in Computational Intelligence,$x1860-9503 ;$v1052 311 08$aPrint version: Santikellur, Pranesh Deep Learning for Computational Problems in Hardware Security Singapore : Springer,c2022 9789811940163 320 $aIncludes bibliographical references. 327 $aChapter 1: Introduction -- Chapter 2: Fundamental Concepts of Machine Learning -- Chapter 3: Supervised Machine Learning Algorithms for PUF Modeling Attacks -- Chapter 4: Deep Learning based PUF Modeling Attacks -- Chapter 5: Tensor Regression based PUF Modeling Attack -- Chapter 6: Binarized Neural Network based PUF Modeling -- Chapter 7: Conclusions and Future Work. . 330 $aThe book discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware security applications, in particular the techniques of launching potent "modeling attacks" on Physically Unclonable Function (PUF) circuits, which are promising hardware security primitives. The volume is self-contained and includes a comprehensive background on PUF circuits, and the necessary mathematical foundation of traditional and advanced machine learning techniques such as support vector machines, logistic regression, neural networks, and deep learning. This book can be used as a self-learning resource for researchers and practitioners of hardware security, and will also be suitable for graduate-level courses on hardware security and application of machine learning in hardware security. A stand-out feature of the book is the availability of reference software code and datasets to replicate the experiments described in the book. 410 0$aStudies in Computational Intelligence,$x1860-9503 ;$v1052 606 $aElectronic circuits 606 $aArtificial intelligence 606 $aMathematics 606 $aComputers, Special purpose 606 $aComputer science 606 $aElectronic Circuits and Systems 606 $aArtificial Intelligence 606 $aMathematics in Popular Science 606 $aSpecial Purpose and Application-Based Systems 606 $aComputer Science 615 0$aElectronic circuits. 615 0$aArtificial intelligence. 615 0$aMathematics. 615 0$aComputers, Special purpose. 615 0$aComputer science. 615 14$aElectronic Circuits and Systems. 615 24$aArtificial Intelligence. 615 24$aMathematics in Popular Science. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aComputer Science. 676 $a006.3 700 $aSantikellur$b Pranesh$01267562 702 $aChakraborty$b Rajat Subhra 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910627259803321 996 $aDeep learning for computational problems in hardware security$93010766 997 $aUNINA