The page lists 35 projects related to the topic "primitives".
# | |||
---|---|---|---|
1 | DexROV | Dexterous ROV: effective dexterous ROV operations in presence of communication latencies. | 2015 |
2 | FOC | Foundations of Cryptographic Hardness | 2015 |
3 | FELICITY | Foundations of Efficient Lattice Cryptography | 2015 |
4 | SUPERCLOUD | USER-CENTRIC MANAGEMENT OF SECURITY AND DEPENDABILITY IN CLOUDS OF CLOUDS | 2015 |
5 | HECTOR | HARDWARE ENABLED CRYPTO AND RANDOMNESS | 2015 |
6 | BEBA | Behavioral Based Forwarding | 2015 |
7 | TREDISEC | Trust-aware, REliable and Distributed Information SEcurity in the Cloud. | 2015 |
8 | CogIMon | Cognitive Interaction in Motion | 2015 |
9 | ACINO | Application Centric IP/Optical Network Orchestration | 2015 |
10 | SKILLS4ROBOTS | Policy Learning of Motor Skills for Humanoid Robots | 2015 |
11 | SUPERFLUIDITY | Superfluidity: a super-fluid, cloud-native, converged edge system | 2015 |
12 | QINTERNET | Quantum communication networks | 2016 |
13 | ECogNeT | Embodied Cognitive Neuromorphic Technology | 2016 |
14 | GraphInt | Principles of Graph Data Integration | 2016 |
15 | QUASYModo | Symmetric Cryptography in the Post-Quantum World | 2017 |
16 | InteractiveSkin | InteractiveSkin: Digital Fabrication of Personalized On-Body User Interfaces | 2017 |
17 | FAFC | Foundations and Applications of Functional Cryptography | 2017 |
18 | POPSTAR | Reasoning about Physical properties Of security Protocols with an Application To contactless Systems | 2017 |
19 | NeuroAgents | Neuromorphic Electronic Agents: from sensory processing to autonomous cognitive behavior | 2017 |
20 | ACTICIPATE | Action understanding in human and robot dyadic interaction | 2017 |
21 | CASCAde | Confidentiality-preserving Security Assurance | 2017 |
22 | ALGSTRONGCRYPTO | Algebraic Methods for Stronger Crypto | 2017 |
23 | NTSC | New Techniques for Secure Computation | 2017 |
24 | REACT | Realizable Advanced Cryptography | 2017 |
25 | EXPROTEA | Exploring Relations in Structured Data with Functional Maps | 2018 |
26 | PROMETHEUS | PRivacy preserving pOst-quantuM systEms from advanced crypTograpHic mEchanisms Using latticeS | 2018 |
27 | Fun-COMP | Functionally scaled computing technology: From novel devices to non-von Neumann architectures and algorithms for a connected intelligent world | 2018 |
28 | ALOHA | software framework for runtime-Adaptive and secure deep Learning On Heterogeneous Architectures | 2018 |
29 | PAPAYA | PlAtform for PrivAcY preserving data Analytics | 2018 |
30 | CLOUDMAP | Cloud Computing via Homomorphic Encryption and Multilinear Maps | 2018 |
31 | VECMA | Verified Exascale Computing for Multiscale Applications | 2018 |
32 | ESCADA | Energy-optimized Symmetric Cryptography by Algebraic Duality Analysis | 2018 |
33 | LEGO-3D | Learning Generative 3D Scene Models for Training and Validating Intelligent Systems | 2020 |
34 | RAINBOW | AN OPEN, TRUSTED FOG COMPUTING PLATFORM FACILITATING THE DEPLOYMENT, ORCHESTRATION AND MANAGEMENT OF SCALABLE, HETEROGENEOUS AND SECURE IOT SERVICES AND CROSS-CLOUD APPS | 2020 |
35 | MCT | Metacomputational Complexity Theory | 2020 |