Skip to search formSkip to main contentSkip to account menu

Tamper-resistant security module

Known as: TRSM 
A Tamper-Resistant Security Module (TRSM) is a device that incorporates physical protections to prevent compromise of Cryptographic Security… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Ulkemizde ruh sagligi alaninda son on yil icinde gerceklesen en onemli gelismelerden birisi, toplum temelli ruh sagligi… 
2015
2015
Abstract : Recursion continues to play an important role in high-performance computing. However, parallelizing recursive… 
2015
2015
This study was conducted to find out the effect of Think-PairShare model and motivation on students’ reading comprehension… 
2013
2013
Design by Transformation (DxT) is a top-down approach to mechanically derive high-performance algorithms for dense linear algebra… 
2012
2012
The Tolerance Rough Sets Model (TRSM) is a tool to model document in text mining. Generation of a document representation based… 
2010
2010
In the information age, there are a lot of accounting information problems in the enterprises and government departments. At our… 
2007
2007
Ho et al. proposed a tolerance rough set model (TRSM) for representing documents and successfully applied it to document… 
2004
2004
This work provides a generalization of the traditional response surface methodology (RSM) that can be applied to complex… 
2003
2003
Clustering is a powerful tool for analyzing and finding useful information in text collections. However, document clustering is a…