paper-conference

Optimizing Energy Efficiency with Configuration Constraints for AMR Trajectory Planning
Tail Victims in Termination Timing Channel Protections beyond Cryptographic Kernels