Skip to main content

Case School of Engineering

Secondary Menu

  • Students
  • Faculty & Staff
  • Alumni
  • Employers
  • Search
Enter the terms you wish to search for.
Enter the terms you wish to search for.

Main navigation

  • About
    • Our School
    • Faculty and Staff Directory
    • Meet the Dean
    • News
    • Community Outreach
    • Contact Us
  • Academics
    • Undergraduate
    • Graduate
    • Departments
  • Research
    • Centers and Institutes
  • Student Life
    • Student Groups
    • Peer Advising
    • Co-Op Program
    • Global Opportunities
    • Case Advancement Fellows
    • Student Support Offices
  • Give

Secondary Menu

  • Students
  • Faculty & Staff
    • Faculty and Staff Awards
  • Alumni
  • Employers
    • Supervising and Mentoring Co-Op Students
  • Search

Embedded Software Security through Key-based Control Flow Obfuscation

  • Read more about Embedded Software Security through Key-based Control Flow Obfuscation

Width-Aware Fine-Grained Dynamic Supply Gating: A Design Methodology for Low-Power Datapath and Memory

  • Read more about Width-Aware Fine-Grained Dynamic Supply Gating: A Design Methodology for Low-Power Datapath and Memory

SCARE: Side-Channel Analysis based Reverse Engineering for Post-Silicon Validation

  • Read more about SCARE: Side-Channel Analysis based Reverse Engineering for Post-Silicon Validation

Energy-Efficient Application Mapping in FPGA through Computation in Embedded Memory Blocks

  • Read more about Energy-Efficient Application Mapping in FPGA through Computation in Embedded Memory Blocks

Introduction to Special Issue on Implantable Electronics

  • Read more about Introduction to Special Issue on Implantable Electronics

Healing of DSP Circuits under Power Bound Using Post-Silicon Operand Bitwidth Truncation

  • Read more about Healing of DSP Circuits under Power Bound Using Post-Silicon Operand Bitwidth Truncation

Improving IC Security against Trojan Attacks through Integration of Security Monitors

  • Read more about Improving IC Security against Trojan Attacks through Integration of Security Monitors

Software Exploitable Hardware Trojan Attacks in Embedded Processor

  • Read more about Software Exploitable Hardware Trojan Attacks in Embedded Processor

Protection against Hardware Trojan Attacks: Towards a Comprehensive Solution

  • Read more about Protection against Hardware Trojan Attacks: Towards a Comprehensive Solution

Implantable Ultrasonic Dual Functional Assembly Detection and Treatment of Anomalous Growth

  • Read more about Implantable Ultrasonic Dual Functional Assembly Detection and Treatment of Anomalous Growth

Pagination

  • First page « First
  • Previous page ‹ Previous
  • …
  • Page 1116
  • Page 1117
  • Page 1118
  • Page 1119
  • Current page 1120
  • Page 1121
  • Page 1122
  • Page 1123
  • Page 1124
  • …
  • Next page Next ›
  • Last page Last »
Subscribe to
Case Western Reserve University Logo with Tagline
© 2024 Case Western Reserve University
10900 Euclid Ave. Cleveland, Ohio 44106
216.368.2000
Legal Notice | Privacy Policy
Title IX Notice of Non-Discrimination
map marker

Case School of Engineering
Campus Location:
Nord Hall
2095 Martin Luther King Jr Dr
Rm 500
Cleveland, OH 44106

Mailing Address:
10900 Euclid Ave.
Cleveland, Ohio 44106-7148

Phone: 216.368.4436

Social Media

  • Facebook
  • Instagram
  • Twitter
  • LinkedIn

CWRU Links

  • Apply to CWRU
  • Give Now
  • Visit Campus
  • University Directory