Next Article in Journal
Power-Time Exploration Tools for NMP-Enabled Systems
Next Article in Special Issue
The Application of a New Secure Software Development Life Cycle (S-SDLC) with Agile Methodologies
Previous Article in Journal
A Fast Algorithm for Identifying Density-Based Clustering Structures Using a Constraint Graph
Previous Article in Special Issue
Model-Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification
 
 
Review

Article Versions Notes

Electronics 2019, 8(10), 1095; https://doi.org/10.3390/electronics8101095
Action Date Notes Link
article xml file uploaded 28 September 2019 11:21 CEST Original file -
article xml uploaded. 28 September 2019 11:21 CEST Update -
article pdf uploaded. 28 September 2019 11:21 CEST Version of Record https://www.mdpi.com/2079-9292/8/10/1095/pdf-vor
article html file updated 28 September 2019 11:22 CEST Original file -
article xml file uploaded 29 September 2019 08:59 CEST Update -
article xml uploaded. 29 September 2019 08:59 CEST Update https://www.mdpi.com/2079-9292/8/10/1095/xml
article pdf uploaded. 29 September 2019 08:59 CEST Updated version of record https://www.mdpi.com/2079-9292/8/10/1095/pdf
article html file updated 29 September 2019 09:01 CEST Update -
article html file updated 30 October 2019 13:31 CET Update -
article html file updated 13 February 2020 21:07 CET Update -
article html file updated 20 July 2022 02:32 CEST Update https://www.mdpi.com/2079-9292/8/10/1095/html
Back to TopTop