Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware security strategies exploiting nanoelectronic circuits., , , , , and . ASP-DAC, page 368-372. IEEE, (2013)Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications., , , , , , and . Proc. IEEE, 103 (5): 829-849 (2015)Spike-Time-Dependent Encoding for Neuromorphic Processors., , , , , and . JETC, 12 (3): 23:1-23:21 (2015)Analysis of dynamic linear and non-linear memristor device models for emerging neuromorphic computing hardware design., , , and . IJCNN, page 1-5. IEEE, (2010)Reservoir Computing in Embedded Systems: Three variants of the reservoir algorithm., , , , and . IEEE Consumer Electronics Magazine, 6 (3): 67-73 (2017)Reservoir Computing and Extreme Learning Machines using Pairs of Cellular Automata Rules.. CoRR, (2017)Foundations of memristor based PUF architectures., , , , and . NANOARCH, page 52-57. IEEE Computer Society, (2013)Memristor-based synapse design and a case study in reconfigurable systems., , , , and . IJCNN, page 1-6. IEEE, (2013)A survey on memristor modeling and security applications., , , , and . ISQED, page 440-447. IEEE, (2015)A write-time based memristive PUF for hardware security applications., , , and . ICCAD, page 830-833. IEEE, (2013)