Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits., , and . ISC, volume 2851 of Lecture Notes in Computer Science, page 366-380. Springer, (2003)User satisfaction aware routing and energy modeling of polymorphic network on chip architecture., and . Comput. Electr. Eng., 40 (8): 260-275 (2014)A reconfigurable multifunction computing cache architecture., , and . IEEE Trans. Very Large Scale Integr. Syst., 9 (4): 509-523 (2001)A Novel Charge Recycling Design Scheme Based on Adiabatic Charge Pump., , and . IEEE Trans. Very Large Scale Integr. Syst., 15 (7): 733-745 (2007)Control flow based obfuscation., , and . Digital Rights Management Workshop, page 83-92. ACM, (2005)A novel thread scheduler design for polymorphic embedded systems., , and . CASES, page 75-84. ACM, (2011)SRAM CP: A Charge Recycling Design Schema for SRAM., and . PATMOS, volume 4148 of Lecture Notes in Computer Science, page 95-106. Springer, (2006)Integrated Area-power Optimal State Assignment.. VLSI Design, 12 (2): 275-300 (2001)Transient State Signaling for Spectre/Meltdown Transient Cache Side-channel Prevention., and . SECRYPT, page 655-660. SCITEPRESS, (2022)Huffman Cache Trails., and . iSES, page 277-282. IEEE, (2023)