Author of the publication

Node configuration for the Aho-Corasick algorithm in Intrusion Detection Systems.

, , , , and . ANCS, page 121-122. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing customized microprocessors for fixed-point computation., , and . AHS, page 1. IEEE, (2015)Module-per-Object: A Human-Driven Methodology for C++-Based High-Level Synthesis Design., , and . FCCM, page 218-226. IEEE, (2019)Extern Objects in P4: an ROHC Compression Case Study., , , and . CoRR, (2016)An FPGA Overlay Architecture for Cost Effective Regular Expression Search (Abstract Only)., , and . FPGA, page 287-288. ACM, (2017)Accelerating the Inference Phase in Ternary Convolutional Neural Networks Using Configurable Processors., , , and . DASIP, page 94-99. IEEE, (2018)Heterogeneous Distributed SRAM Configuration for Energy-Efficient Deep CNN Accelerators., , and . NEWCAS, page 287-290. IEEE, (2020)Accuracy-aware processor customisation for fixed-point arithmetic., , and . IET Comput. Digit. Tech., 10 (1): 1-11 (2016)Asymmetric large size multipliers with optimised FPGA resource utilisation., , , and . IET Comput. Digit. Tech., 6 (6): 372-383 (2012)Polyphase Filter Approach for High Performance, FPGA-Based Quadrature Demodulation., , and . VLSI Signal Processing, 32 (3): 237-254 (2002)Body temperature estimation of a moving subject from thermographic images., , , , , , and . Mach. Vis. Appl., 23 (2): 299-311 (2012)