Author of the publication

Node configuration for the Aho-Corasick algorithm in Intrusion Detection Systems.

, , , , and . ANCS, page 121-122. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A data-driven energy efficient and flexible compute fabric architecture: For adaptive computing applied to ULSI of FFT., , and . ICECS, page 750-753. IEEE, (2014)Designing customized microprocessors for fixed-point computation., , and . AHS, page 1. IEEE, (2015)Accuracy-aware processor customisation for fixed-point arithmetic., , and . IET Comput. Digit. Tech., 10 (1): 1-11 (2016)A SystemC Refinement Methodology for Embedded Software., , , , , , and . IEEE Des. Test Comput., 23 (2): 148-158 (2006)Performance verification for ESL design methodology from AADL models., , , and . RSP, page 33-37. IEEE, (2015)Applying Multi-Paradigm and Design Pattern Approaches to Hardware/Software Design and Reuse., , and . Patterns and Skeletons for Parallel and Distributed Computing, Springer, (2003)Node configuration for the Aho-Corasick algorithm in Intrusion Detection Systems., , , , and . ANCS, page 121-122. ACM, (2016)Self Sorting Radix_2 FFT on FPGA using Parallel Pipelined Distributed Arithmetic Blocks., , and . FCCM, page 337-338. IEEE Computer Society, (1998)Development of a high performance TSPC library for implementation of large digital building blocks., , , and . ISCAS (1), page 443-446. IEEE, (1999)An FPGA Implementation of a Scalable Network-on-Chip Based on the Token Ring Concept., , , , , and . ICECS, page 995-998. IEEE, (2007)