Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A cost-efficient QoS-aware analytical model of future software content delivery networks., , , , , , and . Int. J. Netw. Manag., (2021)The RECIPE Approach to Challenges in Deeply Heterogeneous High Performance Systems., , , , , , , , , and 1 other author(s). CoRR, (2021)Transfer-Learning-Based Intrusion Detection Framework in IoT Networks., , , , , , and . Sensors, 22 (15): 5621 (2022)The RECIPE approach to challenges in deeply heterogeneous high performance systems., , , , , , , , , and 1 other author(s). Microprocess. Microsystems, (2020)Dynamic Code Partitioning for Clustered Architectures., , and . Int. J. Parallel Program., 29 (1): 59-79 (2001)SSFB: A highly-efficient and scalable simulation reduction technique for SRAM yield analysis., and . DATE, page 1-6. European Design and Automation Association, (2014)Variability robustness enhancement for 7nm FinFET 3T1D-DRAM cells., , , , and . MWSCAS, page 81-84. IEEE, (2013)A Cost-Effective Clustered Architecture., , and . IEEE PACT, page 160-168. IEEE Computer Society, (1999)Malicious Website Detection Through Deep Learning Algorithms., , , and . LOD, volume 13163 of Lecture Notes in Computer Science, page 512-526. Springer, (2021)Very low power pipelines using significance compression., , and . MICRO, page 181-190. ACM/IEEE Computer Society, (2000)