Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sleepy Keeper: a New Approach to Low-leakage Power VLSI Design., and . VLSI-SoC, page 367-372. IEEE, (2006)Automated Bus Generation for Multiprocessor SoC Design., and . DATE, page 10282-10289. IEEE Computer Society, (2003)Use of Analog Signatures for Hardware Trojan Detection., , , , and . FPGAworld, page 15-22. ACM, (2017)Late Breaking Results: COPPER: Computation Obfuscation by Producing Permutations for Encoding Randomly., and . DAC, page 1-2. IEEE, (2023)A chip-level security framework for assessing sensor data integrity: work-in-progress., , and . CODES+ISSS, page 20. IEEE / ACM, (2018)Optimizing energy to minimize errors in dataflow graphs using approximate adders., , , , , and . CASES, page 177-186. ACM, (2010)Automatic Subject Identification Using Scale-Based Ballistocardiogram Signals., , , , , and . MobiHealth, volume 440 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 281-292. Springer, (2021)Software Compilation Using FPGA Hardware: Register Allocation., , , and . MECO, page 1-6. IEEE, (2023)Low Power Probabilistic Floating Point Multiplier Design., , , , , , and . ISVLSI, page 182-187. IEEE Computer Society, (2011)Design space optimization of embedded memory systems via data remapping., , , , and . LCTES-SCOPES, page 28-37. ACM, (2002)