Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-correlation of specification and RTL for soft IP analysis., , , , , and . DATE, page 1-6. European Design and Automation Association, (2014)Smoothing delay jitter in networked control systems., , , and . J. Embed. Comput., 4 (1): 11-21 (2011)A Self Test Program Design Technique for Embedded DSP Cores., , and . J. Electron. Test., 22 (1): 71-87 (2006)An experiment with WWW interactive learning in university education., and . Comput. Educ., 31 (3): 255-264 (1998)Multiscan-Based Test Compression and Hardware Decompression Using LZ77., and . ITC, page 331-339. IEEE Computer Society, (2002)A robust authentication methodology using physically unclonable functions in DRAM arrays., , , , , and . DATE, page 647-652. ACM, (2015)High-temperature (>500°C) reconfigurable computing using silicon carbide NEMS switches., , , , , , , and . DATE, page 1065-1070. IEEE, (2011)Fast binary/decimal adder/subtractor with a novel correction-free BCD addition., , , , , and . ICECS, page 455-459. IEEE, (2011)Dynamic Evaluation of Hardware Trust., , , and . HOST, page 108-111. IEEE Computer Society, (2009)An efficient elliptic curve cryptography processor using addition chains with high information entropy., , and . CCECE, page 1-6. IEEE, (2012)