Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An exploration methodology for a customizable OpenCL stereo-matching application targeted to an industrial multi-cluster architecture., , , , , , and . CODES+ISSS, page 503-512. ACM, (2012)A system-level methodology for fast multi-objective design space exploration., , , and . ACM Great Lakes Symposium on VLSI, page 92-95. ACM, (2003)A Framework for Modeling and Estimating the Energy Dissipation of VLIW-Based Embedded Systems., , , , , and . Des. Autom. Embed. Syst., 7 (3): 183-203 (2002)SPIRIT: Spectral-Aware Pareto Iterative Refinement Optimization for Supervised High-Level Synthesis., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 34 (1): 155-159 (2015)Combining application adaptivity and system-wide Resource Management on multi-core platforms., , , , , , and . ICSAMOS, page 26-33. IEEE, (2014)Data Parallel Application Adaptivity and System-Wide Resource Management in Many-Core Architectures., , , , , , , , and . ARC, volume 8405 of Lecture Notes in Computer Science, page 345-352. Springer, (2014)About the performances of the Advanced Encryption Standard in embedded systems with cache memory., , , , , and . ISCAS (5), page 145-148. IEEE, (2003)Symbolic Analysis of Higher-Order Side Channel Countermeasures., , and . IEEE Trans. Computers, 66 (6): 1099-1105 (2017)Spectral Features of Higher-Order Side-Channel Countermeasures., , and . IEEE Trans. Computers, 67 (4): 596-603 (2018)The propagation game: on simulatability, correlation matrices, and probing security.. IACR Cryptol. ePrint Arch., (2023)