Author of the publication

A Model-Driven Development Approach to Mapping UML State Diagrams to Synthesizable VHDL.

, , , , and . IEEE Trans. Computers, 57 (10): 1357-1371 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing associations: UML 2.0 to Java 5., , and . Softw. Syst. Model., 6 (1): 3-35 (2007)Compiling UML State Diagrams into VHDL: An Experiment in Using Model Driven Development., , , and . FDL, page 219-224. ECSI, (2007)Effects of Feature Trimming on Encryption Key Stability for an ICmetric System., , , and . BLISS, page 87-91. IEEE Computer Society, (2008)Cognitive Identity Management: Risks, Trust and Decisions using Heterogeneous Sources., , , , , , and . CogMI, page 33-42. IEEE, (2019)A multiexpert framework for character recognition: a novel application of Clifford networks., , and . IEEE Trans. Neural Networks, 12 (1): 101-112 (2001)SiTra: Simple Transformations in Java., , , , and . MoDELS, volume 4199 of Lecture Notes in Computer Science, page 351-364. Springer, (2006)MAVIS: A Secure Formal Computational Paradigm based on the Mammalian Visual System., , , and . BLISS, page 115-118. IEEE Computer Society, (2007)Evaluating Biometric Encryption Key Generation Using Handwritten Signatures., , and . BLISS, page 17-22. IEEE Computer Society, (2008)Integrating Feature Values for Key Generation in an ICmetric System., , , and . AHS, page 82-88. IEEE Computer Society, (2009)Investigation of Sample Sizes and Correlation in Multi-Cluster Feature Distributions for an Efficient Encryption System., , , and . AHS, page 409-416. IEEE Computer Society, (2008)