Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modular SMT-Based Verification of Rule-Based Hardware Designs.. Massachusetts Institute of Technology, USA, (2021)MI6: Secure Enclaves in a Speculative Out-of-Order Processor., , , , , and . MICRO, page 42-56. ACM, (2019)Objective Assessment of Telesurgical Robot Systems: Telerobotic FLS., , , , , , , , and . MMVR, volume 132 of Studies in Health Technology and Informatics, page 263-265. IOS Press, (2008)A Sound Investment: Managing Human Error in the Finance Sector., and . AHFE (5), volume 589 of Advances in Intelligent Systems and Computing, page 280-289. Springer, (2017)An Energy-Efficient Reconfigurable DTLS Cryptographic Engine for End-to-End Security in IoT Applications., , , , and . CoRR, (2019)T-Count Optimizing Genetic Algorithm for Quantum State Preparation., , , and . QSW, page 58-68. IEEE, (2024)Competitive auctions and digital goods., , and . SODA, page 735-744. ACM/SIAM, (2001)An energy-efficient reconfigurable DTLS cryptographic engine for End-to-End security in iot applications., , , , and . ISSCC, page 42-44. IEEE, (2018)Constructing a Weak Memory Model., , , , and . ISCA, page 124-137. IEEE Computer Society, (2018)From Master Equation to SPICE: A Platform to Model Cryo-CMOS Control for Qubits., , and . DATE, page 1-6. IEEE, (2024)