Author of the publication

Trustworthy computing in a multi-core system using distributed scheduling.

, , , and . IOLTS, page 211-213. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-Healing Design in Deep Scaled CMOS Technologies., , , , and . Journal of Circuits, Systems, and Computers, (2012)Internet of Things security: Are we paranoid enough?. ICCE, page 1. IEEE, (2018)Modeling and Analysis of Loading Effect in Leakage of Nano-Scaled Bulk-CMOS Logic Circuits, , and . CoRR, (2007)Runtime Integrity Verification in Cyber-physical Systems using Side-Channel Fingerprint., , , and . ICCE, page 1-6. IEEE, (2019)Eat, but Verify: Low-Cost Portable Devices for Food Safety Analysis., , , , and . IEEE Consumer Electronics Magazine, 8 (1): 12-18 (2019)Intrinsic and Database-free Watermarking in ICs by Exploiting Process and Design Dependent Variability in Metal-Oxide-Metal Capacitances., , and . ISLPED, page 44:1-44:6. ACM, (2018)Authentication and traceability of food products through the supply chain using NQR spectroscopy., , , , and . BioCAS, page 1-4. IEEE, (2017)Ultralow-power data compression for implantable bladder pressure monitor: Algorithm and hardware implementation., , , , and . BioCAS, page 500-503. IEEE, (2016)Statistical Modeling of Pipeline Delay and Design of Pipeline under Process Variation to Enhance Yield in sub-100nm Technologies, , , , and . CoRR, (2007)ENFIRE: An Energy-efficient Fine-grained Spatio-temporal Reconfigurable Computing Fabric (Abstact Only)., , , and . FPGA, page 275. ACM, (2016)