Author of the publication

Multi-objective artificial immune algorithm for security-constrained multi-application NoC mapping.

, , , , , and . GECCO (Companion), page 1449-1450. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamically Reconfigurable NoC using a deadlock-free flexible routing algorithm with a low hardware implementation cost., , , and . LASCAS, page 1-4. IEEE, (2015)A PD-based methodology to enhance efficiency in testbenches with random stimulation., , and . SBCCI, ACM, (2009)Multifractal on-chip traffic generation under TLM., and . SoCC, page 68-73. IEEE, (2017)Exploring Concurrency in Data Path Functional Units BIST Plan Optimization: A Study-Case., , and . SBCCI, page 244-248. IEEE Computer Society, (1998)Hybrid-on-chip communication architecture for dynamic MP-SoC protection., , , , and . SBCCI, page 1-6. IEEE, (2012)The Multiple Pairs SMO: A modified SMO algorithm for the acceleration of the SVM training., , , and . IJCNN, page 1221-1228. IEEE Computer Society, (2009)Scenario-Aware Workload Characterization Based on a Max-Plus Linear Representation., and . FORMATS, volume 9884 of Lecture Notes in Computer Science, page 177-194. Springer, (2016)Security-enhanced 3D communication structure for dynamic 3D-MPSoCs protection., , , , and . SBCCI, page 1-6. IEEE, (2013)Exploring the problems of placement and mapping in NoC-based reconfizurable systems., and . ReConFig, page 1-4. IEEE, (2013)Functional verification of complete sequential behaviors: A formal treatment of discrepancies between system-level and RTL descriptions., , and . IDT, page 1-6. IEEE, (2013)