Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensitivity to Front-End Non-Idealities of Low PAPR Modulation Schemes for Communications at 60 GHz., , , , and . VTC Spring, page 1292-1296. IEEE, (2007)Software Tool Combining Fault Masking with User-Defined Recovery Strategies., , and . CoRR, (2014)Spatial locality exploitation for runtime reordering of JPEG2000 wavelet data layouts., , , , , , and . ACM Trans. Design Autom. Electr. Syst., 15 (1): 8:1-8:6 (2009)A Flexible Antenna Selection Scheme for 60 GHz Multi-Antenna Systems Using Interleaved ADCs., , , , , , , and . ICC, page 1-5. IEEE, (2009)Adaptive mapping to resource availability for dynamic wavelet-based applications., , , , , , and . ESTImedia, page 53-58. IEEE Computer Society, (2007)Memory Hierarchy Energy Cost of a Direct Filtering Implementation of the Wavelet Transform., , , , and . PATMOS, volume 3728 of Lecture Notes in Computer Science, page 107-116. Springer, (2005)Robust stereo matching with fast Normalized Cross-Correlation over shape-adaptive regions., , , , and . ICIP, page 2357-2360. IEEE, (2009)User-triggered checkpointing: system-independent and scalable application recovery., and . ISCC, page 418-423. IEEE Computer Society, (1997)Sub-Word Parallel Precision-Scalable MAC Engines for Efficient Embedded DNN Inference., , , , , , and . AICAS, page 6-10. IEEE, (2019)A User-triggered Checkpointing Library for Computationintensive Applications., , , and . Parallel and Distributed Computing and Systems, page 321-324. IASTED/ACTA Press, (1995)