Author of the publication

End-to-End Verification of Processors with ISA-Formal.

, , , , , , , , , and . CAV (2), volume 9780 of Lecture Notes in Computer Science, page 42-58. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analog/RF Built-in-Self-Test Subsystem for a Mobile Broadcast Video Receiver in 65-nm CMOS., , , , and . IEEE J. Solid State Circuits, 46 (9): 1998-2008 (2011)End-to-End Verification of Processors with ISA-Formal., , , , , , , , , and . CAV (2), volume 9780 of Lecture Notes in Computer Science, page 42-58. Springer, (2016)IBM voice agent with Watson., , , , and . CASCON, page 342-343. ACM, (2018)Efficient Usage of Network Bandwidth in the Cloud Architecture., , and . ICEBE, page 338-343. IEEE Computer Society, (2012)A Cloud-Based Framework to Enhance Augmented Reality., , and . CISIS, page 78-82. IEEE Computer Society, (2013)Enhancing the precision of content analysis in content adaptation using entropy-based fuzzy reasoning., , and . Expert Syst. Appl., 37 (8): 5706-5719 (2010)A Multiple Objectives Optimization Approach for QoS-Based Web Services Compositions., , , , , and . ICEBE, page 121-128. IEEE Computer Society, (2009)Applying Content Adaptation Technique to Enhance Mobile Learning on Blackboard Learning System., , and . ICALT, page 247-251. IEEE Computer Society, (2007)Computer generated hologram with geometric occlusion using GPU-accelerated depth buffer rasterization for three-dimensional display, and . Appl. Opt., 48 (21): 4246--4255 (2009)Applying DNA computation to intractable problems in social network analysis., and . Biosyst., 101 (3): 222-232 (2010)