Author of the publication

Code Coverage-Based Power Estimation Techniques for Microprocessors.

, , , and . J. Circuits Syst. Comput., 11 (5): 557- (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modified genetic algorithm-based feature selection combined with pre-trained deep neural network for demand forecasting in outpatient department., , , , and . Expert Syst. Appl., (2017)Recent Attacks and Defenses on FPGA-based Systems., and . ACM Trans. Reconfigurable Technol. Syst., 12 (3): 14:1-14:24 (2019)Physical Unclonable Function-Based Key Sharing via Machine Learning for IoT Security., and . IEEE Trans. Ind. Electron., 67 (8): 7025-7033 (2020)Interpretable Multimodal Fusion Networks Reveal Mechanisms of Brain Cognition., , , , , , , , , and 1 other author(s). IEEE Trans. Medical Imaging, 40 (5): 1474-1483 (2021)Voltage Setup Problem for Embedded Systems With Multiple Voltages., and . IEEE Trans. Very Large Scale Integr. Syst., 13 (7): 869-872 (2005)VLSI supply chain security risks and mitigation techniques: A survey., and . Integr., (2016)System synthesis of synchronous multimedia applications., and . ACM Trans. Embed. Comput. Syst., 2 (1): 74-97 (2003)SPECRUN: The Danger of Speculative Runahead Execution in Processors., , and . CoRR, (2023)Ensemble Manifold Regularized Multi-Modal Graph Convolutional Network for Cognitive Ability Prediction., , , , , , and . IEEE Trans. Biomed. Eng., 68 (12): 3564-3573 (2021)Special Issue on the 2021 Workshop on Top Picks in Hardware and Embedded Security.. IEEE Des. Test, 41 (2): 5-6 (2024)