Author of the publication

DSP Address Optimization Using Evolutionary Algorithms.

, , , , and . SCOPES, volume 136 of ACM International Conference Proceeding Series, page 91-98. (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recent Attacks and Defenses on FPGA-based Systems., and . ACM Trans. Reconfigurable Technol. Syst., 12 (3): 14:1-14:24 (2019)Voltage Setup Problem for Embedded Systems With Multiple Voltages., and . IEEE Trans. Very Large Scale Integr. Syst., 13 (7): 869-872 (2005)Embedded Digital Signal Processing Systems., , and . EURASIP J. Embed. Syst., (2007)Control Flow Integrity Based on Lightweight Encryption Architecture., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 37 (7): 1358-1369 (2018)System synthesis of synchronous multimedia applications., and . ACM Trans. Embed. Comput. Syst., 2 (1): 74-97 (2003)Modified genetic algorithm-based feature selection combined with pre-trained deep neural network for demand forecasting in outpatient department., , , , and . Expert Syst. Appl., (2017)Interpretable Multimodal Fusion Networks Reveal Mechanisms of Brain Cognition., , , , , , , , , and 1 other author(s). IEEE Trans. Medical Imaging, 40 (5): 1474-1483 (2021)Physical Unclonable Function-Based Key Sharing via Machine Learning for IoT Security., and . IEEE Trans. Ind. Electron., 67 (8): 7025-7033 (2020)Exploring General Intelligence via Gated Graph Transformer in Functional Connectivity Studies., , , , , , , and . CoRR, (2024)VLSI supply chain security risks and mitigation techniques: A survey., and . Integr., (2016)