Author of the publication

SoCCom: Automated Synthesis of System-on-Chip Architectures.

, , , and . IEEE Trans. Very Large Scale Integr. Syst., 30 (4): 449-462 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice., , , , , , and . J. Hardw. Syst. Secur., 2 (2): 97-110 (2018)Security of Multi-Agent Cyber-Physical Systems: A Survey., and . IEEE Access, (2022)Guarding Deep Learning Systems With Boosted Evasion Attack Detection and Model Update., , , and . IEEE Internet Things J., 11 (6): 9382-9391 (March 2024)SoCCom: Automated Synthesis of System-on-Chip Architectures., , , and . IEEE Trans. Very Large Scale Integr. Syst., 30 (4): 449-462 (2022)SeVNoC: Security Validation of System-on-Chip Designs With NoC Fabrics., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (2): 672-682 (February 2023)Combining Theorem Proving with Model Checking through Predicate Abstraction., and . IEEE Des. Test Comput., 24 (2): 132-139 (2007)Proof Styles in Operational Semantics., and . FMCAD, volume 3312 of Lecture Notes in Computer Science, page 67-81. Springer, (2004)Mechanized Information Flow Analysis through Inductive Assertions., , , and . FMCAD, page 1-4. IEEE, (2008)Modeling and verification of industrial flash memories., , , and . ISQED, page 705-712. IEEE, (2010)Using ACL2 to Verify Loop Pipelining in Behavioral Synthesis., , , and . ACL2, volume 152 of EPTCS, page 111-128. (2014)