Author of the publication

Fine-Grained Checkpoint Recovery for Application-Specific Instruction-Set Processors.

, , , , and . IEEE Trans. Computers, 66 (4): 647-660 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CoRaS: A multiprocessor key corruption and random round swapping for power analysis side channel attacks: A DES case study., , and . ISCAS, page 253-256. IEEE, (2012)Improving GA-Based NoC Mapping Algorithms Using a Formal Model., , and . ISVLSI, page 344-349. IEEE Computer Society, (2014)MUTE-AES: a multiprocessor architecture to prevent power analysis based side channel attack of the AES algorithm., , and . ICCAD, page 678-684. IEEE Computer Society, (2008)SDG2KPN: System Dependency Graph to function-level KPN generation of legacy code for MPSoCs., , , , and . ASP-DAC, page 267-273. IEEE, (2014)Power analysis side channel attacks: the processor design-level context.. University of New South Wales, Sydney, Australia, (2009)base-search.net (ftunswworks:oai:unsworks.unsw.edu.au:1959.4/43756).QuadSeal: Quadruple algorithmic symmetrizing countermeasure against power based side-channel attacks., , , , and . CASES, page 21-30. IEEE, (2015)Randomised multi-modulo residue number system architecture for double-and-add to prevent power analysis side channel attacks., , , and . IET Circuits Devices Syst., 7 (5): 283-293 (2013)Design and implementation of an operating system for composable processor sharing., , , , , , and . Microprocess. Microsystems, 35 (2): 246-260 (2011)Sequential C-code to distributed pipelined heterogeneous MPSoC synthesis for streaming applications., , , , and . ICCD, page 216-223. IEEE Computer Society, (2015)Composable local memory organisation for streaming applications on embedded MPSoCs., , , , , and . Conf. Computing Frontiers, page 23. ACM, (2011)