Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Singapore's cybersecurity ecosystem., , , and . Commun. ACM, 63 (4): 55-57 (2020)Efficient detection and exploitation of infeasible paths for software timing analysis., , , and . DAC, page 358-363. ACM, (2006)Scratchpad allocation for concurrent embedded software., , and . ACM Trans. Program. Lang. Syst., 32 (4): 13:1-13:47 (2010)A Survey on Access Control Deployment.. FGIT-SecTech, volume 259 of Communications in Computer and Information Science, page 11-20. Springer, (2011)Timing Analysis of Concurrent Programs Running on Shared Cache Multi-Cores., , , , and . RTSS, page 57-67. IEEE Computer Society, (2009)Integrated scratchpad memory optimization and task scheduling for MPSoC architectures., , and . CASES, page 401-410. ACM, (2006)Exploring locking & partitioning for predictable shared caches on multi-cores., and . DAC, page 300-303. ACM, (2008)Scratchpad allocation for concurrent embedded software., , and . CODES+ISSS, page 37-42. ACM, (2008)Secure wireless communication platform for EV-to-Grid research., , , , and . IWCMC, page 21-25. ACM, (2010)Obfuscating Software Puzzle for Denial-of-Service Attack Mitigation., , , and . iThings/GreenCom/CPSCom/SmartData, page 115-122. IEEE, (2016)