Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UNIX Password Encryption Considered Insecure., and . USENIX Winter, page 269-280. USENIX Association, (1991)Gaussian random number generators., , , and . ACM Comput. Surv., 39 (4): 11 (2007)Kakadu - A Low Power Analogue Neural Network Classifier., and . Int. J. Neural Syst., 4 (4): 381-394 (1993)Accuracy to Throughput Trade-Offs for Reduced Precision Neural Networks on Reconfigurable Logic., , , , , , , and . ARC, volume 10824 of Lecture Notes in Computer Science, page 29-42. Springer, (2018)Implementation of an FPGA based accelerator for virtual private networks., and . FPT, page 34-41. IEEE, (2002)An FPGA-based re-configurable 24-bit 96kHz sigma-delta audio DAC., , , , and . FPT, page 110-117. IEEE, (2003)Arbitrary function approximation in HDLs with application to the N-body problem., , , , , , , , , and . FPT, page 84-91. IEEE, (2003)Structured ASIC: Methodology and comparison., , , , , , , and . FPT, page 377-380. IEEE, (2010)Distributed kernel learning using Kernel Recursive Least Squares., , , and . ICASSP, page 5500-5504. IEEE, (2015)Design of a single layer programmable Structured ASIC library., , , , , , , , , and . DDECS, page 32-35. IEEE Computer Society, (2010)