Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mask Assignment and DSA Grouping for DSA-MP Hybrid Lithography for Sub-7 nm Contact/Via Holes., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 36 (6): 913-926 (2017)REX-SC: Range-Extended Stochastic Computing Accumulation for Neural Network Acceleration., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (12): 4423-4435 (December 2023)DARE: Deceiving Audio-Visual speech Recognition model., , and . Knowl. Based Syst., (2021)Synthesis and Analysis of Design-Dependent Ring Oscillator (DDRO) Performance Monitors., , , and . IEEE Trans. Very Large Scale Integr. Syst., 22 (10): 2117-2130 (2014)PROCEED: A Pareto Optimization-Based Circuit-Level Evaluator for Emerging Devices., , , and . IEEE Trans. Very Large Scale Integr. Syst., 24 (1): 192-205 (2016)ECO cost measurement and incremental gate sizing for late process changes., and . ACM Trans. Design Autom. Electr. Syst., 18 (1): 16:1-16:11 (2012)Abductive Analysis of Administrative Policies in Rule-Based Access Control., , and . IEEE Trans. Dependable Secur. Comput., 11 (5): 412-424 (2014)Verification of Security Policy Enforcement in Enterprise Systems., and . SEC, volume 297 of IFIP Advances in Information and Communication Technology, page 202-213. Springer, (2009)A Case for Opportunistic Embedded Sensing In Presence of Hardware Power Variability, , , , and . Proceedings of the 2010 International Conference on Power aware computing and systems, page 1--8. (October 2010)Designing new architectures and protocols for wireless sensor networks: a perspective., , and . SECON, page 35-45. IEEE, (2005)