From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Auto-tuning Assisted Power-Aware Study of Iris Matching Algorithm on Intel's SCC., , , , и . J. Signal Process. Syst., 80 (3): 261-276 (2015)Workload Characterization of Cryptography Algorithms for Hardware Acceleration., , , и . ICPE, стр. 381-390. ACM, (2011)Hardware Acceleration for Cryptography Algorithms by Hotspot Detection., , и . GPC, том 7861 из Lecture Notes in Computer Science, стр. 472-481. Springer, (2013)Using Hardware Acceleration to Improve the Security of Wi-Fi Client Devices., и . MUSIC, том 274 из Lecture Notes in Electrical Engineering, стр. 557-562. Springer, (2013)The Performance Analysis and Hardware Acceleration of Crypto-computations for Enhanced Security., , , и . PRDC, стр. 249-250. IEEE Computer Society, (2010)Workload characterization of cryptography algorithms for hardware acceleration (abstracts only)., , , и . SIGMETRICS Perform. Evaluation Rev., 39 (3): 20 (2011)A web-based simulator to train students in self-organizing wireless networks., и . WTS, стр. 1-6. IEEE, (2013)Enhancement for Potential Target in Cryptography Algorithms by Applying Processor-in-Memory Architecture., , и . IPDPS Workshops, стр. 2035-2044. IEEE, (2013)Hardware-assisted security mechanism: The acceleration of cryptographic operations with low hardware cost., , , и . IPCCC, стр. 327-328. IEEE Computer Society, (2010)A Power-Aware Study of Iris Matching Algorithms on Intel's SCC., , , , и . ICPP, стр. 1028-1037. IEEE Computer Society, (2013)