Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RATING: Rigorous Assessment of Trust in Identity Management., and . ARES, page 14-23. IEEE Computer Society, (2006)HammingMesh: A Network Topology for Large-Scale Deep Learning., , , , , , , , , and . SC, page 11:1-11:18. IEEE, (2022)πBox: A Platform for Privacy-Preserving Apps., , , , and . NSDI, page 501-514. USENIX Association, (2013)Building a Hypervisor on a Formally Verifiable Protection Layer., , , , and . HICSS, page 5069-5078. IEEE Computer Society, (2013)Privacy Preserving Collaboration in Bring-Your-Own-Apps., , , , and . SoCC, page 265-278. ACM, (2016)QUIETEST: A Quiescent Current Testing Methodology for Detecting Leakage Faults., , , and . ICCAD, page 280-283. IEEE Computer Society, (1990)An efficient compaction algorithm for test vectors of microprocessors and microcontrollers., and . ICCAD, page 378-381. IEEE Computer Society, (1988)Bridging faults and their implication to PLAs., , , and . ITC, page 852-859. IEEE Computer Society, (1990)Detection of Ündetectable" Faults Using IDDQ Testing., , and . ITC, page 770-777. IEEE Computer Society, (1992)Built-in self-test for large embedded CMOS folded PLAs., , and . ICCAD, page 236-239. IEEE Computer Society, (1988)