Author of the publication

A Mean Analysis Multiprocessor Model Incorporating Superscalar Processors and Latency Tolerating Techniques.

, and . Int. J. Parallel Program., 24 (3): 235-264 (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Unified Negative-Binomial Distribution for Yield Analysis of Defect-Tolerant Circuits., , and . IEEE Trans. Computers, 42 (6): 724-734 (1993)Incorporating Yield Enhancement into the Floorplanning Process., and . IEEE Trans. Computers, 49 (6): 532-541 (2000)Identification of in-field defect development in digital image sensors., , , , , and . Digital Photography, volume 6502 of SPIE Proceedings, page 65020Y. SPIE, (2007)Embedding Tree Stuctures in VLlSI Hexagonal Arrays., , and . IEEE Trans. Computers, 33 (1): 104-107 (1984)Guest Editors' Introduction - Special Issue on Computer Arithmetic., and . IEEE Trans. Computers, 49 (7): 625-627 (2000)Discrete and Continuous Models for the Performance of Reconfigurable Multistage Systems., and . IEEE Trans. Computers, 40 (9): 1024-1033 (1991)Countermeasures against fault attacks on software implemented AES: effectiveness and cost., , , , and . WESS, page 7. ACM, (2010)Countermeasures against Branch Target Buffer Attacks., , , and . FDTC, page 75-79. IEEE Computer Society, (2007)Connectivity and performance tradeoffs in the cascade correlation learning architecture., and . IEEE Trans. Neural Networks, 5 (6): 930-935 (1994)Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES Implementation., , , , , and . RFIDSec, volume 7055 of Lecture Notes in Computer Science, page 48-60. Springer, (2011)