Author of the publication

Performance Study of a Compiler/Hardware Approach to Embedded Systems Security.

, , , , , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 543-548. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Mappings among Interconnection Networks for Performance Evaluation., and . ICDCS, page 16-25. IEEE Computer Society, (1986)3 Parallel computer architectures., and . Computational Statistics, volume 9 of Handbook of Statistics, North-Holland, (1993)Mapping a Chain Task to Chained Processors., , and . Inf. Process. Lett., 44 (3): 141-148 (1992)Providing secure execution environments with a last line of defense against Trojan circuit attacks., , , and . Comput. Secur., 28 (7): 660-669 (2009)Study of link congestion during I/O transfers in 2-D meshes using wormhole routing., , and . CATA, page 186-189. ISCA, (2000)Transform-Based Indexing of Audio Data for Multimedia Databases., , , and . ICMCS, page 211-218. IEEE Computer Society, (1997)Parallel real-time systems: formal specification., , and . HiPC, page 186-191. IEEE Computer Society, (1997)Compiler-Directed Region-Based Security for Low-Overhead Software Protection., , , and . DASC, page 47-54. IEEE Computer Society, (2007)Mapping binary precedence trees to hypercubes and meshes., and . SPDP, page 838-841. IEEE Computer Society, (1990)Preemptive Scheduling of Independent Jobs on Partitionable Parallel Architectures., and . ICPP (1), page 268-275. CRC Press, (1992)