Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Managing Leakage Energy in Cache Hierarchies., , , , , , and . J. Instruction-Level Parallelism, (2003)Design considerations for databus charge recovery., , , and . IEEE Trans. Very Large Scale Integr. Syst., 9 (1): 104-106 (2001)A clock power model to evaluate impact of architectural and technology optimizations., , and . IEEE Trans. Very Large Scale Integr. Syst., 10 (6): 844-855 (2002)Harnessing ferroelectrics for non-volatile memories and logic., , , , , , and . ISQED, page 29-34. IEEE, (2017)On the Effects of Process Variation in Network-on-Chip Architectures., , , , , , and . IEEE Trans. Dependable Secur. Comput., 7 (3): 240-254 (2010)Java Runtime Systems: Characterization and Architectural Implications., , , , , and . IEEE Trans. Computers, 50 (2): 131-146 (2001)X-VS: Crossbar-Based Processing-in-Memory Architecture for Video Summarization., , , and . ISVLSI, page 592-597. IEEE, (2020)On the Detection of Clones in Sensor Networks Using Random Key Predistribution., , , , and . IEEE Trans. Syst. Man Cybern. Part C, 37 (6): 1246-1258 (2007)An Accuracy Tunable Non-Boolean Co-Processor Using Coupled Nano-Oscillators., , , , , and . ACM J. Emerg. Technol. Comput. Syst., 14 (1): 1:1-1:28 (2018)Power Analysis Attack Resistance Engineering by Dynamic Voltage and Frequency Scaling., , , , , and . ACM Trans. Embed. Comput. Syst., 11 (3): 62:1-62:16 (2012)