Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An approximation algorithm for scheduling on heterogeneous reconfigurable resources., , , and . ACM Trans. Embed. Comput. Syst., 9 (1): 5:1-5:20 (2009)General Methodology for Soft-Error-Aware Power Optimization Using Gate Sizing., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 27 (10): 1788-1797 (2008)Data Fusion for Movement Visualization in a Remote Health Monitoring System., and . MobiCASE, volume 95 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 32-40. Springer, (2011)Gate Characterization Using Singular Value Decomposition: Foundations and Applications., , , , and . IEEE Trans. Inf. Forensics Secur., 7 (2): 765-773 (2012)Edemeter: Wearable and continuous fluid retention monitoring., , , and . BSN, page 153-158. IEEE, (2016)Synchronized audio capture with an array of mobile devices., and . CCNC, page 331-336. IEEE, (2017)AirDraw: Leveraging smart watch motion sensors for mobile human computer interactions., , and . CCNC, page 442-446. IEEE, (2016)LightVest: A Wearable Body Position Monitor Using Ambient and Infrared Light., and . BODYNETS, ICST, (2014)Hardware Trojan horse detection using gate-level characterization., , , and . DAC, page 688-693. ACM, (2009)System Level Estimation of Interconnect Length in the Presence of IP Blocks., , and . ISQED, page 438-443. IEEE Computer Society, (2007)