Author of the publication

Effects of Virtual Reality Properties on User Experience of Individuals with Autism.

, , , , and . ACM Trans. Access. Comput., 11 (4): 22:1-22:27 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing Performance and Energy Overheads Due to Fanout in In-Memory Computing Systems., , and . VLSI-SoC (Selected Papers), volume 561 of IFIP Advances in Information and Communication Technology, page 147-166. Springer, (2018)DLockout: A Design Lockout Technique for Key Obfuscated RTL IP Designs., , and . CoRR, (2020)Lightweight Countermeasure to Differential-Plaintext Attacks on Permutation Ciphers., and . IFIPIoT, volume 574 of IFIP Advances in Information and Communication Technology, page 159-176. Springer, (2019)Effects of Virtual Reality Properties on User Experience of Individuals with Autism., , , , and . ACM Trans. Access. Comput., 11 (4): 22:1-22:27 (2018)Customizable FPGA IP Core Implementation of a General-Purpose Genetic Algorithm Engine., , , , and . IEEE Trans. Evol. Comput., 14 (1): 133-149 (2010)A Framework for Power-Gating Functional Units in Embedded Microprocessors., , and . IEEE Trans. Very Large Scale Integr. Syst., 17 (11): 1640-1649 (2009)An efficient register optimization algorithm for high-level synthesis from hierarchical behavioral specifications., , , and . ACM Trans. Design Autom. Electr. Syst., 7 (1): 189-216 (2002)Virtual Reality Interaction Techniques for Individuals with Autism Spectrum Disorder., , , , , and . HCI (8), volume 10908 of Lecture Notes in Computer Science, page 58-77. Springer, (2018)Hardware Trojan Localization: Modeling and Empirical Approach., and . Behavioral Synthesis for Hardware Security, (2022)Defending Against Misspeculation-based Cache Probe Attacks Using Variable Record Table., , and . ISQED, page 408-413. IEEE, (2021)