Author of the publication

Configuring Multiple Boundary Scan Chains for Board Testing.

, , and . ISCAS, page 2128-2131. IEEE, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks., and . SASN, page 59-70. ACM, (2006)Fault detection of wireless sensor networks., and . Comput. Commun., 31 (14): 3469-3475 (2008)A Fault-Tolerant Bloom Filter for Deep Packet Inspection., and . PRDC, page 389-396. IEEE Computer Society, (2007)Fault Detection of Bloom Filters for Defect Maps., and . DFT, page 229-235. IEEE Computer Society, (2008)ARMS: An Authenticated Routing Message in Sensor Networks., and . MADNES, volume 4074 of Lecture Notes in Computer Science, page 158-173. Springer, (2005)A Grid-Based Distributed Event Detection Scheme for Wireless Sensor Networks., and . Sensors, 11 (11): 10048-10062 (2011)Fault-Tolerant Event Detection Using Two Thresholds in Wireless Sensor Networks., and . PRDC, page 331-335. IEEE Computer Society, (2009)Configuration of a boundary scan chain for optimal testing of clusters of non boundary scan devices., and . ICCAD, page 13-16. IEEE Computer Society / ACM, (1992)Probabilistic Diagnosis for Sparsely Interconnected Systems., and . ACM Conference on Computer Science, page 298-304. ACM, (1990)Configuring Multiple Boundary Scan Chains for Board Testing., , and . ISCAS, page 2128-2131. IEEE, (1995)