Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors., , and . ISeCure, 11 (2): 159-171 (2019)Quantum circuit physical design flow for the multiplexed trap architecture., and . Microprocess. Microsystems, (2016)Using on-chip networks to implement polymorphism in the co-design of object-oriented embedded systems., , and . J. Comput. Syst. Sci., 73 (8): 1221-1231 (2007)Qubit mapping of one-way quantum computation patterns onto 2D nearest-neighbor architectures., and . Quantum Inf. Process., 18 (2): 56 (2019)Physical synthesis of quantum circuits using templates., and . Quantum Inf. Process., 15 (10): 4117-4135 (2016)Improving Latency of Quantum Circuits by Gate Exchanging., , and . DSD, page 67-73. IEEE Computer Society, (2009)Quantum physical synthesis: Improving physical design by netlist modifications., , and . Microelectron. J., 41 (4): 219-230 (2010)Quantum circuit physical design flow for 2D nearest-neighbor architectures., and . Int. J. Circuit Theory Appl., 45 (7): 989-1000 (2017)SAQIP: A Scalable Architecture for Quantum Information Processors., and . ACM Trans. Archit. Code Optim., 16 (2): 12:1-12:21 (2019)A Game Theory Approach for Malicious Node Detection in MANETs., , and . J. Inf. Sci. Eng., 32 (3): 559-573 (2016)