Author of the publication

An Efficient Memory Organization for High-ILP Inner Modem Baseband SDR Processors.

, , , , , , and . J. Signal Process. Syst., 61 (2): 157-179 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software Protection Decision Support and Evaluation Methodologies (Dagstuhl Seminar 19331)., , , and . Dagstuhl Reports, 9 (8): 1-25 (2019)Formal virtualization requirements for the ARM architecture., , , , and . J. Syst. Archit., 59 (3): 144-154 (2013)An Efficient Memory Organization for High-ILP Inner Modem Baseband SDR Processors., , , , , , and . J. Signal Process. Syst., 61 (2): 157-179 (2010)Steganography for Executables and Code Transformation Signatures., , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 425-439. Springer, (2004)Attack simulation based software protection assessment method., , , , , , and . Cyber Security And Protection Of Digital Services, page 1-8. IEEE, (2016)Coarse-Grained Reconfigurable Array Architectures., , and . Handbook of Signal Processing Systems, Springer, (2013)Bidirectional liveness analysis, or how less than half of the Alpha's registers are used., , and . J. Syst. Archit., 52 (10): 535-548 (2006)Multi-Variant Execution of Parallel Programs., , , and . CoRR, (2016)To Be or not to Be Cited in Computer Science, and . Communications of the ACM, 55 (8): 69--75 (August 2012)A practical interprocedural dominance algorithm., , and . ACM Trans. Program. Lang. Syst., 29 (4): 19 (2007)