Author of the publication

Optimizing resource utilization using transformations.

, and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 13 (3): 277-292 (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing resource utilization using transformations., and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 13 (3): 277-292 (1994)Improving the observability and controllability of datapaths foremulation-based debugging., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 18 (11): 1529-1541 (1999)Optimizing power using transformations., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 14 (1): 12-31 (1995)Algorithm selection: a quantitative optimization-intensive approach., and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 18 (5): 524-532 (1999)Efficient Block Scheduling to Minimize Context Switching Time for Programmable Embedded Processors., , and . Des. Autom. Embed. Syst., 4 (4): 311-327 (1999)Toward energy-efficient and distributed mobile health monitoring using parallel offloading., and . EMBC, page 7257-7261. IEEE, (2013)Scalable consistency-based hardware trojan detection and diagnosis., and . NSS, page 176-183. IEEE, (2011)The bidirectional polyomino partitioned PPUF as a hardware security primitive., and . GlobalSIP, page 257-260. IEEE, (2013)Hardware obfuscation using PUF-based logic., and . ICCAD, page 270-277. IEEE, (2014)Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels., , , and . DAC, page 90:1-90:6. ACM, (2014)