Author of the publication

Security in Approximate Computing and Approximate Computing for Security: Challenges and Opportunities.

, , , , , and . Proc. IEEE, 108 (12): 2214-2231 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

State of the Journal.. IEEE Trans. Computers, 66 (1): 1-2 (2017)Visualizing vector fields: the thick oriented stream-line algorithm (TOSL)., , , and . Comput. Graph., 25 (5): 847-855 (2001)Measuring Isotropic Local Contrast: A Circular Mask Based Approach., , , and . WSCG (Short Papers), page 83-90. (2002)Improved 64-bit Radix-16 Booth Multiplier Based on Partial Product Array Height Reduction., , and . IEEE Trans. Circuits Syst. I Regul. Pap., 64-I (2): 409-418 (2017)Augmented Reading: The Present and Future of Electronic Scientific Publications., and . Computer, 47 (1): 64-74 (2014)A Radix-2 Digit-by-Digit Architecture for Cube Root., , , and . IEEE Trans. Computers, 57 (4): 562-566 (2008)Reducing the Computation Time in (Short Bit-Width) Two's Complement Multipliers., , , and . IEEE Trans. Computers, 60 (2): 148-156 (2011)A Semantic Recommender System for Adaptive Learning., , , and . IT Prof., 17 (5): 50-58 (2015)Comparing Algorithms for Aggressive Driving Event Detection Based on Vehicle Motion Data., , , , and . IEEE Trans. Veh. Technol., 71 (1): 53-68 (2022)A Digit-by-Digit Algorithm for mth Root Extraction., , , and . IEEE Trans. Computers, 56 (12): 1696-1706 (2007)