Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DSP design tool requirements for embedded systems: A telecommunications industrial perspective., , , and . VLSI Signal Processing, 9 (1-2): 23-47 (1995)Embedded software in real-time signal processing systems: design technologies., , , , , , and . Proc. IEEE, 85 (3): 436-454 (1997)A Dynamic App Anti-Debugging Approach on Android ART Runtime., , and . DASC/PiCom/DataCom/CyberSciTech, page 560-567. IEEE Computer Society, (2018)Register assignment through resource classification for ASIP microcode generation., , and . ICCAD, page 397-402. IEEE Computer Society / ACM, (1994)White-box cryptography: practical protection on hostile hosts., , , , and . SSPREW@ACSAC, page 4:1-4:8. ACM, (2016)A compiler-based infrastructure for software-protection., , and . PLAS, page 33-44. ACM, (2008)Embedded Tools for a Configurable and Customizable DSP Architecture., , , , , and . IEEE Des. Test Comput., 19 (6): 27-35 (2002)System-on-a-Chip Cosimulation and Compilation., , , , and . IEEE Des. Test Comput., 14 (2): 16-25 (1997)Securing Web Applications with Secure Coding Practices and Integrity Verification., , , , and . DASC/PiCom/DataCom/CyberSciTech, page 618-625. IEEE Computer Society, (2018)TRUST-CAP: A Trust Model for Cloud-Based Applications., , , and . COMPSAC (2), page 584-589. IEEE Computer Society, (2017)978-1-5386-0367-3.