Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fingerprint-based Bloom Filter with Deletion Capabilities., , , and . EuCNC, page 453-458. IEEE, (2019)Reliability analysis of memories protected with BICS and a per-word parity bit., , and . ACM Trans. Design Autom. Electr. Syst., 15 (2): 18:1-18:15 (2010)Mitigating the effects of large multiple cell upsets (MCUs) in memories., , , , and . ACM Trans. Design Autom. Electr. Syst., 16 (4): 45:1-45:10 (2011)A method to eliminate the event accumulation problem from a memory affected by multiple bit upsets., and . Microelectron. Reliab., 49 (7): 707-715 (2009)Soft error tolerant Content Addressable Memories (CAMs) using error detection codes and duplication., , , , and . Microprocess. Microsystems, 37 (8-D): 1103-1107 (2013)Mitigation of permanent faults in adaptive equalizers., , and . Microelectron. Reliab., 51 (3): 703-710 (2011)Implementing Double Error Correction Orthogonal Latin Squares Codes in SRAM-based FPGAs., , and . Microelectron. Reliab., (2016)Denial of Service Attack on Cuckoo Filter Based Networking Systems., and . IEEE Communications Letters, 24 (7): 1428-1432 (2020)HyperLogLog (HLL) Security: Inflating Cardinality Estimates., , and . CoRR, (2020)Scheme for periodical concurrent fault detection in parallel CRC circuits., , , , and . IET Comput. Digit. Tech., 14 (2): 80-85 (2020)