Author of the publication

Efficient co-simulation framework enhancing system-level power estimation for a platform-based SoC design.

, , , and . Microelectron. J., 42 (11): 1290-1298 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient co-simulation framework enhancing system-level power estimation for a platform-based SoC design., , , and . Microelectron. J., 42 (11): 1290-1298 (2011)High-Speed FPGA Implementation of the SHA-1 Hash Function., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (9): 1873-1876 (2011)Performance of Receive Diversity UWB Systems with Pulse Amplitude and Position Modulation.. J. Inform. and Commun. Convergence Engineering, 8 (5): 498-501 (2010)A Contract Signing Protocol in the Internet., , and . International Conference on Internet Computing, page 473-. CSREA Press, (2000)Taps Delayed Lines Architecture Based on Linear Transmit Zero-Forcing Approach for Ultra-Wide Band MIMO Communication Systems.. J. Inform. and Commun. Convergence Engineering, 9 (6): 652-656 (2011)Intelligent Home Network Authentication: S/Key-Based Home Device Authentication., , , , , and . ISPA Workshops, volume 4743 of Lecture Notes in Computer Science, page 214-223. Springer, (2007)Design of the Decision Support System for Network Security Management to Secure Enterprise Network., and . ISC, volume 2200 of Lecture Notes in Computer Science, page 497-511. Springer, (2001)How To Exchange Secrets By OT., , and . International Conference on Internet Computing, page 239-244. CSREA Press, (2000)A Self-Timed SRAM Design for Average-Case Performance., , and . IEICE Trans. Inf. Syst., 94-D (8): 1547-1556 (2011)A Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management., , and . ICISC, volume 2015 of Lecture Notes in Computer Science, page 246-260. Springer, (2000)