Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Completion and Refinement of Verification Sets for Microprocessor Cores., , and . EvoWorkshops, volume 3449 of Lecture Notes in Computer Science, page 205-214. Springer, (2005)Post-Silicon Validation of IEEE 1687 Reconfigurable Scan Networks., , , and . ETS, page 1-6. IEEE, (2019)On the Mitigation of Hardware Trojan Attacks in Embedded Processors by Exploiting a Hardware-Based Obfuscator., , , and . IVSW, page 31-37. IEEE, (2018)Evolving Warriors for the Nano Core., , and . CIG, page 272-278. IEEE, (2006)Promoting Diversity in Evolutionary Algorithms: an Updated Bibliography., and . GECCO (Companion), page 943-944. ACM, (2016)Multi-objective Evolutionary Algorithms for Influence Maximization in Social Networks., , , , and . EvoApplications (1), volume 10199 of Lecture Notes in Computer Science, page 221-233. (2017)Chromatic Selection - An Oversimplified Approach to Multi-objective Optimization.. EvoApplications, volume 9028 of Lecture Notes in Computer Science, page 681-689. Springer, (2015)Efficient Techniques for Automatic Verification-Oriented Test Set Optimization., , and . Int. J. Parallel Program., 34 (1): 93-109 (2006)Evolving assembly programs: how games help microprocessor validation., , and . IEEE Trans. Evol. Comput., 9 (6): 695-706 (2005)Automatic Test Program Generation: A Case Study., , , and . IEEE Des. Test Comput., 21 (2): 102-109 (2004)