Author of the publication

System-Level Security for Network Processors with Hardware Monitors.

, , , and . DAC, page 211:1-211:6. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight People Counting and Localizing in Indoor Spaces Using Camera Sensor Nodes., and . ICDSC, page 36-43. IEEE, (2007)Macroscopic Human Behavior Interpretation Using Distributed Imager and Other Sensors., , and . Proc. IEEE, 96 (10): 1657-1677 (2008)Sensor node lifetime analysis: Models and tools., , and . ACM Trans. Sens. Networks, 5 (1): 3:1-3:33 (2009)Towards precision monitoring of elders for providing assistive services., , , and . PETRA, volume 282 of ACM International Conference Proceeding Series, page 49. ACM, (2008)Position estimation of robotic mobile nodes in wireless testbed using GENI., , , , , , , and . SysCon, page 1-6. IEEE, (2016)A Scalable Parallel Deduplication Algorithm., , , , , , and . SBAC-PAD, page 79-86. IEEE Computer Society, (2007)Identifying people in camera networks using wearable accelerometers., , , and . PETRA, ACM, (2009)Model-Based Design Exploration of Wireless Sensor Node Lifetimes., , , and . EWSN, volume 4373 of Lecture Notes in Computer Science, page 277-292. Springer, (2007)Economic incentives in virtualized access networks., , and . ICC, page 1-7. IEEE, (2017)Exploring economic dynamics in an Internet with service choices., , and . ICC, page 5272-5277. IEEE, (2015)