Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

STRUCTURES OF INSULATOR STRINGS FOR UHV TRANSMISSION LINES, , and . (1982)Raw pointers in application classes of C++ considered harmful.. ACM SIGPLAN Notices, 42 (4): 23-31 (2007)Towards Synthesis of Monotonic Asynchronous Circuits from Signal Transition Graphs., , , , and . ACSD, page 179-188. IEEE Computer Society, (2001)Delay Insensitive Encoding and Power Analysis: A Balancing Act., , , , , and . ASYNC, page 116-125. IEEE Computer Society, (2005)Heuristic Based throughput Analysis and Optimization of Asynchronous Pipelines., and . ASYNC, page 162-172. IEEE Computer Society, (2009)Prediction of speech recognition accuracy for utterance classification., , and . INTERSPEECH, page 1275-1279. ISCA, (2015)An Automated Fine-Grain Pipelining Using Domino Style Asynchronous Library., , , and . ACSD, page 68-76. IEEE Computer Society, (2005)A Case Study for the Verification of Complex Timed Circuits: IPCMOS., , , and . DATE, page 44-51. IEEE Computer Society, (2002)Timing Extensions of STG Model and a Method to Simulate Timed STG Behavior in VHDL Environment., , , and . ACSD, page 120-129. IEEE Computer Society, (1998)Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks., , and . CHES, volume 4249 of Lecture Notes in Computer Science, page 399-413. Springer, (2006)