Author of the publication

A 1.2V 6.4GHz 181ps 64-bit CD domino adder with DLL measurement technique.

, , , , , , and . ISCAS, page 1423-1426. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective network defense strategies to maximize system survivability of wireless mesh networks under malicious and jamming attacks., , , and . CASoN, page 297-302. IEEE, (2012)Network recovery strategies for maximization of network survivability., , , and . IWCMC, page 1130-1134. IEEE, (2011)TetherNet Anti-NAT - Secure Internet Subnet Rental System., , and . DISCEX (2), page 112-. IEEE Computer Society, (2003)RoomDreaming: Generative-AI Approach to Facilitating Iterative, Preliminary Interior Design Exploration., , , , , , , , and . CHI, page 379:1-379:20. ACM, (2024)Maximization of Wireless Mesh Networks Survivability to Assure Service Continuity under Intelligent Attacks., , , and . AINA, page 583-590. IEEE Computer Society, (2013)A 5.1Gb/s 60.3fJ/bit/mm PVT tolerant NoC transceiver., , , , , , and . A-SSCC, page 141-144. IEEE, (2016)Redundancy and Defense Resource Allocation Algorithms to Assure Service Continuity against Natural Disasters and Intelligent Attackers., , , and . BWCCA, page 206-213. IEEE Computer Society, (2010)DynaBone: Dynamic Defense Using Multi-layer Internet Overlays., , , and . DISCEX (2), page 271-276. IEEE Computer Society, (2003)Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints., , , and . AINA Workshops, page 165-170. IEEE Computer Society, (2012)A Global X-Bone for Network Experiments., , , , , and . TRIDENTCOM, page 194-203. IEEE Computer Society, (2005)