Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sleepy Keeper: a New Approach to Low-leakage Power VLSI Design., and . VLSI-SoC, page 367-372. IEEE, (2006)Automated Bus Generation for Multiprocessor SoC Design., and . DATE, page 10282-10289. IEEE Computer Society, (2003)An approach to energy-error tradeoffs in approximate ripple carry adders., , , and . ISLPED, page 211-216. IEEE/ACM, (2011)Design space optimization of embedded memory systems via data remapping., , , , and . LCTES-SCOPES, page 28-37. ACM, (2002)A Cryptographic Method for Defense Against MiTM Cyber Attack in the Electricity Grid Supply Chain., , , and . ISGT, page 1-5. IEEE, (2022)Hardware/Software Partitioning of Operating Systems.. DATE, page 10338-10339. IEEE Computer Society, (2003)A novel physiological features-assisted architecture for rapidly distinguishing health problems from hardware Trojan attacks and errors in medical devices., , , and . HOST, page 106-109. IEEE Computer Society, (2017)Optimizing energy to minimize errors in dataflow graphs using approximate adders., , , , , and . CASES, page 177-186. ACM, (2010)A chip-level security framework for assessing sensor data integrity: work-in-progress., , and . CODES+ISSS, page 20. IEEE / ACM, (2018)Introduction to Special Section on Probabilistic Embedded Computing., and . ACM Trans. Embed. Comput. Syst., 12 (2s): 86:1-86:2 (2013)