Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design space exploration using time and resource duality with the ant colony optimization., , , and . DAC, page 451-454. ACM, (2006)Arbitrary Precision and Complexity Tradeoffs for Gate-Level Information Flow Tracking., , , , , and . DAC, page 5:1-5:6. ACM, (2017)Hardware trust implications of 3-D integration., , , , , , , and . WESS, page 1. ACM, (2010)A C to Hardware/Software Compiler., , , and . FCCM, page 331-332. IEEE Computer Society, (2000)Defect-Tolerant Nanocomputing Using Bloom Filters., , and . FCCM, page 277-278. IEEE Computer Society, (2006)Tinker: Generating Custom Memory Architectures for Altera's OpenCL Compiler., , , , and . FCCM, page 21-24. IEEE Computer Society, (2016)Everyone's a Critic: A Tool for Exploring RISC-V Projects., , and . FPL, page 260-264. IEEE Computer Society, (2018)Efficient distributed algorithms for data fusion and node localization in mobile ad-hoc networks., , and . MASS, IEEE Computer Society, (2005)Policy-Driven Memory Protection for Reconfigurable Hardware., , , and . ESORICS, volume 4189 of Lecture Notes in Computer Science, page 461-478. Springer, (2006)Holistic Power Side-Channel Leakage Assessment: Towards a Robust Multidimensional Metric., , and . ICCAD, page 1-8. ACM, (2019)