Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A scheduling algorithm for optimization and early planning in high-level synthesis., , , and . ACM Trans. Design Autom. Electr. Syst., 10 (1): 33-57 (2005)Autonomous acoustic trigger for distributed underwater visual monitoring systems., , , and . WUWNet, page 10. ACM, (2016)Pattern routing: use and theory for increasing predictability andavoiding coupling., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 21 (7): 777-790 (2002)Patient Specific Biomechanics Are Clinically Significant In Accurate Computer Aided Surgical Image Guidance., , , , , and . CoRR, (2020)Statistical Analysis and Design of HARP FPGAs., , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 25 (10): 2088-2102 (2006)A software-based dynamic-warp scheduling approach for load-balancing the Viola-Jones face detection algorithm on GPUs., , , , and . J. Parallel Distributed Comput., 73 (5): 677-685 (2013)Exploring the limits of leakage power reduction in caches., , and . ACM Trans. Archit. Code Optim., 2 (3): 221-246 (2005)Exploring time/resource trade-offs by solving dual scheduling problems with the ant colony optimization., , , and . ACM Trans. Design Autom. Electr. Syst., 12 (4): 46 (2007)Architecture of a Junkyard Datacenter., , and . CoRR, (2021)Symbolic execution based test-patterns generation algorithm for hardware Trojan detection., , , , , and . Comput. Secur., (2018)