Author of the publication

Optimizing the Use of Behavioral Locking for High-Level Synthesis.

, , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (2): 462-472 (February 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GABES: A genetic algorithm based environment for SEU testing in SRAM-FPGAs., , , and . J. Syst. Archit., 59 (10-D): 1243-1254 (2013)Modeling and Simulation of Energy-Aware Adaptive Policies for Automatic Weather Stations., , , and . ES4CPS@DATE, page 44. ACM, (2014)An Expert CAD Flow for Incremental Functional Diagnosis of Complex Electronic Boards., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 34 (5): 835-848 (2015)A Lightweight Security Checking Module to Protect Microprocessors against Hardware Trojan Horses., , , , and . DFT, page 1-6. IEEE, (2021)A configurable board-level adaptive incremental diagnosis technique based on decision trees., and . DFTS, page 227-232. IEEE Computer Society, (2015)Adapting the Duty Cycle to Traffic Load in a Preamble Sampling MAC for WSNs: Formal Specification and Performance Evaluation., , , and . Ad Hoc Sens. Wirel. Networks, 31 (1-4): 101-129 (2016)Design and Safety Verification of a Distributed Charge Equalizer for Modular Li-Ion Batteries., , , , , and . IEEE Trans. Ind. Informatics, 10 (2): 1003-1011 (2014)An Approximation-based Fault Detection Scheme for Image Processing Applications., , and . DATE, page 1331-1334. IEEE, (2020)HATE: a HArdware Trojan Emulation Environment for Microprocessor-based Systems., , , , , and . IOLTS, page 109-114. IEEE, (2019)DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN., , , , and . J. Syst. Archit., (2022)