Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Mitigation of Hardware Trojan Attacks in Embedded Processors by Exploiting a Hardware-Based Obfuscator., , , and . IVSW, page 31-37. IEEE, (2018)Post-Silicon Validation of IEEE 1687 Reconfigurable Scan Networks., , , and . ETS, page 1-6. IEEE, (2019)Evolving Warriors for the Nano Core., , and . CIG, page 272-278. IEEE, (2006)Multi-objective Evolutionary Algorithms for Influence Maximization in Social Networks., , , , and . EvoApplications (1), volume 10199 of Lecture Notes in Computer Science, page 221-233. (2017)Chromatic Selection - An Oversimplified Approach to Multi-objective Optimization.. EvoApplications, volume 9028 of Lecture Notes in Computer Science, page 681-689. Springer, (2015)Automatic Completion and Refinement of Verification Sets for Microprocessor Cores., , and . EvoWorkshops, volume 3449 of Lecture Notes in Computer Science, page 205-214. Springer, (2005)Evolving assembly programs: how games help microprocessor validation., , and . IEEE Trans. Evol. Comput., 9 (6): 695-706 (2005)Artificial evolution in computer aided design: from the optimization of parameters to the creation of assembly programs.. Computing, 93 (2-4): 103-120 (2011)Improving Multi-objective Evolutionary Influence Maximization in Social Networks., , , , and . EvoApplications, volume 10784 of Lecture Notes in Computer Science, page 117-124. Springer, (2018)Code generation for functional validation of pipelined microprocessors., , and . ETW, page 113-118. IEEE Computer Society, (2003)