Author of the publication

Modeling Mobile Cloud Computing Using Greenmetrics.

, and . Feedback Computing, USENIX Association, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy attacks and defense techniques for wireless systems., , and . WISEC, page 185-194. ACM, (2013)Heterogeneous BISR techniques for yield and reliability enhancement using high level synthesis transformations., , and . ASAP, page 454-465. IEEE, (1993)Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach., , , and . Information Hiding, volume 5284 of Lecture Notes in Computer Science, page 102-117. Springer, (2008)The bidirectional polyomino partitioned PPUF as a hardware security primitive., and . GlobalSIP, page 257-260. IEEE, (2013)Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels., , , and . DAC, page 90:1-90:6. ACM, (2014)Hardware obfuscation using PUF-based logic., and . ICCAD, page 270-277. IEEE, (2014)Enhanced FPGA reliability through efficient run-time fault reconfiguration., , and . IEEE Trans. Reliab., 49 (3): 296-304 (2000)Fault-Tolerant and Low-Power Sampling Schedules for Localized BASNs., and . IEEE J. Emerg. Sel. Topics Circuits Syst., 3 (1): 86-95 (2013)Consistency-Based On-line Localization in Sensor Networks., , and . DCOSS, volume 4026 of Lecture Notes in Computer Science, page 529-545. Springer, (2006)Optimal ILP-Based Approach for Throughput Optimization Using Simultaneous Algorithm/Architecture Matching and Retiming., , and . DAC, page 113-118. ACM Press, (1995)