Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mapping of micro data flow computations on parallel microarchitectures., and . MICRO, page 70-72. ACM/IEEE, (1988)Detection of text strings from mixed text/graphics images., and . Document Recognition and Retrieval, volume 4307 of SPIE Proceedings, page 201-211. SPIE, (2001)On reordering instruction streams for pipelined computers., and . MICRO, page 199-206. ACM/IEEE, (1989)Ontology-guided Conceptual Analysis of Design Specifications., , , and . DAC, page 34:1-34:6. ACM, (2014)Improving Bus Test Via IDDT and Boundary Scan., , and . DAC, page 307-312. ACM, (2001)An Effective Power Management Scheme for RTL Design Based on Multiple Clocks., , and . DAC, page 337-342. ACM Press, (1996)An evolution programming approach on multiple behaviors for the design of application specific programmable processors., and . ED&TC, page 144-150. IEEE Computer Society, (1996)Using codesign techniques to support analog functionality., , , and . CODES, page 79-84. ACM, (1999)Knowledge-Guided Methodology for Third-Party Soft IP Analysis., , , , , and . VLSID, page 246-251. IEEE Computer Society, (2014)Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme., , , and . DATE, page 1362-1365. ACM, (2008)