Author of the publication

High-Level Synthesis of Multiple Word-Length DSP Algorithms Using Heterogeneous-Resource FPGAs.

, , , and . FPL, page 1-4. IEEE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forecasting Based on Short Time Series Using ANNs and Grey Theory - Some Basic Comparisons., , , and . IWANN (1), volume 6691 of Lecture Notes in Computer Science, page 183-190. Springer, (2011)Improving security in WMNs with reputation systems and self-organizing maps., , , , , , , , , and 1 other author(s). J. Netw. Comput. Appl., 34 (2): 455-463 (2011)Architectural Synthesis of Fixed-Point DSP Datapaths Using FPGAs., , , , and . Int. J. Reconfigurable Comput., (2009)Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection., , and . CISIS, volume 53 of Advances in Soft Computing, page 147-154. Springer, (2008)A Scalable Security Framework for Reliable AmI Applications Based on Untrusted Sensors., , , , , and . WWIC, volume 5546 of Lecture Notes in Computer Science, page 73-84. Springer, (2009)Utilization factor of a distributed system based on an Ethernet network., , and . PDP, page 273-277. IEEE, (1993)SORU: A Reconfigurable Vector Unit for Adaptable Embedded Systems., , , , , , , , , and 2 other author(s). ARC, volume 5453 of Lecture Notes in Computer Science, page 255-260. Springer, (2009)Evaluation, Energy Optimization, and Spectrum Analysis of an Artificial Noise Technique to Improve CWSN Security., , , and . IJDSN, (2013)Optimal combined word-length allocation and architectural synthesis of digital signal processing circuits., , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 53-II (5): 339-343 (2006)Modular Framework for Smart Home Applications., , , , , , , , and . IWANN (2), volume 5518 of Lecture Notes in Computer Science, page 695-701. Springer, (2009)