Author of the publication

Energy efficient MIMO processing: A case study of opportunistic run-time approximations.

, , , , and . DATE, page 1-6. European Design and Automation Association, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algorithm-architecture co-design of soft-output ML MIMO detector for parallel application specific instruction set processors., , , , , and . DATE, page 1608-1613. IEEE, (2009)Flash-Cosmos: In-Flash Bulk Bitwise Operations Using Inherent Computation Capability of NAND Flash Memory., , , , , , , , and . MICRO, page 937-955. IEEE, (2022)Demystifying the TensorFlow Eager Execution of Deep Learning Inference on a CPU-GPU Tandem., , and . DSD, page 446-455. IEEE, (2022)Selective flexibility: Breaking the rigidity of datapath merging., , , , and . DATE, page 1543-1548. IEEE, (2012)Generic Multi-Phase Software-Pipelined Partial-FFT on Instruction-Level-Parallel Architectures and SDR Baseband Applications., , , , and . DATE, page 598-603. ACM, (2008)Memory Hierarchy Calibration Based on Real Hardware In-order Cores for Accurate Simulation., , , , , and . DATE, page 707-710. IEEE, (2021)Application-driven adaptive fixed-point refinement for SDRs., , , , , and . SiPS, page 245-250. IEEE, (2008)An FPGA-based Emulation Platform for Edge Computing Node Design Exploration., , and . RSP, page 8-14. IEEE, (2021)Implementing Rowhammer Memory Corruption in the gem5 Simulator., , , , and . RSP, page 36-42. IEEE, (2021)Diminisher: A Linux Kernel Based Countermeasure for TAA Vulnerability., , , , , and . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, volume 13106 of Lecture Notes in Computer Science, page 477-495. Springer, (2021)