Author of the publication

Increasing IJTAG bandwidth and managing security through parallel locking-SIBs.

, , , and . ITC, page 1-10. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Behavioral Approach to Information Security Policy Compliance., and . AMCIS, Association for Information Systems, (2017)Business-Driven Information Systems Change: Establishing an Alternate Lens for Understanding the Change Process., and . AMCIS, Association for Information Systems, (2017)Increasing IJTAG bandwidth and managing security through parallel locking-SIBs., , , and . ITC, page 1-10. IEEE, (2017)Examining conversations between police agencies and the public on Facebook., , and . DG.O, page 13:1-13:10. ACM, (2018)Learning Rich Features from RGB-D Images for Object Detection and Segmentation., , , and . CoRR, (2014)Unifying Map and Landmark Based Representations for Visual Navigation., , , and . CoRR, (2017)Spatial Locality-Aware Cache Partitioning for Effective Cache Sharing., and . ICPP, page 150-159. IEEE Computer Society, (2015)Do I matter?: the impact of individual differences on training process., , and . CPR, page 112-120. ACM, (2010)Effective Running of End-to-End HPC Workflows on Emerging Heterogeneous Architectures., , , , and . CLUSTER, page 344-348. IEEE Computer Society, (2017)Cognitive Mapping and Planning for Visual Navigation., , , , and . CVPR, page 7272-7281. IEEE Computer Society, (2017)