From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Energy attacks and defense techniques for wireless systems., , и . WISEC, стр. 185-194. ACM, (2013)Fault-Tolerant and Low-Power Sampling Schedules for Localized BASNs., и . IEEE J. Emerg. Sel. Topics Circuits Syst., 3 (1): 86-95 (2013)Low power and QoS.. IEEE Concurrency, 7 (4): 9-10 (1999)Scheduling Algorithms For Hierarchical Data Control Flow Graphs., и . I. J. Circuit Theory and Applications, 20 (3): 217-233 (1992)Algorithm selection: a quantitative optimization-intensive approach., и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 18 (5): 524-532 (1999)Improving the observability and controllability of datapaths foremulation-based debugging., , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 18 (11): 1529-1541 (1999)Optimizing power using transformations., , , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 14 (1): 12-31 (1995)Optimizing resource utilization using transformations., и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 13 (3): 277-292 (1994)Efficient Block Scheduling to Minimize Context Switching Time for Programmable Embedded Processors., , и . Des. Autom. Embed. Syst., 4 (4): 311-327 (1999)Toward energy-efficient and distributed mobile health monitoring using parallel offloading., и . EMBC, стр. 7257-7261. IEEE, (2013)