From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-Code Files., , , , , , , , и . IEEE Embed. Syst. Lett., 14 (3): 111-114 (2022)Explaining EDA synthesis errors with LLMs., , и . CoRR, (2024)Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design., , , , , , , , , и 2 other автор(ы). ICCAD, стр. 157:1-157:9. ACM, (2022)Chip-Chat: Challenges and Opportunities in Conversational Hardware Design., , , и . MLCAD, стр. 1-6. IEEE, (2023)Dataset for REMaQE evaluation., , , , и . (мая 2024)Benchmarking Large Language Models for Automated Verilog RTL Code Generation., , , , , , , и . DATE, стр. 1-6. IEEE, (2023)dcc -help: Transforming the Role of the Compiler by Generating Context-Aware Error Explanations with Large Language Models., , , и . SIGCSE (1), стр. 1314-1320. ACM, (2024)DAVE: Deriving Automatically Verilog from English., , и . MLCAD, стр. 27-32. ACM, (2020)High-Level Approaches to Hardware Security: A Tutorial., , и . ACM Trans. Embed. Comput. Syst., 22 (3): 45:1-45:40 (2023)Runtime Interchange of Enforcers for Adaptive Attacks: A Security Analysis Framework for Drones., , , и . MEMOCODE, стр. 1-11. IEEE, (2022)