Author of the publication

Technological Capability Enhancement Mechanism of Software Outsourcing Enterprises.

, , , and . Web Intelligence/IAT Workshops, page 82-85. IEEE Computer Society, (2011)978-0-7695-4513-4.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy efficient implementation of G.729 for wireless VoIP application., , , and . ICAIT, page 133:1-133:7. ACM, (2008)Phenotype guided interpretable graph convolutional network analysis of fMRI data reveals changing brain connectivity during adolescence., , and . Medical Imaging: Biomedical Applications in Molecular, Structural, and Functional Imaging, volume 12036 of SPIE Proceedings, SPIE, (2022)Processor Vulnerability Discovery., , and . DAC, page 1-3. IEEE, (2023)Satisfiability Don't Care condition based circuit fingerprinting techniques., and . ASP-DAC, page 815-820. IEEE, (2015)Mitigating Adversarial Attacks for Deep Neural Networks by Input Deformation and Augmentation., , , , , and . ASP-DAC, page 157-162. IEEE, (2020)Design and implementation of a group-based RO PUF., , and . DATE, page 416-421. EDA Consortium San Jose, CA, USA / ACM DL, (2013)Behavioral level dual-vth design for reduced leakage power with thermal awareness., , , and . DATE, page 1261-1266. IEEE Computer Society, (2010)A New Scheme to Extract PUF Information by Scan Chain., , , and . ATS, page 104-108. IEEE, (2018)A survey on security and trust of FPGA-based systems., and . FPT, page 147-152. IEEE, (2014)Energy minimization of system pipelines using multiple voltages., , , and . ISCAS (1), page 362-365. IEEE, (1999)