Author of the publication

Performance aware secure code partitioning.

, , and . DATE, page 1122-1127. EDA Consortium, San Jose, CA, USA, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile Network Analysis Using Probabilistic Connectivity Matrices., , , and . IEEE Trans. Syst. Man Cybern. Part C, 37 (4): 694-702 (2007)On Bandwidth-Limited Sum-of-Games Problems., , , and . IEEE Trans. Syst. Man Cybern. Part A, 41 (2): 341-349 (2011)Inferring Statistically Significant Hidden Markov Models., , , , and . IEEE Trans. Knowl. Data Eng., 25 (7): 1548-1558 (2013)A Normalized Statistical Metric Space for Hidden Markov Models., , , , , and . IEEE Trans. Cybern., 43 (3): 806-819 (2013)Fusion of threshold rules for target detection in wireless sensor networks., , , , , and . ACM Trans. Sens. Networks, 6 (2): 18:1-18:7 (2010)Stochastic Tools for Network Intrusion Detection., and . CoRR, (2017)A Compiler-Based Approach to Data Security., , , and . CC, volume 3443 of Lecture Notes in Computer Science, page 188-203. Springer, (2005)A brief survey of Cryptocurrency systems., , , , , and . PST, page 745-752. IEEE, (2016)Provenance threat modeling., , , , , and . PST, page 384-387. IEEE, (2016)Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions., , , , and . MALWARE, page 161-166. IEEE, (2018)