Author of the publication

Adaptability infrastructure for bridging IT security evaluation and options theory.

, , and . SIN, page 39-45. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptability infrastructure for bridging IT security evaluation and options theory., , and . SIN, page 39-45. ACM, (2009)Reducing the Configuration Overhead of the Distributed Two-level Control System., , and . DATE, page 104-107. IEEE, (2022)Implementation of Sobel Edge Detection on DRRA and DiMArch Architectures., , , , and . DSD, page 16-23. IEEE, (2023)Memristor-Based In-Circuit Computation for Trace-Based STDP., , , , , , , , and . AICAS, page 1-4. IEEE, (2022)Morphable DPU: Smart and efficient data path for signal processing applications., and . SiPS, page 167-172. IEEE, (2009)Self-adaptive Noc Power Management with Dual-level Agents - Architecture and Implementation., , , , , and . PECCS, page 450-458. SciTePress, (2012)Hardware/software partitioning and minimizing memory interface traffic., , , , and . EURO-DAC, page 226-231. IEEE Computer Society, (1994)An efficient hardware implementation of high quality AWGN generator using Box-Muller method., , , and . ISCIT, page 449-454. IEEE, (2011)A neural net based self organising scheduling algorithm., and . EURO-DAC, page 136-140. IEEE Computer Society, (1990)Dynamic memory management methodology applied to embedded telecom network systems., , , , , , and . IEEE Trans. Very Large Scale Integr. Syst., 10 (5): 650-667 (2002)