Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

To Detect or to Correct?, and . IOLTS, page 35-38. IEEE, (2018)Timing vulnerability factors of sequential elements in modern microprocessors., , and . IOLTS, page 55-60. IEEE, (2013)IDLD: Instantaneous Detection of Leakage and Duplication of Identifiers used for Register Renaming., , , , , , , , and . MICRO, page 799-814. IEEE, (2022)Don't Correct the Tags in a Cache, Just Check Their Hamming Distance from the Lookup Tag., , , and . HPCA, page 571-582. IEEE Computer Society, (2018)Flip-flop SEU reduction through minimization of the temporal vulnerability factor (TVF)., , and . IOLTS, page 162-167. IEEE, (2015)2D Error Correction for F/F based Arrays using In-Situ Real-Time Error Detection (RTD)., , , , , , and . DFT, page 1-4. IEEE, (2020)A Real-Time Error Detection (RTD) Architecture and Its Use for Reliability and Post-Silicon Validation for F/F Based Memory Arrays., , , and . IEEE Trans. Emerg. Top. Comput., 10 (2): 524-536 (2022)SRAM Arrays with Built-in Parity Computation for Real-Time Error Detection in Cache Tag Arrays., , and . DATE, page 711-716. IEEE, (2021)Error-Shielded Register Renaming Sub-system for a Dynamically Scheduled Out-of-Order Core., , , , , , , and . DATE, page 812-817. IEEE, (2019)