Author of the publication

Computing with subthreshold leakage: device/circuit/architecture co-design for ultralow-power subthreshold operation.

, , , and . IEEE Trans. Very Large Scale Integr. Syst., 13 (11): 1213-1224 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Eat, but Verify: Low-Cost Portable Devices for Food Safety Analysis., , , , and . IEEE Consumer Electronics Magazine, 8 (1): 12-18 (2019)ENFIRE: An Energy-efficient Fine-grained Spatio-temporal Reconfigurable Computing Fabric (Abstact Only)., , , and . FPGA, page 275. ACM, (2016)Internet of Things security: Are we paranoid enough?. ICCE, page 1. IEEE, (2018)Statistical Modeling of Pipeline Delay and Design of Pipeline under Process Variation to Enhance Yield in sub-100nm Technologies, , , , and . CoRR, (2007)Modeling and Analysis of Loading Effect in Leakage of Nano-Scaled Bulk-CMOS Logic Circuits, , and . CoRR, (2007)On-Chip Batteries as Distributed Energy Sources in Heterogeneous 2.5D/3D Integrated Circuits., , , , and . IEEE Access, (2023)SCOPE: Synthesis-Based Constant Propagation Attack on Logic Locking., , and . IEEE Trans. Very Large Scale Integr. Syst., 29 (8): 1529-1542 (2021)Golden-Free Hardware Trojan Detection Using Self-Referencing., , , and . IEEE Trans. Very Large Scale Integr. Syst., 30 (3): 325-338 (2022)On Database-Free Authentication of Microelectronic Components., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 29 (1): 149-161 (2021)IOLock: An Input/Output Locking Scheme for Protection Against Reverse Engineering Attacks., , and . IEEE Trans. Very Large Scale Integr. Syst., 32 (2): 347-360 (February 2024)