Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient remote profiling for resource-constrained devices., , , and . ACM Trans. Archit. Code Optim., 3 (1): 35-66 (2006)Dataflow Tomography: Information Flow Tracking For Understanding and Visualizing Full Systems., , , , and . ACM Trans. Archit. Code Optim., 9 (1): 3:1-3:26 (2012)Gate-Level Information Flow Tracking for Security Lattices., , , , , , and . ACM Trans. Design Autom. Electr. Syst., 20 (1): 2:1-2:25 (2014)Analysis and Mitigations of Reverse Engineering Attacks on Local Feature Descriptors., , , , , , , , , and 2 other author(s). CoRR, (2021)Analysis of Bit-Split Languages for Packet Scanning and Experiments with Wildcard Matching., , and . Int. J. Found. Comput. Sci., 20 (4): 597-612 (2009)Eliminating Timing Information Flows in a Mix-Trusted System-on-Chip., , and . IEEE Des. Test, 30 (2): 55-62 (2013)Agile Hardware Development and Instrumentation With PyRTL., , and . IEEE Micro, 40 (4): 76-84 (2020)A Pipelined Memory Architecture for High Throughput Network Processors., , and . ISCA, page 288-299. IEEE Computer Society, (2003)Extensible control architectures., , and . CASES, page 323-333. ACM, (2006)Towards understanding architectural tradeoffs in MEMS closed-loop feedback control., , and . CASES, page 95-102. ACM, (2007)