Author of the publication

Error control integration scheme for reliable NoC

, , , and . Circuits and Systems (ISCAS), Proceedings of 2010 IEEE International Symposium on, page 3893-3896. (2010)
DOI: 10.1109/ISCAS.2010.5537694

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dual-Layer Method for Transient and Permanent Error Co-Management in NoC Links., and . IEEE Trans. Circuits Syst. II Express Briefs, 58-II (1): 36-40 (2011)An Orthogonal Algorithm for Key Management in Hardware Obfuscation., , , , , , and . AsianHOST, page 1-4. IEEE, (2019)Explainable fault diagnosis of gas-liquid separator based on fully convolutional neural network., , , , , , and . Comput. Chem. Eng., (2021)INEAD: Intermediate Node Evaluation-Based Attack Detection for Secure Approximate Computing Systems., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 43 (3): 716-727 (March 2024)Hardware Security Risks and Threat Analyses in Advanced Manufacturing Industry., , and . ACM Trans. Design Autom. Electr. Syst., 28 (5): 83:1-83:22 (September 2023)Transient error management for partially adaptive router in network-on-chip (NoC)., and . ISCAS, page 1672-1675. IEEE, (2012)Securing FPGA-based obsolete component replacement for legacy systems., , , , and . ISQED, page 401-406. IEEE, (2018)Optimal pressure sensor locations in smart insoles for heel-strike and toe-off detection., , , , , and . BioCAS, page 458-461. IEEE, (2022)A hardened network-on-chip design using runtime hardware Trojan mitigation methods., and . Integr., (2017)Mitigating Control Flow Attacks in Embedded Systems with Novel Built-in Secure Register Bank., , , and . ACM Great Lakes Symposium on VLSI, page 483-486. ACM, (2017)