From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function., , , , и . SECRYPT, стр. 270-275. SciTePress, (2012)A template-based methodology for efficient microprocessor and FPGA accelerator co-design., , , , и . ICSAMOS, стр. 15-22. IEEE, (2012)Designs and comparisons of authentication modules for IPSec in configurable and extensible embedded processor., , , и . ICECS, стр. 243-246. IEEE, (2010)Area-Throughput Trade-Offs for SHA-1 and SHA-256 Hash Functions' Pipelined Designs., , , , , и . Journal of Circuits, Systems, and Computers, 25 (4): 1650032:1-1650032:26 (2016)A data locality methodology for matrix-matrix multiplication algorithm., , , , , и . J. Supercomput., 59 (2): 830-851 (2012)A Methodology for Speeding Up Fast Fourier Transform Focusing on Memory Architecture Utilization., , , , , и . IEEE Trans. Signal Process., 59 (12): 6217-6226 (2011)Green Traffic Engineering for future core networks., и . SoftCOM, стр. 1-4. IEEE, (2012)Cooperative management of wireless mesh networks.. Wireless Days, стр. 1-6. IEEE, (2012)Green footprint of Cognitive Management Technologies for Future Networks., , , и . MIPRO, стр. 645-649. IEEE, (2011)A Wireless Sensor Network Testbed for Event Detection in Smart Homes., , и . DCOSS, стр. 321-322. IEEE Computer Society, (2013)