Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Agile Hardware Development and Instrumentation With PyRTL., , and . IEEE Micro, 40 (4): 76-84 (2020)Gate-Level Information Flow Tracking for Security Lattices., , , , , , and . ACM Trans. Design Autom. Electr. Syst., 20 (1): 2:1-2:25 (2014)Dataflow Tomography: Information Flow Tracking For Understanding and Visualizing Full Systems., , , , and . ACM Trans. Archit. Code Optim., 9 (1): 3:1-3:26 (2012)Efficient remote profiling for resource-constrained devices., , , and . ACM Trans. Archit. Code Optim., 3 (1): 35-66 (2006)Analysis and Mitigations of Reverse Engineering Attacks on Local Feature Descriptors., , , , , , , , , and 2 other author(s). CoRR, (2021)Analysis of Bit-Split Languages for Packet Scanning and Experiments with Wildcard Matching., , and . Int. J. Found. Comput. Sci., 20 (4): 597-612 (2009)Eliminating Timing Information Flows in a Mix-Trusted System-on-Chip., , and . IEEE Des. Test, 30 (2): 55-62 (2013)Guiding Architectural SRAM Models., and . ICCD, page 376-382. IEEE, (2006)Boosted Race Trees for Low Energy Classification., , , , and . ASPLOS, page 215-228. ACM, (2019)On the Limits of Leakage Power Reduction in Caches., , and . HPCA, page 154-165. IEEE Computer Society, (2005)