From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analysis and Mitigations of Reverse Engineering Attacks on Local Feature Descriptors., , , , , , , , , и 2 other автор(ы). CoRR, (2021)Dataflow Tomography: Information Flow Tracking For Understanding and Visualizing Full Systems., , , , и . ACM Trans. Archit. Code Optim., 9 (1): 3:1-3:26 (2012)Eliminating Timing Information Flows in a Mix-Trusted System-on-Chip., , и . IEEE Des. Test, 30 (2): 55-62 (2013)Guiding Architectural SRAM Models., и . ICCD, стр. 376-382. IEEE, (2006)Boosted Race Trees for Low Energy Classification., , , , и . ASPLOS, стр. 215-228. ACM, (2019)PyRTL in Early Undergraduate Research., , и . WCAE@ISCA, стр. 6:1-6:8. ACM, (2019)On the Limits of Leakage Power Reduction in Caches., , и . HPCA, стр. 154-165. IEEE Computer Society, (2005)A Pipelined Memory Architecture for High Throughput Network Processors., , и . ISCA, стр. 288-299. IEEE Computer Society, (2003)Position paper: Sapper - a language for provable hardware policy enforcement., , , , , , , , и . PLAS, стр. 39-44. ACM, (2013)Project VIRGO: creation of a surrogate companion for the elderly., , и . CHI Extended Abstracts, стр. 2104-2108. ACM, (2005)