Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A pythonic approach for rapid hardware prototyping and instrumentation., , , , , and . FPL, page 1-7. IEEE, (2017)SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing., , , , , and . HASP@MICRO, page 8:1-8:9. ACM, (2020)Charm: A Language for Closed-Form High-Level Architecture Modeling., , , , , , , , and . ISCA, page 152-165. IEEE Computer Society, (2018)Safer Program Behavior Sharing Through Trace Wringing., , , and . ASPLOS, page 1059-1072. ACM, (2019)Analysis and Mitigations of Reverse Engineering Attacks on Local Feature Descriptors., , , , , , , , , and 2 other author(s). CoRR, (2021)SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing., , , , , and . CoRR, (2021)Porcupine: a synthesizing compiler for vectorized homomorphic encryption., , , , , and . PLDI, page 375-389. ACM, (2021)PyRTL in Early Undergraduate Research., , and . WCAE@ISCA, page 6:1-6:8. ACM, (2019)PyRTLMatrix: An Object-Oriented Hardware Design Pattern for Prototyping ML Accelerators., , , , , , and . EMC2@HPCA/CVPR/ISCA, page 36-40. IEEE, (2019)Mitigating Reverse Engineering Attacks on Local Feature Descriptors., , , , , , , , , and 2 other author(s). BMVC, page 106. BMVA Press, (2021)