Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security-driven metrics and models for efficient evaluation of logic encryption schemes., , , , , and . MEMOCODE, page 9:1-9:5. ACM, (2019)Emulating and Verifying Sensing, Computation, and Communication in Distributed Remote Sensing Systems., , , and . IGARSS, page 3849-3852. IEEE, (2020)Constellations in the Cloud: Virtualizing Remote Sensing Systems., , , and . IGARSS, page 5351-5354. IEEE, (2019)Bridging the Gap between Advanced Memory and Heterogeneous Architectures., , , and . FCCM, page 226. IEEE Computer Society, (2018)High-precision self-characterization for the LUT burn-in information leakage threat., , and . FPL, page 1-6. IEEE, (2014)Real-Time Anomaly Detection Framework for Many-Core Router through Machine-Learning Techniques., , , and . ACM J. Emerg. Technol. Comput. Syst., 13 (1): 10:1-10:22 (2016)An Innovative Spacecube Application for Atmospheric Science., , , , and . IGARSS, page 3853-3856. IEEE, (2020)Intra-die process variation aware anomaly detection in FPGAs., , and . ITC, page 1-6. IEEE Computer Society, (2014)Fast lossless image compression with Radiation Hardening by hardware/software co-design on platform FPGAs., and . ASAP, page 103-106. IEEE Computer Society, (2013)Torc: towards an open-source tool flow., , , , , and . FPGA, page 41-44. ACM, (2011)