Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impact of positive bias temperature instability (PBTI) on 3T1D-DRAM cells., , , , and . Integr., 45 (3): 246-252 (2012)Strategies to enhance the 3T1D-DRAM cell variability robustness beyond 22 nm., , , , and . Microelectron. J., 45 (10): 1342-1347 (2014)Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework., , , , , and . J. Netw. Syst. Manag., 31 (2): 33 (April 2023)Power- and Performance - Aware Architectures.. Polytechnic University of Catalonia, Spain, (2004)MASkIt: Soft error rate estimation for combinational circuits., , , and . ICCD, page 614-621. IEEE Computer Society, (2016)SRAM memory margin probability failure estimation using Gaussian Process regression., , , and . ICCD, page 448-451. IEEE Computer Society, (2016)Vitamin-V: Expanding Open-Source RISC-V Cloud Environments., , , , , , , , , and 5 other author(s). CoRR, (2024)Predictive Reliability and Fault Management in Exascale Systems: State of the Art and Perspectives., , , , , , , , , and 2 other author(s). ACM Comput. Surv., 53 (5): 95:1-95:32 (2021)VITAMIN-V: Virtual Environment and Tool-Boxing for Trustworthy Development of RISC-V Based Cloud Services., , , , , , , , , and 14 other author(s). DSD, page 302-308. IEEE, (2023)Malicious Website Detection Through Deep Learning Algorithms., , , and . LOD, volume 13163 of Lecture Notes in Computer Science, page 512-526. Springer, (2021)