Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The complex social network from The Lord of The Rings, , , and . Revista Brasileira de Ensino de Física, (January 2016)Hardware-Accelerated Data Decoding and Reconstruction for Automotive LiDAR Sensors., , , and . IEEE Trans. Veh. Technol., 72 (4): 4267-4276 (April 2023)Shedding Light on Static Partitioning Hypervisors for Arm-based Mixed-Criticality Systems., and . RTAS, page 40-53. IEEE, (2023)Agnostic Hardware-Accelerated Operating System for Low-End IoT., , and . RTCSA, page 21-30. IEEE, (2022)ClimaWin: An intelligent window for optimal ventilation and minimum thermal loss., , , , , , and . ISIE, page 1-6. IEEE, (2013)LTZVisor: TrustZone is the Key., , , , and . ECRTS, volume 76 of LIPIcs, page 4:1-4:22. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Porting SLOTH system to FreeRTOS running on ARM Cortex-M3., , , , , , , and . ISIE, page 1888-1893. IEEE, (2014)Secure and safe virtualization-based framework for embedded systems development. University of Minho, Portugal, (2017)ReZone: Disarming TrustZone with TEE Privilege Reduction., , , and . USENIX Security Symposium, page 2261-2279. USENIX Association, (2022)"Interrupting" the Status Quo: A First Glance at the RISC-V Advanced Interrupt Architecture (AIA)., , , and . IEEE Access, (2024)