From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security-driven metrics and models for efficient evaluation of logic encryption schemes., , , , , и . MEMOCODE, стр. 9:1-9:5. ACM, (2019)Emulating and Verifying Sensing, Computation, and Communication in Distributed Remote Sensing Systems., , , и . IGARSS, стр. 3849-3852. IEEE, (2020)Constellations in the Cloud: Virtualizing Remote Sensing Systems., , , и . IGARSS, стр. 5351-5354. IEEE, (2019)Bridging the Gap between Advanced Memory and Heterogeneous Architectures., , , и . FCCM, стр. 226. IEEE Computer Society, (2018)Reconfigurable Architectures for System Level Applications of Adaptive Computing., , , , , , , , , и . VLSI Design, 10 (3): 265-279 (2000)Sensing nanosecond-scale voltage attacks and natural transients in FPGAs., , , и . FPGA, стр. 101-104. ACM, (2013)A unified hardware/software MPSoC system construction and run-time framework., , , и . DATE, стр. 301-304. ACM, (2015)Open-Source Bitstream Generation., , и . FCCM, стр. 105-112. IEEE Computer Society, (2013)Checkpoint/Restart and Beyond: Resilient High Performance Computing with FPGAs., , , и . FCCM, стр. 162-169. IEEE Computer Society, (2011)High-precision self-characterization for the LUT burn-in information leakage threat., , и . FPL, стр. 1-6. IEEE, (2014)