Author of the publication

A two-stage opamp frequency Compensation technique by splitting the 2nd stage.

, , , and . ICCCNT, page 1-5. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Term Rewriting for Access Control., and . DBSec, volume 4127 of Lecture Notes in Computer Science, page 179-193. Springer, (2006)A High Frequency CMRR improvement technique for Differential Amplifiers in 45nm CMOS., , , , and . ICCCNT, page 1-5. IEEE, (2019)Action-status access control.. SACMAT, page 195-204. ACM, (2007)Panel Session: What Are the Key Challenges in Distributed Security?., , , , and . DBSec, volume 5094 of Lecture Notes in Computer Science, page 219-221. Springer, (2008)Access control by action control.. SACMAT, page 143-152. ACM, (2008)Logical Approaches to Authorization Policies.. Logic Programs, Norms and Action, volume 7360 of Lecture Notes in Computer Science, page 349-373. Springer, (2012)Extended Protected Databases: A Practical Implementation., and . ICEIS (1), page 456-459. (2003)Deductive Database Security.. DBSec, volume 256 of IFIP Conference Proceedings, page 103-114. Kluwer, (2002)Flexible Security Policies in SQL., and . DBSec, volume 215 of IFIP Conference Proceedings, page 167-180. Kluwer, (2001)RBAC Policy Implementation for SQL Databases., and . DBSec, volume 142 of IFIP, page 288-301. Kluwer/Springer, (2003)