Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HARPA: Tackling physically induced performance variability., , , , , , , , , and 10 other author(s). DATE, page 97-102. IEEE, (2017)An energy-efficient and error-resilient server ecosystem exceeding conservative scaling limits., , , , , , , , , and 16 other author(s). DATE, page 1099-1104. IEEE, (2018)Memory array protection: check on read or check on write?, , , , and . DATE, page 214-219. EDA Consortium San Jose, CA, USA / ACM DL, (2013)Fine-Grained Vulnerability Analysis of Resource Constrained Neural Inference Accelerators., , , and . DFT, page 1-6. IEEE, (2021)INTERPLAY: An Intelligent Model for Predicting Performance Degradation due to Multi-cache Way-disabling., , and . DFT, page 1-7. IEEE, (2022)Functional and Timing Implications of Transient Faults in Critical Systems., , , , , , , and . IOLTS, page 1-10. IEEE, (2022)Modeling the implications of DRAM failures and protection techniques on datacenter TCO., , , and . MICRO, page 572-584. ACM, (2015)CNN based Real-time Forest Fire Detection System for Low-power Embedded Devices., , , and . MED, page 137-143. IEEE, (2023)TrustPH: Trustworthy Platoon Head Selection considering Cognitive Biases to enhance Secure Platooning in Intelligent and Connected Vehicles., , and . ITSC, page 1760-1766. IEEE, (2021)SafeDrones: Real-Time Reliability Evaluation of UAVs Using Executable Digital Dependable Identities., , , , , , , , , and 2 other author(s). IMBSA, volume 13525 of Lecture Notes in Computer Science, page 252-266. Springer, (2022)