Author of the publication

Row-by-Row Dynamic Source-Line Voltage Control (RRDSV) Scheme for Two Orders of Magnitude Leakage Current Reduction of Sub-1-V-VDD SRAM's.

, , , , , , , , , and . IEICE Trans. Electron., 88-C (4): 760-767 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Permission-Based Malicious Behaviors Monitoring Model for the Android OS., , , and . ICCSA (1), volume 7971 of Lecture Notes in Computer Science, page 382-395. Springer, (2013)Sequential Change-Point Detection Methods for Nonstationary Time Series., , and . Technometrics, 50 (1): 40-52 (2008)A Framework for Dynamic Taint Analysis of Binary Executable File., and . ICISA, page 1-2. IEEE, (2013)Multi-contact model for FEM-based surgical simulation., , and . Medical Imaging: Image-Guided Procedures, volume 7625 of SPIE Proceedings, page 76252H. SPIE, (2010)Row-by-Row Dynamic Source-Line Voltage Control (RRDSV) Scheme for Two Orders of Magnitude Leakage Current Reduction of Sub-1-V-VDD SRAM's., , , , , , , , , and . IEICE Trans. Electron., 88-C (4): 760-767 (2005)Empirical performance evaluation of IETF mobile IPv6 and proxy mobile IPv6., , , and . Mobility Conference, page 68. ACM, (2008)Establishing Usability and Development Strategies: Focused on Intelligent Legislation Support System., , , , and . iThings/CPSCom, page 541-545. IEEE Computer Society, (2011)A Framework of Static Analyzer for Taint Analysis of Binary Executable File., , , , and . ITCS, volume 253 of Lecture Notes in Electrical Engineering, page 185-192. Springer, (2013)Enhanced Light Weight Route Optimization in Proxy Mobile IPv6., and . NCM, page 501-504. IEEE Computer Society, (2009)Explicit Untainting to Reduce Shadow Memory Usage and Access Frequency in Taint Analysis., , , and . ICCSA (3), volume 7973 of Lecture Notes in Computer Science, page 175-186. Springer, (2013)