Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid Signed-Digit Number Systems: A Unified Framework for Redundant Number Representations With Bounded Carry Propagation Chains., and . IEEE Trans. Computers, 43 (8): 880-891 (1994)Low Cost Dynamic Architecture Adaptation Schemes for Drowsy Cache Management., , and . J. Low Power Electron., 9 (4): 373-388 (2013)Dependence of SEUs in Digital Cameras on Pixel size and Elevation., , , , and . DFT, page 1-4. IEEE, (2021)Tradeoffs in imager design parameters for sensor reliability., , , , and . Sensors, Cameras, and Systems for Industrial, Scientific, and Consumer Applications, volume 7875 of SPIE Proceedings, page 78750I. SPIE, (2011)An evaluation of an AES implementation protected against EM analysis., , , , and . ACM Great Lakes Symposium on VLSI, page 317-318. ACM, (2013)Does the Floorplan of a Chip Affect Its Yield?, and . DFT, page 159-166. IEEE Computer Society, (1993)A Direct Mapping of Algorithms onto VLSI Processing Arrays Based on the Data Flow Approach., and . ICPP, page 335-337. IEEE Computer Society, (1983)The Effect of Operation Scheduling on the Performance of a Data Flow Computer., , and . IEEE Trans. Computers, 36 (9): 1019-1029 (1987)Countermeasures against EM analysis for a secured FPGA-based AES implementation., , , , and . ReConFig, page 1-6. IEEE, (2013)A unified approach to a class of number systems., and . IEEE Symposium on Computer Arithmetic, page 25-28. IEEE Computer Society, (1978)