Author of the publication

Customer Value-based HW/SW Partitioning Decision in Embedded Systems.

, , , , and . SNPD, page 257-262. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Odyssey Towards Best SCM Practices: The Big Picture., , and . SCM, volume 1167 of Lecture Notes in Computer Science, page 231-238. Springer, (1996)Cascade Damage Estimation Model for Internet Attacks., , , and . WISI, volume 3917 of Lecture Notes in Computer Science, page 163-164. Springer, (2006)The Value Gap Model: Value-Based Requirements Elicitation., , , and . CIT, page 885-890. IEEE Computer Society, (2007)A seamless lawful interception architecture for mobile users in IEEE 802.16e networks., , , , and . J. Commun. Networks, 11 (6): 626-633 (2009)Investigation of Hemoglobin/Gold Nanoparticle Heterolayer on Micro-Gap for Electrochemical Biosensor Application., , , , , and . Sensors, 16 (5): 660 (2016)Security Risk Vector for Quantitative Asset Assessment., , , , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 274-283. Springer, (2005)A Security Risk Analysis Model for Information Systems., , , , , and . AsiaSim, volume 3398 of Lecture Notes in Computer Science, page 505-513. Springer, (2004)Effective Appliance Selection by Complementary Context Feeding in Smart Home System., , and . SEUS, volume 4761 of Lecture Notes in Computer Science, page 233-242. Springer, (2007)Cyber Threat Trend Analysis Model Using HMM., , , , and . IAS, page 177-182. IEEE Computer Society, (2007)Effective Service Decision Using Ambient-Based HHMM in Smart Home System., , , and . CIT, page 979-984. IEEE Computer Society, (2007)