From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A text-compression-based method for code size minimization in embedded systems, , и . ACM Trans. Des. Autom. Electron. Syst., 4 (1): 12--38 (1999)A Unified Approach to the Decomposition and Re-Decomposition of Sequential Machines., , и . DAC, стр. 601-606. IEEE Computer Society Press, (1990)Approaches to Multi-level Sequential Logic Synthesis.. DAC, стр. 270-276. ACM Press, (1989)TARDIS: Timestamp based Coherence Algorithm for Distributed Shared Memory., и . CoRR, (2015)Round-Efficient Byzantine Broadcast Under Strongly Adaptive and Majority Corruptions., , , и . TCC (1), том 12550 из Lecture Notes in Computer Science, стр. 412-456. Springer, (2020)An Incomplete Scan Design Approach to Test Generation for Sequential Machines., , , и . ITC, стр. 730-734. IEEE Computer Society, (1988)Proxy-based security protocols in networked mobile devices., , , , , и . SAC, стр. 265-272. ACM, (2002)Analytical cache models with applications to cache partitioning., , и . ICS, стр. 1-12. ACM, (2001)Brief Announcement: Practical Synchronous Byzantine Consensus., , , и . DISC, том 91 из LIPIcs, стр. 41:1-41:4. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Bandwidth Hard Functions for ASIC Resistance., и . TCC (1), том 10677 из Lecture Notes in Computer Science, стр. 466-492. Springer, (2017)