From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hardware obfuscation using PUF-based logic., и . ICCAD, стр. 270-277. IEEE, (2014)The bidirectional polyomino partitioned PPUF as a hardware security primitive., и . GlobalSIP, стр. 257-260. IEEE, (2013)Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels., , , и . DAC, стр. 90:1-90:6. ACM, (2014)Heterogeneous BISR techniques for yield and reliability enhancement using high level synthesis transformations., , и . ASAP, стр. 454-465. IEEE, (1993)Fault-Tolerant and Low-Power Sampling Schedules for Localized BASNs., и . IEEE J. Emerg. Sel. Topics Circuits Syst., 3 (1): 86-95 (2013)Consistency-Based On-line Localization in Sensor Networks., , и . DCOSS, том 4026 из Lecture Notes in Computer Science, стр. 529-545. Springer, (2006)Sequential Circuit Delay optimization Using Global Path Delays., , , и . DAC, стр. 483-489. ACM Press, (1993)Optimal ILP-Based Approach for Throughput Optimization Using Simultaneous Algorithm/Architecture Matching and Retiming., , и . DAC, стр. 113-118. ACM Press, (1995)Engineering Change: Methodology and Applications to Behavioral and System Synthesis., и . DAC, стр. 604-609. ACM Press, (1999)Energy attacks and defense techniques for wireless systems., , и . WISEC, стр. 185-194. ACM, (2013)