From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Verification of Security Policy Enforcement in Enterprise Systems., и . SEC, том 297 из IFIP Advances in Information and Communication Technology, стр. 202-213. Springer, (2009)A Case for Opportunistic Embedded Sensing In Presence of Hardware Power Variability, , , , и . Proceedings of the 2010 International Conference on Power aware computing and systems, стр. 1--8. (October 2010)Synthesis and Analysis of Design-Dependent Ring Oscillator (DDRO) Performance Monitors., , , и . IEEE Trans. Very Large Scale Integr. Syst., 22 (10): 2117-2130 (2014)PROCEED: A Pareto Optimization-Based Circuit-Level Evaluator for Emerging Devices., , , и . IEEE Trans. Very Large Scale Integr. Syst., 24 (1): 192-205 (2016)Mask Assignment and DSA Grouping for DSA-MP Hybrid Lithography for Sub-7 nm Contact/Via Holes., , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 36 (6): 913-926 (2017)REX-SC: Range-Extended Stochastic Computing Accumulation for Neural Network Acceleration., , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (12): 4423-4435 (December 2023)Abductive Analysis of Administrative Policies in Rule-Based Access Control., , и . IEEE Trans. Dependable Secur. Comput., 11 (5): 412-424 (2014)DARE: Deceiving Audio-Visual speech Recognition model., , и . Knowl. Based Syst., (2021)ECO cost measurement and incremental gate sizing for late process changes., и . ACM Trans. Design Autom. Electr. Syst., 18 (1): 16:1-16:11 (2012)Accounting for non-linear dependence using function driven component analysis., , и . ASP-DAC, стр. 474-479. IEEE, (2009)