Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A task remapping technique for reliable multi-core embedded systems., , , , , and . CODES+ISSS, page 307-316. ACM, (2010)On running data-intensive algorithms with intelligent SSD and host CPU: a collaborative approach., , , , and . SAC, page 2060-2065. ACM, (2015)Library Support in an Actor-Based Parallel Programming Platform., , , and . IEEE Trans. Ind. Informatics, 7 (2): 340-353 (2011)Single appearance schedule with dynamic loop count for minimum data buffer from synchronous dataflow graphs., , and . CASES, page 157-165. ACM, (2005)Scalable Wildcarded Identity-Based Encryption., , , and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 269-287. Springer, (2018)Forward Secure Identity-Based Signature Scheme with RSA., , , , and . SEC, volume 562 of IFIP Advances in Information and Communication Technology, page 314-327. Springer, (2019)Combinatorial subset difference public key broadcast encryption scheme for secure multicast., , , and . SAC, page 1593-1600. ACM, (2018)Decidable Signal Processing Dataflow Graphs: Synchronous and Cyclo-Static Dataflow Graphs., and . Handbook of Signal Processing Systems, Springer, (2010)A novel analytical method for worst case response time estimation of distributed embedded systems., , , , and . DAC, page 129:1-129:10. ACM, (2013)Port Based Actor Model with Kahn Process Network Model and Decidable Dataflow Model.. J. Signal Process. Syst., 71 (1): 75-88 (2013)