Author of the publication

Using computational game theory to guide verification and security in hardware designs.

, , , , and . HOST, page 110-115. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Distributed Software Resilience in Asynchronous Many- Task Programming Models., , , and . FTXS@SC, page 11-20. IEEE, (2020)Framework for Enabling System Understanding., , , , , , , , , and . Euro-Par Workshops (2), volume 7156 of Lecture Notes in Computer Science, page 231-240. Springer, (2011)Implementing Software Resiliency in HPX for Extreme Scale Computing., , , and . CoRR, (2020)Digital system robustness via design constraints: The lesson of formal methods., , and . SysCon, page 109-114. IEEE, (2015)Characterizing short-term stability for Boolean networks over any distribution of transfer functions., , , , and . CoRR, (2014)Using computational game theory to guide verification and security in hardware designs., , , , and . HOST, page 110-115. IEEE Computer Society, (2017)Shifted Power Method for Computing Tensor Eigenpairs., and . SIAM J. Matrix Anal. Appl., 32 (4): 1095-1124 (2011)Physics-Based Checksums for Silent-Error Detection in PDE Solvers., , and . Euro-Par Workshops, volume 11997 of Lecture Notes in Computer Science, page 681-693. Springer, (2019)Combining Virtualization, resource characterization, and Resource management to enable efficient high performance compute platforms through intelligent dynamic resource allocation., , , , , , , , and . IPDPS Workshops, page 1-8. IEEE, (2010)Resource monitoring and management with OVIS to enable HPC in cloud computing environments., , , , , , and . IPDPS, page 1-8. IEEE, (2009)