Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High throughput pipelined FPGA implementation of the new SHA-3 cryptographic hash algorithm., , and . ISCCSP, page 538-541. IEEE, (2014)MAC-aware routing metrics for the internet of things., , , and . Comput. Commun., (2016)Price stabilization using buffer stocks, , and . Journal of Economic Dynamics and Control, 32 (4): 1212--1235 (April 2008)Cooperative handoff in wireless networks., , and . PIMRC, page 1-6. IEEE, (2008)Dynamic Cross-Layer Association in 802.11-Based Mesh Networks., , , and . INFOCOM, page 2090-2098. IEEE, (2007)Real Time Earthquake's Survivor Detection using a Miniaturized LWIR Camera., , , and . PETRA, page 21. ACM, (2016)Human Object Detection using Very Low Resolution Thermal Cameras for Urban Search and Rescue., , , and . PETRA, page 311-318. ACM, (2017)Evaluation of localization methods in millimeter-wave wireless systems., , and . CAMAD, page 345-349. IEEE, (2014)On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function., , , , and . SECRYPT, page 270-275. SciTePress, (2012)A template-based methodology for efficient microprocessor and FPGA accelerator co-design., , , , and . ICSAMOS, page 15-22. IEEE, (2012)