Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Analysis of Multi-process Execution Model on Dynamically Reconfigurable Processor., , and . ERSA, page 203-206. CSREA Press, (2007)A Method for Capturing State Data on Dynamically Reconfigurable Processors., and . ERSA, page 208-214. CSREA Press, (2008)Performance and power analysis of time-multiplexed execution on dynamically reconfigurable processor., , , , , , , and . IPDPS, IEEE, (2006)On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks., , and . SSS, volume 6366 of Lecture Notes in Computer Science, page 159-175. Springer, (2010)A Preemption Algorithm for a Multitasking Environment on Dynamically Reconfigurable Processors., and . IEICE Trans. Inf. Syst., 91-D (12): 2793-2803 (2008)Performance/Cost Trade-Off Evaluation for the DCT Implementation on the Dynamically Reconfigurable Processor., , , and . ARC, volume 3985 of Lecture Notes in Computer Science, page 115-121. Springer, (2006)A Mapping Method for Multi-Process Execution on Dynamically Reconfigurable Processors., and . FPT, page 357-360. IEEE, (2007)Evaluation of a multicore reconfigurable architecture with variable core sizes., , , and . IPDPS, page 1-8. IEEE, (2009)Securing wireless sensor networks against large-scale node capture attacks., , and . AsiaCCS, page 112-123. ACM, (2010)Simulation modeling of secure wireless sensor networks., , and . VALUETOOLS, page 30. ICST/ACM, (2009)