Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Embedded Networks through Secure Collective Attestation.. PhD Forum@MobiSys, page 1-2. ACM, (2018)A New Approach to Teaching Fuzzy Logic System Design., , and . IFSA, volume 2715 of Lecture Notes in Computer Science, page 79-86. Springer, (2003)CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems., , , , and . ICCAD, page 1-8. ACM, (2019)Bonsai in the Fog: An active learning lab with Fog computing., , , and . FMEC, page 79-86. IEEE, (2018)A Framework for Analyzing Activity Time Data., and . SOSE, page 14-18. IEEE Computer Society, (2008)Modelling of Process Parameters for 32nm PMOS Transistor Using Taguchi Method., , , , and . Asia International Conference on Modelling and Simulation, page 40-45. IEEE Computer Society, (2012)Enhancing Requirements Engineering Activities through the Use of Mobile Technology Devices and Tools., , and . FGCN (2), page 578-581. IEEE Computer Society, (2007)Selection of High Strength Encapsulant for MEMS Devices Undergoing High Pressure Packaging, , , and . CoRR, (2008)Model check by kernel methods under weak moment conditions, , and . Computational Statistics & Data Analysis, 36 (3): 403--409 (May 28, 2001)A practical investigation on nickel plated copper heat spreader with different catalytic activation processes for flip-chip ball grid array packages., , , , and . Microelectron. Reliab., 49 (5): 537-543 (2009)