Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classifying Computations on Multi-Tenant FPGAs., , , , and . DAC, page 1261-1266. IEEE, (2021)SurfNoC: a low latency and provably non-interfering approach to secure networks-on-chip., , , , , , and . ISCA, page 583-594. ACM, (2013)A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors., , , , , , and . Cryptography and Security, volume 6805 of Lecture Notes in Computer Science, page 364-382. Springer, (2012)Autonomous acoustic trigger for distributed underwater visual monitoring systems., , , and . WUWNet, page 10. ACM, (2016)Hardware acceleration of multi-view face detection., , and . SASP, page 66-69. IEEE Computer Society, (2009)Efficient distributed algorithms for data fusion and node localization in mobile ad-hoc networks., , and . MASS, IEEE Computer Society, (2005)Holistic Power Side-Channel Leakage Assessment: Towards a Robust Multidimensional Metric., , and . ICCAD, page 1-8. ACM, (2019)Policy-Driven Memory Protection for Reconfigurable Hardware., , , and . ESORICS, volume 4189 of Lecture Notes in Computer Science, page 461-478. Springer, (2006)Detection and time-of-arrival estimation of underwater acoustic signals., , and . SPAWC, page 1-5. IEEE, (2016)Arbitrary Precision and Complexity Tradeoffs for Gate-Level Information Flow Tracking., , , , , and . DAC, page 5:1-5:6. ACM, (2017)