From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Scalable Detection of Hardware Trojans Using ATPG-Based Activation of Rare Events., и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (12): 4450-4462 (декабря 2023)Enhanced Alternate Action Recommender System Using Recurrent Patterns and Fault Detection System for Smart Home Users., , , и . IEEE BigData, стр. 651-656. IEEE, (2019)Functional Verification of Pipelined Processors: A Case Study., , и . MTV, стр. 79-84. IEEE Computer Society, (2004)Real-Time Detection and Localization of Denial-of-Service Attacks in Heterogeneous Vehicular Networks., , и . DATE, стр. 1434-1439. IEEE, (2021)An efficient code compression technique using application-aware bitmask and dictionary selection methods., и . DATE, стр. 582-587. EDA Consortium, San Jose, CA, USA, (2007)PreDVS: preemptive dynamic voltage scaling for real-time systems using approximation scheme., и . DAC, стр. 705-710. ACM, (2010)Dynamic cache reconfiguration and partitioning for energy optimization in real-time multi-core systems., , и . DAC, стр. 948-953. ACM, (2011)Automatic RTL Test Generation from SystemC TLM Specifications., , и . ACM Trans. Embed. Comput. Syst., 11 (2): 38:1-38:25 (2012)Directed Test Generation for Activation of Security Assertions in RTL Models., , и . ACM Trans. Design Autom. Electr. Syst., 26 (4): 26:1-26:28 (2021)Automatic validation of pipeline specifications., , и . HLDVT, стр. 9-13. IEEE Computer Society, (2001)