Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

State of the Art of Clinical Narrative Report De-Identification and Its Future., , , and . AMIA, AMIA, (2015)Visualization of Patient Prescription History Data in Emergency Care., , and . AMIA, AMIA, (2014)Efficiently Securing Systems from Code Reuse Attacks., , , and . IEEE Trans. Computers, 63 (5): 1144-1156 (2014)SCRAP: Architecture for signature-based protection from Code Reuse Attacks., , , , and . HPCA, page 258-269. IEEE Computer Society, (2013)A high-resolution side-channel attack on last-level cache., , , and . DAC, page 72:1-72:6. ACM, (2016)Improving the Soft Error Resilience of the Register Files Using SRAM Bitcells with Built-In Comparators., , and . DSD, page 140-143. IEEE Computer Society, (2012)Exploiting Bus Level and Bit Level Inactivity for Preventing Wire Degradation due to Electromigration., , and . DSD, page 280-287. IEEE Computer Society, (2012)A Bayesian Network Scoring Metic that Is Based on Globally Uniform Parameter Priors., and . UAI, page 251-258. Morgan Kaufmann, (2002)Creating a Software Tool for the Clinical Researcher - the IPS System., , , , , , and . AMIA, AMIA, (2002)Branch regulation: Low-overhead protection from code reuse attacks., , , and . ISCA, page 94-105. IEEE Computer Society, (2012)