Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Advanced System for Modeling Asymmetric Threats., , , , , and . SMC, page 3943-3948. IEEE, (2006)Rapid Construction of Partial Configuration Datastreams from High-Level Constructs Using JBits., and . FPL, volume 2147 of Lecture Notes in Computer Science, page 346-356. Springer, (2001)An Analysis of Programmer Productivity versus Performance for High Level Data Parallel Programming., , and . CPA, volume 68 of Concurrent Systems Engineering Series, page 111-130. IOS Press, (2011)Implementing Fudgets with Standard Widget Sets., and . Functional Programming, page 222-235. Springer, (1993)Dynamic Scheduling of Multiple Hidden Markov Model-Based Sensors., , , , and . J. Adv. Inf. Fusion, 3 (1): 33-49 (2008)Rendering Postscript Fonts on FPGAs., , and . FPL, volume 1673 of Lecture Notes in Computer Science, page 223-232. Springer, (1999)Dynamic Specialisation of XC6200 FPGAs by Parial Evaluation., and . FPL, volume 1482 of Lecture Notes in Computer Science, page 298-307. Springer, (1998)Partial Evaluation of Hardware., and . Partial Evaluation, volume 1706 of Lecture Notes in Computer Science, page 221-230. Springer, (1998)Circuit Analysis by Non-Standard Interpretation.. Designing Correct Circuits, volume A-5 of IFIP Transactions, page 119-138. North-Holland, (1992)Hardware/Software Synthesis and Verification Using Esterel.. CPA, volume 65 of Concurrent Systems Engineering Series, page 371-378. IOS Press, (2007)