Author of the publication

Hardware/software managed scratchpad memory for embedded system.

, , and . ICCAD, page 370-377. IEEE Computer Society / ACM, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Delineating Classes of Computational Complexity via Second Order Theories with Weak Set Existence Principles, I.. J. Symb. Log., 60 (1): 103-121 (1995)Unprovability of Consistency Statements in Fragments of Bounded Arithmetic., and . Ann. Pure Appl. Logic, 74 (3): 221-244 (1995)Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency., , and . DCOSS, page 286-288. IEEE Computer Society, (2013)CSI-MIMO: Indoor Wi-Fi fingerprinting system., , , and . LCN, page 202-209. IEEE Computer Society, (2014)Some applications of logic to feasibility in higher types., and . ACM Trans. Comput. Log., 5 (2): 332-350 (2004)Optimal synthesis of latency and throughput constrained pipelined MPSoCs targeting streaming applications., , , and . CODES+ISSS, page 75-84. ACM, (2010)DoSGuard: Protecting pipelined MPSoCs against hardware Trojan based DoS attacks., , , and . ASAP, page 45-52. IEEE Computer Society, (2017)A novel intermittent fault Markov model for deep sub-micron processors., , , and . ACM Great Lakes Symposium on VLSI, page 13-18. ACM, (2013)Improved VCF normalization for accurate VCF comparison., , , and . Bioinformatics, 33 (7): 964-970 (2017)Detecting, Representing and Querying Collusion in Online Rating Systems, , , , , and . CoRR, (2012)