Author of the publication

Wide I/O or LPDDR? Exploration and analysis of performance, power and temperature trade-offs of emerging DRAM technologies in embedded MPSoCs.

, , and . ICCD, page 62-69. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Homayoun, Houman
add a person with the name Homayoun, Houman
 

Other publications of authors with the same name

Hot peripheral thermal management to mitigate cache temperature variation., , , , and . ISQED, page 755-763. IEEE, (2012)A 64-core platform for biomedical signal processing., , , and . ISQED, page 368-372. IEEE, (2013)Temperature aware thread migration in 3D architecture with stacked DRAM., , and . ISQED, page 80-87. IEEE, (2013)A centralized cache miss driven technique to improve processor power dissipation., , , and . ICSAMOS, page 195-202. IEEE, (2008)Wide I/O or LPDDR? Exploration and analysis of performance, power and temperature trade-offs of emerging DRAM technologies in embedded MPSoCs., , and . ICCD, page 62-69. IEEE Computer Society, (2015)Co-clustering of diseases, genes, and drugs for identification of their related gene modules., , , and . ICACI, page 407-411. IEEE, (2016)Characterizing Hadoop applications on microservers for performance and energy efficiency optimizations., , , , and . ISPASS, page 153-154. IEEE Computer Society, (2016)Variation Trained Drowsy Cache (VTD-Cache): A History Trained Variation Aware Drowsy Cache for Fine Grain Voltage Scaling., , , , and . IEEE Trans. VLSI Syst., 20 (4): 630-642 (2012)Programmable Gates Using Hybrid CMOS-STT Design to Prevent IC Reverse Engineering., , , , , and . ACM Trans. Design Autom. Electr. Syst., 23 (6): 76:1-76:21 (2018)Benchmarking the Capabilities and Limitations of SAT Solvers in Defeating Obfuscation Schemes., , , , and . IOLTS, page 275-280. IEEE, (2018)