Author of the publication

An At-Speed Test Technique for High-Speed High-order Adder by a 6.4-GHz 64-bit Domino Adder Example.

, , , and . IEEE Trans. on Circuits and Systems, 59-I (8): 1644-1655 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application Deployment in Virtual Networks Using the X-Bone., and . DANCE, page 484-. IEEE Computer Society, (2002)Use of IPsec Transport Mode for Dynamic Routing., , and . RFC, (September 2004)Maximization of Wireless Mesh Networks Survivability to Assure Service Continuity under Intelligent Attacks., , , and . AINA, page 583-590. IEEE Computer Society, (2013)TetherNet Anti-NAT - Secure Internet Subnet Rental System., , and . DISCEX (2), page 112-. IEEE Computer Society, (2003)Effective network defense strategies to maximize system survivability of wireless mesh networks under malicious and jamming attacks., , , and . CASoN, page 297-302. IEEE, (2012)Network recovery strategies for maximization of network survivability., , , and . IWCMC, page 1130-1134. IEEE, (2011)Redundancy and Defense Resource Allocation Algorithms to Assure Service Continuity against Natural Disasters and Intelligent Attackers., , , and . BWCCA, page 206-213. IEEE Computer Society, (2010)A Cyber-Attack Synergy Model Considering Both Positive and Negative Impacts from Each Attacker., , , and . IJDSN, (2015)NVGRE: Network Virtualization Using Generic Routing Encapsulation., and . RFC, (September 2015)A Dynamic Topology and Routing Management Strategy for Virtual IP Networks., , , and . IEICE Transactions, 89-B (9): 2375-2384 (2006)