Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and correctness proof of a security protocol for mobile banking., , , and . Bell Labs Technical Journal, 14 (1): 259-265 (2009)Hybrid quick error detection (H-QED): accelerator validation and debug using high-level synthesis principles., , , and . DAC, page 53:1-53:6. ACM, (2015)A ship motion simulation system., , and . Virtual Reality, 12 (1): 65-76 (2008)Quick error detection tests with fast runtimes for effective post-silicon validation and debug., , , , and . DATE, page 1168-1173. ACM, (2015)A Data-Driven Approach for Semantic Role Labeling from Induced Grammar Structures in Language., , , and . CoRR, (2016)Logic Bug Detection and Localization Using Symbolic Quick Error Detection., , , and . CoRR, (2017)Symbolic Quick Error Detection for Pre-Silicon and Post-Silicon Validation: Frequently Asked Questions., , , and . IEEE Design & Test, 33 (6): 55-62 (2016)Solving cold-start problem in large-scale recommendation engines: A deep learning approach., , , , , and . BigData, page 1901-1910. IEEE Computer Society, (2016)QED: Quick Error Detection tests for effective post-silicon validation., , , , , , , , , and . ITC, page 154-163. IEEE Computer Society, (2010)Finding an unpredictable target in a workspace with obstacles., , , , and . ICRA, page 737-742. IEEE, (1997)