Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information security and computer systems: an integrated approach., and . InfoSecCD, page 58-63. ACM, (2006)Reducing the cost of conditional transfers of control by using comparison specifications., , , and . LCTES, page 64-71. ACM, (2006)Branch elimination by condition merging., , , , , and . Softw., Pract. Exper., 35 (1): 51-74 (2005)Improving WCET by Optimizing Worst-Case Paths., , , , and . IEEE Real-Time and Embedded Technology and Applications Symposium, page 138-147. IEEE Computer Society, (2005)Branch Elimination via Multi-variable Condition Merging., , , , , and . Euro-Par, volume 2790 of Lecture Notes in Computer Science, page 261-270. Springer, (2003)Automated construction of memory diagrams for program comprehension., and . ACM Southeast Regional Conference, page 22. ACM, (2010)Subsumption Architecture Model Suitable for Students at All Grade Levels., , , and . FECS, page 382-388. CSREA Press, (2009)A Holistic Capstone Experience: Beyond Technical Ability., , , and . SIGITE, page 1-6. ACM, (2017)Profile Assisted Register Allocation., and . SAC (2), page 774-781. ACM, (2000)1-58113-240-9.Using computer graphics to explore object oriented concepts using C.. ACM Southeast Regional Conference, ACM, (2009)