Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The human motion database: A cognitive and parametric sampling of human motion., and . Image Vision Comput., 30 (3): 251-261 (2012)The human motion database: A cognitive and parametric sampling of human motion., and . FG, page 103-110. IEEE Computer Society, (2011)Compact modeling of DG-Tunnel FET for Verilog-A implementation., , , and . ESSDERC, page 40-43. IEEE, (2015)Compact modeling of homojunction tunnel FETs., , , , , , and . MIXDES, page 54-57. IEEE, (2014)Router Attack toward NoC-enabled MPSoC and Monitoring Countermeasures against such Threat., , and . CSSP, 34 (10): 3241-3290 (2015)Source Authentication Techniques for Network-on-Chip Router Configuration Packets.. JETC, 13 (2): 28:1-28:31 (2016)KLEESPECTRE: Detecting Information Leakage through Speculative Cache Attacks via Symbolic Execution., , , , and . CoRR, (2019)A small and adaptive coprocessor for information flow tracking in ARM SoCs., , , , , , and . ReConFig, page 1-8. IEEE, (2018)Role based shared memory access control mechanisms in NoC based MP-SoC., and . Nano Comm. Netw., (2016)A Survey of Timing Channels and Countermeasures., , and . ACM Comput. Surv., 50 (1): 6:1-6:39 (2017)