Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of Task Allocation in Mesh-Based Multicomputers using Genetic, Neural, and Traditional Algorithms., and . International Journal on Artificial Intelligence Tools, 3 (1): 47-60 (1994)Reliability Analysis of Two Classes of Double-Tree Network-Based Multiprocessors., and . ICPP (1), page 585-586. Pennsylvania State University Press, (1990)An Interconnection Network Supporting Relational Join Operations., , , , and . ICDCS, page 128-135. IEEE Computer Society, (1987)Highly Efficient Algorithms for AES Key Retrieval in Cache Access Attacks., , and . EuroS&P, page 261-275. IEEE, (2016)"S-Box" Implementation of AES is NOT side-channel resistant., , , and . IACR Cryptology ePrint Archive, (2018)KYKLOS: Low Tide High Flow., and . ICDCS, page 8-15. IEEE Computer Society, (1986)Analysis of Pipelined External Sorting on a Reconfigurable Message-Passing Multicomputer., , and . Parallel Computing, 19 (8): 839-858 (1993)The Performance of Crossbar-Based Binary Hypercubes., and . IEEE Trans. Computers, 44 (10): 1208-1215 (1995)The KYKLOS Multicomputer Network: Interconnection Strategies, Properties, and Applications., and . IEEE Trans. Computers, 40 (6): 692-705 (1991)New Bounds on the Reliability of Augmented Shuffle-Exchange Networks., and . IEEE Trans. Computers, 44 (1): 123-129 (1995)