Author of the publication

Effective and efficient microprocessor design space exploration using unlabeled design configurations.

, , , , , and . ACM TIST, 5 (1): 20:1-20:18 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prevention from Soft Errors via Architecture Elasticity., , , and . J. Comput. Sci. Technol., 29 (2): 247-254 (2014)Evaluation and Tradeoffs for Out-of-Order Execution on Reconfigurable Heterogeneous MPSoC., , , and . IEEE Trans. VLSI Syst., 24 (1): 79-91 (2016)GRASP for traffic grooming and routing with simple path constraints in WDM mesh networks., , , and . Computer Networks, (2015)A hierarchical path planning approach based on A⁎ and least-squares policy iteration for mobile robots., , , and . Neurocomputing, (2015)Estimating design quality of digital systems via machine learning., , , and . ICECS, page 623-626. IEEE, (2010)On-the-Fly Reduction of Stimuli for Functional Verification., , , , and . Asian Test Symposium, page 448-454. IEEE Computer Society, (2010)Availability-Constrained Shared Backup Path Protection (SBPP) for GMPLS-Based Spare Capacity Reprovisioning., , , and . ICC, page 2186-2191. IEEE, (2007)Estimating Ad Clickthrough Rate through Query Intent Analysis., , , and . Web Intelligence, page 222-229. IEEE Computer Society, (2009)The role mining problem: A formal perspective., , and . ACM Trans. Inf. Syst. Secur., 13 (3): 27:1-27:31 (2010)Microarchitectural design space exploration made fast., , , , and . Microprocessors and Microsystems - Embedded Hardware Design, 37 (1): 41-51 (2013)