Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perceived Information Security Risk as a Function of Probability and Severity., , , and . HAISA, page 183-193. University of Plymouth, (2015)Design of a fast and area efficient filter., , and . EUSIPCO, page 1-4. IEEE, (1996)Complexity reductions in unrolled CORDIC architectures.. ICECS, page 868-871. IEEE, (2009)Reducing Leakage Power in Fixed Coefficient Arithmetic.. ICECS, page 306-309. IEEE, (2007)A Simulator Study Comparing Characteristics of Manual and Automated Driving During Lane Changes of Long Combination Vehicles., , and . IEEE Trans. Intelligent Transportation Systems, 18 (9): 2514-2524 (2017)Hardware implementation of the exponential function using Taylor series., , , and . NORCHIP, page 1-4. IEEE, (2014)Hardware architecture for matrix factorization in mimo receivers., , and . ACM Great Lakes Symposium on VLSI, page 196-199. ACM, (2007)Ultra low power hardware for computing Squared Euclidean Distances., and . ECCTD, page 580-583. IEEE, (2011)A VLSI implementation of logarithmic and exponential functions using a novel parabolic synthesis methodology compared to the CORDIC algorithm., , and . ECCTD, page 709-712. IEEE, (2011)VLSI implementation issues of lattice decoders for MIMO systems., and . ISCAS (4), page 477-480. IEEE, (2004)