Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Implementation of Singular Value Decomposition Rotation Transformations with CORDIC Processors., , and . J. Parallel Distrib. Comput., 17 (4): 360-362 (1993)Power analysis based reverse engineering on the secret round function of block ciphers., , , , , and . Concurrency and Computation: Practice and Experience, 26 (8): 1531-1545 (2014)Determining an Optimal Penetration Among Weighted Regions in Two and Three Dimensions., , , , and . J. Comb. Optim., 5 (1): 59-79 (2001)Efficient list-approximation techniques for floorplan area minimization., , and . ACM Trans. Design Autom. Electr. Syst., 6 (3): 372-400 (2001)Low energy register allocation beyond basic blocks., , and . ISCAS (1), page 290-293. IEEE, (1999)Efficient algorithms for acceptable design exploration., , and . ACM Great Lakes Symposium on VLSI, page 139-142. ACM, (2000)Scheduling for power reduction in a real-time system., , , , and . ISLPED, page 84-87. ACM, (1997)An Evolutionary Approach to Hardware/ Software Partitioning., , and . PPSN, volume 1141 of Lecture Notes in Computer Science, page 900-909. Springer, (1996)Fitness Functions for Multiple Objective Optimization Problems: Combining Preferences with Pareto Rankings., , and . FOGA, page 437-455. Morgan Kaufmann, (1996)Codesign of architectures for automotive powertrain modules., , , and . IEEE Micro, 14 (4): 17-25 (1994)