Author of the publication

An efficient technique to select logic nodes for single event transient pulse-width reduction.

, , , , , , and . Microelectronics Reliability, 53 (1): 114-117 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resilient and efficient MANET aerial communications for search and rescue applications., and . ICNC, page 845-849. IEEE Computer Society, (2013)Hardware Trojans: The defense and attack of integrated circuits., and . ICCD, page 293-296. IEEE Computer Society, (2011)Stealth assessment of hardware Trojans in a microcontroller., , , , and . ICCD, page 139-142. IEEE Computer Society, (2012)A Passive Solution to the CPU Resource Discovery Problem in Cluster Grid Networks., , and . IEEE Trans. Parallel Distrib. Syst., 22 (12): 2000-2007 (2011)Using Network Traffic to Infer Hardware State: A Kernel-Level Investigation., , and . ACM Trans. Embedded Comput. Syst., 14 (3): 55:1-55:22 (2015)An efficient technique to select logic nodes for single event transient pulse-width reduction., , , , , , and . Microelectronics Reliability, 53 (1): 114-117 (2013)A Dual-Threshold Voltage Approach for Timing Speculation in CMOS Circuits., and . ISVLSI, page 691-696. IEEE Computer Society, (2016)Aerial MANETs: Developing a Resilient and Efficient Platform for Search and Rescue Applications., and . JCM, 8 (4): 216-224 (2013)Addressing Negative Racial and Gendered Experiences That Discourage Academic Careers in Engineering., , , , and . Computing in Science and Engineering, 18 (2): 29-39 (2016)Using network traffic to verify mobile device forensic artifacts., , , , , and . CCNC, page 114-119. IEEE, (2017)