Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Panel: Future SoC verification methodology: UVM evolution or revolution?, , , , , , and . DATE, page 1-5. European Design and Automation Association, (2014)Emulation in post-silicon validation: It's not just for functionality anymore., , , and . HLDVT, page 110-117. IEEE Computer Society, (2012)EverLost: A Flexible Platform for Industrial-Strength Abstraction-Guided Simulation.. HLDVT, page 151-152. IEEE Computer Society, (2006)Panel: Assertion-Based Verification -What's the Big Deal?, , , , , , and . HLDVT, page 183. IEEE Computer Society, (2006)Selection of the optimum uniform partition search.. Computing, 37 (3): 261-264 (1986)Scalable, high-quality, SAT-based multi-layer escape routing., , and . ICCAD, page 22. ACM, (2016)Efficient Verification with BDDs using Implicitly Conjoined Invariants., and . CAV, volume 697 of Lecture Notes in Computer Science, page 3-14. Springer, (1993)Less Haste, Less Waste: On Recycling and Its Limits in Strand Displacement Systems., , , and . DNA, volume 6937 of Lecture Notes in Computer Science, page 84-99. Springer, (2011)VNF chain abstraction for cloud service providers., , , , , and . ANCS, page 165-166. ACM, (2018)VNF chain allocation and management at data center scale., , , , , and . ANCS, page 125-140. ACM, (2018)