Author of the publication

Hybrid Architectures for Efficient and Secure Face Authentication in Embedded Systems.

, , , and . IEEE Trans. VLSI Syst., 15 (3): 296-308 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transient Power Management Through High Level Synthesis., , , and . ICCAD, page 545-552. IEEE Computer Society, (2001)Automated Energy/Performance Macromodeling of Embedded Software., , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 26 (3): 542-552 (2007)Use of Computation-Unit Integrated Memories in High-Level Synthesis., , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 25 (10): 1969-1989 (2006)A Synthesis Methodology for Hybrid Custom Instruction and Coprocessor Generation for Extensible Processors., , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 26 (11): 2035-2045 (2007)Special session 11B: Hot topic hardware security: Design, test and verification issues., and . VTS, page 349. IEEE Computer Society, (2010)MedMon: Securing Medical Devices Through Wireless Monitoring and Anomaly Detection., , and . IEEE Trans. Biomed. Circuits and Systems, 7 (6): 871-881 (2013)Approximate Computing for Long Short Term Memory (LSTM) Neural Networks., and . IEEE Trans. on CAD of Integrated Circuits and Systems, 37 (11): 2266-2276 (2018)Secure reconfiguration of software-defined radio., , and . ACM Trans. Embedded Comput. Syst., 11 (1): 10:1-10:22 (2012)Yield, Area and Energy Optimization in Stt-MRAMs using failure aware ECC., , , and . CoRR, (2015)Variation-Tolerant Dynamic Power Management at the System-Level., , , and . IEEE Trans. VLSI Syst., 17 (9): 1220-1232 (2009)