Author of the publication

A new approach for pin detection for an electronic system prototyping reconfigurable platform.

, , , and . RSP, page 122-127. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Computation Using Leaky Correlations (Asymptotically Optimal Constructions)., , , and . TCC (2), volume 11240 of Lecture Notes in Computer Science, page 36-65. Springer, (2018)A Power Consumption Benchmark Framework for Ontology Reasoning on Android Devices., , and . ORE, volume 1387 of CEUR Workshop Proceedings, page 80-86. CEUR-WS.org, (2015)Success Stories., , , , , , , , , and 1 other author(s). Exploiting Linked Data and Knowledge Graphs in Large Organisations, Springer, (2017)CURIOS: Web-based Presentation and Management of Linked Datasets., , , , , , and . International Semantic Web Conference (Posters & Demos), volume 1272 of CEUR Workshop Proceedings, page 249-252. CEUR-WS.org, (2014)A Lightweight Treatment of Inexact Dates., , , , , , , and . JIST, volume 8943 of Lecture Notes in Computer Science, page 187-193. Springer, (2014)Secure Computation with Constant Communication Overhead Using Multiplication Embeddings., , and . INDOCRYPT, volume 11356 of Lecture Notes in Computer Science, page 375-398. Springer, (2018)Belief Revision in a Fact-Rule Agent's Belief Base.. KES-AMSTA, volume 5559 of Lecture Notes in Computer Science, page 120-130. Springer, (2009)Multi-Cycle Query Caching in Agent Programming., , , , , , , and . AAAI, AAAI Press, (2013)A new approach for pin detection for an electronic system prototyping reconfigurable platform., , , and . RSP, page 122-127. IEEE, (2012)CURIOS Mobile: Linked Data Exploitation for Tourist Mobile Apps in Rural Areas., , , , , and . JIST, volume 8943 of Lecture Notes in Computer Science, page 129-145. Springer, (2014)