Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collaborating with communities: Citizen Science Flood Monitoring in Urban Informal Settlements., , , , and . CoRR, (2021)Security-driven metrics and models for efficient evaluation of logic encryption schemes., , , , , and . MEMOCODE, page 9:1-9:5. ACM, (2019)Constellations in the Cloud: Virtualizing Remote Sensing Systems., , , and . IGARSS, page 5351-5354. IEEE, (2019)Bridging the Gap between Advanced Memory and Heterogeneous Architectures., , , and . FCCM, page 226. IEEE Computer Society, (2018)Emulating and Verifying Sensing, Computation, and Communication in Distributed Remote Sensing Systems., , , and . IGARSS, page 3849-3852. IEEE, (2020)Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking., , , , , , , , , and 25 other author(s). CoRR, (2020)System on a Programmable Chip Adaptation Through Active Partial Reconfiguration., , and . ERSA, page 104-110. CSREA Press, (2008)Experimental quantum annealing: case study involving the graph isomorphism problem., , and . CoRR, (2015)Content-Oriented Mobile Edge Technology System Integration Framework and Field Evaluation., , , , , and . MILCOM, page 1405-1410. IEEE, (2014)Applications of adaptive computing systems for signal processing challenges., , , and . ASP-DAC, page 465-470. ACM, (2003)