The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Farinaz Koushanfar: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andrew E. Caldwell, Yu Cao, Andrew B. Kahng, Farinaz Koushanfar, Hua Lu, Igor L. Markov, Michael Oliver, Dirk Stroobandt, Dennis Sylvester
    GTX: the MARCO GSRC technology extrapolation system. [Citation Graph (0, 0)][DBLP]
    DAC, 2000, pp:693-698 [Conf]
  2. Farinaz Koushanfar, Gang Qu
    Hardware Metering. [Citation Graph (0, 0)][DBLP]
    DAC, 2001, pp:490-493 [Conf]
  3. Farinaz Koushanfar, Jennifer L. Wong, Jessica Feng, Miodrag Potkonjak
    ILP-based engineering change. [Citation Graph (0, 0)][DBLP]
    DAC, 2002, pp:910-915 [Conf]
  4. Seapahn Meguerdichian, Farinaz Koushanfar, Advait Mogre, Dusan Petranovic, Miodrag Potkonjak
    MetaCores: Design and Optimization Techniques. [Citation Graph (0, 0)][DBLP]
    DAC, 2001, pp:585-590 [Conf]
  5. Jennifer L. Wong, Farinaz Koushanfar, Miodrag Potkonjak
    Flexible ASIC: shared masking for multiple media processors. [Citation Graph (0, 0)][DBLP]
    DAC, 2005, pp:909-914 [Conf]
  6. Farinaz Koushanfar, Darko Kirovski, Miodrag Potkonjak
    Symbolic Debugging Scheme for Optimized Hardware and Software. [Citation Graph (0, 0)][DBLP]
    ICCAD, 2000, pp:40-43 [Conf]
  7. Jan M. Rabaey, Miodrag Potkonjak, Farinaz Koushanfar, Suet-Fei Li, Tim Tuan
    Challenges and Opportunities in Broadband and Wireless Communication Designs. [Citation Graph (0, 0)][DBLP]
    ICCAD, 2000, pp:76-82 [Conf]
  8. Jennifer L. Wong, Farinaz Koushanfar, Seapahn Meguerdichian, Miodrag Potkonjak
    A Probabilistic Constructive Approach to Optimization Problems. [Citation Graph (0, 0)][DBLP]
    ICCAD, 2001, pp:453-0 [Conf]
  9. Jessica Feng, Farinaz Koushanfar, Miodrag Potkonjak
    System-Architectures for Sensor Networks Issues, Alternatives, and Directions. [Citation Graph (0, 0)][DBLP]
    ICCD, 2002, pp:226-0 [Conf]
  10. Farinaz Koushanfar, Miodrag Potkonjak, Vandana Prabhu, Jan M. Rabaey
    Processors for Mobile Applications. [Citation Graph (0, 0)][DBLP]
    ICCD, 2000, pp:603-608 [Conf]
  11. Farinaz Koushanfar, Gang Qu, Miodrag Potkonjak
    Intellectual Property Metering. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:81-95 [Conf]
  12. Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, Mani B. Srivastava
    Coverage Problems in Wireless Ad-hoc Sensor Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:1380-1387 [Conf]
  13. Stephen So, Farinaz Koushanfar, Anatoliy Kosterev, Frank Tittel
    LaserSPECks: : laser SPECtroscopic trace-gas sensor networks - sensor integration and applications. [Citation Graph (0, 0)][DBLP]
    IPSN, 2007, pp:226-235 [Conf]
  14. Farinaz Koushanfar, Abhijit Davare, Dai Tho Nguyen, Miodrag Potkonjak, Alberto L. Sangiovanni-Vincentelli
    Low power coordination in wireless ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    ISLPED, 2003, pp:475-480 [Conf]
  15. Seapahn Meguerdichian, Farinaz Koushanfar, Gang Qu, Miodrag Potkonjak
    Exposure in wireless Ad-Hoc sensor networks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2001, pp:139-150 [Conf]
  16. Farinaz Koushanfar, Darko Kirovski, Inki Hong, Miodrag Potkonjak, Marios C. Papaefthymiou
    Symbolic debugging of embedded hardware and software. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 2001, v:20, n:3, pp:392-401 [Journal]
  17. Jennifer L. Wong, Farinaz Koushanfar, Seapahn Megerian, Miodrag Potkonjak
    Probabilistic constructive optimization techniques. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 2004, v:23, n:6, pp:859-868 [Journal]
  18. Seapahn Megerian, Farinaz Koushanfar, Miodrag Potkonjak, Mani B. Srivastava
    Worst and Best-Case Coverage in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2005, v:4, n:1, pp:84-92 [Journal]
  19. Farinaz Koushanfar, Inki Hong, Miodrag Potkonjak
    Behavioral synthesis techniques for intellectual property protection. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Design Autom. Electr. Syst., 2005, v:10, n:3, pp:523-545 [Journal]
  20. Seapahn Megerian, Farinaz Koushanfar, Gang Qu, Giacomino Veltri, Miodrag Potkonjak
    Exposure in Wireless Sensor Networks: Theory and Practical Solutions. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2002, v:8, n:5, pp:443-454 [Journal]
  21. Farinaz Koushanfar, Miodrag Potkonjak
    CAD-based Security, Cryptography, and Digital Rights Management. [Citation Graph (0, 0)][DBLP]
    DAC, 2007, pp:268-269 [Conf]
  22. Farinaz Koushanfar, Nina Taft, Miodrag Potkonjak
    Sleeping Coordination for Comprehensive Sensing Using Isotonic Regression and Domatic Partitions. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  23. Farinaz Koushanfar, Abhijit Davare, David T. Nguyen, Alberto L. Sangiovanni-Vincentelli, Miodrag Potkonjak
    Techniques for maintaining connectivity in wireless ad-hoc networks under energy constraints. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Embedded Comput. Syst., 2007, v:6, n:3, pp:- [Journal]

  24. Active control and digital rights management of integrated circuit IP cores. [Citation Graph (, )][DBLP]


  25. Protecting bus-based hardware IP by secret sharing. [Citation Graph (, )][DBLP]


  26. N-variant IC design: methodology and applications. [Citation Graph (, )][DBLP]


  27. (Bio)-behavioral CAD. [Citation Graph (, )][DBLP]


  28. Input vector control for post-silicon leakage current minimization in the presence of manufacturing variability. [Citation Graph (, )][DBLP]


  29. Hierarchical hybrid power supply networks. [Citation Graph (, )][DBLP]


  30. Real time emulations: foundation and applications. [Citation Graph (, )][DBLP]


  31. EPIC: Ending Piracy of Integrated Circuits. [Citation Graph (, )][DBLP]


  32. Remote activation of ICs for piracy prevention and digital right management. [Citation Graph (, )][DBLP]


  33. Post-silicon timing characterization by compressed sensing. [Citation Graph (, )][DBLP]


  34. Lightweight secure PUFs. [Citation Graph (, )][DBLP]


  35. Consistency-based characterization for IC Trojan detection. [Citation Graph (, )][DBLP]


  36. Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach. [Citation Graph (, )][DBLP]


  37. SVD-Based Ghost Circuitry Detection. [Citation Graph (, )][DBLP]


  38. Noninvasive leakage power tomography of integrated circuits by compressive sensing. [Citation Graph (, )][DBLP]


  39. N-version temperature-aware scheduling and binding. [Citation Graph (, )][DBLP]


  40. Challenging benchmark for location discovery in ad hoc networks: foundations and applications. [Citation Graph (, )][DBLP]


  41. Circuit CAD Tools as a Security Threat. [Citation Graph (, )][DBLP]


  42. Designer's Hardware Trojan Horse. [Citation Graph (, )][DBLP]


  43. Robust Stable Radiometric Fingerprinting for Frequency Reconfigurable Devices. [Citation Graph (, )][DBLP]


  44. A Survey of Hardware Trojan Taxonomy and Detection. [Citation Graph (, )][DBLP]


  45. Guest Editors' Introduction: Confronting the Hardware Trustworthiness Problem. [Citation Graph (, )][DBLP]


Search in 0.012secs, Finished in 0.014secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002