|
Search the dblp DataBase
Farinaz Koushanfar:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Andrew E. Caldwell, Yu Cao, Andrew B. Kahng, Farinaz Koushanfar, Hua Lu, Igor L. Markov, Michael Oliver, Dirk Stroobandt, Dennis Sylvester
GTX: the MARCO GSRC technology extrapolation system. [Citation Graph (0, 0)][DBLP] DAC, 2000, pp:693-698 [Conf]
- Farinaz Koushanfar, Gang Qu
Hardware Metering. [Citation Graph (0, 0)][DBLP] DAC, 2001, pp:490-493 [Conf]
- Farinaz Koushanfar, Jennifer L. Wong, Jessica Feng, Miodrag Potkonjak
ILP-based engineering change. [Citation Graph (0, 0)][DBLP] DAC, 2002, pp:910-915 [Conf]
- Seapahn Meguerdichian, Farinaz Koushanfar, Advait Mogre, Dusan Petranovic, Miodrag Potkonjak
MetaCores: Design and Optimization Techniques. [Citation Graph (0, 0)][DBLP] DAC, 2001, pp:585-590 [Conf]
- Jennifer L. Wong, Farinaz Koushanfar, Miodrag Potkonjak
Flexible ASIC: shared masking for multiple media processors. [Citation Graph (0, 0)][DBLP] DAC, 2005, pp:909-914 [Conf]
- Farinaz Koushanfar, Darko Kirovski, Miodrag Potkonjak
Symbolic Debugging Scheme for Optimized Hardware and Software. [Citation Graph (0, 0)][DBLP] ICCAD, 2000, pp:40-43 [Conf]
- Jan M. Rabaey, Miodrag Potkonjak, Farinaz Koushanfar, Suet-Fei Li, Tim Tuan
Challenges and Opportunities in Broadband and Wireless Communication Designs. [Citation Graph (0, 0)][DBLP] ICCAD, 2000, pp:76-82 [Conf]
- Jennifer L. Wong, Farinaz Koushanfar, Seapahn Meguerdichian, Miodrag Potkonjak
A Probabilistic Constructive Approach to Optimization Problems. [Citation Graph (0, 0)][DBLP] ICCAD, 2001, pp:453-0 [Conf]
- Jessica Feng, Farinaz Koushanfar, Miodrag Potkonjak
System-Architectures for Sensor Networks Issues, Alternatives, and Directions. [Citation Graph (0, 0)][DBLP] ICCD, 2002, pp:226-0 [Conf]
- Farinaz Koushanfar, Miodrag Potkonjak, Vandana Prabhu, Jan M. Rabaey
Processors for Mobile Applications. [Citation Graph (0, 0)][DBLP] ICCD, 2000, pp:603-608 [Conf]
- Farinaz Koushanfar, Gang Qu, Miodrag Potkonjak
Intellectual Property Metering. [Citation Graph (0, 0)][DBLP] Information Hiding, 2001, pp:81-95 [Conf]
- Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, Mani B. Srivastava
Coverage Problems in Wireless Ad-hoc Sensor Networks. [Citation Graph (0, 0)][DBLP] INFOCOM, 2001, pp:1380-1387 [Conf]
- Stephen So, Farinaz Koushanfar, Anatoliy Kosterev, Frank Tittel
LaserSPECks: : laser SPECtroscopic trace-gas sensor networks - sensor integration and applications. [Citation Graph (0, 0)][DBLP] IPSN, 2007, pp:226-235 [Conf]
- Farinaz Koushanfar, Abhijit Davare, Dai Tho Nguyen, Miodrag Potkonjak, Alberto L. Sangiovanni-Vincentelli
Low power coordination in wireless ad-hoc networks. [Citation Graph (0, 0)][DBLP] ISLPED, 2003, pp:475-480 [Conf]
- Seapahn Meguerdichian, Farinaz Koushanfar, Gang Qu, Miodrag Potkonjak
Exposure in wireless Ad-Hoc sensor networks. [Citation Graph (0, 0)][DBLP] MOBICOM, 2001, pp:139-150 [Conf]
- Farinaz Koushanfar, Darko Kirovski, Inki Hong, Miodrag Potkonjak, Marios C. Papaefthymiou
Symbolic debugging of embedded hardware and software. [Citation Graph (0, 0)][DBLP] IEEE Trans. on CAD of Integrated Circuits and Systems, 2001, v:20, n:3, pp:392-401 [Journal]
- Jennifer L. Wong, Farinaz Koushanfar, Seapahn Megerian, Miodrag Potkonjak
Probabilistic constructive optimization techniques. [Citation Graph (0, 0)][DBLP] IEEE Trans. on CAD of Integrated Circuits and Systems, 2004, v:23, n:6, pp:859-868 [Journal]
- Seapahn Megerian, Farinaz Koushanfar, Miodrag Potkonjak, Mani B. Srivastava
Worst and Best-Case Coverage in Sensor Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Mob. Comput., 2005, v:4, n:1, pp:84-92 [Journal]
- Farinaz Koushanfar, Inki Hong, Miodrag Potkonjak
Behavioral synthesis techniques for intellectual property protection. [Citation Graph (0, 0)][DBLP] ACM Trans. Design Autom. Electr. Syst., 2005, v:10, n:3, pp:523-545 [Journal]
- Seapahn Megerian, Farinaz Koushanfar, Gang Qu, Giacomino Veltri, Miodrag Potkonjak
Exposure in Wireless Sensor Networks: Theory and Practical Solutions. [Citation Graph (0, 0)][DBLP] Wireless Networks, 2002, v:8, n:5, pp:443-454 [Journal]
- Farinaz Koushanfar, Miodrag Potkonjak
CAD-based Security, Cryptography, and Digital Rights Management. [Citation Graph (0, 0)][DBLP] DAC, 2007, pp:268-269 [Conf]
- Farinaz Koushanfar, Nina Taft, Miodrag Potkonjak
Sleeping Coordination for Comprehensive Sensing Using Isotonic Regression and Domatic Partitions. [Citation Graph (0, 0)][DBLP] INFOCOM, 2006, pp:- [Conf]
- Farinaz Koushanfar, Abhijit Davare, David T. Nguyen, Alberto L. Sangiovanni-Vincentelli, Miodrag Potkonjak
Techniques for maintaining connectivity in wireless ad-hoc networks under energy constraints. [Citation Graph (0, 0)][DBLP] ACM Trans. Embedded Comput. Syst., 2007, v:6, n:3, pp:- [Journal]
Active control and digital rights management of integrated circuit IP cores. [Citation Graph (, )][DBLP]
Protecting bus-based hardware IP by secret sharing. [Citation Graph (, )][DBLP]
N-variant IC design: methodology and applications. [Citation Graph (, )][DBLP]
(Bio)-behavioral CAD. [Citation Graph (, )][DBLP]
Input vector control for post-silicon leakage current minimization in the presence of manufacturing variability. [Citation Graph (, )][DBLP]
Hierarchical hybrid power supply networks. [Citation Graph (, )][DBLP]
Real time emulations: foundation and applications. [Citation Graph (, )][DBLP]
EPIC: Ending Piracy of Integrated Circuits. [Citation Graph (, )][DBLP]
Remote activation of ICs for piracy prevention and digital right management. [Citation Graph (, )][DBLP]
Post-silicon timing characterization by compressed sensing. [Citation Graph (, )][DBLP]
Lightweight secure PUFs. [Citation Graph (, )][DBLP]
Consistency-based characterization for IC Trojan detection. [Citation Graph (, )][DBLP]
Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach. [Citation Graph (, )][DBLP]
SVD-Based Ghost Circuitry Detection. [Citation Graph (, )][DBLP]
Noninvasive leakage power tomography of integrated circuits by compressive sensing. [Citation Graph (, )][DBLP]
N-version temperature-aware scheduling and binding. [Citation Graph (, )][DBLP]
Challenging benchmark for location discovery in ad hoc networks: foundations and applications. [Citation Graph (, )][DBLP]
Circuit CAD Tools as a Security Threat. [Citation Graph (, )][DBLP]
Designer's Hardware Trojan Horse. [Citation Graph (, )][DBLP]
Robust Stable Radiometric Fingerprinting for Frequency Reconfigurable Devices. [Citation Graph (, )][DBLP]
A Survey of Hardware Trojan Taxonomy and Detection. [Citation Graph (, )][DBLP]
Guest Editors' Introduction: Confronting the Hardware Trustworthiness Problem. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.006secs
|