|
Search the dblp DataBase
Ronald D. Williams:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Paul R. Jordan, Ronald D. Williams
COMP: A VHDL Composition System. [Citation Graph (0, 0)][DBLP] DAC, 1989, pp:750-753 [Conf]
- Ali A. Minai, Ronald D. Williams, F. W. Blake
A Discrete Heuristics Approach to Predictive Evaluation of Semi-Custom IC Layouts. [Citation Graph (0, 0)][DBLP] DAC, 1987, pp:770-776 [Conf]
- Ronald D. Williams, Brian D. Kuebert
Reconfigurable Pipelines in VLIW Execution Units. [Citation Graph (0, 0)][DBLP] FCCM, 1999, pp:298-299 [Conf]
- Robert M. McGraw, Moshe Meyassed, Robert H. Klenke, James H. Aylor, Ronald D. Williams
Refinement of system-level designs using hybrid modeling. [Citation Graph (0, 0)][DBLP] ICECCS, 1995, pp:409-416 [Conf]
- Barry W. Boehm, James F. Elwell, Arthur B. Pyster, E. Don Stuckle, Ronald D. Williams
The TRW Software Productivity System. [Citation Graph (0, 0)][DBLP] ICSE, 1982, pp:148-156 [Conf]
- Randy F. Pausch, Ronald D. Williams
Giving CANDY to Children: User-Tailored Gesture Input Driving an Articulator-Based Speech Synthesizer. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1992, v:35, n:5, pp:58-66 [Journal]
- Vinay M. Igure, Sean A. Laughter, Ronald D. Williams
Security issues in SCADA networks. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:7, pp:498-506 [Journal]
- Robert H. Klenke, Ronald D. Williams, James H. Aylor
Parallel-Processing Techniques for Automatic Test Pattern Generation. [Citation Graph (0, 0)][DBLP] IEEE Computer, 1992, v:25, n:1, pp:71-84 [Journal]
- Ali A. Minai, Ronald D. Williams
On the derivatives of the sigmoid. [Citation Graph (0, 0)][DBLP] Neural Networks, 1993, v:6, n:6, pp:845-853 [Journal]
- Ali A. Minai, Ronald D. Williams
Perturbation response in feedforward networks. [Citation Graph (0, 0)][DBLP] Neural Networks, 1994, v:7, n:5, pp:783-796 [Journal]
- Girish B. Ratanpal, Ronald D. Williams, Travis N. Blalock
An On-Chip Signal Suppression Countermeasure to Power Analysis Attacks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2004, v:1, n:3, pp:179-189 [Journal]
Tailor: creating custom user interfaces based on gesture. [Citation Graph (, )][DBLP]
A Software Development Environment for Improving Productivity. [Citation Graph (, )][DBLP]
Taxonomies of attacks and vulnerabilities in computer systems. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|