The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Andrew B. T. Hopkins: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andrew B. T. Hopkins, Klaus D. McDonald-Maier
    Transform Digital Signal Processor Architecture using Optical Interconnections. [Citation Graph (0, 0)][DBLP]
    Parallel and Distributed Computing and Networks, 2005, pp:7-12 [Conf]
  2. Andrew B. T. Hopkins, Klaus D. McDonald-Maier
    A Generic On-Chip Debugger for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AHS, 2006, pp:338-342 [Conf]
  3. Andrew B. T. Hopkins, Klaus D. McDonald-Maier
    Debug Support Strategy for Systems-on-Chips with Multiple Processor Cores. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2006, v:55, n:2, pp:174-184 [Journal]
  4. Andrew B. T. Hopkins, Klaus D. McDonald-Maier
    Debug support for embedded processor reuse. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2006, pp:- [Conf]

  5. Key Generation for Secure Inter-satellite Communication. [Citation Graph (, )][DBLP]


  6. Normalizing Discrete Circuit Features with Statistically Independent values for incorporation within a highly Secure Encryption System. [Citation Graph (, )][DBLP]


  7. Debug Support for Hybrid SoCs. [Citation Graph (, )][DBLP]


  8. A System Level Framework for Monitoring and Self Diagnosis in ESPACENET. [Citation Graph (, )][DBLP]


  9. Trace algorithms for deeply integrated complex and hybrid SoCs. [Citation Graph (, )][DBLP]


  10. Ensuring data integrity via ICmetrics based security infrastructure. [Citation Graph (, )][DBLP]


  11. Integrating Multi-Modal Circuit Features within an Efficient Encryption System. [Citation Graph (, )][DBLP]


  12. I2S3 the Integrated Intelligent Secure Sensor Systems Project. [Citation Graph (, )][DBLP]


  13. Effects of Feature Trimming on Encryption Key Stability for an ICmetric System. [Citation Graph (, )][DBLP]


  14. Towards Embedded Artificial Intelligence Based Security for Computer Systems. [Citation Graph (, )][DBLP]


  15. Ensuring Secure Healthcare Communications via ICmetric Based Encryption on Unseen Devices. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002