Filter
Chapter

Search results

  • 2022

    High-Level Synthesis for Minimizing Power Side-Channel Information Leakage

    Choden Konigsmark, S. T., Ren, W., Wong, M. D. F. & Chen, D., Jan 1 2022, Behavioral Synthesis for Hardware Security. Springer, p. 291-317 27 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2004

    Rectilinear steiner tree construction using answer set programming

    Erdem, E. & Wong, M. D. F., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Demoen, B. & Lifschitz, V. (eds.). Springer, p. 386-399 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3132).

    Research output: Chapter in Book/Report/Conference proceedingChapter