Search results for: Niraj K. Jha
Biotechnology and Bioengineering > 120 > 1 > 82 - 94
Journal of Biochemical and Molecular Toxicology > 36 > 10 > n/a - n/a
IEEE Consumer Electronics Magazine > 2018 > 7 > 1 > 29 - 37
IEEE Transactions on Emerging Topics in Computing > 2017 > 5 > 4 > 586 - 602
IEEE Transactions on Multi-Scale Computing Systems > 2017 > 3 > 4 > 255 - 268
IEEE Transactions on Multi-Scale Computing Systems > 2017 > 3 > 4 > 228 - 241
IEEE Transactions on Multi-Scale Computing Systems > 2017 > 3 > 4 > 242 - 254
IEEE Transactions on Multi-Scale Computing Systems > 2017 > 3 > 4 > 269 - 282
IEEE Transactions on Very Large Scale Integration (VLSI) Systems > 2017 > 25 > 9 > 2616 - 2624
IEEE Transactions on Computers > 2017 > 66 > 5 > 759 - 772
IEEE Transactions on Multi-Scale Computing Systems > 2017 > 3 > 2 > 124 - 138
IEEE Transactions on Very Large Scale Integration (VLSI) Systems > 2017 > 25 > 1 > 319 - 329
IEEE Transactions on Computers > 2016 > 65 > 11 > 3293 - 3303
IEEE Transactions on Very Large Scale Integration (VLSI) Systems > 2016 > 24 > 10 > 3013 - 3026
IEEE Transactions on Circuits and Systems I: Regular Papers > 2016 > 63 > 8 > 1176 - 1187
IEEE Transactions on Emerging Topics in Computing > 2016 > 4 > 3 > 321 - 334
IEEE Transactions on Very Large Scale Integration (VLSI) Systems > 2016 > 24 > 5 > 1649 - 1662
Lecture Notes in Computer Science > High Performance Computing — HiPC 2002 > Embedded Systems > 679-693
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Malware Detection and Prevention (I) > 64-87