Search

Your search keyword '"Juho Kim"' showing total 50 results

Search Constraints

Start Over You searched for: Author "Juho Kim" Remove constraint Author: "Juho Kim" Publisher ieee Remove constraint Publisher: ieee
50 results on '"Juho Kim"'

Search Results

4. Symmetrical Buffered Clock Tree Synthesis Considering NBTI

5. Fast buffered clock tree synthesis in multi corner multi mode scenario

6. Slew-aware fast clock tree synthesis with buffer sizing

7. Designing interactive distance cartograms to support urban travelers

8. Performance optimization in FinFET-based circuit using TILOS-like gate sizing

9. Indoor positioning system techniques and security

10. K-critical path search based Multi Corner Multi Mode Static Timing Analysis

11. Ensemble learning for robust prediction of microRNA-mRNA interactions

12. Ensemble algorithms for DNA motif finding

13. External memory protection mechanism based on encryption using revocable hardwired key

16. NBTI-aware statistical timing analysis framework

17. SERA: A Secure Energy and Reliability Aware Data Gathering for Sensor Networks

18. A gate delay model considering temporal proximity of Multiple Input Switching

19. Crosstalk avoidance method considering multi-aggressors

20. Efficient cell characterization for SSTA

21. Power supply noise reduction by clock scheduling with gate-level current waveform estimation

22. Network Forensic Analysis Using Visualization Effect

23. Stochastic glitch elimination considering path correlation

24. Global false path-aware hierarchical timing analysis

25. Glitch elimination by gate freezing, gate sizing and buffer insertion for low power optimization circuit

26. Accurate static timing analysis considering crosstalk noise effect

27. False aggressors pruning using path sensitization and logic implications

28. A new gate selection method for resizing to circuit performance optimization

29. Derivation of signal flow directions and synchronizers for switch-level timing analysis

30. Combined transistor sizing with buffer insertion for timing optimization

31. CADIC: computer-aided design on internet with cryptosystem

32. Security enhanced IEEE 802.1x authentication method for WLAN mobile router.

34. Implementation of an ultrasound biomicroscopy system by rotational scanning of a high-frequency angled needle transducer.

44. External memory protection mechanism based on encryption using revocable hardwired key.

Catalog

Books, media, physical & digital resources