Остановите войну!
for scientists:
default search action
Joseph Zambreno
- > Home > Persons > Joseph Zambreno
Publications
- 2010
- [c33]Abhishek Das, Gokhan Memik, Joseph Zambreno, Alok N. Choudhary:
Detecting/preventing information leakage on the memory bus due to malicious hardware. DATE 2010: 861-866 - 2008
- [j6]Abhishek Das, Serkan Ozdemir, Gokhan Memik, Joseph Zambreno, Alok N. Choudhary:
Microarchitectures for Managing Chip Revenues under Process Variations. IEEE Comput. Archit. Lett. 7(1): 5-8 (2008) - [j4]Abhishek Das, David Nguyen, Joseph Zambreno, Gokhan Memik, Alok N. Choudhary:
An FPGA-Based Network Intrusion Detection Architecture. IEEE Trans. Inf. Forensics Secur. 3(1): 118-132 (2008) - [c22]Abhishek Das, Sanchit Misra, Sumeet Joshi, Joseph Zambreno, Gokhan Memik, Alok N. Choudhary:
An Efficient FPGA Implementation of Principle Component Analysis based Network Intrusion Detection System. DATE 2008: 1160-1165 - [c17]Abhishek Das, Berkin Özisikyilmaz, Serkan Ozdemir, Gokhan Memik, Joseph Zambreno, Alok N. Choudhary:
Evaluating the effects of cache redundancy on profit. MICRO 2008: 388-398 - 2007
- [j3]Abhishek Das, Serkan Ozdemir, Gokhan Memik, Joseph Zambreno, Alok N. Choudhary:
Microarchitectures for Managing Chip Revenues under Process Variations. IEEE Comput. Archit. Lett. 6(2): 29-32 (2007) - [c15]Ramanathan Narayanan, Daniel Honbo, Gokhan Memik, Alok N. Choudhary, Joseph Zambreno:
Interactive presentation: An FPGA implementation of decision tree classification. DATE 2007: 189-194 - [c14]Sailesh Pati, Ramanathan Narayanan, Gokhan Memik, Alok N. Choudhary, Joseph Zambreno:
Design and Implementation of an FPGA Architecture for High-Speed Network Feature Extraction. FPT 2007: 49-56 - [c13]Ramanathan Narayanan, Berkin Özisikyilmaz, Gokhan Memik, Alok N. Choudhary, Joseph Zambreno:
Quantization Error and Accuracy-Performance Tradeoffs for Embedded Data Mining Workloads. International Conference on Computational Science (3) 2007: 734-741 - 2006
- [j2]Joseph Zambreno, Daniel Honbo, Alok N. Choudhary, Rahul Simha, Bhagirath Narahari:
High-Performance Software Protection Using Reconfigurable Architectures. Proc. IEEE 94(2): 419-431 (2006) - [c12]Berkin Özisikyilmaz, Ramanathan Narayanan, Joseph Zambreno, Gokhan Memik, Alok N. Choudhary:
An Architectural Characterization Study of Data Mining and Bioinformatics Workloads. IISWC 2006: 61-70 - [c11]Ramanathan Narayanan, Berkin Özisikyilmaz, Joseph Zambreno, Gokhan Memik, Alok N. Choudhary:
MineBench: A Benchmark Suite for Data Mining Workloads. IISWC 2006: 182-188 - 2005
- [j1]Joseph Zambreno, Alok N. Choudhary, Rahul Simha, Bhagirath Narahari, Nasir D. Memon:
SAFE-OPS: An approach to embedded software security. ACM Trans. Embed. Comput. Syst. 4(1): 189-210 (2005) - [c10]Joseph Zambreno, Daniel Honbo, Alok N. Choudhary:
Exploiting Multi-Grained Parallelism in Reconfigurable SBC Architectures. FCCM 2005: 333-334 - [c9]Olga Gelbart, Paul Ott, Bhagirath Narahari, Rahul Simha, Alok N. Choudhary, Joseph Zambreno:
CODESSEAL: Compiler/FPGA Approach to Secure Applications. ISI 2005: 530-535 - [c8]Kripashankar Mohan, Bhagirath Narahari, Rahul Simha, Paul Ott, Alok N. Choudhary, Joseph Zambreno:
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security. ISI 2005: 543-548 - 2004
- [c7]Joseph Zambreno, Alok N. Choudhary, Rahul Simha, Bhagirath Narahari:
Flexible Software Protection Using Hardware/Software Codesign Techniques. DATE 2004: 636-641 - [c6]Joseph Zambreno, Rahul Simha, Alok N. Choudhary:
Addressing application integrity attacks using a reconfigurable architecture. FPGA 2004: 250 - [c5]Joseph Zambreno, David Nguyen, Alok N. Choudhary:
Exploring Area/Delay Tradeoffs in an AES FPGA Implementation. FPL 2004: 575-585 - 2002
- [c2]Mahmut T. Kandemir, Ismail Kadayif, Alok N. Choudhary, Joseph Zambreno:
Optimizing inter-nest data locality. CASES 2002: 127-135 - [c1]Joseph Zambreno, Mahmut T. Kandemir, Alok N. Choudhary:
Enhancing Compiler Techniques for Memory Energy Optimizations. EMSOFT 2002: 364-381
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-02-07 04:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint