Select Publications
Journal articles
2009, 'Chromatic Derivatives and Local Approximations', IEEE Transactions on Signal Processing, 57, pp. 2998 - 3007
,2009, 'Chromatic Derivatives, Chromatic Expansions and associated spaces', East Journal on Approximations, 15, pp. 263 - 302, http://www.darba-eja.com/
,2009, 'HMP-ASIP`s: heterogeneous multi-pipeline application-specific instruction-set processors', IET Computers and Digital Techniques, 3, pp. 94 - 108
,2007, 'Local approxiamtions based on orthogonal differential operators', Journal of Fourier Analysis and Application, Kahane special issue, 13, pp. 309 - 330
,2006, 'Exploiting statistical information for implementation of instruction scratchpad memory in embedded systems', IEEE Transactions on Very Large Scale Integration (Vlsi) Systems, 14, pp. 816 - 829
,2005, 'On mathematical instrumentalism', Journal of Symbolic Logic, 70, pp. 778 - 794
,2004, 'Some applications of logic to feasibility in higher types', ACM Transactions on Computational Logic, 5, pp. 332 - 350, http://dx.doi.org/10.1145/976706.976713
,2004, 'Some applications of logic to feasibility in higher types', ACM Transactions on Computational Logic, 5, no 2, pp. 1 - 19
,2002, 'A Note on Induction Schemas in Bounded Arithmetic', , http://arxiv.org/abs/cs/0210011v1
,2002, 'Chromatic Derivative Filter Banks', IEEE Signal Processing Letters, pp. 215 - 216
,2002, 'Chromatic derivative filter banks.', IEEE Signal Process. Lett., 9, pp. 215 - 216
,2001, 'New sampling expansions for bandlimited signals based on chromatic derivatives', Conference Record of the Asilomar Conference on Signals, Systems and Computers, 1, pp. 558 - 562, http://dx.doi.org/10.1109/ACSSC.2001.986985
,1996, 'A comment on the joint embedding property', Periodica Mathematica Hungarica, 33, pp. 45 - 50, http://dx.doi.org/10.1007/BF02341089
,1995, 'Unprovability of consistency statements in fragments of bounded arithmetic', Annals of Pure and Applied Logic, 74, pp. 221 - 244, http://dx.doi.org/10.1016/0168-0072(94)00049-9
,1995, 'DELINEATING CLASSES OF COMPUTATIONAL-COMPLEXITY VIA 2ND-ORDER THEORIES WITH WEAK SET EXISTENCE PRINCIPLES .1.', JOURNAL OF SYMBOLIC LOGIC, 60, pp. 103 - 121, http://dx.doi.org/10.2307/2275511
,1994, 'HILBERT PROGRAM AND THE OMEGA-RULE', JOURNAL OF SYMBOLIC LOGIC, 59, pp. 322 - 343, http://dx.doi.org/10.2307/2275269
,1993, 'Parallel computable higher type functionals', Annual Symposium on Foundatons of Computer Science (Proceedings), pp. 72 - 81
,1987, 'UNIONS AND INTERSECTIONS OF ISOMORPHIC IMAGES OF NONSTANDARD MODELS OF ARITHMETIC', JOURNAL OF SYMBOLIC LOGIC, 52, pp. 323 - 323, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:A1987G393900099&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,Conference Papers
2024, 'Acquisition and Processing of Chromatic Derivatives using FPGA-based Digital Hardware', in Proceedings - IEEE International Symposium on Circuits and Systems, http://dx.doi.org/10.1109/ISCAS58744.2024.10558136
,2022, 'Iterative Filtering Algorithms for Computing Consensus Analyst Estimates', in 2022 IEEE Symposium on Computational Intelligence for Financial Engineering and Economics, CIFEr 2022 - Proceedings, http://dx.doi.org/10.1109/CIFEr52523.2022.9776160
,2022, 'Parallel Processing Framework for Efficient Computation of Analyst Consensus Estimates and Measurement of Forecast Accuracy', in 2022 International Conference on Data Science and Its Applications, ICoDSA 2022, pp. 143 - 148, http://dx.doi.org/10.1109/ICoDSA55874.2022.9862846
,2021, 'Acquisition of high bandwidth signals by sampling an analog chromatic derivatives filterbank', in Proceedings - IEEE International Symposium on Circuits and Systems, http://dx.doi.org/10.1109/ISCAS51556.2021.9401478
,2020, 'REALM: Reduced-Error Approximate Log-based Integer Multiplier', in Proceedings of the 2020 Design, Automation and Test in Europe Conference and Exhibition, DATE 2020, pp. 1366 - 1371, http://dx.doi.org/10.23919/DATE48585.2020.9116315
,2020, 'WEID: Worst-case Error Improvement in Approximate Dividers', in Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC, Institute of Electrical and Electronics Engineers (IEEE), pp. 593 - 598, presented at 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC), 13 January 2020 - 16 January 2020, http://dx.doi.org/10.1109/ASP-DAC47756.2020.9045504
,2019, 'SCRIP: Secure random clock execution on soft processor systems to mitigate power-based side channel attacks', in IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD, http://dx.doi.org/10.1109/ICCAD45719.2019.8942112
,2019, 'RFTC: Runtime frequency tuning countermeasure using FPGA dynamic reconfiguration to mitigate power analysis attacks', in Proceedings - Design Automation Conference, http://dx.doi.org/10.1145/3316781.3317899
,2019, 'Hardware Trojan Detection and Recovery in MPSoCs via On-line Application Specific Testing', in Proceedings - 2019 22nd International Symposium on Design and Diagnostics of Electronic Circuits and Systems, DDECS 2019, http://dx.doi.org/10.1109/DDECS.2019.8724649
,2017, 'Trust and Privacy Challenges in Social Participatory Networks', in Beheshti A; Hashmi M; Dong H; Zhang WE (eds.), Lecture Notes in Business Information Processing, Springer, Cham, Sydney, NSW, pp. 178 - 190, presented at Australian Symposium on Service Research and Innovation : ASSRI 2017, Sydney, NSW, 19 October 2017 - 20 October 2017, http://dx.doi.org/10.1007/978-3-319-76587-7_12
,2017, 'DoSGuard: Protecting pipelined MPSoCs against hardware Trojan based DoS attacks', in Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors, Seattle, WA, USA, pp. 45 - 52, presented at 2017 IEEE 28th International Conference on Application-specific Systems, Architectures and Processors (ASAP), Seattle, WA, USA, 10 July 2017 - 12 July 2017, http://dx.doi.org/10.1109/ASAP.2017.7995258
,2017, 'TrojanGuard: Simple and Effective Hardware Trojan Mitigation Techniques for Pipelined MPSoCs', in Proceedings - Design Automation Conference, http://dx.doi.org/10.1145/3061639.3062336
,2017, 'NORA: Algorithmic Balancing without Pre-charge to Thwart Power Analysis Attacks', in VLSI Design 2017, Hyderabad, India, presented at 30th International Conference on VLSI Design and 16th International Conference on Embedded Systems, VLSID 2017, Hyderabad, India, 07 January 2017 - 11 January 2017
,2016, 'Anomaly-free policy composition in software-defined networks', in 2016 IFIP Networking Conference (IFIP Networking) and Workshops, IFIP Networking 2016, vienna, pp. 28 - 36, presented at 2016 IFIP Networking Conference, vienna, 17 May 2016 - 19 May 2016, http://dx.doi.org/10.1109/IFIPNetworking.2016.7497226
,2016, 'Does It Sound as It Claims: A Detailed Side-Channel Security Analysis of QuadSeal Countermeasure', Como, Italy, presented at ACM International Conference on Computing Frontiers 2016, Como, Italy, 16 May 2016 - 18 May 2016, http://dx.doi.org/10.1145/2903150.2911709
,2015, 'A Collaborative Reputation System Based on Credibility Propagation in WSNs', Melbourne, VIC, presented at IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS), Melbourne, VIC, 14 December 2015 - 17 December 2015, http://dx.doi.org/10.1109/ICPADS.2015.9
,2015, 'QuadSeal: Quadruple algorithmic symmetrizing countermeasure against power based side-channel attacks', in 2015 International Conference on Compilers, Architecture and Synthesis for Embedded Systems, CASES 2015, pp. 21 - 30, http://dx.doi.org/10.1109/CASES.2015.7324539
,2015, 'ARCHER: Communication-based predictive architecture selection for application specific multiprocessor Systems-on-Chip', in Proceedings - IEEE International Symposium on Circuits and Systems, pp. 413 - 416, http://dx.doi.org/10.1109/ISCAS.2015.7168658
,2015, 'An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems', in ICT Systems Security and Privacy Protection, Hamburg, Germany, presented at IFIP SEC 2015, Hamburg, Germany, 26 May 2015 - 28 May 2015, http://dx.doi.org/10.1007/978-3-319-18467-8_13
,2015, 'A Trust Assessment Framework for Streaming Data in WSNs Using Iterative Filtering', in The IEEE 10th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Singapore, presented at The IEEE 10th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Singapore, 07 April 2015 - 09 April 2015, http://dx.doi.org/10.1109/ISSNIP.2015.7106935
,2014, 'Advanced Modes in AES: Are they Safe from Power Analysis based Side Channel Attacks?', Seoul, Korea, presented at IEEE International Conference on Computer Design, Seoul, Korea, 19 October 2014 - 22 October 2014
,2014, 'CSI-MIMO: Indoor Wi-Fi Fingerprinting System', in Turgut D (ed.), 39th Annual IEEE Conference on Local Computer Networks, IEEE, Edmonton, Canada, pp. 202 - 209, presented at Local Computer Networks Conference, Edmonton, Canada, 08 September 2014 - 11 September 2014, http://dx.doi.org/10.1109/LCN.2014.6925773
,2014, 'Trajectory Approximation for Resource Constrained Mobile Sensor Networks', in Krishnamachari B (ed.), IEEE DCOSS, Australia, presented at Ghulam Murtaza, Australia, 26 May 2014 - 28 May 2014, http://dx.doi.org/10.1109/DCOSS.2014.27
,2014, 'Provenance-Aware Security Risk Analysis for Hosts and Network Flows', in Proceedings of NOMS 2014 IEEE/IFIP Network Operations and Management Symposium, Krakow, Poland, pp. 1 - 8, presented at IEEE/IFIP Network Operations and Management Symposium, NOMS 2014, Krakow, Poland, 05 May 2014 - 09 May 2014, http://dx.doi.org/10.1109/NOMS.2014.6838250
,2014, 'κ-FSOM: Fair Link Scheduling Optimization for Energy-Aware Data Collection in Mobile Sensor Networks', in Krishnamachari B; Murphy A; Trigoni N (eds.), Proceedings 11th European Conference, EWSN 2014 : Lecture Notes in Computer Science, Springer, Oxford, UK, pp. 17 - 33, presented at 11th European Conference, EWSN 2014, Oxford, UK, 17 February 2014 - 19 February 2014, http://dx.doi.org/10.1007/978-3-319-04651-8_2
,2014, 'kappa-FSOM: Fair Link Scheduling Optimization for Energy-Aware Data Collection in Mobile Sensor Networks', in Krishnamachari B; Murphy AL; Trigoni N (eds.), WIRELESS SENSOR NETWORKS, EWSN 2014, SPRINGER-VERLAG BERLIN, ENGLAND, Oxford, pp. 17 - 33, presented at 11th European Conference on Wireless Sensor Networks (EWSN), ENGLAND, Oxford, 17 February 2014 - 19 February 2014, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000340395900002&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2013, 'A case study on exploration of last-level cache for energy reduction in DDR3 DRAM', in Proceedings - 2013 2nd Mediterranean Conference on Embedded Computing, MECO 2013, pp. 42 - 45, http://dx.doi.org/10.1109/MECO.2013.6601372
,2013, 'A novel intermittent fault Markov model for deep sub-micron processors', in Proceedings of the 23rd ACM international conference on Great lakes symposium on VLSI, ACM, New York, NY, USA, pp. 13 - 18, presented at the 23rd ACM international conference on Great lakes symposium on VLSI, Paris, France, 02 May 2013 - 03 May 2013, http://dx.doi.org/10.1145/2483028.2483051
,2013, 'Collusion Detection in Online Rating Systems', in Web Technologies and Applications, Springer Berlin Heidelberg, Sydney, pp. 196 - 207, presented at 15th Asia Pacific Web Conference, Sydney, 04 April 2013 - 06 April 2013, http://link.springer.com/chapter/10.1007/978-3-642-37401-2_21
,2013, 'Poster abstract: A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks', in SenSys 2013 - Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, http://dx.doi.org/10.1145/2517351.2517394
,2012, 'Reputation Management in Crowdsourcing Systems', in 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2012, IEEE, Pittsburgh, USA, pp. 664 - 671, presented at 7th IEEE International Workshop on Trusted Collaboration, Pittsburgh, USA, 14 October 2012, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6450966
,2012, 'CoRaS: A Multiprocessor Key Corruption and Random Round Swapping for Power Analysis Side Channel Attacks: A DES Case Study', in ISCAS 2012 - 2012 IEEE International Symposium on Circuits and Systems Proceedings, IEEE, South Korea, pp. 253 - 256, presented at IEEE International Symposium on Circuits and Systems, South Korea, 20 May 2012, http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6271818
,