Cited By
View all- Gong YQian FWang L(2019)Probabilistic Evaluation of Hardware Security VulnerabilitiesACM Transactions on Design Automation of Electronic Systems10.1145/329040524:2(1-20)Online publication date: 10-Jan-2019
- Li TAmbrose JRagel RParameswaran S(2016)Processor Design for Soft ErrorsACM Computing Surveys10.1145/299635749:3(1-44)Online publication date: 8-Nov-2016
- Ebrahimi MTahoori M(2016)Invited - Cross-layer approaches for soft error modeling and mitigationProceedings of the 53rd Annual Design Automation Conference10.1145/2897937.2905007(1-6)Online publication date: 5-Jun-2016
- Show More Cited By