Miodrag Potkonjak
#113,128
Most Influential Person Now
Miodrag Potkonjak's AcademicInfluence.com Rankings
Miodrag Potkonjakengineering Degrees
Engineering
#3334
World Rank
#4395
Historical Rank
Electrical Engineering
#730
World Rank
#794
Historical Rank

Miodrag Potkonjakcomputer-science Degrees
Computer Science
#4338
World Rank
#4564
Historical Rank
Computer Architecture
#27
World Rank
#27
Historical Rank
Database
#1543
World Rank
#1619
Historical Rank

Download Badge
Engineering Computer Science
Miodrag Potkonjak's Degrees
- Bachelors Electrical Engineering University of Belgrade
Why Is Miodrag Potkonjak Influential?
(Suggest an Edit or Addition)Miodrag Potkonjak's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- MediaBench: a tool for evaluating and synthesizing multimedia and communications systems (1997) (2364)
- Coverage problems in wireless ad-hoc sensor networks (2001) (1910)
- Power efficient organization of wireless sensor networks (2001) (1117)
- Exposure in wireless Ad-Hoc sensor networks (2001) (711)
- Optimizing power using transformations (1995) (479)
- Multiple constant multiplications: efficient and versatile framework and algorithms for exploring common subexpression elimination (1996) (389)
- Worst and best-case coverage in sensor networks (2005) (382)
- Statistical model of lossy links in wireless sensor networks (2005) (352)
- Smart kindergarten: sensor-based wireless networks for smart developmental problem-solving environments (2001) (346)
- Temporal properties of low power wireless links: modeling and implications on multi-hop routing (2005) (327)
- Lightweight secure PUFs (2008) (317)
- Security of IoT systems: Design challenges and opportunities (2014) (307)
- A Collaborative Approach to In-Place Sensor Calibration (2003) (295)
- Fast prototyping of datapath-intensive architectures (1991) (290)
- Localized algorithms in wireless ad-hoc networks: location discovery and sensor exposure (2001) (277)
- Power optimization of variable voltage core-based systems (1998) (269)
- Watermarking techniques for intellectual property protection (1998) (259)
- Hardware Trojan horse detection using gate-level characterization (2009) (255)
- On communication security in wireless ad-hoc sensor networks (2002) (240)
- MediaBench: A Tool for Evaluating and Synthesizing Multimedia and Communicatons Systems (1997) (230)
- Techniques for Design and Implementation of Secure Reconfigurable PUFs (2009) (230)
- Minimal and maximal exposure path algorithms for wireless embedded sensor networks (2003) (222)
- Constraint-based watermarking techniques for design IP protection (2001) (212)
- Synthesis techniques for low-power hard real-time systems on variable voltage processors (1998) (208)
- On-line scheduling of hard real-time tasks on variable voltage processor (1998) (203)
- On-line fault detection of sensor measurements (2003) (202)
- HYPER-LP: a system for power minimization using architectural transformations (1992) (199)
- Testing Techniques for Hardware Security (2008) (199)
- Exposure in Wireless Sensor Networks: Theory and Practical Solutions (2002) (192)
- Fault tolerance techniques for wireless ad hoc sensor networks (2002) (191)
- Power optimization of variable-voltage core-based systems (1999) (187)
- Remote activation of ICs for piracy prevention and digital right management (2007) (183)
- Low overhead fault-tolerant FPGA systems (1998) (178)
- Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions (2009) (161)
- Optimizing resource utilization using transformations (1991) (141)
- Analysis of watermarking techniques for graph coloring problem (1998) (131)
- Robust IP watermarking methodologies for physical design (1998) (130)
- Low Power 0 / 1 Coverage and Scheduling Techniques in Sensor Networks (2003) (111)
- Effective iterative techniques for fingerprinting design IP (1999) (108)
- Performance optimization using template mapping for datapath-intensive high-level synthesis (1996) (107)
- Fingerprinting techniques for field-programmable gate arrayintellectual property protection (2001) (106)
- Function-level power estimation methodology for microprocessors (2000) (105)
- Nano-PPUF: A Memristor-Based Security Primitive (2012) (105)
- Scalable Hardware Trojan Diagnosis (2012) (104)
- Behavioral synthesis techniques for intellectual property protection (2005) (99)
- Hiding Data in DNA (2002) (99)
- Enabling trusted software integrity (2002) (97)
- FPGA fingerprinting techniques for protecting intellectual property (1998) (96)
- Optimal Worst-Case Coverage of Directional Field-of-View Sensor Networks (2006) (96)
- Robust FPGA intellectual property protection through multiple small watermarks (1999) (95)
- Watermarking Deep Neural Networks for Embedded Systems (2018) (93)
- Gate-level characterization: Foundations and hardware security applications (2010) (93)
- Intellectual Property Protection in VLSI Designs: Theory and Practice (2003) (89)
- System-level Synthesis Of Low-power Hard Real-time Systems (1997) (89)
- Signature hiding techniques for FPGA intellectual property protection (1998) (89)
- Dynamically reconfigurable hybrid cache: An energy-efficient last-level cache design (2012) (88)
- Intellectual property protection by watermarking combinational logic synthesis solutions (1998) (88)
- Intellectual Property Metering (2001) (87)
- Location errors in wireless embedded sensor networks: sources, models, and effects on applications (2002) (87)
- Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications (2015) (87)
- System-architectures for sensor networks issues, alternatives, and directions (2002) (84)
- Gateway placement for latency and energy efficient data aggregation [wireless sensor networks] (2004) (82)
- Efficiently supporting fault-tolerance in FPGAs (1998) (81)
- Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach (2008) (80)
- Fingerprinting Digital Circuits on Programmable Hardware (1998) (78)
- Model-based calibration for sensor networks (2003) (77)
- On-line fault detection for bus-based field programmable gate arrays (1998) (77)
- Maximally fast and arbitrarily fast implementation of linear computations (circuit layout CAD) (1992) (75)
- HYPER: an interactive synthesis environment for high performance real time applications (1989) (74)
- Efficient Substitution of Multiple Constant Multiplications by Shifts and Additions Using Iterative Pairwise Matching (1994) (70)
- Hardware obfuscation using PUF-based logic (2014) (70)
- Fault Tolerance in Wireless Ad-Hoc Sensor Networks (2007) (70)
- Estimating implementation bounds for real time DSP application specific circuits (1994) (63)
- Hiding Signatures in Graph Coloring Solutions (1999) (63)
- Public Physical Unclonable Functions (2014) (62)
- Sleeping Coordination for Comprehensive Sensing Using Isotonic Regression and Domatic Partitions (2006) (62)
- Differential public physically unclonable functions: Architecture and applications (2011) (61)
- A Scheduling and Resource Allocation Algorithm for Hierarchical Signal Flow Graphs (1989) (61)
- CAD-based Security, Cryptography, and Digital Rights Management (2007) (59)
- Fingerprinting intellectual property using constraint-addition (2000) (58)
- Real-time watermarking techniques for sensor networks (2003) (57)
- Optimum and heuristic transformation techniques for simultaneous optimization of latency and throughput (1995) (56)
- Critical Path Minimization Using Retiming and Algebraic Speed-Up (1993) (55)
- Can EDA combat the rise of electronic counterfeiting? (2012) (55)
- Two new methods for computer forming of dynamic equations of active mechanisms (1979) (54)
- Exploiting hardware sharing in high-level synthesis for partial scan optimization (1993) (54)
- Malicious Circuitry Detection Using Thermal Conditioning (2011) (53)
- Efficient coloring of a large spectrum of graphs (1998) (52)
- Copy detection for intellectual property protection of VLSI designs (1999) (52)
- Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry (2012) (51)
- Enhanced FPGA reliability through efficient run-time fault reconfiguration (2000) (50)
- Robust and flexible FPGA-based digital PUF (2014) (50)
- Synthesis of trustable ICs using untrusted CAD tools (2010) (50)
- Performance optimization of sequential circuits by eliminating retiming bottlenecks (1992) (50)
- Behavioral synthesis techniques for intellectual property protection (1999) (49)
- Watermarking graph partitioning solutions (2001) (49)
- Input vector control for post-silicon leakage current minimization in the presence of manufacturing variability (2008) (49)
- Device aging-based physically unclonable functions (2011) (48)
- Fault Tolerance in Wireless Sensor Networks (2004) (48)
- Non-scan Design-for-testability Of Rt-level Data Paths (1994) (46)
- Quo vadis, PUF?: Trends and challenges of emerging physical-disorder based security (2014) (43)
- System-level design guidance using algorithm properties (1994) (43)
- Protecting Combinational Logic Synthesis Solutions (2006) (43)
- Behavioral synthesis of area-efficient testable designs using interaction between hardware sharing and partial scan (1995) (42)
- Trusted sensors and remote sensing (2010) (42)
- Processors for mobile applications (2000) (41)
- The undetectable and unprovable hardware Trojan horse (2013) (41)
- Matched public PUF: Ultra low energy security platform (2011) (40)
- Transforming behavioral specifications to facilitate synthesis of testable designs (1994) (40)
- Techniques for intellectual property protection of DSP designs (1998) (40)
- Characterization of Location Error in Wireless Sensor Networks: Analysis and Applications (2003) (40)
- SVD-Based Ghost Circuitry Detection (2009) (38)
- Local watermarks: methodology and application to behavioral synthesis (2003) (38)
- Low-power behavioral synthesis optimization using multiple precision arithmetic (1999) (37)
- mHealthMon: Toward Energy-Efficient and Distributed Mobile Health Monitoring Using Parallel Offloading (2013) (36)
- Resource driven synthesis in the HYPER system (1990) (36)
- Coding-based energy minimization for Phase Change Memory (2012) (35)
- Nanotechnology-based trusted remote sensing (2011) (35)
- Considering testability at behavioral level: use of transformations for partial scan cost minimization under timing and area constraints (1995) (35)
- Provably complete hardware Trojan detection using test point insertion (2012) (34)
- Hardware security strategies exploiting nanoelectronic circuits (2013) (34)
- An Approach For Power Minimization Using Transformations (1992) (34)
- High level synthesis for reconfigurable datapath structures (1993) (34)
- Power efficient mediaprocessors: design space exploration (1999) (33)
- Energy minimization with guaranteed quality of service (2000) (33)
- Location Discovery in Ad-hoc Wireless Sensor Networks (2004) (33)
- Digital bimodal function: An ultra-low energy security primitive (2013) (32)
- Optimization-intensive watermarking techniques for decision problems (1999) (32)
- Optimizing the Output of a Human-Powered Energy Harvesting System With Miniaturization and Integrated Control (2014) (32)
- Detection and Diagnosis (2011) (31)
- Latency-guided on-chip bus network design (2000) (31)
- Scalable segmentation-based malicious circuitry detection and diagnosis (2010) (31)
- Hierarchical watermarking for protection of DSP filter cores (1999) (31)
- Application-driven synthesis of core-based systems (1997) (31)
- Robust passive hardware metering (2011) (31)
- Behavioral-level synthesis of heterogeneous BISR reconfigurable ASIC's (1998) (31)
- Real-time operating systems for embedded computing (1997) (30)
- Algorithms for efficient runtime fault recovery on diverse FPGA architectures (1999) (29)
- Latency-Guided On-Chip Bus-Network Design (2006) (29)
- Scalable consistency-based hardware trojan detection and diagnosis (2011) (29)
- Synthesis of Hard Real-Time Application Specific Systems (1999) (29)
- Wireless Sensor Networks (2003) (28)
- Instruction set mapping for performance optimization (1993) (28)
- Power optimization in programmable processors and ASIC implementations of linear systems: transformation-based approach (1996) (28)
- Effective iterative techniques for fingerprinting design IP [VLSI CAD] (1999) (28)
- Computer Aided Design of Fault-Tolerant Application Specific Programmable Processors (2000) (28)
- Challenges and opportunities in broadband and wireless communication designs (2000) (28)
- An integrated system for rapid prototyping of high performance algorithm specific data paths (1992) (27)
- On the sensitivity of incremental algorithms for combinatorial auctions (2002) (27)
- Nanoelectronic Solutions for Hardware Security (2012) (26)
- High level synthesis techniques for efficient built-in-self-repair (1993) (26)
- Cost optimization in ASIC implementation of periodic hard-real time systems using behavioral synthesis techniques (1995) (26)
- Semantic multicast: intelligently sharing collaborative sessions (1999) (26)
- Reverse engineering and prevention techniques for physical unclonable functions using side channels (2014) (26)
- Synthesis Of Application Specific Programmable Processors (1997) (26)
- A controller-based design-for-testability technique for controller-data path circuits (1995) (26)
- Computational forensic techniques for intellectual property protection (2001) (25)
- Hardware aging-based software metering (2009) (25)
- Low power coordination in wireless ad-hoc networks (2003) (25)
- General Methodology for Soft-Error-Aware Power Optimization Using Gate Sizing (2007) (25)
- Scheduling with integer time budgeting for low-power optimization (2008) (25)
- Self-Consistency and Consistency-Based Detection and Diagnosis of Malicious Circuitry (2014) (24)
- A methodology for guided behavioral-level optimization (1998) (24)
- Medical diagnostic-based sensor selection (2011) (24)
- The bidirectional polyomino partitioned PPUF as a hardware security primitive (2013) (23)
- Energy optimization in wireless medical systems using physiological behavior (2010) (23)
- Fast implementation of recursive programs using transformations (1992) (23)
- Algorithm Selection: A Quantitative Computation-intensive Optimization Approach (1994) (23)
- Power optimization in disk-based real-time application specific systems (1996) (23)
- Markov chain-based models for missing and faulty data in MICA2 sensor motes (2005) (23)
- Experimental Investigation of IEEE 802.15.4 Transmission Power Control and Interference Minimization (2007) (22)
- Pipelining: just another transformation (1992) (21)
- Secure remote sensing and communication using digital PUFs (2014) (21)
- Forensic engineering techniques for VLSI CAD tools (2000) (21)
- Sensor coverage in wireless sensor networks (2005) (20)
- Sensor Network Architecture (2004) (20)
- Techniques for foundry identification (2014) (20)
- Location Discovery Using Data-Driven Statistical Error Modeling (2006) (19)
- Design-for-Debugging of application specific designs (1995) (19)
- INTELLECTUAL PROPERTY PROTECTION USING WATERMARKING PARTIAL SCAN CHAINS FOR SEQUENTIAL LOGIC TEST GENERATION (1998) (19)
- Application-driven synthesis of memory-intensive systems-on-chip (1999) (19)
- Sequential Circuit Delay Optimization Using Global Path Delays (1993) (19)
- Synthesis of power efficient systems-on-silicon (1998) (19)
- Matched Digital PUFs for Low Power Security in Implantable Medical Devices (2014) (19)
- Security in sensor networks: watermarking techniques (2004) (19)
- Improving the observability and controllability of datapaths foremulation-based debugging (1999) (19)
- Transforming linear systems for joint latency and throughput optimization (1994) (19)
- Gate Characterization Using Singular Value Decomposition: Foundations and Applications (2012) (19)
- Experimental Analysis of a Mobile Health System for Mood Disorders (2010) (18)
- System-level synthesis of application specific systems using A* search and generalized force-directed heuristics (1996) (18)
- Watermarking while preserving the critical path (2000) (18)
- ERROR-TOLERANT MULTI-MODAL SENSOR FUSION (2002) (18)
- Algorithms for high-level synthesis: resource utilization-based approach (1992) (17)
- Securing netlist-level FPGA design through exploiting process variation and degradation (2012) (17)
- Power minimization using system-level partitioning of applications with quality of service requirements (1999) (17)
- Energy minimization of system pipelines using multiple voltages (1999) (17)
- Search in sensor networks: Challenges, techniques, and applications (2002) (17)
- High performance embedded system optimization using algebraic and generalized retiming techniques (1993) (17)
- Integrated circuit security techniques using variable supply voltage (2011) (17)
- Toward energy-efficient and distributed mobile health monitoring using parallel offloading (2013) (17)
- Design techniques for sensor appliances: foundations and light compass case study (2003) (16)
- Optimizing Resource Utilization and Testability Using Hot Potato Techniques (1994) (16)
- Synthesizing designs with low-cardinality minimum feedback vertex set for partial scan application (1994) (16)
- MetaCores: design and optimization techniques (2001) (16)
- Exploring the algorithmic design space using high level synthesis (1993) (16)
- Efficient and Secure Group Key Management in IoT using Multistage Interconnected PUF (2018) (16)
- Security primitives and protocols for ultra low power sensor systems (2011) (15)
- Optimizing computations for effective block-processing (2000) (15)
- An on-line approach for power minimization in QoS sensitive systems (2003) (15)
- Energy minimization for real-time systems with non-convex and discrete operation modes (2009) (15)
- Localization in Wireless Networks: Foundations and Applications (2012) (15)
- Using standardized quantization for multi-party PPUF matching: Foundations and applications (2012) (14)
- Techniques for energy minimization of communication pipelines (1998) (14)
- Complexity Estimation for Real Time Application Specific Circuits (1991) (14)
- Power optimization using divide-and-conquer techniques for minimization of the number of operations (1997) (14)
- Scheduling Algorithms For Hierarchical Data Control Flow Graphs (1992) (14)
- Nonscan design-for-testability techniques using RT-level design information (1997) (14)
- Pruning Filters and Classes: Towards On-Device Customization of Convolutional Neural Networks (2017) (13)
- A digital PUF-based IP protection architecture for network embedded systems (2014) (13)
- Semantics-driven sensor configuration for energy reduction in medical sensor networks (2012) (13)
- Hardware IP Watermarking and Fingerprinting (2016) (13)
- Quality of service and system design (1999) (13)
- Potential-driven Statistical Ordering Of Transformations (1997) (13)
- A secure and unclonable embedded system using instruction-level PUF authentication (2014) (13)
- Semantic multimodal compression for wearable sensing systems (2010) (13)
- Fault-Tolerant and Low-Power Sampling Schedules for Localized BASNs (2013) (13)
- Watermarking integer linear programming solutions (2002) (12)
- Stable and secure delay-based physical unclonable functions using device aging (2015) (12)
- Error models for light sensors by statistical analysis of raw sensor measurements (2004) (12)
- Model-based compression in wireless ad hoc networks (2003) (12)
- Aging-based leakage energy reduction in FPGAs (2013) (12)
- Integrated circuit digital rights management techniques using physical level characterization (2011) (12)
- Digital PUF using intentional faults (2015) (12)
- Fair watermarking techniques (2000) (12)
- Evolutionary Trigger Set Generation for DNN Black-Box Watermarking (2019) (11)
- Malicious circuitry detection using fast timing characterization via test points (2013) (11)
- Algorithm selection: a quantitative optimization-intensive approach (1999) (11)
- POWER MINIMIZATION BY SEPARATION OF CONTROL AND DATA RADIOS (2002) (11)
- Power minimization in DSP application specific systems using algorithm selection (1995) (11)
- Wireless security techniques for coordinated manufacturing and on-line hardware trojan detection (2012) (11)
- Lightweight digital hardware random number generators (2013) (11)
- Sensor calibration using nonparametric statistical characterization of error models (2004) (10)
- Power constrained sensor sample selection for improved form factor and lifetime in localized BANs (2012) (10)
- Cut-based functional debugging for programmable systems-on-chip (2000) (10)
- System Synthesis of Synchronous Multimedia Applications (2003) (10)
- PPM model cleaning (2003) (10)
- A Benign Hardware Trojan on FPGA-based embedded systems (2012) (10)
- Pruning ConvNets Online for Efficient Specialist Models (2017) (10)
- Synthesis-for-testability using transformations (1995) (10)
- Maximizing yield in Near-Threshold Computing under the presence of process variation (2013) (10)
- Techniques for maintaining connectivity in wireless ad-hoc networks under energy constraints (2007) (10)
- Optimal ILP-based Approach for Throughput Optimization Using Simultaneous Algorithm/Architecture Matching and Retiming (1995) (10)
- Fault scanner for reconfigurable logic (1997) (10)
- A statistical methodology for wire-length prediction (2006) (9)
- Protecting ownership rights of a lossless image coder through hierarchical watermarking (1998) (9)
- Dielectric Elastomer Generators for foot plantar pressure based energy scavenging (2012) (9)
- Energy and Cost Reduction in Localized Multisensory Systems through Application-Driven Compression (2012) (9)
- Behavioral optimization using the manipulation of timing constraints (1998) (9)
- DSP Quant: design, validation, and applications of DSP hard real-time benchmark (1997) (9)
- Secure System Design and Trustable Computing (2015) (9)
- Localized watermarking: methodology and application to template mapping (2000) (9)
- Configurable spare processors: a new approach to system level fault-tolerance (1996) (9)
- Spatiotemporal assignment of energy harvesters on a self-sustaining medical shoe (2012) (9)
- Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware (1999) (9)
- Semantic attacks on wireless medical devices (2014) (9)
- 20 Years of research on intellectual property protection (2017) (9)
- A methodology and algorithms for the design of hard real-time multitasking ASICs (1999) (9)
- Power minimization in QoS sensitive systems (2004) (8)
- A controller redesign technique to enhance testability of controller-data path circuits (1998) (8)
- Optimizing designs using the addition of deflection operations (2004) (8)
- Reducing Energy of DRAM/Flash Memory System by OS-controlled Data Refresh (2007) (8)
- Methodology For Behavioral Synthesis-based Algorithm-level Design Space Exploration: DCT Case Study (1997) (8)
- Energy efficient E-Textile based portable keyboard (2011) (8)
- Divide-and-conquer techniques for global throughput optimization (1996) (8)
- Energy attacks and defense techniques for wireless systems (2013) (8)
- Localized watermarking: methodology and application to operation scheduling (1999) (8)
- Code Coverage-Based Power Estimation Techniques for Microprocessors (2002) (8)
- Energy-efficient sampling schedules for Body Area Networks (2012) (8)
- Heterogeneous built-in resiliency of application specific programmable processors (1996) (8)
- Adaptive characterization and emulation of delay-based physical unclonable functions using statistical models (2015) (8)
- Media architecture: general purpose vs. multiple application-specific programmable processor (1998) (8)
- Energy-efficient fault tolerance approach for Internet of Things applications (2016) (7)
- Security Defenses for Vulnerable Medical Sensor Network (2014) (7)
- Low power FPGA design using post-silicon device aging (abstract only) (2013) (7)
- Behavior-oriented data resource management in medical sensing systems (2013) (7)
- Rephasing: A Transformation Technique for the Manipulation of Timing Constraints (1995) (7)
- Critical Path Analysis (1999) (7)
- Gate sizing in the presence of gate switching activity and input vector control (2013) (7)
- Optimizing throughput and resource utilization using pipelining: Transformation based approach (1994) (7)
- Securing wireless body sensor networks using bijective function-based hardware primitive (2015) (7)
- Techniques for energy-efficient communication pipeline design (2002) (7)
- Flexible ASIC: shared masking for multiple media processors (2005) (7)
- A gate level sensor network for integrated circuits temperature monitoring (2010) (7)
- Localized Algorithms for Sensor Networks (2018) (7)
- N-version temperature-aware scheduling and binding (2009) (7)
- Engineering change: methodology and applications to behavioral and system synthesis (1999) (7)
- Efficient Block Scheduling to Minimize Context Switching Time for Programmable Embedded Processors (1999) (7)
- Efficient Image Sensor Subsampling for DNN-Based Image Classification (2018) (6)
- Achieving utility arbitrarily close to the optimal with limited energy (2000) (6)
- The digital bidirectional function as a hardware security primitive: Architecture and applications (2015) (6)
- Energy Efficient Collaborative Sensing-Based Design: Soft Keyboard Case Study (2014) (6)
- Optimization intensive energy harvesting (2012) (6)
- Consistency-Based On-line Localization in Sensor Networks (2006) (6)
- Energy-Efficient Data Multicast in Multi-Hop Wireless Networks (2002) (6)
- A probabilistic constructive approach to optimization problems (2001) (6)
- Localization in Wireless Networks (2012) (6)
- Concurrency characteristics in DSP programs (1994) (6)
- A quantitative approach to functional debugging (1997) (6)
- Chapter 1 FPGA-oriented Security (2011) (6)
- What is hardware security? (2010) (6)
- Efficient error detection, localization, and correction for FPGA-based debugging (2000) (6)
- Watermarking Technique for Sensor Networks: Foundations and Applications (2006) (6)
- Phase Change Memory Write Cost Minimization by Data Encoding (2015) (6)
- Micropreemption synthesis: an enabling mechanism for multitask VLSI systems (2006) (6)
- Data protection using recursive inverse function (2015) (6)
- Maximally and arbitrarily fast implementation of linear andfeedback linear computations (2000) (6)
- Engineering change protocols for behavioral and system synthesis (2005) (5)
- Energy Saving Using Scenario Based Sensor Selection on Medical Shoes (2015) (5)
- Effective Heterogeneous Design and Co-simulation 25 6. Acknowledgments (1995) (5)
- Fair watermarking using combinatorial isolation lemmas (2004) (5)
- An ultra-low energy PUF matching security platform using programmable delay lines (2016) (5)
- Enhanced FPGA Reliability Through Efficient (2000) (5)
- VeSense: High-performance and energy-efficient vehicular sensing platform (2014) (5)
- Securing interconnected PUF network with reconfigurability (2018) (5)
- Nonparametric Combinatorial Regression for Shape Constrained Modeling (2010) (5)
- Optimizing systems for effective block-processing: the k-delay problem (1996) (5)
- ILP-based engineering change (2002) (5)
- Low power and QoS (1999) (5)
- Heterogeneous BISR-approach using system level synthesis flexibility (1998) (5)
- Leakage minimization using self sensing and thermal management (2010) (5)
- Behavioral synthesis optimization using multiple precision arithmetic (1998) (5)
- Quantitative Intellectual Property Protection Using Physical-Level Characterization (2013) (5)
- Behavioral synthesis of high performance, low cost, and low power application specific processors for linear computations (1994) (5)
- Securing embedded systems and their IPs with digital reconfigurable PUFs (2016) (5)
- Small is Beautiful and Smart (2013) (5)
- Hardware Security: Preparing Students for the Next Design Frontier (2007) (4)
- Designing power efficient hypermedia processors (1999) (4)
- Energy Balancing Routing Schemes for Low-Power Wireless Networks (2009) (4)
- Addressing biosignal data sharing security issues with robust watermarking (2014) (4)
- A temperature-aware synthesis approach for simultaneous delay and leakage optimization (2013) (4)
- A Robust Watermarking Technique for Secure Sharing of BASN Generated Medical Data (2014) (4)
- Trusted Design in FPGAs (2012) (4)
- Global error-tolerant algorithms for location discovery in ad-hoc wireless Netoworks (2002) (4)
- Data integrity attacks and defenses for Intel lab sensor network (2015) (4)
- DIFFERENTIAL ON-LINE SENSOR CALIBRATION (2004) (4)
- Optimal Node Scheduling for Effective Energy Usage in Sensor Networks (2002) (4)
- Functional debugging of systems-on-chip (1998) (4)
- Improving Energy Efficiency in Sensing Subsystems via Near-Threshold Computing and Device Aging (2013) (4)
- Optimization-intensive watermarking techniques for decision problems (1999) (4)
- Differential on-line sensor calibration [light intensity sensor example] (2004) (4)
- Synthesis and selection of DCT algorithms using behavioral synthesis-based algorithm space exploration (1995) (4)
- Optimizing the configuration and control of a novel human-powered energy harvesting system (2013) (4)
- Detecting local events using global sensing (2011) (4)
- Security Map of Sensor Network (2008) (4)
- Forward-looking objective functions: concept & applications in high level synthesis (2002) (4)
- Driving low-power wearable systems with an adaptively-controlled foot-strike scavenging platform (2013) (4)
- Transitive statistical sensor error characterization and calibration (2005) (4)
- Hypermedia-aided design (2001) (4)
- Gradual relaxation techniques with applications to behavioral synthesis (2003) (4)
- Optimized Operation for Infrastructure-Supported Wireless Sensor Networks (2010) (3)
- Evolution-Strategies-Driven Optimization on Secure and Reconfigurable Interconnection PUF Networks (2021) (3)
- Interacting Particle-Based Model for Missing Data in Sensor Networks: Foundations and Applications (2006) (3)
- Can We Trust the Chips of the Future? (2011) (3)
- Digital Bimodal Functions and Digital Physical Unclonable Functions: Architecture and Applications (2016) (3)
- DA vision 2015: From here to eternity (2015) (3)
- Area-time high level synthesis laws: theory and practice (1994) (3)
- Symbolic debugging scheme for optimized hardware and software (2000) (3)
- Sensor Deployment Using Interleaved Experimentation, Modeling, and Optimization (2006) (3)
- Heuristic techniques for synthesis of hard real-time DSP application specific systems (1996) (3)
- Power Minimization under QoS Constraints (2002) (3)
- Heterogeneous BISR techniques for yield and reliability enhancement using high level synthesis transformations (1993) (3)
- Synthesis of Datapath Architectures (1992) (3)
- Energy efficient implementation of linear systems on programmable processors (1995) (3)
- On unlimited parallelism of DSP arithmetic computations (1993) (3)
- An Energy-Efficient PUF Design: Computing While Racing (2016) (3)
- Coarse-grained learning-based dynamic voltage frequency scaling for video decoding (2016) (3)
- Embedded tutorials: Embedded tutorial 1: Cell-aware test-from gates to transistors (2013) (3)
- Design of high throughput, low latency and low cost structures for linear systems (1994) (3)
- Wire-length prediction using statistical techniques (2004) (3)
- Actuator-Based Infield Sensor Calibration (2006) (3)
- Symmetric Monotonic Regression: Techniques and Applications in Sensor Networks (2007) (2)
- Forward-looking objective functions: concept and applications in high level synthesis (2002) (2)
- Quantitative selection of media benchmarks (1998) (2)
- Consistency Error Modeling-based Localization in Sensor Networks (2006) (2)
- Power optimization using divide-and-conquer techniques for minimization of the number of operations (1999) (2)
- Sensor calibration based on external stimulus actuation (2005) (2)
- Micro-preemption synthesis: an enabling mechanism for multi-task VLSI systems (1997) (2)
- Handheld System Energy Reduction by OS-Driven Refresh (2006) (2)
- Coordinated and adaptive power gating and dynamic voltage scaling for energy minimization (2014) (2)
- Retiming and dual-supply voltage based energy optimization for DSP applications (2016) (2)
- Probabilistic constructive optimization techniques (2004) (2)
- Optimizing Systems for Effective Block-Processing: Optimizing Systems for Effective Block-Processing: (1996) (2)
- High Level Synthesis (1999) (2)
- Networked Sensing of Nitrate in Support of Groundwater Quality Protection (2004) (2)
- VeSense: Energy-Efficient Vehicular Sensing (2013) (2)
- Introduction to Digital Design: A Paradigm-Based Approach (2007) (2)
- Behavioral synthesis of low-cost partial scan designs for DSP applications (1994) (2)
- Security and Privacy Protection in Wireless Sensor Networks (2004) (2)
- Tele-Healthcare Computing and Engineering: Principles and Design (2011) (2)
- Relative Generic Computational Forensic Techniques (2004) (2)
- Multiple constant multiplication implementations in near-threshold computing systems (2015) (2)
- Synthesis of Application Speci c Programmable Processors (1997) (2)
- Statistical timing analysis using Kernel smoothing (2007) (2)
- Special Issue on Emerging Nanoscale Architectures for Hardware Security, Trust, and Reliability: Part 1 (2014) (2)
- Scheduling of soft real-time systems for context-aware applications (2005) (2)
- A quantitative approach to development and validation of synthetic benchmarks for behavioral synthesis (1998) (2)
- Optimization for Real-Time Systems with Non-convex Power Versus Speed Models (2007) (2)
- Techniques for functional test pattern execution (1998) (2)
- Provably minimal energy using coordinated DVS and power gating (2014) (2)
- Enabling environmentally-powered indoor sensor networks with dynamic routing and operation (2016) (2)
- Guest Editorial Integrated Circuit and System Security (2012) (2)
- Ultra-lightweight symmetric-key cipher for resource constrained systems (2014) (1)
- Synthesis of DSP soft real-time multiprocessor systems-on-silicon (1999) (1)
- Symbolic debugging of globally optimized behavioral specifications (2000) (1)
- Kernel Density Estimation-Based Data Correlation (2006) (1)
- System synthesis of synchronous multimedia applications (1999) (1)
- Throughput optimization in disk-based real-time application specific systems (1996) (1)
- Challenging benchmark for location discovery in ad hoc networks: foundations and applications (2008) (1)
- On Admitting Sensor Fault Tolerance While Achieving Secure Biosignal Data Sharing (2014) (1)
- Leveraging human gait characteristics towards self-sustained operation of low-power mobile devices (2014) (1)
- Throughput optimization of general non-linear computations (1999) (1)
- Engineering change protocols for behavioral synthesis (1999) (1)
- Knowledge-based transformation ordering (1996) (1)
- Power optimization of real-time embedded systems on variable voltage processor (2001) (1)
- Wire-length Prediction using Statistical and Probabilistic Techniques (2004) (1)
- Watermarking multiple constant multiplications solutions (2004) (1)
- Efficient throughput optimization of feedback linear computations using generalized Horner's scheme (1995) (1)
- Input vector control for post-silicon leakage current minimization under manufacturing variations (2008) (1)
- A heterogeneous built-in self-repair approach using system-level synthesis flexibility (2004) (1)
- Exploring the diversity of multimedia systems (2001) (1)
- (Bio)-Behavioral CAD (2008) (1)
- A semantically-adaptive strategy for energy-efficiency in wireless medical monitoring devices (2013) (1)
- A low-power APUF-based environmental abnormality detection framework (2017) (1)
- Integration of Statistical Techniques in the Design Curriculum (2007) (1)
- Maximizing the fault-tolerance of application specific programmable signal processors (1996) (1)
- Gate Sizing Under Uncertainty (2013) (1)
- GLOBAL ERROR-TOLERANT ALGORITHM S FOR LOCATION DISCOVERY IN WIRELESS AD-HOC NETWORK S (2001) (1)
- Staggered Sampling for Energy Efficient Data Collection (2006) (1)
- Localized Probabilistic Routing for Data Gathering in Wireless Ad Hoc Networks (2009) (1)
- On-line Fault Detection for Programmable Logic (1997) (1)
- Discrete-relaxation-based heuristic techniques for video algorithm/architecture matching and system level transformations (1995) (1)
- Non-Parametric Statistical Methodology for Wire-length Prediction (2005) (1)
- Low Energy Trusted Private Sensing Using Shared Hardware Random Number Generators (2012) (1)
- Maximally Fast and Arbitrarily Fast Hardwar e Efficient Implementation of Linear and Feedback Linear Computations 1 (1996) (1)
- Low-power semantic fault-detection in multi-sensory mobile health monitoring systems (2014) (1)
- Field Division Routing (2007) (1)
- . " Sis: a System for Sequential Circuit Synthesis, " Report M92/41, A) Shallow Reconvergant Fanout A) Deep Reconvergant Fanout (1)
- Algorithm Selection : A Quantitative Optimization-Intensive Approach 1 (2007) (0)
- “ Location Discovery and Location Error Analysis in Wireless Sensor Networks ” Major : Embedded Network Systems (2001) (0)
- A framework for optimization of operational latency in wireless networks (2010) (0)
- Modeling Mobile Cloud Computing Using Greenmetrics (2013) (0)
- Synthesis techniques for low-power digital designs (1995) (0)
- A Priori Wirelength Estimation : Statistical Models , Bounds and Applications (2006) (0)
- Consistency-based Localization in Sensor Networks (MAS 9) (2006) (0)
- Obstacle Identification and Localization (2003) (0)
- Exploring Hypermedia Processor Design Space (2001) (0)
- A lightweight security primitive using laser-based fault injection (2014) (0)
- Beacon Positioning and Operations (2012) (0)
- 1 Nanoelectronic Solutions for Hardware Security (2012) (0)
- Strategic Deployment in the Presence of Lossy Communication Links (SYS 21) (2006) (0)
- Pipelining for dual supply voltages (2016) (0)
- Techniques for Enabling Efficient Location Discovery (2012) (0)
- Technical Subcommittees (2005) (0)
- SEARCH IN SENS OR NETWORKS: CHALLENGE S, TECHNIQUES, AND APPLICATI ONS (2002) (0)
- INTERACTINGPARTICLE-BASEDMODEL FOR MISSINGDATAINSENSORNETWORKS: FOUNDATIONSAND APPLICATIONS (2006) (0)
- Techniques for implementation of at-speed testable, high performance, and low cost linear designs (1995) (0)
- Sensor calibration using density estimation-based error model (2005) (0)
- Book review: Intellectual property protection in VLSI designs: Theory and practice, Hardcover, pp 183, plus XIX, Kluwer Academic Publishers, Boston, 2003, ISBN 1-4020-7320-8 (2004) (0)
- SYS0: Systems Area Research Overview (2005) (0)
- A technique for QoS-based system partitioning (2000) (0)
- ERROR-TOLERANT MULTI-MODAL SENSOR FUSION ( SHORT PAPER ) (0)
- Localization Attacks and Countermeasures (2012) (0)
- Nonparametrical Statistical Techniques for Location Discovery-Friendly Deployment (2007) (0)
- SYS 0: CENS Systems Research Overview (2006) (0)
- Optimal and Heuristic Techniques for Fault Detection (MAS 8) (2006) (0)
- Sensor Networks and Low Power Coordination in Wireless Ad-hoc Networks (2003) (0)
- Techniques for at-speed testing of VLSI ASIC designs (1994) (0)
- Data pass synthesizing method and bilt-in self repair realizing hardware circuit (1994) (0)
- Future Research Directions (2012) (0)
- Efficient support of hardware debugging through FPGA physical design partitioning (1999) (0)
- SIP0: CENS Sensor Information Processing Research Overview (2005) (0)
- Localization attacks and countermeasures in wireless sensor networks (2010) (0)
- Minimizing Global Interconnect in DSP Systems using Bypassing (2007) (0)
- Hypermedia processors: design space exploration (1998) (0)
- Algorithms for Runtime Tolerance of Interconnect Faults on Diverse FPGA Architectures (2007) (0)
- Learning-Based Localized Offloading with Resource-Constrained Data Centers (2015) (0)
- Phase Change Memory Write Cost Minimization (2015) (0)
- Synthesis of fault-tolerant application specific programmable processors (1998) (0)
- 1 . 0 Introduction 1 . 1 Motivation : Design Space Exploration (2007) (0)
- Hot Potato Techniques in High Level Synthesis (1995) (0)
- Effective Iterative Techniques for (2004) (0)
- Computing and Networking, Optimal Node Scheduling of Effective Energy Usage in Sensor Networks (2002) (0)
- Synthesis of Power-Efficient Memory-Intensive Systems-on-Chip ∗ (0)
- Design of embedded systems using data-driven statistical techniques (2006) (0)
- Stastical Techniques and Location Discovery (2012) (0)
- Comparison Results on Fu and Register Counts Accurately Handle Don't-care Conditions in High-level Designs and Application for Reducing Initialized Registers Chou Et Al.: Accurately Handle Don't-care Conditions in High-level Designs and Application for Reducing Initialized Registers 647 (0)
- Model-based Localized Calibration for Interacting Actuators And Sensors (2003) (0)
- Design trade-offs during fault-tolerant data path synthesis (1999) (0)
- Variability: For headache and profit (2010) (0)
- Location Discovery in Presence of Insufficient Number of Measurements (2012) (0)
- Controlled Personal Data Stream in Mobile Personal Sensing (2009) (0)
- Minimizing the number of operations in DSP computations (1997) (0)
- VSIA ( Virtual Socket Initiative Alliance ) Intellectual Property Metering (2001) (0)
- What to read? With whom to work? Where to publish? — Scientific techniques for organizing and conducting engineering research (2011) (0)
- Energy-Aware Post Settings: A Study on Performance Gain by Adding Relaying Nodes in Wireless Ad-Hoc Networks (2009) (0)
- Compression techniques for embedded systems: foundations and applications (2003) (0)
- with for Gasoline Companies (2015) (0)
- LARGE SCALE DATA MINING PROBLEMS : APPLICATION TO CLIENT-SIDE CACHING IN DIRECTTV (2003) (0)
- Tutorial 2 Real-time Operating Systems For Embedded Computing (1998) (0)
- High-level synthesis techniques for functional test pattern execution1 (1998) (0)
- Symbolic debugging of embedded hardware and software (2001) (0)
- Lack of the Golden Standard and Missing Measurements (2012) (0)
- Coordinated optimization and modeling for location discovery in sensor networks (2008) (0)
- ABC: AGING-BASED IC CONFIGURATION UNIVERSITY OF CALIFORNIA, LOS ANGELES APRIL 2014 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED (2014) (0)
- Session details: Session 7B: Architecture oriented scheduling (2001) (0)
- JointMMSETransceiverDesignsandPerformanceBenchmarkfor CoMP Transmission and Reception (2012) (0)
- Shared storage for energy-efficient multi-core processors (2010) (0)
- Multimedia copyright enforcement on the Internet (panel session) (2000) (0)
- Nonlinear Function Minimization-Based Location Discovery for Ad-Hoc Wireless Sensor Networks (2004) (0)
- 36 Fault Tolerance in Wireless Sensor Networks (2004) (0)
- SIP5: Understanding and Controlling Instrumented Physical Systems:Modeling is Complex, but Optimization is Easy (2005) (0)
- Circuit power optimization using pipelining and dual-supply voltage assignment (2019) (0)
- In situ Calibration (2004) (0)
- ABC: Aging-Based IC Configuration (2014) (0)
- Transitive Error Characterization for Sensor Networks (2005) (0)
- A framework for profile-based system-level synthesis of embedded systems (2002) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Miodrag Potkonjak?
Miodrag Potkonjak is affiliated with the following schools: