default search action
Athanasios Kakarountas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Vasileios Tsoukas, Anargyros Gkogkidis, Eleni Boumpa, Athanasios Kakarountas:
A Review on the emerging technology of TinyML. ACM Comput. Surv. 56(10): 259 (2024) - 2023
- [j23]Nicholas Vaiopoulos, Alexander Vavoulas, Hector E. Nistazakis, Harilaos G. Sandalidis, Athanasios Kakarountas:
On the UOWC Performance Under Location Uncertainty. IEEE Access 11: 38783-38794 (2023) - [j22]Ioannis Dimos, Chrysoula Velaora, Konstantinos Louvaris, Athanasios Kakarountas, Assimina Antonarakou:
How a Rubric Score Application Empowers Teachers' Attitudes over Computational Thinking Leverage. Inf. 14(2): 118 (2023) - [c77]Vasileios Tsoukas, Anargyros Gkogkidis, Athanasios Kakarountas:
Internet of Things Challenges and the Emerging Technology of TinyML. DCOSS-IoT 2023: 491-495 - [c76]Angeliki Karageorgopoulou, Vasileios Tsoukas, Georgios P. Spathoulas, Athanasios Kakarountas, Maria G. Koziri:
Porting the Paillier Algorithm for Homomorphic Encryption on Portable Devices. ICCE 2023: 1-5 - [c75]Georgios Giannakas, Maria Sapounaki, Vasileios Tsoukas, Athanasios Kakarountas:
A Reward Modulated Spiked Timing Depended Plasticity inspired algorithm applied on a MultiLayer Perceptron. PCI 2023: 42-47 - [c74]Fotios Roumpies, Athanasios Kakarountas:
A Review of Homomorphic Encryption and its Contribution to the Sector of Health Services. PCI 2023: 237-242 - [c73]Ioannis Arvanitakis, George K. Kranas, Michael F. Dossis, Athanasios Kakarountas, Antonios N. Dadaliaris:
Assessing Swapping Policies as a Detailed Placement Approach. SEEDA-CECNSM 2023: 1-6 - [c72]Konstantinos Kalovrektis, Ioannis Dimos, Apostolos Xanakis, Athanasios Kakarountas:
Nanotechnology as a Tool for Computational Thinking Skills using Open Hardware, Embedded Systems and Repository Platform, in Industry 4.0 Era. SEEDA-CECNSM 2023: 1-6 - [c71]Angeliki Katsika, Konstantinos Papageorgiou, Alexandros Fakis, Athanasios Kakarountas, Fotis Andritsopoulos, Vassilis P. Plagianakos, Georgios P. Spathoulas:
Compressing Time Series Towards Lightweight Integrity Commitments. SEEDA-CECNSM 2023: 1-7 - [c70]Fotios Roumpies, Athanasios P. Kakarountas:
Cybersecurity and Democracy: A Review. SEEDA-CECNSM 2023: 1-8 - [e1]Nikitas N. Karanikolas, Michael Vassilakopoulos, Catherine Marinagi, Athanasios Kakarountas, Ioannis Voyiatzis:
Proceedings of the 27th Pan-Hellenic Conference on Progress in Computing and Informatics, PCI 2023, Lamia, Greece, November 24-26, 2023. ACM 2023 [contents] - 2022
- [j21]Chrysoula Velaora, Ioannis Dimos, Sofia Tsagiopoulou, Athanasios Kakarountas:
A Game-Based Learning Approach in Digital Design Course to Enhance Students' Competency. Inf. 13(4): 177 (2022) - [j20]Aikaterini A. Fragkou, Athanasios Kakarountas, Vasileios Kokkinos:
Low Power EEG Data Encoding for Brain Neurostimulation Implants. Inf. 13(4): 194 (2022) - [j19]Vasileios Tsoukas, Anargyros Gkogkidis, Aikaterini Kampa, Georgios P. Spathoulas, Athanasios Kakarountas:
Enhancing Food Supply Chain Security through the Use of Blockchain and TinyML. Inf. 13(5): 213 (2022) - [c69]Vasileios Tsoukas, Anargyros Gkogkidis, Athanasios Kakarountas:
Elements of TinyML on Constrained Resource Hardware. ICACDS (2) 2022: 316-331 - [c68]Anargyros Gkogkidis, Vasileios Tsoukas, Stefanos Papafotikas, Eleni Boumpa, Athanasios Kakarountas:
A TinyML-based system for gas leakage detection. MOCAST 2022: 1-5 - [c67]Vasileios Tsoukas, Anargyros Gkogkidis, Athanasios Kakarountas:
A TinyML-based System For Smart Agriculture. PCI 2022: 207-212 - [c66]Eleni Boumpa, Vasileios Tsoukas, Vasileios Chioktour, Maria Kalafati, Georgios P. Spathoulas, Athanasios Kakarountas:
Smart Delivery for Goods Exploiting ML Algorithms. PCI 2022: 304-308 - [c65]Anargyros Gkogkidis, Vasileios Tsoukas, Athanasios Kakarountas:
A TinyML-based Alcohol Impairment Detection System For Vehicle Accident Prevention. SEEDA-CECNSM 2022: 1-6 - 2021
- [j18]Vasileios Chioktour, Athanasios Kakarountas:
Constant delay systolic binary counter with variable size cellular automaton based prescaler. Comput. Electr. Eng. 93: 107291 (2021) - [j17]Dimitrios Myridakis, Paul Myridakis, Athanasios Kakarountas:
A Power Dissipation Monitoring Circuit for Intrusion Detection and Botnet Prevention on IoT Devices. Comput. 9(2): 19 (2021) - [j16]Georgios Giannoukos, Athanasios Kakarountas, Vasileios Chioktour:
Interaction between two cells based on a recurrent neural network using the impedance concept. J. Comput. Methods Sci. Eng. 21(2): 293-299 (2021) - [c64]Angeliki Bicaku, Maria Sapounaki, Athanasios Kakarountas:
A low-complexity bit-efficient Neuromorphic Astrocyte-Neuron Circuit. ICECS 2021: 1-6 - [c63]Eleni Boumpa, Vasileios Tsoukas, Anargyros Gkogkidis, Georgios P. Spathoulas, Athanasios Kakarountas:
Security and Privacy Concerns for Healthcare Wearable Devices and Emerging Alternative Approaches. MobiHealth 2021: 19-38 - [c62]Maria Sapounaki, Athanasios Kakarountas:
A Novel Low-power Neuromorphic Circuit based on Izhikevich Model. MOCAST 2021: 1-4 - [c61]Vasileios Tsoukas, Eleni Boumpa, Georgios Giannakas, Athanasios Kakarountas:
A Review of Machine Learning and TinyML in Healthcare. PCI 2021: 69-73 - [c60]Christos Kompogiannis, Maria Sapounaki, Athanasios Kakarountas:
Development of a Neuromorphic Circuit in Reconfigurable Technology for the Simulation of Synapses. PCI 2021: 195-199 - [c59]Aikaterini A. Fragkou, Athanasios P. Kakarountas, Vasileios Kokkinos:
Low-Power Electroencephalographic Data Encoding System for Implantable Brain Stimulation Systems. SEEDA-CECNSM 2021: 1-5 - [c58]Maria Kalafati, Athanasios Kakarountas:
A Smart Assistant Nightstand For Hospitals. SEEDA-CECNSM 2021: 1-4 - [c57]Sofia Tsagiopoulou, Georgios P. Spathoulas, Athanasios Kakarountas:
Secure aggregation of users' privacy preferences in shared IoT environments. SEEDA-CECNSM 2021: 1-8 - [c56]Vasileios Tsoukas, Anargyros Gkogkidis, Aikaterini Kampa, Georgios P. Spathoulas, Athanasios Kakarountas:
Blockchain technology in food supply chain: A state of the art. SEEDA-CECNSM 2021: 1-8 - [c55]Chrysoula Velaora, Athanasios Kakarountas:
Game-Based Learning for Engineering Education. SEEDA-CECNSM 2021: 1-6 - [c54]Sofia I. Zagori, Athanasios P. Kakarountas:
Prototype Haptic Feedback Device for Robot-Assisted Minimally Invasive Surgery. SEEDA-CECNSM 2021: 1-6 - 2020
- [j15]Dimitrios Myridakis, Georgios P. Spathoulas, Athanasios Kakarountas, Dimitrios Schinianakis:
Smart Devices Security Enhancement via Power Supply Monitoring. Future Internet 12(3): 48 (2020) - [c53]Vasileios Tsoukas, Anargyros Gkogkidis, Athanasios Kakarountas:
A Survey on Mobile User Perceptions of Sensitive Data and Authentication Methods. PCI 2020: 346-349 - [c52]Olga Petroulaki, Angeliki Bicaku, Athanasios Kakarountas:
A Generalized Tonic-Clonic Seizure Detection Method in a Bathtub using a Natural Language Verification Step. PCI 2020: 407-410 - [c51]Athanasios Kakarountas, Georgios P. Spathoulas, Panagiotis Trivellas, Panagiotis Reklitis, George Malindretos:
Survey on Routing Services for Smart Delivery in Urban Environments. SEEDA-CECNSM 2020: 1-5 - [c50]Vasileios Kokkinos, Athanasios Kakarountas:
Design of Reconfigurable Fault-Tolerant Datapaths. SEEDA-CECNSM 2020: 1-6 - [c49]Dimitrios Myridakis, Paul Myridakis, Athanasios Kakarountas:
Intrusion Detection and Botnet Prevention Circuit for IoT Devices. SEEDA-CECNSM 2020: 1-4
2010 – 2019
- 2019
- [c48]Lydia Negka, Georgios Gketsios, Nikolaos Athanasios Anagnostopoulos, Georgios P. Spathoulas, Athanasios Kakarountas, Stefan Katzenbeisser:
Employing Blockchain and Physical Unclonable Functions for Counterfeit IoT Devices Detection. COINS 2019: 172-178 - [c47]Dimitrios Myridakis, Georgios P. Spathoulas, Athanasios Kakarountas, Dimitrios M. Schinianakis, Joachim Lüken:
Monitoring Supply Current Thresholds for Smart Device's Security Enhancement. DCOSS 2019: 224-227 - [c46]Eleni Boumpa, Athanasios Kakarountas:
Smart System for Supporting the Elderly in Home Environment. MobiHealth 2019: 171-185 - [c45]Maria Sapounaki, Athanasios Kakarountas:
A High-Performance Neuron for Artificial Neural Network based on Izhikevich model. PATMOS 2019: 29-34 - [c44]Vasileios Tsoukas, Athanasios Kakarountas, Anargyros Gkogkidis, Georgios Giannakas:
Multi-screen lock: visual passwords from user's social data. PCI 2019: 90-95 - [c43]Stefanos Papafotikas, Athanasios Kakarountas:
A Machine-Learning Clustering Approach for Intrusion Detection to IoT Devices. SEEDA-CECNSM 2019: 1-6 - [c42]Vasileios Tsoukas, Konstantinos Kolomvatsos, Vasileios Chioktour, Athanasios Kakarountas:
A Comparative Assessment of Machine Learning Algorithms for Events Detection. SEEDA-CECNSM 2019: 1-4 - [i1]Eleni Boumpa, Athanasios Kakarountas:
Technological Memory Aids for Neurodegenerative Diseases and the AuDi-o-Mentia Approach. ERCIM News 2019(118) (2019) - 2018
- [c41]Eleni Boumpa, Ioanna Charalampou, Anargyros Gkogkidis, Argyro Ntaliani, Evdoxia Kokkinou, Athanasios Kakarountas:
Assistive System for Elders Suffering of Dementia. ICCE-Berlin 2018: 1-4 - [c40]Dimitrios Myridakis, Georgios P. Spathoulas, Athanasios Kakarountas, Dimitris Schoinianakisy, xJoachim Luekeny:
Anomaly detection in IoT devices via monitoring of supply current. ICCE-Berlin 2018: 1-4 - [c39]Panagiotis Oikonomou, Antonios N. Dadaliaris, Thanasis Loukopoulos, Athanasios Kakarountas, Georgios I. Stamoulis:
A Tetris-based legalization heuristic for standard cell placement with obstacles. MOCAST 2018: 1-4 - 2017
- [c38]Stamatis Dragoumanos, Athanasios Kakarountas, Theodora Fourou:
Young technology entrepreneurship enhancement based on an alternative approach of project-based learning. EDUCON 2017: 351-358 - [c37]Vasileios Chioktour, Athanasios Kakarountas:
A time-aware code execution continuous monitoring for safety-critical applications. MOCAST 2017: 1-4 - [c36]Dimitrios Myridakis, Georgios P. Spathoulas, Athanasios Kakarountas:
Supply Current Monitoring for Anomaly Detection on IoT Devices. PCI 2017: 9:1-9:2 - [c35]Vasileios Chioktour, Georgios P. Spathoulas, Athanasios Kakarountas:
Systolic Binary Counter using a Cellular Automaton-based Prescaler. PCI 2017: 15:1-15:4 - [c34]Maria Sapounaki, Ioanna Polychronou, Maria Gkonta, Angeliki Vogiatzoglou, Athanasios Kakarountas:
Wearable Panic Attack Detection System. PCI 2017: 18:1-18:2 - [c33]Eleni Boumpa, Ioanna Charalampou, Anargyros Gkogkidis, Athanasios Kakarountas:
Home Assistive System for Dementia. PCI 2017: 58:1-58:6 - 2015
- [j14]Athanasios Kakarountas:
Collaborative Efforts Fuel the Greece Chapter [Society News]. IEEE Consumer Electron. Mag. 4(4): 22-23 (2015) - [c32]Harris E. Michail, Apostolis Kotsiolis, Athanasios Kakarountas, George Athanasiou, Costas E. Goutis:
Hardware implementation of the Totally Self-Checking SHA-256 hash core. EUROCON 2015: 1-5 - [c31]Jan Haase, Athanasios Kakarountas, Manuel Graña, Jesús Fraile-Ardanuy, Carl James Debono, Héctor Quintián, Emilio Corchado:
Welcome. EUROCON 2015: I - [c30]Filippos Pirpilidis, Paris Kitsos, Athanasios Kakarountas:
A compact design of SEED block cipher. MECO 2015: 119-123 - [c29]Despoina Kotsidou, Constantinos Angelis, Stamatis Dragoumanos, Athanasios Kakarountas:
Computer assisted gesture recognition for the greek sign language / fingerspelling. Panhellenic Conference on Informatics 2015: 241-242 - 2014
- [c28]Athanasios Kakarountas, Stamatis Dragoumanos, Konstantinos Kakarountas:
Extending visitor's reality at museums. IISA 2014: 196-200 - [c27]Athanasios Kakarountas, Epameinontas Hatzidimitriou, Paris Kitsos:
Cipher Text Stealing integrated in implementations of IEEE P1619 for shared storage media. ISCCSP 2014: 574-577 - [c26]Athanasios Kakarountas:
Disappearing computing for elderly assisted living. MobiHealth 2014: 36-38 - [c25]Pantelis Christodoulou, Ioannis Diamantis, Stamatis Dragoumanos, Athanasios Kakarountas:
A Marketing Tool Based on Games for Smart Devices. Panhellenic Conference on Informatics 2014: 40:1-40:2 - 2011
- [j13]Harris E. Michail, Dimitrios M. Schinianakis, Costas E. Goutis, Athanasios P. Kakarountas, Georgios N. Selimis:
Cipher Block Based Authentication Module: a Hardware Design Perspective. J. Circuits Syst. Comput. 20(2): 163-184 (2011) - [c24]Athanasios P. Kakarountas, Epameinontas Hatzidimitriou, Athanasios Milidonis:
High-throughput ASIC implementation of an encryption core for securing shared storage media. DSP 2011: 1-5 - [c23]Athanasios P. Kakarountas, Epameinontas Hatzidimitriou, Athanasios Milidonis:
A survey on throughput-efficient architectures for IEEE P1619 for shared storage media. ISCC 2011: 758-763 - [c22]Athanasios Kakarountas, Ilias Mavridis:
Efficient Exploitation of Parallel Computing on the Server-Side of Health Organizations' Intranet for Distributing Medical Images to Smart Devices. MobiHealth 2011: 394-398 - 2010
- [j12]Athanasios Milidonis, Nikolaos Alachiotis, Vasileios Porpodas, Harris E. Michail, George A. Panagiotakopoulos, Athanasios P. Kakarountas, Costas E. Goutis:
Decoupled Processors Architecture for Accelerating Data Intensive Applications using Scratch-Pad Memory Hierarchy. J. Signal Process. Syst. 59(3): 281-296 (2010) - [c21]Efthymia Arvaniti, Ilias Mavridis, Athanasios Kakarountas:
Exploration of 2D Cellular Automata as Binary Sequence Generators. ISVLSI 2010: 41-45 - [c20]Dimitris Tychalas, Athanasios Kakarountas:
Planning and Development of an Electronic Health Record Client Based on the Android Platform. Panhellenic Conference on Informatics 2010: 3-6
2000 – 2009
- 2009
- [j11]Athanasios Milidonis, Vasileios Porpodas, Nikolaos Alachiotis, Athanasios P. Kakarountas, Harris E. Michail, George A. Panagiotakopoulos, Costas E. Goutis:
Low-power architecture with scratch-pad memory for accelerating embedded applications with run-time reuse. IET Comput. Digit. Tech. 3(1): 109-123 (2009) - [j10]Dimitrios M. Schinianakis, Apostolos P. Fournaris, Harris E. Michail, Athanasios P. Kakarountas, Thanos Stouraitis:
An RNS Implementation of an Fp Elliptic Curve Point Multiplier. IEEE Trans. Circuits Syst. I Regul. Pap. 56-I(6): 1202-1213 (2009) - [j9]Harris E. Michail, Athanasios Kakarountas, Athanasios Milidonis, Costas E. Goutis:
A Top-Down Design Methodology for Ultrahigh-Performance Hashing Cores. IEEE Trans. Dependable Secur. Comput. 6(4): 255-268 (2009) - [c19]Dimitrios Schinianakis, Athanasios Kakarountas, Thanos Stouraitis, Alexander Skavantzos:
Elliptic Curve Point Multiplication in GF(2n) using Polynomial Residue Arithmetic. ICECS 2009: 980-983 - 2008
- [j8]Markos E. Papadonikolakis, Athanasios P. Kakarountas, Costas E. Goutis:
Efficient high-performance implementation of JPEG-LS encoder. J. Real Time Image Process. 3(4): 303-310 (2008) - 2007
- [j7]Harris E. Michail, George A. Panagiotakopoulos, Vasilis N. Thanasoulis, Athanasios Kakarountas, Costas E. Goutis:
Server side hashing core exceeding 3 Gbps of throughput. Int. J. Secur. Networks 2(3/4): 228-238 (2007) - [j6]George N. Selimis, Athanasios P. Kakarountas, Apostolos P. Fournaris, Athanasios Milidonis, Odysseas G. Koufopavlou:
A Low Power Design for Sbox Cryptographic Primitive of Advanced Encryption Standard for Mobile End-Users. J. Low Power Electron. 3(3): 327-336 (2007) - [c18]Markos E. Papadonikolakis, Vasilleios Pantazis, Athanasios Kakarountas:
Efficient high-performance ASIC implementation of JPEG-LS encoder. DATE 2007: 159-164 - [c17]Athanasios Milidonis, Nikolaos Alachiotis, Vasileios Porpodas, Haralambos Michail, Athanasios Kakarountas, Constantinos E. Goutis:
Interactive presentation: A decoupled architecture of processors with scratch-pad memory hierarchy. DATE 2007: 612-617 - [c16]Athanasios P. Kakarountas, Haralambos Michail, Costas E. Goutis, Costas Efstathiou:
Implementation of HSSec: a high-speed cryptographic co-processor. ETFA 2007: 625-631 - [c15]Harris E. Michail, Athanasios P. Kakarountas, Georgios N. Selimis, Constantinos E. Goutis:
Throughput Optimization of the Cipher Message Authentication Code. DSP 2007: 495-498 - 2006
- [j5]Athanasios Kakarountas, Nikolaos D. Zervas, George Theodoridis, Haralambos Michail, Dimitrios Soudris:
Power Management Through Dynamic Frequency Scaling for Low and Medium Bit-Rate Digital Receivers. J. Low Power Electron. 2(3): 356-364 (2006) - [j4]Michalis D. Galanis, Athanasios Milidonis, Athanasios Kakarountas, Costas E. Goutis:
A design flow for speeding-up dsp applications in heterogeneous reconfigurable systems. Microelectron. J. 37(6): 554-564 (2006) - [j3]Athanasios Kakarountas, Haralambos Michail, Athanasios Milidonis, Costas E. Goutis, George Theodoridis:
High-Speed FPGA Implementation of Secure Hash Algorithm for IPSec and VPN Applications. J. Supercomput. 37(2): 179-195 (2006) - [c14]Harris E. Michail, Athanasios P. Kakarountas, Athanasios Milidonis, George A. Panagiotakopoulos, Vasilis N. Thanasoulis, Costas E. Goutis:
Temporal and System Level Modifications for High Speed VLSI Implementations of Cryptographic Core. ICECS 2006: 1180-1183 - [c13]Dimitrios M. Schinianakis, Apostolos P. Fournaris, Athanasios Kakarountas, Thanos Stouraitis:
An RNS architecture of an Fp elliptic curve point multiplier. ISCAS 2006 - 2005
- [c12]Harris E. Michail, Athanasios Milidonis, Athanasios Kakarountas, Constantinos E. Goutis:
Novel high throughput implementation of SHA-256 hash function through pre-computation technique. ICECS 2005: 1-4 - [c11]Haralambos Michail, Athanasios P. Kakarountas, Odysseas G. Koufopavlou, Constantinos E. Goutis:
A low-power and high-throughput implementation of the SHA-1 hash function. ISCAS (4) 2005: 4086-4089 - [c10]Haralambos Michail, Athanasios Kakarountas, George N. Selimis, Costas E. Goutis:
Optimizing SHA-1 Hash Function for High Throughput with a Partial Unrolling Study. PATMOS 2005: 591-600 - 2004
- [j2]Athanasios Milidonis, Gregory Dimitroulakos, Michalis D. Galanis, Athanasios P. Kakarountas, George Theodoridis, Constantinos E. Goutis, Francky Catthoor:
A Framework for Data Partitioning for C++ Data-Intensive Applications. Des. Autom. Embed. Syst. 9(2): 101-121 (2004) - [c9]Harris E. Michail, Athanasios P. Kakarountas, Athanasios Milidonis, Costas E. Goutis:
Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function. ICECS 2004: 567-570 - [c8]Athanasios Kakarountas, Vassilis Spiliotopoulos, Spiridon Nikolaidis, Constantinos E. Goutis:
The Impact of Low-Power Techniques on the Design of Portable Safety-Critical Systems. PATMOS 2004: 501-509 - [c7]Dimitris Karatasos, Athanasios Kakarountas, George Theodoridis, Constantinos E. Goutis:
A Novel Constant-Time Fault-Secure Binary Counter. PATMOS 2004: 742-749 - 2003
- [j1]Spiridon Nikolaidis, E. Karaolis, Athanasios Kakarountas, Kyriakos Papadomanolakis, Constantinos E. Goutis:
A Methodology for Calculating the Undetectable Double-Faults in Self-Checking Circuits. J. Circuits Syst. Comput. 12(1): 75-92 (2003) - [c6]Athanasios P. Kakarountas, George Theodoridis, Kyriakos S. Papadomanolakis, Costas E. Goutis:
A novel high-speed counter with counting rate independent of the counter's length. ICECS 2003: 1164-1167 - 2002
- [c5]Kyriakos S. Papadomanolakis, Athanasios P. Kakarountas, Nicolas Sklavos, Costas E. Goutis:
A low power fault secure timer implementation based on the Gray encoding scheme. ICECS 2002: 537-540 - [c4]Athanasios Kakarountas, Kyriakos Papadomanolakis, Spiridon Nikolaidis, Dimitrios Soudris, Constantinos E. Goutis:
Confronting violations of the TSCG(T) in low-power design. ISCAS (4) 2002: 313-316 - 2001
- [c3]Athanasios P. Kakarountas, Vasileios Kokkinos, Costas E. Goutis:
Design of low-power on-line reconfigurable datapaths using self-checking circuits. ICECS 2001: 1565-1568 - 2000
- [c2]Nikolaos D. Zervas, S. Theoharis, Athanasios Kakarountas, George Theodoridis, Dimitrios Soudris, Constantinos E. Goutis:
Reducing Power Consumption through Dynamic Frequency Scaling for a Class of Digital Receivers. PATMOS 2000: 47-55 - [c1]Athanasios Kakarountas, Kyriakos Papadomanolakis, Vasileios Kokkinos, Constantinos E. Goutis:
Comparative Study on Self-Checking Carry-Propagate Adders in Terms of Area, Power and Performance. PATMOS 2000: 187-194
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint