default search action
Darko Kirovski
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j30]Ji-Yong Shin, Emin Gün Sirer, Hakim Weatherspoon, Darko Kirovski:
On the Feasibility of Completely Wirelesss Datacenters. IEEE/ACM Trans. Netw. 21(5): 1666-1679 (2013) - 2012
- [j29]Paruj Ratanaworabhan, Martin Burtscher, Darko Kirovski, Benjamin G. Zorn, Rahul Nagpal, Karthik Pattabiraman:
Efficient Runtime Detection and Toleration of Asymmetric Races. IEEE Trans. Computers 61(4): 548-562 (2012) - [j28]Renan G. Cattelan, Darko Kirovski:
Towards improving the online shopping experience: A client-based platform for post-processing Web search results. Web Intell. Agent Syst. 10(2): 209-231 (2012) - [c83]Ji-Yong Shin, Emin Gün Sirer, Hakim Weatherspoon, Darko Kirovski:
On the feasibility of completely wireless datacenters. ANCS 2012: 3-14 - [c82]Paruj Ratanaworabhan, Martin Burtscher, Darko Kirovski, Benjamin G. Zorn:
Hardware support for enforcing isolation in lock-based parallel programs. ICS 2012: 301-310 - [c81]Gerald DeJean, Jeff Herron, Jie Liu, Darko Kirovski:
Demo: Bluetooth TouchPoint. MobiSys 2012: 485-486 - 2011
- [c80]Darko Kirovski, Christopher Meek:
Tunneled TLS for multi-factor authentication. Digital Rights Management Workshop 2011: 31-40 - [c79]Michalis Raptis, Darko Kirovski, Hugues Hoppe:
Real-Time Classification of Dance Gesturesfrom Skeleton Animation. Symposium on Computer Animation 2011: 147-156 - 2010
- [j27]Milenko Drinic, Darko Kirovski, Lin Yuan, Gang Qu, Miodrag Potkonjak:
Field Division Routing. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j26]Ashwin Swaminathan, Renan G. Cattelan, Ydo Wexler, Cherian V. Mathew, Darko Kirovski:
Relating Reputation and Money in Online Markets. ACM Trans. Web 4(4): 17:1-17:31 (2010) - [c78]Vanessa Testoni, Max H. M. Costa, Darko Kirovski, Henrique S. Malvar:
On the Adaptive Coefficient Scanning of JPEG XR/HD Photo. DCC 2010: 69-78 - [c77]Vanessa Testoni, Darko Kirovski:
On the inversion of biometric templates by an example. ICASSP 2010: 1830-1833 - [p1]Darko Kirovski:
Anti-counterfeiting: Mixing the Physical and the Digital World. Towards Hardware-Intrinsic Security 2010: 223-233
2000 – 2009
- 2009
- [j25]Shan He, Darko Kirovski, Min Wu:
High-Fidelity Data Embedding for Image Annotation. IEEE Trans. Image Process. 18(2): 429-435 (2009) - [c76]Deepak Vijaywargi, Dave Lewis, Darko Kirovski:
Optical DNA. Financial Cryptography 2009: 222-229 - [c75]Paruj Ratanaworabhan, Martin Burtscher, Darko Kirovski, Benjamin G. Zorn, Rahul Nagpal, Karthik Pattabiraman:
Detecting and tolerating asymmetric races. PPoPP 2009: 173-184 - [c74]Ashwin Swaminathan, Cherian V. Mathew, Darko Kirovski:
Essential Pages. Web Intelligence 2009: 173-182 - [c73]Renan G. Cattelan, Darko Kirovski, Deepak Vijaywargi:
Serving Comparative Shopping Links Non-invasively. Web Intelligence 2009: 498-507 - [c72]Ashwin Swaminathan, Renan G. Cattelan, Cherian V. Mathew, Ydo Wexler, Darko Kirovski:
Relating Reputation and Money in On-line Markets. Web Intelligence 2009: 639-646 - [i1]Darko Kirovski:
Anti-Counterfeiting: Mixing the Physical and the Digital World. Foundations for Forgery-Resilient Cryptographic Hardware 2009 - 2008
- [j24]David C. Nickle, Nebojsa Jojic, David Heckerman, Vladimir Jojic, Darko Kirovski, Morgane Rolland, Sergei L. Kosakovsky Pond, James I. Mullins:
Comparison of Immunogen Designs That Optimize Peptide Coverage: Reply to Fischer et al. PLoS Comput. Biol. 4(1) (2008) - [c71]Shan He, Darko Kirovski:
Mixing bounded Laplace and Gaussian fingerprints. ACSCC 2008: 1378-1385 - [c70]Shan He, Renan G. Cattelan, Darko Kirovski:
Modeling viral economies for digital media. EuroSys 2008: 149-162 - 2007
- [j23]Darko Kirovski, Zeph Landau:
Generalized Lempel-Ziv Compression for Audio. IEEE Trans. Speech Audio Process. 15(2): 509-518 (2007) - [j22]Darko Kirovski, Fabien A. P. Petitcolas, Zeph Landau:
The Replacement Attack. IEEE Trans. Speech Audio Process. 15(6): 1922-1931 (2007) - [j21]Shan He, Darko Kirovski:
An Estimation Attack on Content-Based Video Fingerprinting. Trans. Data Hiding Multim. Secur. 2: 35-47 (2007) - [j20]Milenko Drinic, Darko Kirovski, Hoi Vo:
PPMexe: Program compression. ACM Trans. Program. Lang. Syst. 29(1): 3 (2007) - [c69]Gerald DeJean, Darko Kirovski:
RF-DNA: Radio-Frequency Certificates of Authenticity. CHES 2007: 346-363 - [c68]Darko Kirovski, Mike Sinclair, David Wilson:
The Martini Synch: Joint Fuzzy Hashing Via Error Correction. ESAS 2007: 16-30 - [c67]Shan He, Darko Kirovski, Min Wu:
Colluding Fingerprinted Video using the Gradient Attack. ICASSP (2) 2007: 161-164 - [c66]Darko Kirovski, Michael Sinclair, David Wilson:
The Martini Synch: Device Pairing via Joint Quantization. ISIT 2007: 466-470 - [c65]Darko Kirovski, Nuria Oliver, Mike Sinclair, Desney O. Tan:
Health-OS: : a position paper. HealthNet 2007: 76-78 - 2006
- [b1]Borko Furht, Darko Kirovski:
Multimedia encryption and authentication - techniques and applications. Auerbach Publ. 2006, ISBN 978-0-8493-7212-4, pp. 1-395 - [j19]Milenko Drinic, Darko Kirovski, Seapahn Megerian, Miodrag Potkonjak:
Latency-Guided On-Chip Bus-Network Design. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 25(12): 2663-2673 (2006) - [j18]Darko Kirovski, Yean-Yow Hwang, Miodrag Potkonjak, Jason Cong:
Protecting Combinational Logic Synthesis Solutions. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 25(12): 2687-2696 (2006) - [j17]Daniel Schonberg, Darko Kirovski:
EyeCerts. IEEE Trans. Inf. Forensics Secur. 1(2): 144-153 (2006) - [j16]Gwenaël J. Doërr, Jean-Luc Dugelay, Darko Kirovski:
On the Need for Signal-Coherent Watermarks. IEEE Trans. Multim. 8(5): 896-904 (2006) - [c64]Darko Kirovski:
The economics of multimedia. IHC 2006: 141 - [c63]Shan He, Darko Kirovski:
A Novel Visual Perceptual Model with An Application to Hi-Fidelity Image Annotation. MMSP 2006: 92-97 - [c62]Darko Kirovski, Kamal Jain:
Off-line economies for digital media. NOSSDAV 2006: 20 - [c61]Darko Kirovski, Nebojsa Jojic, Paul Roberts:
Click Passwords. SEC 2006: 351-363 - [c60]Renan G. Cattelan, Shan He, Darko Kirovski:
Prototyping a novel platform for free-trade of digital content. WebMedia 2006: 79-88 - 2005
- [j15]Yuqun Chen, Mehmet Kivanç Mihçak, Darko Kirovski:
Certifying authenticity via fiber-infused paper. SIGecom Exch. 5(3): 29-37 (2005) - [j14]Darko Kirovski, Milenko Drinic, Miodrag Potkonjak:
Engineering change protocols for behavioral and system synthesis. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 24(8): 1145-1155 (2005) - [c59]Darko Kirovski:
A Point-Set Compression Heuristic for Fiber-Based Certificates of Authenticity. DCC 2005: 103-112 - [c58]Darko Kirovski, Zeph Landau:
Parameter Analysis for the Generalized LZ Compression of Audio. DCC 2005: 465 - [c57]Zeph Landau, Darko Kirovski:
Parameter analysis for GLZ audio compression. ICASSP (3) 2005: 157-160 - [c56]Darko Kirovski, Mehmet Kivanç Mihçak:
Bounded Gaussian fingerprints and the gradient collusion attack [multimedia fingerprinting applications]. ICASSP (2) 2005: 1037-1040 - [c55]Darko Kirovski:
Collusion of fingerprints via the gradient attack. ISIT 2005: 2280-2284 - 2004
- [j13]Darko Kirovski, Henrique S. Malvar, Yacov Yacobi:
A Dual Watermark-Fingerprint System. IEEE Multim. 11(3): 59-73 (2004) - [j12]Jennifer L. Wong, Darko Kirovski, Miodrag Potkonjak:
Computational forensic techniques for intellectual property protection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 23(6): 987-994 (2004) - [c54]Daniel Schonberg, Darko Kirovski:
Iris Compression for Cryptographically Secure Person Identification. Data Compression Conference 2004: 459-468 - [c53]Darko Kirovski:
Point Compression for Certificates of Authenticity. Data Compression Conference 2004: 545 - [c52]Darko Kirovski, Zeph Landau:
Randomizing the replacement attack. ICASSP (5) 2004: 381-384 - [c51]Darko Kirovski, Nebojsa Jojic:
Cryptographically secure identity certificates. ICASSP (5) 2004: 413-416 - [c50]Darko Kirovski:
A point-subset compression algorithm for fiber-based certificates of authenticity. ISIT 2004: 173 - [c49]Darko Kirovski, Nebojsa Jojic, Gavin Jancke:
Tamper-Resistant Biometric IDs. ISSE 2004: 160-175 - [c48]Milenko Drinic, Darko Kirovski:
A Hardware-Software Platform for Intrusion Prevention. MICRO 2004: 233-242 - [c47]Daniel Schonberg, Darko Kirovski:
Fingerprinting and forensic analysis of multimedia. ACM Multimedia 2004: 788-795 - [c46]Darko Kirovski, Zeph Landau:
Generalized Lempel-Ziv compression for audio. MMSP 2004: 127-130 - [c45]Darko Kirovski:
Toward an automated verification of certificates of authenticity. EC 2004: 160-169 - 2003
- [j11]Marcus Peinado, Fabien A. P. Petitcolas, Darko Kirovski:
Digital rights management for digital cinema. Multim. Syst. 9(3): 228-238 (2003) - [j10]Darko Kirovski, Miodrag Potkonjak:
Local watermarks: methodology and application to behavioral synthesis. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 22(9): 1277-1283 (2003) - [j9]Darko Kirovski, Henrique S. Malvar:
Spread-spectrum watermarking of audio signals. IEEE Trans. Signal Process. 51(4): 1020-1033 (2003) - [j8]Darko Kirovski, Fabien A. P. Petitcolas:
Blind pattern matching attack on watermarking systems. IEEE Trans. Signal Process. 51(4): 1045-1053 (2003) - [c44]Milenko Drinic, Darko Kirovski, Hoi Vo:
Code Optimization for Code Compression. CGO 2003: 315-324 - [c43]Milenko Drinic, Darko Kirovski, Miodrag Potkonjak:
PPM Model Cleaning. DCC 2003: 163-172 - [c42]Darko Kirovski, Nebojsa Jojic:
FaceCerts. DCC 2003: 435 - [c41]Milenko Drinic, Darko Kirovski, Miodrag Potkonjak:
Model-based compression in wireless ad hoc networks. SenSys 2003: 231-242 - 2002
- [c40]Darko Kirovski, Hagai Attias:
Beat-ID: identifying music via beat analysis. IEEE Workshop on Multimedia Signal Processing 2002: 190-193 - [c39]Darko Kirovski, Milenko Drinic, Miodrag Potkonjak:
Enabling trusted software integrity. ASPLOS 2002: 108-120 - [c38]Darko Kirovski, Fabien A. P. Petitcolas:
Replacement Attack on Arbitrary Watermarking Systems. Digital Rights Management Workshop 2002: 177-189 - [c37]Milenko Drinic, Darko Kirovski:
Behavioral synthesis via engineering change. DAC 2002: 18-21 - [c36]Milenko Drinic, Darko Kirovski:
PPMexe: PPM for Compressing Software. DCC 2002: 192-201 - [c35]Darko Kirovski, Henrique S. Malvar:
Embedding and detecting spread-spectrum watermarks under estimation attacks. ICASSP 2002: 1293-1296 - [c34]Fabien A. P. Petitcolas, Darko Kirovski:
The blind pattern matching attack on watermark systems. ICASSP 2002: 3740-3743 - [c33]Darko Kirovski, Hagai Attias:
Audio Watermark Robustness to Desynchronization via Beat Detection. Information Hiding 2002: 160-176 - [c32]Darko Kirovski, Henrique S. Malvar, Yacov Yacobi:
Multimedia content screening using a dual watermarking and fingerprinting system. ACM Multimedia 2002: 372-381 - 2001
- [j7]Farinaz Koushanfar, Darko Kirovski, Inki Hong, Miodrag Potkonjak, Marios C. Papaefthymiou:
Symbolic debugging of embedded hardware and software. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 20(3): 392-401 (2001) - [c31]Seapahn Meguerdichian, Milenko Drinic, Darko Kirovski:
Latency-Driven Design of Multi-Purpose Systems-On-Chip. DAC 2001: 27-30 - [c30]Darko Kirovski, Milenko Drinic, Miodrag Potkonjak:
Hypermedia-Aided Design. DAC 2001: 407-412 - [c29]Darko Kirovski, Henrique S. Malvar:
Robust spread-spectrum audio watermarking. ICASSP 2001: 1345-1348 - [c28]Jennifer L. Wong, Darko Kirovski, Miodrag Potkonjak:
Computational Forensic Techniques for Intellectual Property Protection. Information Hiding 2001: 66-80 - [c27]Darko Kirovski, Henrique S. Malvar:
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum. Information Hiding 2001: 354-368 - [c26]Darko Kirovski, Henrique S. Malvar:
Spread-spectrum audio watermarking: requirements, applications, and limitations. MMSP 2001: 219-224 - 2000
- [j6]Darko Kirovski, Miodrag Potkonjak, Lisa M. Guerra:
Cut-based functional debugging for programmable systems-on-chip. IEEE Trans. Very Large Scale Integr. Syst. 8(1): 40-51 (2000) - [c25]Inki Hong, Darko Kirovski, Miodrag Potkonjak, Marios C. Papaefthymiou:
Symbolic debugging of globally optimized behavioral specifications. ASP-DAC 2000: 397-400 - [c24]Darko Kirovski, David T. Liu, Jennifer L. Wong, Miodrag Potkonjak:
Forensic engineering techniques for VLSI CAD tools. DAC 2000: 581-586 - [c23]Darko Kirovski, Miodrag Potkonjak:
Localized watermarking: methodology and application to template mapping. ICASSP 2000: 3235-3238 - [c22]Farinaz Koushanfar, Darko Kirovski, Miodrag Potkonjak:
Symbolic Debugging Scheme for Optimized Hardware and Software. ICCAD 2000: 40-43 - [c21]Milenko Drinic, Darko Kirovski, Seapahn Meguerdichian, Miodrag Potkonjak:
Latency-Guided On-Chip Bus Network Design. ICCAD 2000: 420-423 - [c20]James M. Burger, Christopher J. Cookson, Darko Kirovski, David Paul Maher, Miodrag Potkonjak, Jeremy Welt:
Multimedia copyright enforcement on the Internet (panel session). ACM Multimedia 2000: 347-349
1990 – 1999
- 1999
- [j5]Darko Kirovski, Johnson Kin, William H. Mangione-Smith:
Procedure Based Program Compression. Int. J. Parallel Program. 27(6): 457-475 (1999) - [j4]Darko Kirovski, Chunho Lee, Miodrag Potkonjak, William H. Mangione-Smith:
Application-driven synthesis of memory-intensive systems-on-chip. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 18(9): 1316-1326 (1999) - [j3]Darko Kirovski, Miodrag Potkonjak, Lisa M. Guerra:
Improving the observability and controllability of datapaths foremulation-based debugging. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 18(11): 1529-1541 (1999) - [j2]Inki Hong, Darko Kirovski, Gang Qu, Miodrag Potkonjak, Mani B. Srivastava:
Power optimization of variable-voltage core-based systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 18(12): 1702-1714 (1999) - [c19]Milos D. Ercegovac, Darko Kirovski, Miodrag Potkonjak:
Low-Power Behavioral Synthesis Optimization Using Multiple Precision Arithmetic. DAC 1999: 568-573 - [c18]Darko Kirovski, Miodrag Potkonjak:
Engineering Change: Methodology and Applications to Behavioral and System Synthesis. DAC 1999: 604-609 - [c17]Darko Kirovski, Miodrag Potkonjak:
Synthesis of DSP soft real-time multiprocessor systems-on-silicon. ICASSP 1999: 1901-1904 - [c16]Darko Kirovski, Miodrag Potkonjak:
Engineering change protocols for behavioral synthesis. ICASSP 1999: 1993-1996 - [c15]Darko Kirovski, Miodrag Potkonjak:
Localized watermarking: methodology and application to operation scheduling. ICCAD 1999: 596-599 - [c14]Andrew B. Kahng, Darko Kirovski, Stefanus Mantik, Miodrag Potkonjak, Jennifer L. Wong:
Copy detection for intellectual property protection of VLSI designs. ICCAD 1999: 600-605 - [c13]Gang Qu, Darko Kirovski, Miodrag Potkonjak, Mani B. Srivastava:
Energy minimization of system pipelines using multiple voltages. ISCAS (1) 1999: 362-365 - 1998
- [j1]Inki Hong, Darko Kirovski, Kevin T. Kornegay, Miodrag Potkonjak:
High-level synthesis techniques for functional test pattern execution1. Integr. 25(2): 161-180 (1998) - [c12]Darko Kirovski, Chunho Lee, Miodrag Potkonjak, William H. Mangione-Smith:
Synthesis of Power Efficient Systems-on-Silicon. ASP-DAC 1998: 557-562 - [c11]Inki Hong, Darko Kirovski, Gang Qu, Miodrag Potkonjak, Mani B. Srivastava:
Power Optimization of Variable Voltage Core-Based Systems. DAC 1998: 176-181 - [c10]Darko Kirovski, Miodrag Potkonjak:
Efficient Coloring of a Large Spectrum of Graphs. DAC 1998: 427-432 - [c9]Milos D. Ercegovac, Darko Kirovski, George Mustafa, Miodrag Potkonjak:
Behavioral synthesis optimization using multiple precision arithmetic. ICASSP 1998: 3113-3116 - [c8]Darko Kirovski, Yean-Yow Hwang, Miodrag Potkonjak, Jason Cong:
Intellectual property protection by watermarking combinational logic synthesis solutions. ICCAD 1998: 194-198 - [c7]Darko Kirovski, Miodrag Potkonjak, Lisa M. Guerra:
Functional debugging of systems-on-chip. ICCAD 1998: 525-528 - 1997
- [c6]Inki Hong, Darko Kirovski, Miodrag Potkonjak:
Potential-Driven Statistical Ordering of Transformations. DAC 1997: 347-352 - [c5]Darko Kirovski, Miodrag Potkonjak:
System-Level Synthesis of Low-Power Hard Real-Time Systems. DAC 1997: 697-702 - [c4]Chunho Lee, Darko Kirovski, Inki Hong, Miodrag Potkonjak:
DSP Quant: design, validation, and applications of DSP hard real-time benchmark. ICASSP 1997: 679-682 - [c3]Darko Kirovski, Chunho Lee, Miodrag Potkonjak, William H. Mangione-Smith:
Application-driven synthesis of core-based systems. ICCAD 1997: 104-107 - [c2]Darko Kirovski, Miodrag Potkonjak:
A quantitative approach to functional debugging. ICCAD 1997: 170-173 - [c1]Darko Kirovski, Johnson Kin, William H. Mangione-Smith:
Procedure Based Program Compression. MICRO 1997: 204-213
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint