Cited By
View all- Fournaris AKeramidas GIspoglou KVoros N(2016)VirISA: Recruiting Virtualization and Reconfigurable Processor ISA for Malicious Code Injection ProtectionComponents and Services for IoT Platforms10.1007/978-3-319-42304-3_7(117-130)Online publication date: 24-Sep-2016
- Patil SMuthukumar V(2008)Maximizing Resource Utilization by Slicing of Superscalar ArchitectureProceedings of the 2008 11th EUROMICRO Conference on Digital System Design Architectures, Methods and Tools10.1109/DSD.2008.125(923-930)Online publication date: 3-Sep-2008