Russell Tessier
Affiliations: | Electrical & Computer Engineering | University of Massachusetts, Amherst, Amherst, MA |
Area:
Electronics and Electrical Engineering, Computer ScienceGoogle:
"Russell Tessier"Children
Sign in to add traineeSrinivasaraghavan Krishnamoorthy | grad student | 2004 | U Mass Amherst |
Muralidhar R. Kudlugi | grad student | 2005 | U Mass Amherst |
Deepak Unnikrishnan | grad student | 2013 | U Mass Amherst |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Zhang X, Shao X, Provelengios G, et al. (2020) CoNFV: A Heterogeneous Platform for Scalable Network Function Virtualization Acm Transactions On Reconfigurable Technology and Systems. 14: 1-29 |
Dumpala NK, Patil SB, Holcomb D, et al. (2019) Loop Unrolling for Energy Efficiency in Low-Cost Field-Programmable Gate Arrays Acm Transactions On Reconfigurable Technology and Systems. 11: 1-23 |
Fyrbiak M, Wallat S, Swierczynski P, et al. (2019) HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion Ieee Transactions On Dependable and Secure Computing. 16: 498-510 |
Fyrbiak M, Rokicki S, Bissantz N, et al. (2018) Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors Ieee Transactions On Computers. 67: 307-321 |
Migliore V, Seguin C, Real MM, et al. (2017) A High-Speed Accelerator for Homomorphic Encryption using the Karatsuba Algorithm Acm Transactions in Embedded Computing Systems. 16: 138 |
Hu K, Chandrikakutty HK, Goodman Z, et al. (2016) Dynamic Hardware Monitors for Network Processor Protection Ieee Transactions On Computers. 65: 860-872 |
Wolf T, Chandrikakutty HK, Hu K, et al. (2015) Securing Network Processors with High-Performance Hardware Monitors Ieee Transactions On Dependable and Secure Computing. 12: 652-664 |
Tessier R, Pocek K, DeHon A. (2015) Reconfigurable computing architectures Proceedings of the Ieee. 103: 332-354 |
Swierczynski P, Fyrbiak M, Paar C, et al. (2015) Protecting against cryptographic Trojans in FPGAS Proceedings - 2015 Ieee 23rd Annual International Symposium On Field-Programmable Custom Computing Machines, Fccm 2015. 151-154 |
Thomas T, Pouraghily A, Hu K, et al. (2015) Multi-task support for security-enabled embedded processors Proceedings of the International Conference On Application-Specific Systems, Architectures and Processors. 2015: 136-143 |