Cited By
View all- King STucek JCozzie AGrier CJiang WZhou Y(2008)Designing and implementing malicious hardwareProceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats10.5555/1387709.1387714(1-8)Online publication date: 15-Apr-2008
- Rudd KFlynn M(1997)Instruction-level parallel processors-dynamic and static scheduling tradeoffsProceedings of the 2nd AIZU International Symposium on Parallel Algorithms / Architecture Synthesis10.5555/523978.826105Online publication date: 17-Mar-1997
- Oberman SFlynn M(1997)Division Algorithms and ImplementationsIEEE Transactions on Computers10.1109/12.60927446:8(833-854)Online publication date: 1-Aug-1997
- Show More Cited By