![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Sorin A. Huss
Person information
- affiliation: Darmstadt University of Technology, Germany
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j15]Adeel Israr, Mohammad Kaleem, Sajid Nazir, Hamid Turab Mirza
, Sorin Alexander Huss:
Nested genetic algorithm for highly reliable and efficient embedded system design. Des. Autom. Embed. Syst. 24(4): 185-221 (2020)
2010 – 2019
- 2016
- [c96]Carsten Büttner, Sorin A. Huss:
Attribute-based authorization tickets for Car-to-X communication. CNS 2016: 234-242 - [c95]Carsten Büttner, Sorin A. Huss:
An Anonymous Geocast Scheme for ITS Applications. ICISSP 2016: 179-189 - [c94]Carsten Büttner, Sorin A. Huss:
An Efficient Approach to Anonymous Distribution of ITS Messages in Geographic Areas via LTE and IRS Networks. ICISSP (Revised Selected Papers) 2016: 192-214 - 2015
- [j14]Abdulhadi Shoufan
, Zheng Lu, Sorin A. Huss:
A Web-Based Visualization and Animation Platform for Digital Logic Design. IEEE Trans. Learn. Technol. 8(2): 225-239 (2015) - [j13]Alexander Biedermann, Sorin A. Huss, Adeel Israr:
Safe Dynamic Reshaping of Reconfigurable MPSoC Embedded Systems for Self-Healing and Self-Adaption Purposes. ACM Trans. Reconfigurable Technol. Syst. 8(4): 26:1-26:22 (2015) - [c93]Carsten Büttner, Sorin A. Huss:
An Efficient Anonymous Authenticated Key Agreement Protocol for Vehicular Ad-Hoc Networks Based on Ring Signatures and the Elliptic Curve Integrated Encryption Scheme. ICISSP (Revised Selected Papers) 2015: 139-159 - [c92]Carsten Büttner, Sorin A. Huss:
A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks. ICISSP 2015: 259-269 - [c91]Carsten Büttner, Sorin A. Huss:
Path Hiding for Privacy Enhancement in Vehicular Ad-Hoc Networks. VTC Fall 2015: 1-5 - [c90]Carsten Büttner, Friederike Bartels, Sorin A. Huss:
Real-world evaluation of an anonymous authenticated key agreement protocol for vehicular ad-hoc networks. WiMob 2015: 651-658 - 2013
- [j12]Jonas Firl, Hagen Stübing, Sorin A. Huss, Christoph Stiller
:
MARV-X: Applying Maneuver Assessment for Reliable Verification of Car-to-X Mobility Data. IEEE Trans. Intell. Transp. Syst. 14(3): 1301-1312 (2013) - [c89]Sorin A. Huss, Marc Stöttinger
, Michael Zohner:
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework. Number Theory and Cryptography 2013: 151-165 - [c88]Alexander Biedermann, Sorin A. Huss:
A Methodology for Invasive Programming on Virtualizable Embedded MPSoC Architectures. ICCS 2013: 359-368 - [c87]Attila Jaeger, Sorin A. Huss:
Novel Techniques to Handle Rectangular Areas in Car-to-X Communication Applications. ICINCO (1) 2013: 575-582 - [c86]Alexander Biedermann, Boris Dreyer
, Sorin A. Huss:
A generic, scalable reconfiguration infrastructure for sensor networks functionality adaption. SoCC 2013: 301-306 - 2012
- [j11]Attila Jaeger, Norbert Bißmeyer, Hagen Stübing, Sorin A. Huss:
A Novel Framework for Efficient Mobility Data Verification in Vehicular Ad-hoc Networks. Int. J. Intell. Transp. Syst. Res. 10(1): 11-21 (2012) - [c85]Sunil Malipatlolla, Thomas Feller, Sorin A. Huss:
An adaptive system architecture for mitigating asymmetric cryptography weaknesses on TPMs. AHS 2012: 221-226 - [c84]Norman Göttert
, Thomas Feller, Michael Schneider, Johannes Buchmann, Sorin A. Huss:
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes. CHES 2012: 512-529 - [c83]Michael Zohner, Michael Kasper, Marc Stöttinger
, Sorin A. Huss:
Side channel analysis of the SHA-3 finalists. DATE 2012: 1012-1017 - [c82]H. Gregor Molter
, Johannes Kohlmann, Sorin A. Huss:
Automated Generation of Embedded Systems Software from Timed DEVS Model of Computation Specifications. DSD 2012: 700-707 - [c81]André Seffrin, Sorin A. Huss:
Constraint-driven automatic generation of interconnect for partially reconfigurable architectures (abstract only). FPGA 2012: 267 - [c80]Florian Benz, André Seffrin, Sorin A. Huss:
Bil: A tool-chain for bitstream reverse-engineering. FPL 2012: 735-738 - [c79]Bernhard Jungk, Marc Stöttinger
, Jan Gampe, Steffen Reith, Sorin A. Huss:
Side-channel resistant AES architecture utilizing randomized composite field representations. FPT 2012: 125-128 - [c78]Michael Zohner, Marc Stöttinger
, Sorin A. Huss, Oliver Stein:
An adaptable, modular, and autonomous side-channel vulnerability evaluator. HOST 2012: 43-48 - [c77]Qizhi Tian, Sorin A. Huss:
A General Approach to Power Trace Alignment for the Assessment of Side-Channel Resistance of Hardened Cryptosystems. IIH-MSP 2012: 465-470 - [c76]Qizhi Tian, Annelie Heuser, Sorin A. Huss:
A Novel Analysis Method for Assessing the Side-Channel Resistance of Cryptosystems. IIH-MSP 2012: 480-485 - [c75]Jonas Firl, Hagen Stübing, Sorin A. Huss, Christoph Stiller
:
Predictive maneuver evaluation for enhancement of Car-to-X mobility data. Intelligent Vehicles Symposium 2012: 558-564 - [c74]Qizhi Tian, Sorin A. Huss:
On Clock Frequency Effects in Side Channel Attacks of Symmetric Block Ciphers. NTMS 2012: 1-5 - [c73]Alexander Biedermann, Sorin A. Huss:
Hardware virtualization-driven software task switching in reconfigurable multi-processor system-on-chip architectures. Map2MPSoC/SCOPES 2012: 32-41 - [e3]Werner Schindler, Sorin A. Huss:
Constructive Side-Channel Analysis and Secure Design - Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings. Lecture Notes in Computer Science 7275, Springer 2012, ISBN 978-3-642-29911-7 [contents] - 2011
- [j10]Attila Jaeger, Hagen Stübing, Sorin A. Huss:
WiSec 2011 poster: a modular design for a hardware security module in car-to-x communication. ACM SIGMOBILE Mob. Comput. Commun. Rev. 15(3): 43-44 (2011) - [c72]Alexander Biedermann, Marc Stöttinger
, Lijing Chen, Sorin A. Huss:
Secure Virtualization within a Multi-processor Soft-Core System-on-Chip Architecture. ARC 2011: 385-396 - [c71]André Seffrin, Sorin A. Huss:
Minimal physical resource allocation of pi-calculus schedules to dynamically reconfigurable platforms. DDECS 2011: 457-462 - [c70]Sunil Malipatlolla, Thomas Feller, Abdulhadi Shoufan
, Tolga Arul
, Sorin A. Huss:
A novel architecture for a secure update of cryptographic engines on trusted platform module. FPT 2011: 1-6 - [c69]Sunil Malipatlolla, Thomas Feller, Abdulhadi Shoufan, Tolga Arul, Sorin A. Huss:
A novel architecture for a secure update of cryptographic engines on trusted platform module. FPT 2011: 1-6 - [c68]André Seffrin, Sorin A. Huss:
Hardware-accelerated execution of Pi-calculus reconfiguration schedules. FPT 2011: 1-8 - [c67]Thomas Feller, Sunil Malipatlolla, David Meister, Sorin A. Huss:
TinyTPM: A lightweight module aimed to IP protection and trusted embedded platforms. HOST 2011: 6-11 - [c66]André Seffrin, Sorin A. Huss:
Determining Minimum Interconnect for Reconfigurable Hardware by Analysis and Verification of Pi-Calculus Design Specifications. MBMV 2011: 193-202 - [c65]Alexander Biedermann, Thorsten Piper, Lars Patzina, Sven Patzina, Sorin A. Huss, Andy Schürr, Neeraj Suri:
Enhancing FPGA Robustness via Generic Monitoring IP Cores. PECCS 2011: 379-386 - [c64]Hagen Stübing, Murat Ceven, Sorin A. Huss:
A Diffie-Hellman based privacy protocol for Car-to-X communication. PST 2011: 201-204 - [c63]Thomas Feller, Sunil Malipatlolla, Michael Kasper, Sorin A. Huss:
dcTPM: A Generic Architecture for Dynamic Context Management. ReConFig 2011: 211-216 - [c62]Hagen Stübing, Marco Pfalzgraf, Sorin A. Huss:
A Decentralized Group Privacy Protocol for Vehicular Networks. SocialCom/PASSAT 2011: 1147-1154 - [c61]André Seffrin, Sorin A. Huss:
Ensuring Secure Information Flow in Partially Reconfigurable Architectures by Means of Process Algebra Analysis. TrustCom 2011: 443-450 - [c60]H. Gregor Molter
, André Seffrin, Sorin A. Huss:
State space optimization within the DEVS model of computation for timing efficiency. VLSI-SoC 2011: 422-427 - [c59]Hagen Stübing, Jonas Firl, Sorin A. Huss:
A two-stage verification process for Car-to-X mobility data based on path prediction and probabilistic maneuver recognition. VNC 2011: 17-24 - [e2]Mehmet A. Orgun, Atilla Elçi, Oleg B. Makarevich, Sorin A. Huss, Josef Pieprzyk, Lyudmila K. Babenko, Alexander G. Chefranov, Rajan Shankaran:
Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011. ACM 2011, ISBN 978-1-4503-1020-8 [contents] - 2010
- [j9]Abdulhadi Shoufan, Sorin A. Huss:
A Course on Reconfigurable Processors. ACM Trans. Comput. Educ. 10(2): 7:1-7:20 (2010) - [j8]Abdulhadi Shoufan
, Thorsten Wink, H. Gregor Molter
, Sorin A. Huss, Eike Kohnert:
A Novel Cryptoprocessor Architecture for the McEliece Public-Key Cryptosystem. IEEE Trans. Computers 59(11): 1533-1546 (2010) - [c58]Marc Stöttinger
, Alexander Biedermann, Sorin Alexander Huss:
Virtualization within a Parallel Array of Homogeneous Processing Units. ARC 2010: 17-28 - [c57]Abdulhadi Shoufan
, Sorin Alexander Huss:
Reconfigurable Computing Education in Computer Science. ARC 2010: 329-336 - [c56]Felix Madlener, Julia Weingart, Sorin A. Huss:
Verification of dynamically reconfigurable embedded systems by model transformation rules. CODES+ISSS 2010: 33-40 - [c55]Marc Stöttinger
, Sorin A. Huss, Sascha Mühlbach, Andreas Koch:
Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme. EUC 2010: 603-608 - [c54]André Seffrin, Alexander Biedermann, Sorin A. Huss:
Tiny-Pi: A Novel Formal Method for Specification, Analysis and Verification of Dynamic Partial Reconfiguration Processes. FDL 2010: 86-91 - [c53]André Seffrin, Sunil Malipatlolla, Sorin A. Huss:
A novel design flow for tamper-resistant self-healing properties of FPGA devices without configuration readback capability. FPT 2010: 291-294 - [c52]Abdulhadi Shoufan, Hagen Stübing, Sorin A. Huss:
Interactive Optimization of FPGA-based Systems-on-Chips. MBMV 2010: 217-226 - [c51]Stefan Nürnberger, Thomas Feller, Sorin A. Huss:
Ray - a secure micro kernel architecture. PST 2010: 3-6 - [c50]Hagen Stübing, Abdulhadi Shoufan
, Sorin Alexander Huss:
Enhancing Security and Privacy in C2X Communication by Radiation Pattern Control. VTC Spring 2010: 1-5 - [c49]Hagen Stübing, Abdulhadi Shoufan
, Sorin Alexander Huss:
A Demonstrator for Beamforming in C2X Communication. VTC Spring 2010: 1-2 - [p1]Marc Stöttinger
, Felix Madlener, Sorin A. Huss:
Procedures for Securing ECC Implementations Against Differential Power Analysis Using Reconfigurable Architectures. Dynamically Reconfigurable Systems 2010: 395-415 - [e1]Oleg B. Makarevich, Atilla Elçi, Mehmet A. Orgun, Sorin A. Huss, Ludmila K. Babenko, Alexander G. Chefranov, Vijay Varadharajan:
Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010. ACM 2010, ISBN 978-1-4503-0234-0 [contents]
2000 – 2009
- 2009
- [j7]Abdulhadi Shoufan
, Sorin A. Huss:
High-Performance Rekeying Processor Architecture for Group Key Management. IEEE Trans. Computers 58(10): 1421-1434 (2009) - [c48]Abdulhadi Shoufan
, Thorsten Wink, H. Gregor Molter
, Sorin A. Huss, Falko Strenzke:
A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms. ASAP 2009: 98-105 - [c47]Felix Madlener, H. Gregor Molter, Sorin A. Huss:
SC-DEVS: An efficient SystemC extension for the DEVS model of computation. DATE 2009: 1518-1523 - [c46]H. Gregor Molter, André Seffrin, Sorin Alexander Huss:
DEVS2VHDL: Automatic transformation of XML-specified DEVS Model of Computation into synthesizable VHDL code. FDL 2009: 1-6 - [c45]Abdulhadi Shoufan, Sorin Alexander Huss:
Understanding physical models in VHDL-AMS. FDL 2009: 1-4 - [c44]Adeel Israr, Abdulhadi Shoufan
, Sorin A. Huss:
A compact error model for reliable system design. HPCS 2009: 60-66 - [c43]Adeel Israr, Abdulhadi Shoufan
, Sorin A. Huss:
An efficient reliability evaluation approach for system-level design of embedded systems. ISQED 2009: 339-344 - [c42]Sorin Alexander Huss:
Embedded systems for IT security applications: properties and design considerations. SIN 2009: 138-142 - [i1]Osman Ugus, Dirk Westhoff, Ralf Laue, Abdulhadi Shoufan, Sorin A. Huss:
Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks. CoRR abs/0903.3900 (2009) - 2008
- [j6]Ralf Laue, Sorin A. Huss:
Parallel Memory Architecture for Elliptic Curve Cryptography over GF(p) Aimed at Efficient FPGA Implementation. J. Signal Process. Syst. 51(1): 39-55 (2008) - [c41]Adeel Israr, Sorin A. Huss:
Specification and Design Considerations for Reliable Embedded Systems. DATE 2008: 1111-1116 - [c40]Ralf Laue, H. Gregor Molter
, Felix Rieder, Sorin A. Huss, Kartik Saxena:
A Novel Multiple Core Co-processor Architecture for Efficient Server-Based Public Key Cryptographic Applications. ISVLSI 2008: 87-92 - [c39]Abdulhadi Shoufan
, Sorin A. Huss, Oliver Kelm, Sebastian Schipp:
A Novel Rekeying Message Authentication Procedure Based on Winternitz OTS and Reconfigurable Hardware Architectures. ReConFig 2008: 301-306 - [c38]Abdulhadi Shoufan, Sorin A. Huss:
Schlüsselverwaltung im Sicheren Multicast. Sicherheit 2008: 179-191 - 2007
- [c37]Abdulhadi Shoufan
, Ralf Laue, Sorin A. Huss:
High-Flexibility Rekeying Processor for Key Management in Secure Multicast. AINA Workshops (1) 2007: 822-829 - [c36]Juergen Weber, Andreas C. Lemke, Andreas Lehmler, Mario Anton, Sorin A. Huss:
Mixed-Level Modeling Using Configurable MOS Transistor Models. FDL 2007: 6-11 - [c35]Ralf Laue, Oliver Kelm, Sebastian Schipp, Abdulhadi Shoufan
, Sorin A. Huss:
Compact AES-based Architecture for Symmetric Encryption, Hash Function, and Random Number Generation. FPL 2007: 480-484 - [c34]Abdulhadi Shoufan, Ralf Laue, Sorin A. Huss:
Secure Multicast Rekeying: A Case Study for HW/SW-Codesign. MBMV 2007: 171-180 - [c33]Abdulhadi Shoufan
, Ralf Laue, Sorin A. Huss:
Reliable Performance Evaluation of Rekeying Algorithms in Secure Multicast. WOWMOM 2007: 1-8 - 2006
- [c32]Thilo Brause, Kaiping Zeng, Sorin A. Huss:
Supporting AMS-System Design. FDL 2006: 99-104 - [c31]Ralf Laue, Sorin A. Huss:
A novel memory architecture for elliptic curve cryptography with parallel modular multipliers. FPT 2006: 149-156 - [c30]Sorin A. Huss:
Analog circuit synthesis: a search for the Holy Grail? ISCAS 2006 - [c29]Kaiping Zeng, Sorin A. Huss:
Architecture refinements by code refactoring of behavioral VHDL-AMS models. ISCAS 2006 - [c28]Kaiping Zeng, Sorin A. Huss:
Structure Synthesis of Analog and Mixed-Signal Circuits using Partition Techniques. ISQED 2006: 225-230 - [c27]Tim Sander, Wolfgang Hess, Sorin A. Huss:
Konzept zur Taskmigration auf heterogenen rekonfigurierbaren Rechenplattformen. MBMV 2006: 237-241 - [c26]Andreas Kühn, Felix Madlener, Sorin A. Huss:
Resource Management for Dynamic Reconfigurable Hardware Structures. ReCoSoC 2006: 111-116 - 2005
- [j5]Michael Jung, Sorin Alexander Huss, Matthias Deegener:
PEAC: Ein partieller Evaluator für eingebettete Software. Softwaretechnik-Trends 25(4) (2005) - [j4]W. W. Bachmann, Sorin A. Huss:
Efficient algorithms for multilevel power estimation of VLSI circuits. IEEE Trans. Very Large Scale Integr. Syst. 13(2): 238-254 (2005) - [c25]Arshad Jhumka, Stephan Klaus, Sorin A. Huss:
A Dependability-Driven System-Level Design Approach for Embedded Systems. DATE 2005: 372-377 - [c24]Stephan Hermanns, Sorin A. Huss:
Synchronisierungsprobleme von Schaltwerken in Wave Pipelining Architektur und ihre Auswirkungen auf die Wahl der Schaltungstechnik. GI Jahrestagung (1) 2005: 449 - [c23]Abdulhadi Shoufan
, Sorin A. Huss, Murtuza Cutleriwala:
A Novel Batch Rekeying Processor Architecture for Secure Multicast Key Management. HiPEAC 2005: 169-183 - [c22]Kaiping Zeng, Sorin A. Huss:
RAMS: A VHDL-AMS Code Refactoring Tool Supporting High Level Analog Synthesis. ISVLSI 2005: 266-267 - [c21]Michael Jung, Ralf Laue, Sorin A. Huss:
A Case Study on Partial Evaluation in Embedded Software Design. SEUS 2005: 16-21 - 2004
- [j3]Jens Bieger, Sorin A. Huss:
Konzepte zur Beherrschung der Entwurfskomplexität eingebetteter Systeme. it Inf. Technol. 46(2): 59-66 (2004) - [j2]Markus Ernst, Birgit Henhapl, Steffen Klupsch, Sorin A. Huss:
FPGA based hardware acceleration for elliptic curve public key cryptosystems. J. Syst. Softw. 70(3): 299-313 (2004) - [c20]P. Hastono, Stephan Klaus, Sorin A. Huss:
Real-Time Operating System Services for Realistic SystemC Simulation Models of Embedded Systems. FDL 2004: 380-392 - [c19]Song Yuan, Sorin A. Huss:
Audio watermarking algorithm for real-time speech integrity and authentication. MM&Sec 2004: 220-226 - [c18]Andreas Kühn, Sorin A. Huss:
Dynamically Reconfigurable Hardware for Object-Oriented Processing. PARELEC 2004: 181-186 - [c17]Michael Jung, Sorin A. Huss:
Fast Points-to Analysis for Languages with Structured Types. SCOPES 2004: 107-121 - [c16]Jens Bieger, Sorin A. Huss, Michael Jung, Stephan Klaus, Thomas Steininger:
Rapid Prototyping for Configurable System-on-a-Chip Platforms: A Simulation Based Approach. VLSI Design 2004: 577- - 2003
- [c15]Stephan Klaus, Sorin A. Huss:
A Novel Specification Model for IP-based Design. DSD 2003: 190-196 - 2002
- [c14]M. Ernst, Michael Jung, Felix Madlener, Sorin A. Huss, Rainer Blümel:
A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2n). CHES 2002: 381-399 - 2001
- [c13]M. Ernst, Steffen Klupsch, Oliver Hauck, Sorin A. Huss:
Rapid Prototyping for Hardware Accelerated Elliptic Curve Public-Key Cryptosystems. IEEE International Workshop on Rapid System Prototyping 2001: 24-31 - 2000
- [c12]Oliver Hauck, A. Katoch, Sorin A. Huss:
VLSI System Design Using Asynchronous Wave Pipelines: A 0.35?m CMOS 1.5 GHz Elliptic Curve Public Key Cryptosystem Chip. ASYNC 2000: 188- - [c11]Wolfgang Boßung, Sorin A. Huss, Michael Stini:
xCDM -- Ein interaktives Werkzeug zur graphenbasierten Systemmodellierung. MBMV 2000: 153-161
1990 – 1999
- 1999
- [j1]Wolfgang Boßung, Sorin Alexander Huss, Stephan Klaus:
High-Level Embedded System Specifications Based on Process Activation Conditions. J. VLSI Signal Process. 21(3): 277-291 (1999) - [c10]Oliver Hauck, M. Garg, Sorin A. Huss:
Two-Phase Asynchronous Wave-Pipelines and Their Application to a 2D-DCT. ASYNC 1999: 219- - [c9]Oliver Hauck, M. Garg, Sorin A. Huss:
Efficient and Safe Asynchronous Wave-Pipeline Architectures for Datapath and Control Unit Applications. Great Lakes Symposium on VLSI 1999: 38-41 - [c8]Wolfgang Boßung, Sorin A. Huss, Stephan Klaus, Lars Wehmeyer:
Functional Specification of Distributed Digital Image Processing Systems by Process Interface Descriptions. PDPTA 1999: 2975-2981 - 1998
- [c7]Ralf Rosenberger, Sorin A. Huss:
A Systems Theoretic Approach to Behavioural Modeling and Simulation of Analog Functional Blocks. DATE 1998: 721-728 - [c6]Oliver Hauck, Sorin A. Huss:
Asynchronous wave pipelines for high throughput datapaths. ICECS 1998: 283-286 - 1996
- [b2]Andreas Bleck, Michael Goedecke, Sorin A. Huss, Klaus Waldschmidt:
Praktikum des modernen VLSI-Entwurfs. Vieweg+Teubner Verlag 1996, ISBN 978-3-519-02296-1 - 1995
- [c5]Uwe F. Baake, Sorin A. Huss:
Logic Reduction in Timed Asynchronous Circuits. ISCAS 1995: 1223-1226 - [c4]Michael Goedecke, Sorin A. Huss, Kai Morich:
Automatic Parallelization of the Visual Data-Flow Language Cantata for Efficient Characterization of Analog Circuit Behavior. VL 1995: 69-76 - 1994
- [c3]Matthias Deegener, Sorin A. Huss:
Software/hardware Co-Design in the MuSE environment. CODES 1994: 195-202 - [c2]Uwe F. Baake, Sorin A. Huss:
Scheduling of Signal Transition Graphs under Timing Constraints. ISCAS 1994: 205-208 - 1993
- [c1]Uwe F. Baake, Sorin A. Huss:
Object-oriented representation, analysis, and scheduling of signal transition graphs. ISCAS 1993: 2737-2740
1980 – 1989
- 1982
- [b1]Sorin Alexander Huss:
Zur interaktiven Optimierung integrierter Schaltungen. Technical University Munich, Germany, 1982, pp. 1-115
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint