default search action
Sorin A. Huss
Sorin Alexander Huss
Person information
- affiliation: Darmstadt University of Technology, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j15]Adeel Israr, Mohammad Kaleem, Sajid Nazir, Hamid Turab Mirza, Sorin Alexander Huss:
Nested genetic algorithm for highly reliable and efficient embedded system design. Des. Autom. Embed. Syst. 24(4): 185-221 (2020)
2010 – 2019
- 2016
- [c96]Carsten Büttner, Sorin A. Huss:
Attribute-based authorization tickets for Car-to-X communication. CNS 2016: 234-242 - [c95]Carsten Büttner, Sorin A. Huss:
An Anonymous Geocast Scheme for ITS Applications. ICISSP 2016: 179-189 - [c94]Carsten Büttner, Sorin A. Huss:
An Efficient Approach to Anonymous Distribution of ITS Messages in Geographic Areas via LTE and IRS Networks. ICISSP (Revised Selected Papers) 2016: 192-214 - 2015
- [j14]Abdulhadi Shoufan, Zheng Lu, Sorin A. Huss:
A Web-Based Visualization and Animation Platform for Digital Logic Design. IEEE Trans. Learn. Technol. 8(2): 225-239 (2015) - [j13]Alexander Biedermann, Sorin A. Huss, Adeel Israr:
Safe Dynamic Reshaping of Reconfigurable MPSoC Embedded Systems for Self-Healing and Self-Adaption Purposes. ACM Trans. Reconfigurable Technol. Syst. 8(4): 26:1-26:22 (2015) - [c93]Carsten Büttner, Sorin A. Huss:
An Efficient Anonymous Authenticated Key Agreement Protocol for Vehicular Ad-Hoc Networks Based on Ring Signatures and the Elliptic Curve Integrated Encryption Scheme. ICISSP (Revised Selected Papers) 2015: 139-159 - [c92]Carsten Büttner, Sorin A. Huss:
A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks. ICISSP 2015: 259-269 - [c91]Carsten Büttner, Sorin A. Huss:
Path Hiding for Privacy Enhancement in Vehicular Ad-Hoc Networks. VTC Fall 2015: 1-5 - [c90]Carsten Büttner, Friederike Bartels, Sorin A. Huss:
Real-world evaluation of an anonymous authenticated key agreement protocol for vehicular ad-hoc networks. WiMob 2015: 651-658 - 2013
- [j12]Jonas Firl, Hagen Stübing, Sorin A. Huss, Christoph Stiller:
MARV-X: Applying Maneuver Assessment for Reliable Verification of Car-to-X Mobility Data. IEEE Trans. Intell. Transp. Syst. 14(3): 1301-1312 (2013) - [c89]Sorin A. Huss, Marc Stöttinger, Michael Zohner:
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework. Number Theory and Cryptography 2013: 151-165 - [c88]Alexander Biedermann, Sorin A. Huss:
A Methodology for Invasive Programming on Virtualizable Embedded MPSoC Architectures. ICCS 2013: 359-368 - [c87]Attila Jaeger, Sorin A. Huss:
Novel Techniques to Handle Rectangular Areas in Car-to-X Communication Applications. ICINCO (1) 2013: 575-582 - [c86]Alexander Biedermann, Boris Dreyer, Sorin A. Huss:
A generic, scalable reconfiguration infrastructure for sensor networks functionality adaption. SoCC 2013: 301-306 - 2012
- [j11]Attila Jaeger, Norbert Bißmeyer, Hagen Stübing, Sorin A. Huss:
A Novel Framework for Efficient Mobility Data Verification in Vehicular Ad-hoc Networks. Int. J. Intell. Transp. Syst. Res. 10(1): 11-21 (2012) - [c85]Sunil Malipatlolla, Thomas Feller, Sorin A. Huss:
An adaptive system architecture for mitigating asymmetric cryptography weaknesses on TPMs. AHS 2012: 221-226 - [c84]Norman Göttert, Thomas Feller, Michael Schneider, Johannes Buchmann, Sorin A. Huss:
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes. CHES 2012: 512-529 - [c83]Michael Zohner, Michael Kasper, Marc Stöttinger, Sorin A. Huss:
Side channel analysis of the SHA-3 finalists. DATE 2012: 1012-1017 - [c82]H. Gregor Molter, Johannes Kohlmann, Sorin A. Huss:
Automated Generation of Embedded Systems Software from Timed DEVS Model of Computation Specifications. DSD 2012: 700-707 - [c81]André Seffrin, Sorin A. Huss:
Constraint-driven automatic generation of interconnect for partially reconfigurable architectures (abstract only). FPGA 2012: 267 - [c80]Florian Benz, André Seffrin, Sorin A. Huss:
Bil: A tool-chain for bitstream reverse-engineering. FPL 2012: 735-738 - [c79]Bernhard Jungk, Marc Stöttinger, Jan Gampe, Steffen Reith, Sorin A. Huss:
Side-channel resistant AES architecture utilizing randomized composite field representations. FPT 2012: 125-128 - [c78]Michael Zohner, Marc Stöttinger, Sorin A. Huss, Oliver Stein:
An adaptable, modular, and autonomous side-channel vulnerability evaluator. HOST 2012: 43-48 - [c77]Qizhi Tian, Sorin A. Huss:
A General Approach to Power Trace Alignment for the Assessment of Side-Channel Resistance of Hardened Cryptosystems. IIH-MSP 2012: 465-470 - [c76]Qizhi Tian, Annelie Heuser, Sorin A. Huss:
A Novel Analysis Method for Assessing the Side-Channel Resistance of Cryptosystems. IIH-MSP 2012: 480-485 - [c75]Jonas Firl, Hagen Stübing, Sorin A. Huss, Christoph Stiller:
Predictive maneuver evaluation for enhancement of Car-to-X mobility data. Intelligent Vehicles Symposium 2012: 558-564 - [c74]Qizhi Tian, Sorin A. Huss:
On Clock Frequency Effects in Side Channel Attacks of Symmetric Block Ciphers. NTMS 2012: 1-5 - [c73]Alexander Biedermann, Sorin A. Huss:
Hardware virtualization-driven software task switching in reconfigurable multi-processor system-on-chip architectures. Map2MPSoC/SCOPES 2012: 32-41 - [e3]Werner Schindler, Sorin A. Huss:
Constructive Side-Channel Analysis and Secure Design - Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings. Lecture Notes in Computer Science 7275, Springer 2012, ISBN 978-3-642-29911-7 [contents] - 2011
- [j10]Attila Jaeger, Hagen Stübing, Sorin A. Huss:
WiSec 2011 poster: a modular design for a hardware security module in car-to-x communication. ACM SIGMOBILE Mob. Comput. Commun. Rev. 15(3): 43-44 (2011) - [c72]Alexander Biedermann, Marc Stöttinger, Lijing Chen, Sorin A. Huss:
Secure Virtualization within a Multi-processor Soft-Core System-on-Chip Architecture. ARC 2011: 385-396 - [c71]André Seffrin, Sorin A. Huss:
Minimal physical resource allocation of pi-calculus schedules to dynamically reconfigurable platforms. DDECS 2011: 457-462 - [c70]Sunil Malipatlolla, Thomas Feller, Abdulhadi Shoufan, Tolga Arul, Sorin A. Huss:
A novel architecture for a secure update of cryptographic engines on trusted platform module. FPT 2011: 1-6 - [c69]Sunil Malipatlolla, Thomas Feller, Abdulhadi Shoufan, Tolga Arul, Sorin A. Huss:
A novel architecture for a secure update of cryptographic engines on trusted platform module. FPT 2011: 1-6 - [c68]André Seffrin, Sorin A. Huss:
Hardware-accelerated execution of Pi-calculus reconfiguration schedules. FPT 2011: 1-8 - [c67]Thomas Feller, Sunil Malipatlolla, David Meister, Sorin A. Huss:
TinyTPM: A lightweight module aimed to IP protection and trusted embedded platforms. HOST 2011: 6-11 - [c66]André Seffrin, Sorin A. Huss:
Determining Minimum Interconnect for Reconfigurable Hardware by Analysis and Verification of Pi-Calculus Design Specifications. MBMV 2011: 193-202 - [c65]Alexander Biedermann, Thorsten Piper, Lars Patzina, Sven Patzina, Sorin A. Huss, Andy Schürr, Neeraj Suri:
Enhancing FPGA Robustness via Generic Monitoring IP Cores. PECCS 2011: 379-386 - [c64]Hagen Stübing, Murat Ceven, Sorin A. Huss:
A Diffie-Hellman based privacy protocol for Car-to-X communication. PST 2011: 201-204 - [c63]Thomas Feller, Sunil Malipatlolla, Michael Kasper, Sorin A. Huss:
dcTPM: A Generic Architecture for Dynamic Context Management. ReConFig 2011: 211-216 - [c62]Hagen Stübing, Marco Pfalzgraf, Sorin A. Huss:
A Decentralized Group Privacy Protocol for Vehicular Networks. SocialCom/PASSAT 2011: 1147-1154 - [c61]André Seffrin, Sorin A. Huss:
Ensuring Secure Information Flow in Partially Reconfigurable Architectures by Means of Process Algebra Analysis. TrustCom 2011: 443-450 - [c60]H. Gregor Molter, André Seffrin, Sorin A. Huss:
State space optimization within the DEVS model of computation for timing efficiency. VLSI-SoC 2011: 422-427 - [c59]Hagen Stübing, Jonas Firl, Sorin A. Huss:
A two-stage verification process for Car-to-X mobility data based on path prediction and probabilistic maneuver recognition. VNC 2011: 17-24 - [e2]Mehmet A. Orgun, Atilla Elçi, Oleg B. Makarevich, Sorin A. Huss, Josef Pieprzyk, Lyudmila K. Babenko, Alexander G. Chefranov, Rajan Shankaran:
Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011. ACM 2011, ISBN 978-1-4503-1020-8 [contents] - 2010
- [j9]Abdulhadi Shoufan, Sorin A. Huss:
A Course on Reconfigurable Processors. ACM Trans. Comput. Educ. 10(2): 7:1-7:20 (2010) - [j8]Abdulhadi Shoufan, Thorsten Wink, H. Gregor Molter, Sorin A. Huss, Eike Kohnert:
A Novel Cryptoprocessor Architecture for the McEliece Public-Key Cryptosystem. IEEE Trans. Computers 59(11): 1533-1546 (2010) - [c58]Marc Stöttinger, Alexander Biedermann, Sorin Alexander Huss:
Virtualization within a Parallel Array of Homogeneous Processing Units. ARC 2010: 17-28 - [c57]Abdulhadi Shoufan, Sorin Alexander Huss:
Reconfigurable Computing Education in Computer Science. ARC 2010: 329-336 - [c56]Felix Madlener, Julia Weingart, Sorin A. Huss:
Verification of dynamically reconfigurable embedded systems by model transformation rules. CODES+ISSS 2010: 33-40 - [c55]Marc Stöttinger, Sorin A. Huss, Sascha Mühlbach, Andreas Koch:
Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme. EUC 2010: 603-608 - [c54]André Seffrin, Alexander Biedermann, Sorin A. Huss:
Tiny-Pi: A Novel Formal Method for Specification, Analysis and Verification of Dynamic Partial Reconfiguration Processes. FDL 2010: 86-91 - [c53]André Seffrin, Sunil Malipatlolla, Sorin A. Huss:
A novel design flow for tamper-resistant self-healing properties of FPGA devices without configuration readback capability. FPT 2010: 291-294 - [c52]Abdulhadi Shoufan, Hagen Stübing, Sorin A. Huss:
Interactive Optimization of FPGA-based Systems-on-Chips. MBMV 2010: 217-226 - [c51]Stefan Nürnberger, Thomas Feller, Sorin A. Huss:
Ray - a secure micro kernel architecture. PST 2010: 3-6 - [c50]Hagen Stübing, Abdulhadi Shoufan, Sorin Alexander Huss:
Enhancing Security and Privacy in C2X Communication by Radiation Pattern Control. VTC Spring 2010: 1-5 - [c49]Hagen Stübing, Abdulhadi Shoufan, Sorin Alexander Huss:
A Demonstrator for Beamforming in C2X Communication. VTC Spring 2010: 1-2 - [p1]Marc Stöttinger, Felix Madlener, Sorin A. Huss:
Procedures for Securing ECC Implementations Against Differential Power Analysis Using Reconfigurable Architectures. Dynamically Reconfigurable Systems 2010: 395-415 - [e1]Oleg B. Makarevich, Atilla Elçi, Mehmet A. Orgun, Sorin A. Huss, Ludmila K. Babenko, Alexander G. Chefranov, Vijay Varadharajan:
Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010. ACM 2010, ISBN 978-1-4503-0234-0 [contents]
2000 – 2009
- 2009
- [j7]Abdulhadi Shoufan, Sorin A. Huss:
High-Performance Rekeying Processor Architecture for Group Key Management. IEEE Trans. Computers 58(10): 1421-1434 (2009) - [c48]Abdulhadi Shoufan, Thorsten Wink, H. Gregor Molter, Sorin A. Huss, Falko Strenzke:
A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms. ASAP 2009: 98-105 - [c47]Felix Madlener, H. Gregor Molter, Sorin A. Huss:
SC-DEVS: An efficient SystemC extension for the DEVS model of computation. DATE 2009: 1518-1523 - [c46]H. Gregor Molter, André Seffrin, Sorin Alexander Huss:
DEVS2VHDL: Automatic transformation of XML-specified DEVS Model of Computation into synthesizable VHDL code. FDL 2009: 1-6 - [c45]Abdulhadi Shoufan, Sorin Alexander Huss:
Understanding physical models in VHDL-AMS. FDL 2009: 1-4 - [c44]Adeel Israr, Abdulhadi Shoufan, Sorin A. Huss:
A compact error model for reliable system design. HPCS 2009: 60-66 - [c43]Adeel Israr, Abdulhadi Shoufan, Sorin A. Huss:
An efficient reliability evaluation approach for system-level design of embedded systems. ISQED 2009: 339-344 - [c42]Sorin Alexander Huss:
Embedded systems for IT security applications: properties and design considerations. SIN 2009: 138-142 - [i1]Osman Ugus, Dirk Westhoff, Ralf Laue, Abdulhadi Shoufan, Sorin A. Huss:
Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks. CoRR abs/0903.3900 (2009) - 2008
- [j6]Ralf Laue, Sorin A. Huss:
Parallel Memory Architecture for Elliptic Curve Cryptography over GF(p) Aimed at Efficient FPGA Implementation. J. Signal Process. Syst. 51(1): 39-55 (2008) - [c41]Adeel Israr, Sorin A. Huss:
Specification and Design Considerations for Reliable Embedded Systems. DATE 2008: 1111-1116 - [c40]Ralf Laue, H. Gregor Molter, Felix Rieder, Sorin A. Huss, Kartik Saxena:
A Novel Multiple Core Co-processor Architecture for Efficient Server-Based Public Key Cryptographic Applications. ISVLSI 2008: 87-92 - [c39]Abdulhadi Shoufan, Sorin A. Huss, Oliver Kelm, Sebastian Schipp:
A Novel Rekeying Message Authentication Procedure Based on Winternitz OTS and Reconfigurable Hardware Architectures. ReConFig 2008: 301-306 - [c38]Abdulhadi Shoufan, Sorin A. Huss:
Schlüsselverwaltung im Sicheren Multicast. Sicherheit 2008: 179-191 - 2007
- [c37]Abdulhadi Shoufan, Ralf Laue, Sorin A. Huss:
High-Flexibility Rekeying Processor for Key Management in Secure Multicast. AINA Workshops (1) 2007: 822-829 - [c36]Juergen Weber, Andreas C. Lemke, Andreas Lehmler, Mario Anton, Sorin A. Huss:
Mixed-Level Modeling Using Configurable MOS Transistor Models. FDL 2007: 6-11 - [c35]Ralf Laue, Oliver Kelm, Sebastian Schipp, Abdulhadi Shoufan, Sorin A. Huss:
Compact AES-based Architecture for Symmetric Encryption, Hash Function, and Random Number Generation. FPL 2007: 480-484 - [c34]Abdulhadi Shoufan, Ralf Laue, Sorin A. Huss:
Secure Multicast Rekeying: A Case Study for HW/SW-Codesign. MBMV 2007: 171-180 - [c33]Abdulhadi Shoufan, Ralf Laue, Sorin A. Huss:
Reliable Performance Evaluation of Rekeying Algorithms in Secure Multicast. WOWMOM 2007: 1-8 - 2006
- [c32]Thilo Brause, Kaiping Zeng, Sorin A. Huss:
Supporting AMS-System Design. FDL 2006: 99-104 - [c31]Ralf Laue, Sorin A. Huss:
A novel memory architecture for elliptic curve cryptography with parallel modular multipliers. FPT 2006: 149-156 - [c30]Sorin A. Huss:
Analog circuit synthesis: a search for the Holy Grail? ISCAS 2006 - [c29]Kaiping Zeng, Sorin A. Huss:
Architecture refinements by code refactoring of behavioral VHDL-AMS models. ISCAS 2006 - [c28]Kaiping Zeng, Sorin A. Huss:
Structure Synthesis of Analog and Mixed-Signal Circuits using Partition Techniques. ISQED 2006: 225-230 - [c27]Tim Sander, Wolfgang Hess, Sorin A. Huss:
Konzept zur Taskmigration auf heterogenen rekonfigurierbaren Rechenplattformen. MBMV 2006: 237-241 - [c26]Andreas Kühn, Felix Madlener, Sorin A. Huss:
Resource Management for Dynamic Reconfigurable Hardware Structures. ReCoSoC 2006: 111-116 - 2005
- [j5]Michael Jung, Sorin Alexander Huss, Matthias Deegener:
PEAC: Ein partieller Evaluator für eingebettete Software. Softwaretechnik-Trends 25(4) (2005) - [j4]W. W. Bachmann, Sorin A. Huss:
Efficient algorithms for multilevel power estimation of VLSI circuits. IEEE Trans. Very Large Scale Integr. Syst. 13(2): 238-254 (2005) - [c25]Arshad Jhumka, Stephan Klaus, Sorin A. Huss:
A Dependability-Driven System-Level Design Approach for Embedded Systems. DATE 2005: 372-377 - [c24]Stephan Hermanns, Sorin A. Huss:
Synchronisierungsprobleme von Schaltwerken in Wave Pipelining Architektur und ihre Auswirkungen auf die Wahl der Schaltungstechnik. GI Jahrestagung (1) 2005: 449 - [c23]Abdulhadi Shoufan, Sorin A. Huss, Murtuza Cutleriwala:
A Novel Batch Rekeying Processor Architecture for Secure Multicast Key Management. HiPEAC 2005: 169-183 - [c22]Kaiping Zeng, Sorin A. Huss:
RAMS: A VHDL-AMS Code Refactoring Tool Supporting High Level Analog Synthesis. ISVLSI 2005: 266-267 - [c21]Michael Jung, Ralf Laue, Sorin A. Huss:
A Case Study on Partial Evaluation in Embedded Software Design. SEUS 2005: 16-21 - 2004
- [j3]Jens Bieger, Sorin A. Huss:
Konzepte zur Beherrschung der Entwurfskomplexität eingebetteter Systeme. it Inf. Technol. 46(2): 59-66 (2004) - [j2]Markus Ernst, Birgit Henhapl, Steffen Klupsch, Sorin A. Huss:
FPGA based hardware acceleration for elliptic curve public key cryptosystems. J. Syst. Softw. 70(3): 299-313 (2004) - [c20]P. Hastono, Stephan Klaus, Sorin A. Huss:
Real-Time Operating System Services for Realistic SystemC Simulation Models of Embedded Systems. FDL 2004: 380-392 - [c19]Song Yuan, Sorin A. Huss:
Audio watermarking algorithm for real-time speech integrity and authentication. MM&Sec 2004: 220-226 - [c18]Andreas Kühn, Sorin A. Huss:
Dynamically Reconfigurable Hardware for Object-Oriented Processing. PARELEC 2004: 181-186 - [c17]Michael Jung, Sorin A. Huss:
Fast Points-to Analysis for Languages with Structured Types. SCOPES 2004: 107-121 - [c16]Jens Bieger, Sorin A. Huss, Michael Jung, Stephan Klaus, Thomas Steininger:
Rapid Prototyping for Configurable System-on-a-Chip Platforms: A Simulation Based Approach. VLSI Design 2004: 577- - 2003
- [c15]Stephan Klaus, Sorin A. Huss:
A Novel Specification Model for IP-based Design. DSD 2003: 190-196 - 2002
- [c14]M. Ernst, Michael Jung, Felix Madlener, Sorin A. Huss, Rainer Blümel:
A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2n). CHES 2002: 381-399 - 2001
- [c13]M. Ernst, Steffen Klupsch, Oliver Hauck, Sorin A. Huss:
Rapid Prototyping for Hardware Accelerated Elliptic Curve Public-Key Cryptosystems. IEEE International Workshop on Rapid System Prototyping 2001: 24-31 - 2000
- [c12]Oliver Hauck, A. Katoch, Sorin A. Huss:
VLSI System Design Using Asynchronous Wave Pipelines: A 0.35?m CMOS 1.5 GHz Elliptic Curve Public Key Cryptosystem Chip. ASYNC 2000: 188- - [c11]Wolfgang Boßung, Sorin A. Huss, Michael Stini:
xCDM -- Ein interaktives Werkzeug zur graphenbasierten Systemmodellierung. MBMV 2000: 153-161
1990 – 1999
- 1999
- [j1]Wolfgang Boßung, Sorin Alexander Huss, Stephan Klaus:
High-Level Embedded System Specifications Based on Process Activation Conditions. J. VLSI Signal Process. 21(3): 277-291 (1999) - [c10]Oliver Hauck, M. Garg, Sorin A. Huss:
Two-Phase Asynchronous Wave-Pipelines and Their Application to a 2D-DCT. ASYNC 1999: 219- - [c9]Oliver Hauck, M. Garg, Sorin A. Huss:
Efficient and Safe Asynchronous Wave-Pipeline Architectures for Datapath and Control Unit Applications. Great Lakes Symposium on VLSI 1999: 38-41 - [c8]Wolfgang Boßung, Sorin A. Huss, Stephan Klaus, Lars Wehmeyer:
Functional Specification of Distributed Digital Image Processing Systems by Process Interface Descriptions. PDPTA 1999: 2975-2981 - 1998
- [c7]Ralf Rosenberger, Sorin A. Huss:
A Systems Theoretic Approach to Behavioural Modeling and Simulation of Analog Functional Blocks. DATE 1998: 721-728 - [c6]Oliver Hauck, Sorin A. Huss:
Asynchronous wave pipelines for high throughput datapaths. ICECS 1998: 283-286 - 1996
- [b2]Andreas Bleck, Michael Goedecke, Sorin A. Huss, Klaus Waldschmidt:
Praktikum des modernen VLSI-Entwurfs. Vieweg+Teubner Verlag 1996, ISBN 978-3-519-02296-1 - 1995
- [c5]Uwe F. Baake, Sorin A. Huss:
Logic Reduction in Timed Asynchronous Circuits. ISCAS 1995: 1223-1226 - [c4]Michael Goedecke, Sorin A. Huss, Kai Morich:
Automatic Parallelization of the Visual Data-Flow Language Cantata for Efficient Characterization of Analog Circuit Behavior. VL 1995: 69-76 - 1994
- [c3]Matthias Deegener, Sorin A. Huss:
Software/hardware Co-Design in the MuSE environment. CODES 1994: 195-202 - [c2]Uwe F. Baake, Sorin A. Huss:
Scheduling of Signal Transition Graphs under Timing Constraints. ISCAS 1994: 205-208 - 1993
- [c1]Uwe F. Baake, Sorin A. Huss:
Object-oriented representation, analysis, and scheduling of signal transition graphs. ISCAS 1993: 2737-2740
1980 – 1989
- 1982
- [b1]Sorin Alexander Huss:
Zur interaktiven Optimierung integrierter Schaltungen. Technical University Munich, Germany, 1982, pp. 1-115