Paranoid: a global secure file access control system
Zaffar, F., Kedem, G., Gehani, A.
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)
Get full text
Conference Proceeding
Cooperative Forensics Sharing
Zaffar, Fareed, Kedem, Gershon
Published in 2006 1st Bio-Inspired Models of Network, Information and Computing Systems (01.12.2006)
Published in 2006 1st Bio-Inspired Models of Network, Information and Computing Systems (01.12.2006)
Get full text
Conference Proceeding
The Quad-CIF Tree: A Data Structure for Hierarchical On-Line Algorithms
Get full text
Conference Proceeding
The quad-CIF tree: A data structure for hierarchical on-line algorithms
Get full text
Conference Proceeding
A quadrisection-based combined place and route scheme for standard cells
Suaris, P.R., Kedem, G.
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01.03.1989)
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01.03.1989)
Get full text
Journal Article
Graph-Optimization Techniques for IC Layout and Compaction
Kedem, G., Watanabe, H.
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01.01.1984)
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01.01.1984)
Get full text
Journal Article
Graph-optimization techniques for IC layout and compaction
Kedem, Gershon, Watanabe, Hiroyuki
Published in Proceedings of the 20th Design Automation Conference (27.06.1983)
Published in Proceedings of the 20th Design Automation Conference (27.06.1983)
Get full text
Conference Proceeding
Automated synthesis for testability
Brglez, F., Bryan, D., Calhoun, J., Kedem, G., Lisanke, R.
Published in IEEE transactions on industrial electronics (1982) (01.05.1989)
Published in IEEE transactions on industrial electronics (1982) (01.05.1989)
Get full text
Journal Article