default search action
Sidhartha Sankar Rout
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j5]Sidhartha Sankar Rout, Mitali Sinha, Sujay Deb:
2DMAC: A Sustainable and Efficient Medium Access Control Mechanism for Future Wireless NoCs. ACM J. Emerg. Technol. Comput. Syst. 19(3): 20:1-20:25 (2023) - [j4]Sidhartha Sankar Rout, Badri M, Mitali Sinha, Sujay Deb:
ReDeSIGN: Reuse of Debug Structures for Improvement in Performance Gain of NoC Based MPSoCs. IEEE Trans. Emerg. Top. Comput. 11(2): 432-447 (2023) - 2022
- [j3]Mitali Sinha, Pramit Bhattacharyya, Sidhartha Sankar Rout, Neha Bhairavi Prakriya, Sujay Deb:
Securing an Accelerator-Rich System From Flooding-Based Denial-of-Service Attacks. IEEE Trans. Emerg. Top. Comput. 10(2): 855-869 (2022) - 2021
- [j2]Mitali Sinha, Setu Gupta, Sidhartha Sankar Rout, Sujay Deb:
Sniffer: A Machine Learning Approach for DoS Attack Localization in NoC-Based SoCs. IEEE J. Emerg. Sel. Topics Circuits Syst. 11(2): 278-291 (2021) - [j1]Sidhartha Sankar Rout, Sujay Deb, Kanad Basu:
WiND: An Efficient Post-Silicon Debug Strategy for Network on Chip. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(11): 2372-2385 (2021) - 2020
- [c14]Sidhartha Sankar Rout, Badri M, Sujay Deb:
Reutilization of Trace Buffers for Performance Enhancement of NoC based MPSoCs. ASP-DAC 2020: 97-102 - [c13]Sidhartha Sankar Rout, Akshat Singh, Suyog Bhimrao Patil, Mitali Sinha, Sujay Deb:
Security Threats in Channel Access Mechanism of Wireless NoC and Efficient Countermeasures. ISCAS 2020: 1-5
2010 – 2019
- 2019
- [c12]Priyanshi Gaur, Sidhartha Sankar Rout, Sujay Deb:
Efficient Hardware Verification Using Machine Learning Approach. iSES 2019: 168-171 - [c11]Sidhartha Sankar Rout, Vaibhav Ishwarlal Chaudhari, Suyog Bhimrao Patil, Sujay Deb:
RCAS: Critical Load Based Ranking for Efficient Channel Allocation in Wireless NoC. SoCC 2019: 21-26 - [c10]Sidhartha Sankar Rout, Suyog Bhimrao Patil, Vaibhav Ishwarlal Chaudhari, Sujay Deb:
Efficient Router Architecture for Trace Reduction During NoC Post-Silicon Validation. SoCC 2019: 230-235 - [c9]Sidhartha Sankar Rout, Kanad Basu, Sujay Deb:
Efficient Post-Silicon Validation of Network-on-Chip Using Wireless Links. VLSID 2019: 371-376 - 2018
- [c8]Sri Harsha Gade, Sidhartha Sankar Rout, Ravi Kashyap, Sujay Deb:
Reliability Analysis of On-Chip Wireless Links for Many Core WNoCs. DCIS 2018: 1-6 - [c7]Mitali Sinha, Sidhartha Sankar Rout, Sri Harsha Gade, Sujay Deb:
Near Threshold Last Level Cache for Energy Efficient Embedded Applications. IGSC 2018: 1-6 - [c6]Sri Harsha Gade, Sidhartha Sankar Rout, Mitali Sinha, Hemanta Kumar Mondal, Wazir Singh, Sujay Deb:
A Utilization Aware Robust Channel Access Mechanism for Wireless NoCs. ISCAS 2018: 1-5 - [c5]Sidhartha Sankar Rout, Hemanta Kumar Mondal, Rohan Juneja, Sri Harsha Gade, Sujay Deb:
Dynamic NoC platform for varied application needs. ISQED 2018: 232-237 - [c4]Sri Harsha Gade, Mitali Sinha, Sidhartha Sankar Rout, Sujay Deb:
Enabling Reliable High Throughput On-chip Wireless Communication for Many Core Architectures. ISVLSI 2018: 591-596 - [c3]Sri Harsha Gade, Sidhartha Sankar Rout, Sujay Deb:
On-Chip Wireless Channel Propagation: Impact of Antenna Directionality and Placement on Channel Performance. NOCS 2018: 21:1-21:8 - [c2]Ravi Kashyap, Twinkle Verma, Priyanka Kwatra, Sidhartha Sankar Rout:
Efficient Data Compression Scheme for Secured Application Needs. VDAT 2018: 221-230 - 2015
- [c1]Deepak Baranwal, Digvijay Singh, Khanusiya Soyeb, Sidhartha Sankar Rout, Sujay Deb:
Reliability Enhancement of SoCs Based on Dynamic Memory Access Profiling in Conjunction with PVT Monitoring. VLSID 2015: 541-546
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint