{"id":56,"date":"2018-02-19T12:36:14","date_gmt":"2018-02-19T16:36:14","guid":{"rendered":"https:\/\/sites.bu.edu\/mark\/?page_id=56"},"modified":"2024-05-08T16:14:12","modified_gmt":"2024-05-08T20:14:12","slug":"resume","status":"publish","type":"page","link":"https:\/\/sites.bu.edu\/mark\/resume\/","title":{"rendered":"Resume"},"content":{"rendered":"<p style=\"font-weight: 400;\"><strong><\/strong><\/p>\n<p style=\"text-align: center;\"><strong>Mark Karpovsky<\/strong><br \/>\nProfessor Emeritus<br \/>\nBoston University. Department of Electrical and Computer Engineering<br \/>\nE-mail: markkar@bu.edu<\/p>\n<hr \/>\n<p><strong>Education:<\/strong><br \/>\n<span><strong>Ph.D. <\/strong>Department<\/span><span>\u00a0<\/span>of Mathematics,<span>\u00a0 Leningrad<\/span><span>\u00a0<\/span><span>Electrotechnical<\/span><span>\u00a0<\/span>Institute, Leningrad, USSR.<br \/>\n<strong>M.S.<\/strong><span>\u00a0<\/span>Department of Computer Science,<span>\u00a0 Leningrad<\/span><span>\u00a0<\/span><span>Electrotechnical<\/span><span>\u00a0<\/span>Institute, Leningrad, USSR.<br \/>\n<strong>B.S.<\/strong><span>\u00a0<\/span>Department of Computer Science,<span>\u00a0 Leningrad<\/span><span>\u00a0<\/span><span>Electrotechnical<\/span><span>\u00a0<\/span>Institute, Leningrad, USSR.<\/p>\n<hr \/>\n<p style=\"font-weight: 400;\"><strong>Employment:<\/strong><\/p>\n<p style=\"font-weight: 400;\"><strong>June 2002- July. 2002<\/strong>, Visiting Professor, Tampere International Center for Signal Processing. Finland.<\/p>\n<p style=\"font-weight: 400;\"><strong>June 2000- July<\/strong>,<span>\u00a0<\/span><strong>2000<\/strong>, Visiting Professor, Tampere International Center for Signal Processing, Finland.<\/p>\n<p style=\"font-weight: 400;\"><strong>Feb 1997 &#8211; Mar. 1997<\/strong><span>\u00a0<\/span>Visiting Professor, Department of Electrical and Computer Engineering, New Jersey Institute of Technology.<\/p>\n<p><strong>June 1990 &#8211; July 1990<\/strong><span>\u00a0<\/span>Visiting Professor, Department of Computer Science, University of Dortmund, Dortmund, Germany.<\/p>\n<p><strong>May 1990 &#8211; June 1990<\/strong><span>\u00a0<\/span>Visiting Professor, Department of Computer Science,<span>\u00a0<\/span><span>Ecole<\/span><span>\u00a0<\/span>National<span>\u00a0<\/span><span>Superieure<\/span><span>\u00a0<\/span>des Telecommunication, Paris, France.<\/p>\n<p><strong>1983 &#8211; Present<\/strong><span>\u00a0<\/span>Professor, Department of Electrical, Computers and Systems Engineering, Boston University, Boston, MA 02215.<\/p>\n<p><strong>1987 &#8211; Present<\/strong><span>\u00a0<\/span>Director, Reliable Computing Laboratory, Boston University,<span>\u00a0<\/span><span>Boston<\/span>, MA 02215.<\/p>\n<p><strong>1989<\/strong><span>\u00a0<\/span>Consultant for ATT Bell Laboratories, Andover, MA.<\/p>\n<p><strong>1987<\/strong><span>\u00a0<\/span>Consultant for Standard<span>\u00a0<\/span><span>Electrik<\/span><span>\u00a0<\/span>Corporation, Germany<\/p>\n<p><strong>1986<\/strong><span>\u00a0<\/span>Consultant for Honeywell Corporation, Billerica, MA.<\/p>\n<p><strong>1984 &#8211; 1985<span>\u00a0<\/span><\/strong>Consultant for Digital Equipment Corporation, Maynard, MA.<\/p>\n<p><strong>1982 &#8211; 1983<\/strong><span>\u00a0<\/span>Professor, Computer Science Department, State University of New York, Binghamton, NY.<\/p>\n<p><strong>1981 &#8211; 1983<\/strong><span>\u00a0<\/span>Consultant for IBM Corporation, Endicott, NY.<\/p>\n<p><strong>May 1983 &#8211; June 1983<\/strong><span>\u00a0<\/span>Visiting Professor, Department of Computer Science,<span>\u00a0<\/span><span>Ecole<\/span><span>\u00a0<\/span>National<span>\u00a0<\/span><span>Superieure<\/span><span>\u00a0<\/span>des Telecommunication, Paris, France.<\/p>\n<p><strong>1978 &#8211; 1982<\/strong><span>\u00a0<\/span>Associate Professor, Coordinator of Research and Ph.D. Program, Computer Science Department, State University of New York at Binghamton, NY.<\/p>\n<p><strong>May 1982 &#8211; June 1982<\/strong><span>\u00a0<\/span>Visiting Professor , Department of Computer Science,<span>\u00a0<\/span><span>Ecole<\/span><span>\u00a0<\/span>National<span>\u00a0<\/span><span>Superieure<\/span><span>\u00a0<\/span>des Telecommunication, Paris, France.<\/p>\n<p><strong>1976 &#8211; 1977<\/strong><span>\u00a0<\/span>Head of Computer Science Division, Department of Mathematics, Tel Aviv, Israel.<\/p>\n<p><strong>1973 &#8211; 1978<\/strong><span>\u00a0<\/span>Senior Lecturer, Department of Mathematics, Computer Science Division, Tel Aviv University, Tel Aviv, Israel.<\/p>\n<p><strong>1968 &#8211; 1971<\/strong><span>\u00a0<\/span>Consultant,<span>\u00a0<\/span><span>The<\/span><span>\u00a0<\/span>Military Scientific Research Institute, Leningrad, USSR.<\/p>\n<p><strong>1967<\/strong><span>\u00a0<\/span>Engineer,<span>\u00a0<\/span><span>The<\/span><span>\u00a0<\/span>Scientific Research Institute, Leningrad, USSR.<\/p>\n<p><strong>1964 &#8211; 1966<\/strong><span>\u00a0<\/span>Junior Research Worker,<span>\u00a0<\/span><span>The<\/span><span>\u00a0<\/span>Leningrad<span>\u00a0<\/span><span>Electrotechnical<\/span><span>\u00a0<\/span>Institute, Leningrad, USSR.<\/p>\n<p><strong>January 1963 &#8211; December 1963<\/strong><span>\u00a0<\/span>Engineer, Scientific Research Institute, Leningrad, USSR.<\/p>\n<p><strong>1958 &#8211; 1962<\/strong><span>\u00a0<\/span>Laboratory Asst.,<span>\u00a0<\/span><span>The<\/span><span>\u00a0<\/span>Department of Electronic Computers, Leningrad<span>\u00a0<\/span><span>Electrotechnical<\/span><span>\u00a0<\/span>Institute, Leningrad, USSR.<\/p>\n<hr \/>\n<p style=\"font-weight: 400;\"><strong>Professional Societies, Citations and Committee Membership:<\/strong><\/p>\n<p>Nokia Foundation Visiting Fellowship, 2005<\/p>\n<p style=\"font-weight: 400;\">Institute of Electrical and Electronic Engineers, Fellow.<\/p>\n<p>International<span>\u00a0<\/span><span>Informatization<\/span><span>\u00a0<\/span>Academy, Associate Member.<\/p>\n<p>Who is<span>\u00a0<\/span><span>Who<\/span><span>\u00a0<\/span>in the World.<\/p>\n<p>New York Academy of Science, Member.<\/p>\n<p>American Society of Engineering Education, Member.<\/p>\n<p>Main Advisor for 20 doctoral students in USSR, Israel, SUNY-Binghamton and Boston University.<\/p>\n<p style=\"font-weight: 400;\">Editorial Advisory Board, open access in computer science,<span>\u00a0<\/span><span>Verista<\/span>, Member<\/p>\n<hr \/>\n<p style=\"font-weight: 400;\"><strong>Patents.<br \/>\n<\/strong><br \/>\n1. Mark Karpovsky, Alexander Taubin, Konrad Kulikowski<em>,<span>\u00a0<\/span><br \/>\n<a href=\"https:\/\/www.google.com\/patents\/US20070019805?dq=karpovsky&amp;hl=en&amp;sa=X&amp;ved=0ahUKEwig7c3vpanSAhUCMSYKHeASDu4Q6AEIUjAI\">System employing systematic robust error detection coding to protect system element against errors with unknown probability distributions<\/a><br \/>\nPublication number<span>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span>US20070019805 A1<br \/>\n<\/em>Publication type<span>\u00a0\u00a0\u00a0<\/span>Application<\/p>\n<ol start=\"2\">\n<li style=\"font-weight: 400;\">Hans J. Matt, Mark G. Karpovsky, Lev B. Levitin,<br \/>\n<em><a href=\"https:\/\/www.google.com\/patents\/US5134618?dq=karpovsky&amp;hl=en&amp;sa=X&amp;ved=0ahUKEwiZgfGppqnSAhXDPiYKHUk_CO44ChDoAQg1MAQ\">Method of testing connecting and\/or switching devices and\/or lines<\/a><br \/>\nPublication number<span><\/span>US5134618 A<br \/>\n<\/em>Publication type<span>\u00a0\u00a0\u00a0<\/span>Grant<\/li>\n<\/ol>\n<hr \/>\n<p style=\"font-weight: 400;\"><strong>Inventions<\/strong><\/p>\n<p>1. M.G. Karpovsky, V. S.<span>\u00a0<\/span><span>Tolstiakov<\/span>, V. N.<span>\u00a0<\/span><span>Nomokonov<\/span>, I. L.<span>\u00a0<\/span><span>Erosh<\/span><em>, Certificate of Authorship No. 18177<\/em><span>\u00a0<\/span>for the invention: &#8220;A Method for Error-Correction in Binary Counters,&#8221; USSR, April 1965 (Russian).<\/p>\n<p>2. M.G. Karpovsky, V. S.<span>\u00a0<\/span><span>Tolstiakov<\/span>, V. N.<span>\u00a0<\/span><span>Nomokonov<\/span>, I. L.<span>\u00a0<\/span><span>Erosh<\/span>,<span>\u00a0<\/span><em>Certificate of Authorship No. 207888<\/em><span>\u00a0<\/span>for the invention: &#8220;Accumulation Counter with Magnetic Elements,&#8221; USSR, May 1965 (Russian).<\/p>\n<p>3. M.G. Karpovsky, V. S.<span>\u00a0<\/span><span>Tolstiakov<\/span>, V. N.<span>\u00a0<\/span><span>Nomokonov<\/span>, I. L.<span>\u00a0<\/span><span>Erosh<\/span>,<span>\u00a0<\/span><em>Certificate of Authorship No. 217456<\/em><span>\u00a0<\/span>for the invention: &#8220;Pulsed Counter with Error Detection and Error Correction,&#8221; USSR, June 1966 (Russian).<\/p>\n<p>4. M.G. Karpovsky, V. S.<span>\u00a0<\/span><span>Tolstiakov<\/span>, V. N.<span>\u00a0<\/span><span>Nomokonov<\/span>, I. L.<span>\u00a0<\/span><span>Erosh<\/span>,<span>\u00a0<\/span><em>Certificate of Authorship No. 2354242<\/em><span>\u00a0<\/span>for the invention: &#8220;Self-Correcting Flip-Flop Using &#8220;NOR&#8221; Potential Elements and Pulse Input,&#8221; USSR, July 1967 (Russian).<\/p>\n<hr \/>\n<p style=\"font-weight: 400;\"><strong>Proceedings<\/strong><\/p>\n<p>5. M.G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/5.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Synthesis of Digital Devices with the Required Error Correcting Capability<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. Leningrad<span>\u00a0<\/span><span>Elecrotechnical<\/span><span>\u00a0<\/span>Institute<\/em>, No.65, part. 2, 1968 (Russian).<\/p>\n<p>6. M.G. Karpovsky, B. I.<span>\u00a0<\/span><span>Ruzansky<\/span>, V. S.<span>\u00a0<\/span><span>Tcherbakov<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/6.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Synthesis of Fault Tolerant Finite Automata<\/a>&#8220;<span>\u00a0<\/span><em>Proc., Third Conference on Theory of Transmission and Coding of Information, part 3,<\/em><span>\u00a0<\/span>Moscow, USSR.<\/p>\n<p>7. M.G. Karpovsky, E. S.<span>\u00a0<\/span><span>Moskalev<\/span>, V. V.<span>\u00a0<\/span><span>Danilov<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/7.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Estimations on the Number of Tests for Orientated Graphs<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. Leningrad<span>\u00a0<\/span><span>Electrotechnical<\/span><span>\u00a0<\/span>Institute<\/em>, No. 68, 1968 (Russian).<\/p>\n<p>8. M.G. Karpovsky, E. S.<span>\u00a0<\/span><span>Moskalev<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/8.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">One Method of State Assignment for Finite Automata<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. Second Conference on Theory of Transmission and Coding of Information<\/em>, part 3, Moscow, USSR, 1968 (Russian).<\/p>\n<p>9. M.G. Karpovsky, V. V.<span>\u00a0<\/span><span>Dnilov<\/span>, E. S.<span>\u00a0<\/span><span>Moskalev<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/9.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Optimization of Coverings used for the Construction of Tests<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. Leningrad<span>\u00a0<\/span><span>Electrotechnical<\/span><span>\u00a0<\/span>Institute<\/em>, No. 84, 1969 (Russian).<\/p>\n<p>10. M.G. Karpovsky, A. A.<span>\u00a0<\/span><span>Troianovsky<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/10.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">One method of Reducing Redundancy for Sequential Machines with Error Correction<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. First Symposium on Synthesis Fault-Tolerant Automata<\/em>, Kiev, 1971 (Russian).<\/p>\n<p>11. M.G. Karpovsky, A. A.<span>\u00a0<\/span><span>Troianovsky<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/11.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Analysis of the Error Correcting Capability for Finite Automata<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. Fifth Symposium on Using Redundancy in Information Systems<\/em>, Leningrad, USSR, 1972 (Russian).<\/p>\n<p>12. M.G. Karpovsky, E. S.<span>\u00a0<\/span><span>Moskalev<\/span>, A. A.<span>\u00a0<\/span><span>Troianovsky<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/12.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Analysis of the Correcting Power for Logical Functions<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. Fifth Symposium on Using Redundancy in Information Systems<\/em>, Leningrad, USSR, 1972 (Russian).<\/p>\n<p>13. M.G. Karpovsky, A. A.<span>\u00a0<\/span><span>Troianovsky<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/13.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">State Assignment Method for Non-Redundant Automata with Error Correction<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. Fifth Symposium on Using Redundancy in Information Systems<\/em>, Leningrad, USSR, 1972 (Russian).<\/p>\n<p>14. M.G. Karpovsky, E. A. Trachtenberg, &#8220;<span><a href=\"\/mark\/files\/2018\/02\/14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Circulants in Finite Groups<\/a><\/span>,&#8221;<span>\u00a0<\/span><em>Technical Report No. 67<\/em>, Israel, December 1975.<\/p>\n<p>15. M.G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">On Covering Radius of (<span>n,k<\/span>) codes<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. of International Symposium on Information Theory<\/em>, Les Arcs, France, June 1982.<\/p>\n<p>16. M.G. Karpovsky, L.B. Levitin, &#8220;<a href=\"\/mark\/files\/2018\/02\/16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Error Detection in Combinational Network by Use of Codes Based on<span>\u00a0<\/span><span>Hadamard<\/span><span>\u00a0<\/span>Matrices<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. of International Symposium on Information Theory<\/em>, St.<span>\u00a0<\/span><span>Jovite<\/span>, Canada, 1983.<\/p>\n<p>17. M.G. Karpovsky, L.B. Levitin, &#8220;<a href=\"\/mark\/files\/2018\/02\/17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A new Probabilistic Approach to VLSI Circuits Testing<\/a>,&#8221;<span>\u00a0<\/span><em>International Workshop on Fault-Detection and Spectral Techniques<\/em>, October 1983, Boston, pp. 3.1-3.34.<\/p>\n<p>18. L. Trachtenberg, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Detection of Signals in Communication Channels by Fourier Transforms Over Finite Groups<\/a>,&#8221;<span>\u00a0<\/span><em>International Workshop on Fault-Detection and Spectral Techniques<\/em>, October 1983, Boston, pp. 9.1 &#8211; 9.15.<\/p>\n<p>19. P.<span>\u00a0<\/span><span>Frankl<\/span>, M. G. Karpovsky, L. B. Levitin, &#8220;<a href=\"\/mark\/files\/2018\/02\/19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Exhaustive Testing of Almost all Devices with Output Depending on Limited Number of Inputs<\/a>,&#8221;<span>\u00a0<\/span><em>International Symposium on Information Theory<\/em>, Brighton, United Kingdom, 1985.<\/p>\n<p>20. L. B. Levitin, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Efficient Tests Based on MDS Codes<\/a>,&#8221;<span>\u00a0<\/span><em>International Symposium on Information Theory<\/em>, Ann Arbor, MI, 1986.<\/p>\n<p>21. M.G. Karpovsky, P.<span>\u00a0<\/span><span>Nagvajara<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/21.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Asymptotically Bent Functions and Optimal Quadratic Codes for the<span>\u00a0<\/span><span>Minimax<\/span><span>\u00a0<\/span>Criterion on Error-Detection<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. International Symposium on Information Theory<\/em>, Japan, 1988.<\/p>\n<p>22. L.B. Levitin, M. G. Karpovsky, P.<span>\u00a0<\/span><span>Frankl<\/span>, &#8220;Exhaustive Testing of Almost All Devices with Outputs Depending on Limited Number of Inputs,&#8221;<span>\u00a0<\/span><em>Proc. of Sixth International Symposium on Networks, Systems and Signal Processing<\/em>, Zagreb, Yugoslavia, 1989.<\/p>\n<p>23. M. G. Karpovsky, L. B. Levitin, F. S.<span>\u00a0<\/span><span>Vainstein<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/23.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Hard and Soft Decisions in Diagnosis by Space-Time Signatures<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. of International Symposium on Information Theory<\/em>, Budapest, Hungary, 1991.<\/p>\n<p>24. L. B. Levitin, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/24.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Traveling Salesman Problem in the Space of Binary Vectors<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. of International Symposium on Information<span>\u00a0<\/span><span>Theory\u00a0,<\/span><\/em><span>\u00a0<\/span>Norway, 1994.<\/p>\n<p>25. M. G. Karpovsky, &#8220;New Techniques in Testing and Diagnosis of Computer Hardware,&#8221; Keynote paper,<span>\u00a0<\/span><em>North Atlantic Test Workshop<\/em>, 1998.<\/p>\n<hr \/>\n<p style=\"font-weight: 400;\"><strong>Monographs, Books<\/strong><\/p>\n<p>26. M. G. Karpovsky, &#8220;<em>Mathematical Methods of Synthesis of Switching Circuits with Error Detection and Error Correction<\/em>,&#8221; Ph. D. Dissertation, Leningrad<span>\u00a0<\/span><span>Electrotechnical<\/span><span>\u00a0<\/span>Institute, Leningrad, USSR, 1967 (Russian).<\/p>\n<p>27. M. G. Karpovsky, E. S.<span>\u00a0<\/span><span>Moskalev<\/span>, &#8220;<em>Spectral Methods of Analysis and Synthesis of Switching Circuits<\/em>,&#8221; Energy, Leningrad, USSR, 1972 (Russian).<\/p>\n<p>28. M. G. Karpovsky, &#8220;<em>Finite Orthogonal Series in the Design of Digital Devices<\/em>,&#8221; John Wiley, New York, 1976.<\/p>\n<p>29. M. G. Karpovsky (Editor), &#8220;<em><a href=\"\/mark\/files\/2018\/02\/29.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Spectral Techniques and Fault Detection<\/a><\/em>,&#8221; Academic Press, 1985.<\/p>\n<ol start=\"30\">\n<li style=\"font-weight: 400;\">M. G. Karpovsky, R.S. Stankovic, J. T. Astola,<span><\/span><em>&#8220;Spectral Logic and Its Applications for the Design of Digital Devices&#8221;,<\/em><span><\/span>John<span>\u00a0<\/span><span>Wiley&amp;Sons<\/span>, 595 pages<span>, ,<\/span><span>\u00a0<\/span>2008.<br \/>\n&gt;<\/li>\n<\/ol>\n<hr \/>\n<p style=\"font-weight: 400;\"><strong>Chapters in Books<\/strong><\/p>\n<p>30. M. G. Karpovsky, &#8220;Synthesis of Digital Services with Error Detection and Error Correction&#8221; in<span>\u00a0<\/span><em>Soviet Radio<\/em>, Chapters 4-6 (Russian).<\/p>\n<p>31. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/31.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Linear Automata with Error Detection and Error Correction<\/a>&#8221; in Monograph:<span>\u00a0<\/span><em>Using redundancy in Information Systems<\/em>, Prof.<span>\u00a0<\/span><span>Gelesnov<\/span><span>\u00a0<\/span>Ed., Leningrad, 1970.<\/p>\n<p>32. M. G. Karpovsky, V. V.<span>\u00a0<\/span><span>Danilov<\/span>, E. S.<span>\u00a0<\/span><span>Moskalev<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/32.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Tests for Digital Devices<\/a>&#8221; in<span>\u00a0<\/span><span>Monograph:<em>Technical<\/em><\/span><em><span>\u00a0<\/span>Diagnosis<\/em>, Prof.<span>\u00a0<\/span><span>Parkhomenko<\/span><span>\u00a0<\/span>Ed., Moscow, 1972 (Russian).<\/p>\n<p>33. M. G. Karpovsky, G. S.<span>\u00a0<\/span><span>Kan<\/span>, I. I.<span>\u00a0<\/span><span>Sisoev<\/span>, A. A.<span>\u00a0<\/span><span>Troianovsky<\/span>., Yu. A.<span>\u00a0<\/span><span>Shapkov<\/span>, &#8220;Mathematical Model for Activity of the Muscles in Maintaining the Upright Position of a Human Being&#8221; in Monograph:<em><span>\u00a0<\/span>Some Problems of Biological Cybernetics<\/em>, Acad. Berg Ed., 1972 (Russian).<\/p>\n<p>34. M. G. Karpovsky, E. A. Trachtenberg, &#8220;<em>Detection of signals in Communication Channels by Fourier Transforms over Finite Groups<\/em>,&#8221;<span>\u00a0<\/span><em>in Spectral Techniques and Fault Detection<\/em>, M. G. Karpovsky, editor, Academic Press, 1985.<\/p>\n<p>35. M. G. Karpovsky, L. B. Levitin, &#8220;<a href=\"\/mark\/files\/2018\/02\/35.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Universal Testing of Computer Hardware<\/a>,&#8221; In<span>\u00a0<\/span><em>Spectral Techniques and Fault Detection<\/em>, M. G. Karpovsky, Editor, Academic Press, 1985.<\/p>\n<hr \/>\n<p style=\"font-weight: 400;\"><strong>Articles<\/strong><strong><span>\u00a0<\/span><\/strong>(Book reviews, short notes and research reports not listed<span>)<\/span><\/p>\n<p>36. M. G. Karpovsky, E.S.<span>\u00a0<\/span><span>Moskalev<\/span>, B.S.<span>\u00a0<\/span><span>Podkletnov<\/span>, &#8220;One Method of Synthesis of Logical Networks,&#8221;<span>\u00a0<\/span><em>Problems of<span>\u00a0<\/span><span>Radioelectronics<\/span><\/em>, No.12, 1966 (Russian).<\/p>\n<p>37. M. G. Karpovsky, E.S.<span>\u00a0<\/span><span>Moskalev<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/37.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Realization of System of Logical Functions by Means of an Expansion in Orthogonal Series<\/a>,&#8221;<span>\u00a0<\/span><em>Automata.<span>\u00a0<\/span><span>and<\/span><span>\u00a0<\/span>Remote Control<\/em>, Vol.28, N. 23, pp. 1921-1932, December 1967.<\/p>\n<p>38. M. G. Karpovsky, V.N.<span>\u00a0<\/span><span>Nomokonov<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/38.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Synthesis of Logical Networks for Redundant State Assignment of Binary Counters<\/a>,&#8221;<span>\u00a0<\/span><em>Problems of<span>\u00a0<\/span><span>Radioelectronics<\/span><\/em>, No. 27, 1968 (Russian).<\/p>\n<p>39. M. G. Karpovsky, B.S.<span>\u00a0<\/span><span>Levit<\/span>, B.E.<span>\u00a0<\/span><span>Ruzansky<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/39.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Algorithms for State Assignment and Minimization for Finite Automata with Error Correction<\/a>,&#8221;<span>\u00a0<\/span><em>Methods of Computations<\/em>, No. 5, 1968 (Russian).<\/p>\n<p>40. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/40.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Sequential Machines with Error Detection and Error Correction<\/a>,&#8221;<span>\u00a0<\/span><em>Computer Science and Problems of Cybernetics<\/em>, No. 5, 1968 (Russian).<\/p>\n<p>41. M. G. Karpovsky, E.S.<span>\u00a0<\/span><span>Moskalev<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/41.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Realization of Partially Defined Logical Functions by Expansion into Orthogonal Series<\/a>,&#8221;<span>\u00a0<\/span><em>Automata.<span>\u00a0<\/span><span>and<\/span><span>\u00a0<\/span>Remote Control<\/em>, Vol. 31, No. 8, August 1970, pp. 1278-1288.<\/p>\n<p>42. M. G. Karpovsky, I.L.<span>\u00a0<\/span><span>Erosh<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/42.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Error Correction in Arithmetical Devices Constructed by Multivalued Logical Cells<\/a>,&#8221;<span>\u00a0<\/span><em>Theoretical Cybernetics<\/em>, No. 2, 1970 (Russian).<\/p>\n<p>43. M. G. Karpovsky, E.S.<span>\u00a0<\/span><span>Moskalev<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/43.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Utilization of Autocorrelation Functions for Realization of Systems of Logical Functions<\/a>,&#8221;<span>\u00a0<\/span><em>Automata.<span>\u00a0<\/span><span>and<\/span><span>\u00a0<\/span>Remote Control<\/em>, Vol. 31, No. 2, February 1970, pp. 243-250.<\/p>\n<p>44. M. G. Karpovsky, E.S.<span>\u00a0<\/span><span>Moskalev<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/44.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Tests for Non-Orientated Graphs<\/a>,&#8221;<span>\u00a0<\/span><em>Automata.<span>\u00a0<\/span><span>and<\/span><span>\u00a0<\/span>Remote Control<\/em>, Vol. 31, No. 4, April 1970, pp. 656-665.<\/p>\n<p>45. M. G. Karpovsky, A.A.<span>\u00a0<\/span><span>Troianovsky<\/span>, I.I.<span>\u00a0<\/span><span>Sisoev<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/45.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Investigation of a Biological System as an Automation with Error Correction<\/a>,&#8221;<span>\u00a0<\/span><em>Automata. Control and Computer Science<\/em>, No. 6, 1971, pp. 77-81 (Russian).<\/p>\n<p>46. M. G. Karpovsky,<span>\u00a0<\/span><span>Yu.G<\/span>. Karpov, &#8220;<a href=\"\/mark\/files\/2018\/02\/46.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Optimal Code Redundancy Methods for Error Correction in Finite Automata<\/a>,&#8221;<span>\u00a0<\/span><em>Cybernetics<\/em>, July 1973, pp. 82-89.<\/p>\n<p>47. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/47.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Error Correction in Automata with Combinatorial Parts Realized by Expansion in Orthogonal Series<\/a>,&#8221;<span>\u00a0<\/span><em>Automata.<span>\u00a0<\/span><span>and<\/span><span>\u00a0<\/span>Remote Control<\/em>, Vol. 32, No. 93, Part 2, September 1971, pp. 1534-1528.<\/p>\n<p>48. M. G. Karpovsky, E.S.<span>\u00a0<\/span><span>Moskalev<\/span>, A.A.<span>\u00a0<\/span><span>Troianovsky<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/48.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Methods of Estimating of the Correcting Capability of Functions of Algebra of Logic<\/a>,&#8221;<span>\u00a0<\/span><span><em>Izvestia<\/em><\/span><em><span>\u00a0<\/span>Acad.<span>\u00a0<\/span><span>Nauk<\/span><span>\u00a0<\/span>USSR<\/em>, Vol. 12, No. 1, 1974, pp. 124-130.<\/p>\n<p>49. M. G. Karpovsky, N.S.<span>\u00a0<\/span><span>Tcherbakov<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/49.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Automata with Transition Self-Correction<\/a>,&#8221;<span>\u00a0<\/span><em>Cybernetics<\/em>, February 1971, pp. 63-66 (Russian).<\/p>\n<p>50. M. G. Karpovsky,<span>\u00a0<\/span><span>Yu.G<\/span>. Karpov, &#8220;<a href=\"\/mark\/files\/2018\/02\/50.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Decomposition of Algebras and Synthesis of Reliable Discrete Devices by Integral Modules<\/a>,&#8221;<span>\u00a0<\/span><em>Cybernetics<\/em>, Vol. 9, No. 3, February 1975 (Russian).<\/p>\n<p>51. M. G. Karpovsky, A.A.<span>\u00a0<\/span><span>Troianovsky<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/51.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Methods for Analyzing the Correcting Power of Automata<\/a>,&#8221;<span>\u00a0<\/span><em>Automatic Control and Computer Science<\/em>, Vol. 8, No. 1, 1974, pp. 22-27.<\/p>\n<p>52. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/52-harmonic.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Harmonic Analysis over Finite Commutative Groups in Linearization Problems for Systems of Logical Functions<\/a>,&#8221;<span>\u00a0<\/span><em>Information and Control<\/em>, Vol. 33, 1977, pp. 142-165.<\/p>\n<p>53. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/53-Error-detection.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Error Detection in Digital Devices and Computer Programs with the Aid of Linear Recurrent Equations over Finite<span>\u00a0<\/span><span>Communative<\/span><span>\u00a0<\/span>Groups<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. on Computers<\/em>, C-26, No. 3, 1977, pp. 208-219.<\/p>\n<p>54. M. G. Karpovsky, E.A. Trachtenberg, &#8220;<a href=\"\/mark\/files\/2018\/02\/54.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Some Optimization Problems for Convolution Systems over Finite Groups<\/a>,&#8221;<span>\u00a0<\/span><em>Information and Control<\/em>, Vol. 34, 1977, pp. 1-22.<\/p>\n<p>55. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/55.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Fast Fourier Transforms over a Finite Non-Abelian Group<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. on Computers<\/em>, C-26, No. 10, 1977, pp. 1028-1031.<\/p>\n<p>56. M. G. Karpovsky, E.A. Trachtenberg, &#8220;<a href=\"\/mark\/files\/2018\/02\/56.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Linear Checking Equations and Error-Correcting Capability for Computation Channels<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. IFIP Congress 1977<\/em>, North Holland, 1977, pp. 619-624.<\/p>\n<p>57. M. G. Karpovsky, E.A. Trachtenberg, &#8220;<a href=\"\/mark\/files\/2018\/02\/57.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Fourier Transforms Over Finite Groups for Error Detection and Error Correction in Computational Channels<\/a>,&#8221;<span>\u00a0<\/span><em>Information and Control<\/em>, Vol. 40, No. 2, 1979, pp. 335-359.<\/p>\n<p>58. M. G. Karpovsky, V.D.<span>\u00a0<\/span><span>Milman<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/58.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Coordinate Density of Subsets of Finite Homogeneous Spaces<\/a>,&#8221;<span>\u00a0<\/span><em>Discrete Mathematics<\/em>, No. 22, 1978, pp. 273-281.<\/p>\n<p>59. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/59-weight-distribution.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">On Weight Distribution for Binary Linear Codes<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. on Inf. Theory<\/em>, IT-25, January, 1979, pp. 105-109.<\/p>\n<p>60. M. G. Karpovsky, V.D.<span>\u00a0<\/span><span>Milman<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/60.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Coordinate Density of Sets of Vectors<\/a>,&#8221;<span>\u00a0<\/span><em>Discrete Mathematics<\/em>, No. 24, 1978, pp. 171-184.<\/p>\n<p>61. M. G.<span>\u00a0<\/span><span>Karpovksy<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/61.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Error Detection for Polynomial Computations<\/a>,&#8221;<span>\u00a0<\/span><em>IEE Journal on Computer and Digital Techniques<\/em>, C-26, No. 6, June 1980, pp. 523-528.<\/p>\n<p>62. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/62.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Detection and Location of Input and Feedback Bridging Faults<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. on Computers<\/em>, C-26, No. 6, June 1980, pp. 523-528.<\/p>\n<p>63. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/63-weight-translate.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Weight Distribution of Translates, Covering Radius and Perfect Codes Correcting Errors of the Given Weights<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. Info. Theory<\/em>, July 1981, pp. 462-472.<\/p>\n<p>64. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/64.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Testing for Numerical Computations<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Proc.<\/em>, Vol. 127, pt. E, No. 2, March 1980, pp. 69-77.<\/p>\n<p>65. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/65.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">An Approach for Error Detection and Error Correction in Distributed Systems Computing Numerical Functions<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. on Computers<\/em>, No. 12, December 1981, pp. 947-954.<\/p>\n<p>66. M. G. Karpovsky, S. Su, &#8220;<a href=\"\/mark\/files\/2018\/02\/66.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Detection of Bridging and Stuck-At Faults at Input and Output Pins of Standard Computer Components<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. of 17th Design Automation Conference<\/em>, 1980, pp. 494-506.<\/p>\n<p>67. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/67.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Spectral Methods for Decomposition, Design and Testing of Multiple-Valued Logical Networks<\/a>,&#8221; Keynote Paper,<span>\u00a0<\/span><em>Proc. of International Symposium on Multiple-Valued Logic<\/em>, Oklahoma, 1981, pp. 1-10.<\/p>\n<p>68. M.<span>\u00a0<\/span><span>Deza<\/span>, M. G. Karpovsky, V.S.<span>\u00a0<\/span><span>Milman<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/68.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Codes Correcting and Arbitrary Sets of Errors<\/a>,&#8221;<span>\u00a0<\/span><em>Revue de<span>\u00a0<\/span><span>Cethedec<\/span><\/em>, No. 66, 1981 (French).<\/p>\n<p>69. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/69.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Detection and Location of Error by Linear Inequality Checks<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. IEE<\/em>, Vol. 129, No. 3, May 1982, pp. 86-92.<\/p>\n<p>70. N.<span>\u00a0<\/span><span>Goel<\/span>, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/70.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Functional Testing of Computer Hardware Based on Minimization of Magnitude of Undetected Errors<\/a>,&#8221;<span>\u00a0<\/span><em>IEE Journal on Computer and Digital Techniques<\/em>, Vol. 129, No. 5, September 1982, pp. 169-181.<\/p>\n<p>71. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/71.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Testing for Multiple Valued Computations<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. 12th International Symposium on Multiple Valued Logic<\/em>, Paris, France, 1982.<\/p>\n<p>72. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/72.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Universal Tests Detecting<span>\u00a0<\/span><span>Input\/Output<\/span><span>\u00a0<\/span>Faults in Almost All Devices<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. of 1982 International Test Conference<\/em>, Cherry Hill, NJ, 1982, pp. 52-57.<\/p>\n<p>73. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/73.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Universal Tests for Detection of<span>\u00a0<\/span><span>Input\/Output<\/span><span>\u00a0<\/span>Stuck-At and Bridging Faults<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. on Computers<\/em>, Vol. C-32, December 1983, pp. 1194-1198.<\/p>\n<p>74. K. K.<span>\u00a0<\/span><span>Saluja<\/span>, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/74.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Testing Computer Hardware through Data Compression in Space and Time<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. of 1983 International Test Conference<\/em>, Cherry Hill, NJ, 1983, pp. 83-89.<\/p>\n<p>75. M. G. Karpovsky, L.B. Levitin, &#8220;<a href=\"\/mark\/files\/2018\/02\/75.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Detection and Identification of<span>\u00a0<\/span><span>Input\/Output<\/span><span>\u00a0<\/span>Stuck-At and Bridging Faults in Combinational and Sequential VLSI Networks by Universal Tests<\/a>,&#8221;<span>\u00a0<\/span><em>Integration the VLSI Journal<\/em>, November 1983, pp. 22-24.<\/p>\n<p>76. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/76.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Memory Testing by Linear Checks<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Journal on Computer and Digital Techniques<\/em>, Vol. 131, pt. E, No. 5, September 1984, pp. 158-168.<\/p>\n<p>77. M. G. Karpovsky, R.G. Van Meter, &#8220;<a href=\"\/mark\/files\/2018\/02\/77.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">An Approach to the Testing of Microprocessors<\/a>,&#8221; Proc. 1984,<span>\u00a0<\/span><em>Design Automation Conference<\/em>, Albuquerque, New Mexico, 1984, pp. 196-202.<\/p>\n<p>78. G. Cohen, M. G. Karpovsky, H.F. Mattson Jr., J.R.<span>\u00a0<\/span><span>Shatz<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/78-covering-radius.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Covering Radius Survey and Recent Results<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. on Information Theory<\/em>, May 1985, Vol. IT-31, pp. 328-344.<\/p>\n<p>79. M. G. Karpovsky, E.A. Trachtenberg, &#8220;<a href=\"\/mark\/files\/2018\/02\/79-wiener-filters.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Statistical and Computational Performance of a Class of Generalized Wiener Filters<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. on Information Theory<\/em>, May 1986, pp. 303-307.<\/p>\n<p>80. G. Cohen, P.<span>\u00a0<\/span><span>Godlewski<\/span>, M.G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/80.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Exhaustive Tests for Combinational Networks<\/a>,&#8221;<span>\u00a0<\/span><em>Journal<span>\u00a0<\/span><span>Fransais<\/span><span>\u00a0<\/span>de<span>\u00a0<\/span><span>Theorie<\/span><span>\u00a0<\/span>du Signal<\/em>, Vol. 2, No. 2, 1984, pp. 223-226.<\/p>\n<p>81. S. M. Reddy, K.K.<span>\u00a0<\/span><span>Saluja<\/span>, M.G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/81.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Data Compression Technique for Built-In<span>\u00a0<\/span><span>Self Test<\/span><\/a>,&#8221;<span>\u00a0<\/span><em>Proc. of 1985 Fault-Tolerant Computing Symposium<\/em>, 1985, pp. 294-299.<\/p>\n<p>82. M. G. Karpovsky, E.A.<span>\u00a0<\/span><span>Moskalev<\/span>, &#8220;Covering of Edges of Graph by a Minimal Set of Paths,&#8221;<span>\u00a0<\/span><em>Discrete Mathematics<\/em>, Vol. 58, No. 2, February 1986.<\/p>\n<p>83. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/83.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Multilevel Logical Networks<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. on Computers<\/em>, C-36, No. 2, 1987, pp. 215-225.R<\/p>\n<p>84. S. R. Reddy, K. K.<span>\u00a0<\/span><span>Saluja<\/span>, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/84.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Data Compression Techniques for Test responses<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. on Computers<\/em>, September 1988, pp. 1151-1156.<\/p>\n<p>85. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/85.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Recent Developments in Applications of Spectral Techniques in Logic Design and Testing of Computer Hardware<\/a>,&#8221; Keynote Paper,<span>\u00a0<\/span><em>Proc. of Second International Symposium on Spectral Techniques<\/em>, Montreal, Canada, 1986, pp. 1-10.<\/p>\n<p>86. T.<span>\u00a0<\/span><span>Damarla<\/span>, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/86.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Reed-Muller Transforms for Fault Detection<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. Second International Workshop on Spectral Techniques<\/em>, Montreal, Canada, October 1986.<\/p>\n<p>87. T.<span>\u00a0<\/span><span>Damarla<\/span>, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/87.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Fault Detection in Combinational Networks by Reed-Muller Transforms<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. on Computers<\/em>, Vol. 38, June 1989, pp. 788-798.<\/p>\n<p>88. M. G. Karpovsky, P.<span>\u00a0<\/span><span>Nagvajara<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/88.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Optimal Time and Space Compression of Test Responses for VLSI Devices<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. The International Test Conference<\/em>, 1987, pp. 523-529.<\/p>\n<p>89. E. A. Trachtenberg, A. H.<span>\u00a0<\/span><span>Chaudhri<\/span>, M. G. Karpovsky, &#8220;Blackout Detection as a<span>\u00a0<\/span><span>Multiobjective<\/span><span>\u00a0<\/span>Optimization Problem,&#8221;<span>\u00a0<\/span><em>Proc. of 1987 International Symposium of Test and Evaluation<span>\u00a0<\/span><span>Assocs.,<\/span><\/em><span>\u00a0<\/span>Boston, 1987.<\/p>\n<p>90. T. Roziner, M. G. Karpovsky, E. A. Trachtenberg, &#8220;<a href=\"\/mark\/files\/2018\/02\/90.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Fast Fourier Transforms over Finite Groups on Multiprocessor Systems<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. on Acoustics, Speech, and Signal Processing<\/em>, February 1990.<\/p>\n<p>91. T. Roziner, M. G. Karpovsky, E. A. Trachtenberg, &#8220;<a href=\"\/mark\/files\/2018\/02\/91.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Complexity Analysis for Generalized Fast Fourier Transforms in Multiprocessor Environment<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. 12th IMAC World Congress<\/em>, Paris, France, 1988.<\/p>\n<p>92. M. G. Karpovsky, P.<span>\u00a0<\/span><span>Nagvajara<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/92.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Optimal Robust Compression of Test Responses<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. on Computers<\/em>, Vol. 39, No. 1, pp. 138-141, January 1990.<\/p>\n<p>93. E. A. Trachtenberg, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/93.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Optimal Varying Dyadic Structure Models of Time Invariant Systems<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. 1988 IEEE Symposium on Circuits and Systems<\/em>, Helsinki, 1988, pp. 1111-1115.<\/p>\n<p>94. M. G. Karpovsky, P.<span>\u00a0<\/span><span>Nagvajara<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/94-minimax-criterion.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Optimal Codes for the<span>\u00a0<\/span><span>Minimax<\/span><span>\u00a0<\/span>Criterion on Error Detection<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. on Information Theory<\/em>, November 1989.<\/p>\n<p>95. M. G. Karpovsky, P.<span>\u00a0<\/span><span>Nagvajara<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/95.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Board Level Diagnosis by Signature Analysis<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. International Test Conference<\/em>, 1988, pp. 47-53.<\/p>\n<p>96. M. G. Karpovsky, P.<span>\u00a0<\/span><span>Nagvajara<\/span>,<span>\u00a0<\/span><span>&#8221;\u00a0<\/span><a href=\"\/mark\/files\/2018\/02\/96.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Functions with Flat Autocorrelation and Their Generalizations<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. 3rd International Workshop on Spectral Techniques<\/em>, W. Germany, 1988.<\/p>\n<p>97. P.<span>\u00a0<\/span><span>Nagvajara<\/span>, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/97.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Signature Analysis by Quadratic Compressors<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. Test and Instrumentation Conference<\/em>, Boston, 1988, pp. 751-758.<\/p>\n<p>98. M. G. Karpovsky, P.<span>\u00a0<\/span><span>Nagvajara<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/98.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Design of Self-Diagnostic Boards by Signature Analysis<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. on Industrial Electronics<\/em>, May 1989, pp 241-246.<\/p>\n<p>99. T.<span>\u00a0<\/span><span>Damarla<\/span>, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/99.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Detection of Stuck-At and Bridging Faults in Reed-Muller Canonical Networks<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Proc.<\/em>, Vol. 136, No. 5, pp. 430-433, 1989.<\/p>\n<p>100. M. G. Karpovsky, E. A. Trachtenberg, T. Roziner, &#8220;<a href=\"\/mark\/files\/2018\/02\/100.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Computation of Discrete Fourier Transforms over Finite Abelian Groups Using Pipelined and Systolic Array Architectures<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. of International Symposium on the Mathematical Theory of Networks and Systems<\/em>, Amsterdam, Netherlands, 1989.<\/p>\n<p>101. D. K. Pradhan, S. K. Gupta, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/101.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Aliasing Probability for Multiple Input Signature Analyzer<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. on Computer<\/em>, April 1990.<\/p>\n<p>102. T.<span>\u00a0<\/span><span>Damarla<\/span>, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/102.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Multiple Fault Detection in a Network of Functions<\/a>,&#8221;<span>\u00a0<\/span><em>IETE Journal<\/em>, Vol. 35, No. 6, 1989.<\/p>\n<p>103. M. G. Karpovsky, L. B. Levitin, F. S.<span>\u00a0<\/span><span>Vainstein<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/103.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Identification of Faulty Processing Elements by Space-Time Compression of Test Responses<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. International Test Conference<\/em>, 1990, pp. 638-647.<\/p>\n<p>104. P.<span>\u00a0<\/span><span>Nagvajara<\/span>, M. G. Karpovsky, L. B. Levitin, &#8220;<a href=\"\/mark\/files\/2018\/02\/104.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Pseudorandom Test Patterns Generation for Boundary Scan Design<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Journal on Design and Test of Computers<\/em>, September 1991, pp. 58-65.<\/p>\n<p>105. T. Roziner, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/105.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Multidimensional Fourier Transforms by Systolic Architectures<\/a>,&#8221;<span>\u00a0<\/span><em>Journal of VLSI Signal Processing<\/em>, No. 4, 1992, pp. 343-354.<\/p>\n<p>106. M. G. Karpovsky, D. K. Pradhan, S. K. Gupta, &#8220;<a href=\"\/mark\/files\/2018\/02\/106.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Aliasing and Diagnostic Probabilities in MISR and STUMPS Using a General Error Model<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. International Test Conference<\/em>, 1991, pp. 828-840.<\/p>\n<p>107. P.<span>\u00a0<\/span><span>Nagvajara<\/span>, M. G. Karpovsky, L. B. Levitin, &#8220;<a href=\"\/mark\/files\/2018\/02\/107.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Efficient Test Generation for Built-In Self-Test Boundary-Scan Template<\/a>,&#8221;<span>\u00a0<\/span><em>9th Annual IEEE VLSI Test Symposium<\/em>, Atlantic City, NJ, 1991, pp. 277-284.<\/p>\n<p>108. P.<span>\u00a0<\/span><span>Nagvajara<\/span>, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/108.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Built-In Self-Diagnostic Read-Only-Memories<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. International Test Conference<\/em>, 1991, pp. 695-704.<\/p>\n<p>109. P.<span>\u00a0<\/span><span>Nagvajara<\/span>, M. G. Karpovsky, &#8220;<span><a href=\"\/mark\/files\/2018\/02\/109.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Coset Error Detection in BIST Design<\/a><\/span>,&#8221;<span>\u00a0<\/span><em>IEEE VLSI Test Symposium<\/em>, Atlantic City, NJ, 1992, pp. 79-84.<\/p>\n<p>110. M. G. Karpovsky, L. B. Levitin, F. S.<span>\u00a0<\/span><span>Vainstein<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/110.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Diagnosis by Signature Analysis of Test Responses<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. on Computers<\/em>, Vol. 43, No. 2,<span>\u00a0<\/span><span>Februrary<\/span><span>\u00a0<\/span>1994, pp. 141-153.<\/p>\n<p>111. M. G. Karpovsky, S. Chaudhry, &#8220;Built-In Self-Diagnostic by Space-Time Compression of Test Responses,&#8221;<span>\u00a0<\/span><em>IEEE VLSI Test Symposium<\/em>, Atlantic City, NJ, 1992, pp. 149-155.<\/p>\n<p>112. M. G. Karpovsky, S. Chaudhry, &#8220;<a href=\"\/mark\/files\/2018\/02\/112.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Design of Self-Diagnostic Boards by Multiple Signature Analysis<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. on Computers<\/em>, Vol. 42, No. 9, September 1993, pp. 1035-1044.<\/p>\n<p>113. M. G. Karpovsky, S. Chaudhry, L. B. Levitin, &#8220;<a href=\"\/mark\/files\/2018\/02\/113.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Multiple Signature Analysis: a Framework for Built-In Self-Diagnostic<\/a>,&#8221;<span>\u00a0<\/span><em>Fault-Tolerant Computing Symposium<\/em>, Boston, 1992, pp. 112-120.<\/p>\n<p>114. M. G. Karpovsky, T. Roziner, C. Moraga, &#8220;<a href=\"\/mark\/files\/2018\/02\/114.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Error Detection in Multiprocessor Systems and Array Processors<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. on Computers<\/em>, Vol. 44, No. 3, March 1995, pp. 383-394.<\/p>\n<p>115. M. G. Karpovsky, S. Chaudhry, L. B. Levitin, C. Moraga, &#8220;<a href=\"\/mark\/files\/2018\/02\/115.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Detection and Location of Given Sets of Errors by<span>\u00a0<\/span><span>Nonbinary<\/span><span>\u00a0<\/span>Linear Codes<\/a>,&#8221; Springer and<span>\u00a0<\/span><span>Verlag<\/span>,<span>\u00a0<\/span><em>Lecture Notes<\/em>, No. 781, 1994, pp. 172-194.<\/p>\n<p>116. M. G. Karpovsky, V. N.<span>\u00a0<\/span><span>Yarmolik<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/116.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Transparent Memory BIST<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. International Workshop on Memory Technology<\/em>, 1994, pp. 106-112.<\/p>\n<p>117. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/117.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Spectral Techniques for Off-Line Testing and Diagnosis of Computer Systems<\/a>,&#8221; Keynote paper,<span>\u00a0<\/span><em>Proc. of Fifth International Symposium on Spectral Techniques<\/em>, China, 1994, pp. 172-194.<\/p>\n<p>118. M. G. Karpovsky, V. N.<span>\u00a0<\/span><span>Yarmolik<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/118.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Transparent Memory Testing for Pattern Sensitive Faults<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. International Test Conference<\/em>, 1994, pp. 860-870.<\/p>\n<p>119. E. P.<span>\u00a0<\/span><span>Kalosha<\/span>, V. N.<span>\u00a0<\/span><span>Yarmolik<\/span>, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/119.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Signature Testability of PLA<\/a>,&#8221;<span>\u00a0<\/span><em>Fourth International Workshop on Field Programmable Logic<\/em>, 1994, pp. 126-132.<\/p>\n<p>120. M. G. Karpovsky, V. N.<span>\u00a0<\/span><span>Yarmolik<\/span>, A. J. van de<span>\u00a0<\/span><span>Goor<\/span>, &#8220;<span><a href=\"\/mark\/files\/2018\/02\/120.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Pseudoexhaustive Word-Oriented DRAM Testing<\/a><\/span>,&#8221;<span>\u00a0<\/span><em>Proc. 1995 European Design and Test Conference<\/em>, 1995, pp. 126-132.<\/p>\n<p>121. M. G. Karpovsky, &#8220;Application of Spectral Techniques for Off-Line Testing and Fault-Tolerant Computing,&#8221;<span>\u00a0<\/span><span><em>Berichte<\/em><\/span><em><span>\u00a0<\/span><span>zur<\/span><span>\u00a0<\/span><span>Angewandten<\/span><span>\u00a0<\/span><span>Informatik<\/span><\/em>, 1995.<\/p>\n<p>122. L. B. Levitin, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/122.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Exhaustive Testing of Almost All Devices&#8230;<\/a>,&#8221;<span>\u00a0<\/span><em>Open Systems and Information Dynamics<\/em>, Vol. 2, No. 3, 1994, pp. 1-16.<\/p>\n<p>123. M. G. Karpovsky, V. N.<span>\u00a0<\/span><span>Yarmolik<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/123.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Testability Measures and Test Complexities for Testing with Internal Access<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. Int. Workshop on IDDQ Testing<\/em>, pp. 9-14, 1995.<\/p>\n<p>124. V. N.<span>\u00a0<\/span><span>Yarmolik<\/span>, Y. V.<span>\u00a0<\/span><span>Bykov<\/span>, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/124.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Test Sets for Internal Access Testing<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. Int. Conference on Computer-Aided Design<\/em>, pp. 135-141, 1995.<\/p>\n<p>125. M. G. Karpovsky, D. Das, H.<span>\u00a0<\/span><span>Varhan<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/125.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Built-In Self-Testing for Detection of Coupling Faults in Semiconductor Memories<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. Int. IEEE Workshop on Memory Technology, Design and Testing<\/em>, 1996.<\/p>\n<p>126. M. G. Karpovsky, V. N.<span>\u00a0<\/span><span>Yarmolik<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/126.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Transparent Random Access Memory Testing&#8230;<\/a>,&#8221;<span>\u00a0<\/span><em>Journal of Electronic Testing: Theory and Applications<\/em>, Vol. 9, No. 3, 1996, pp. 261-266.<\/p>\n<p>127. V. N.<span>\u00a0<\/span><span>Yarmolik<\/span>, A. I.<span>\u00a0<\/span><span>Yanushkevich<\/span>, M. G. Karpovsky, &#8220;IDDQ Testing of Systolic CMOS Networks,&#8221;<span>\u00a0<\/span><em>Microelectronics, Bulletin Russian Academy of Science<\/em>, Vol. 26, No. 1, 1997, pp. 25-29.<\/p>\n<p>128. D. Das, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/128.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Exhaustive and Near Exhaustive Memory Testing and their BIST Implementations<\/a>,&#8221;<span>\u00a0<\/span><em>Journal of Electronic Testing: Theory and Applications<\/em>, Vol. 10, No. 3, June 1997, pp. 215-229.<\/p>\n<p>129. C. Moraga, R.<span>\u00a0<\/span><span>Oenning<\/span>, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/129.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Zhang<span>\u00a0<\/span><span>Watari<\/span><span>\u00a0<\/span>Transform..<\/a>.,&#8221;<span>\u00a0<\/span><em>Multivalued Logic<\/em>, Vol. 2, 1997, pp. 245-262.<\/p>\n<p>130. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/130.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Integrated On-Line and Off-Line Error Detection Mechanism in the Coding Theory Framework<\/a>,&#8221;<span>\u00a0<\/span><em>VLSI Design<\/em>, Vol. 5, No. 4, 1998, pp. 313-331.<\/p>\n<p>131. K.<span>\u00a0<\/span><span>Chakrabarty<\/span>, M. G. Karpovsky, L. B. Levitin, &#8220;<a href=\"\/mark\/files\/2018\/02\/131.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Fault Isolation and Diagnosis in Multiprocessor Systems with Point-to-Point Connections<\/a>,&#8221; in<span>\u00a0<\/span><em>Fault Tolerant Parallel and Distributed Systems<\/em>, Kluwer Academic Publishers, 1998, pp. 285-301.<\/p>\n<p>132. M. G. Karpovsky, K.<span>\u00a0<\/span><span>Chakrabarty<\/span>, L. B. Levitin, &#8220;<a href=\"\/mark\/files\/2018\/02\/132.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A New Class of Codes for Identification of Vertices in Graphs<\/a>,&#8221;<span>\u00a0<\/span><em>IEEE Trans. Info Theory<\/em>, March 1998, Vol. 46, pp. 599-611.<\/p>\n<p>133. L.<span>\u00a0<\/span><span>Zakrevsky<\/span>, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/133-routing.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Fault Tolerant Message Routing For Multiprocessors<\/a>,&#8221; in<span>\u00a0<\/span><em>Parallel and Distributed Processing (J.<span>\u00a0<\/span><span>Rolim<\/span><span>\u00a0<\/span>Editor)<\/em>, Springer, 1998, pp. 714-731.<\/p>\n<p>134. I. Levin, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/134.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">On-Line Self-Checking of<span>\u00a0<\/span><span>Microprogram<\/span><span>\u00a0<\/span>Control Units<\/a>,&#8221;<span>\u00a0<\/span><em>Proc. 4th Int. Workshop on On-Line Testing<\/em>, 1998, pp. 152-157.<\/p>\n<p>135. M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/135.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Spectral Techniques for Off-Line Testing and Diagnosis of <\/a><a href=\"\/mark\/files\/2018\/02\/135.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Computer Systems<\/a>,&#8221;<span>\u00a0<\/span><em>Approximation Theory and Its Applications<\/em>, 1998, pp. 55-72.<\/p>\n<p>136.<span>\u00a0<\/span><span>L.Zakrevski<\/span>, M.G. Karpovsky,<span>\u00a0<\/span><span>S.Yang<\/span><span>, \u201d<\/span><a href=\"\/mark\/files\/2018\/02\/136-BISTDRAM.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">BIST for Embedded Drams<\/a>\u201d,<span>\u00a0<\/span><em>Proc. Int. Workshop<\/em><span>\u00a0<\/span><em>on Memory Technology<\/em>, 1998.<\/p>\n<ol start=\"137\">\n<li style=\"font-weight: 400;\"><span><\/span><span>M.G.Karpovsky<\/span>,<span><\/span><span>K.Chakrabarty<\/span>,<span>\u00a0<\/span><span>L.B.Levitin<\/span>,<span>\u00a0<\/span><span>D.Avresky<\/span>, \u201c<a href=\"\/mark\/files\/2018\/02\/137.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">On<span>\u00a0<\/span><span>the\u00a0\u00a0Covering<\/span><span>\u00a0<\/span>of Vertices for Fault-Diagnosis in<span>\u00a0<\/span><span>Hypercubes<\/span><\/a>\u201d,<span>\u00a0<\/span><em>Information Processing Letters<\/em>, 69, 1999, pp.99-103.<\/li>\n<li style=\"font-weight: 400;\"><span><\/span><span>L.Zakrevski<\/span>,<span><\/span><span>M.G.Karpovsky<\/span>, \u201c<a href=\"\/mark\/files\/2018\/02\/138-FTRouting.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Fault-Tolerant Routing in Computer Networks<\/a>\u201d,<span>\u00a0<\/span><em>Proc. Int.<\/em><span>\u00a0<\/span><em>Conf. On Parallel and Distributed Processing Techniques and Applications<\/em>, vol.4, 1999, pp.2279-2287.<\/li>\n<li style=\"font-weight: 400;\"><span><\/span><span>L.Zakrevski<\/span>,<span><\/span><span>S.Jaiswal<\/span>,<span>\u00a0<\/span><span>L.B.Levitin<\/span>,<span>\u00a0<\/span><span>M.G.Karpovsky<\/span><span>, \u201d<\/span><a href=\"\/mark\/files\/2018\/02\/139_dead.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A New Method for Deadlock Elimination in Computer Networks with Irregular Topologies<\/a>\u201d,<span>\u00a0<\/span><em>Proc. Int. Conf. On Parallel and<\/em><span>\u00a0<\/span><em>Distributed Computer Systems<\/em><span>,vol.1<\/span>, pp396-402, 1999.<\/li>\n<li style=\"font-weight: 400;\"><span><\/span><span>L.Zakrevski,S.Jaiswal<\/span>,<span><\/span><span>M.G.Karpovsky<\/span>,<span>\u00a0<\/span><u>&#8220;<a href=\"\/mark\/files\/2018\/02\/140-unicast.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Unicast Message Routing in Communication Networks with Irregular Topologies<\/a>&#8220;<\/u><em>Proc. of CAD-99<\/em>, 1999.<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\">141<span>.S.Jaiswal<\/span>,<span>\u00a0<\/span><span>M.Mustafa<\/span>,<span>\u00a0<\/span><span>L.Zakrevski<\/span>,<span>\u00a0<\/span><span>M.G.Karpovsky<\/span>, &#8220;Wormhole Message Routing in Networks of Workstations&#8221;<a href=\"http:\/\/people.bu.edu\/markkar\/papers\/141-wormhole.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">,<span>\u00a0<\/span><\/a><span><em>Proc.of<\/em><\/span><em><span>\u00a0<\/span><\/em>\u00a0<span>\u00a0<\/span><em>PDCS-2000,\u00a0 pp.169-174<\/em><\/p>\n<ol start=\"142\">\n<li style=\"font-weight: 400;\"><span><\/span><span>L.Zakrevski<\/span>,<span><\/span><span>M.Mustafa<\/span>,<span>\u00a0<\/span><span>M.G.Karpovsky<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/142.doc\">Turn Prohibition Based Routing in Irregular Computer Networks<\/a>&#8220;,<span>\u00a0<\/span><em>Proc. of PDCS-2000, pp.174-179<\/em><\/li>\n<li style=\"font-weight: 400;\"><span><\/span><span>M.G.Karpovsky,I.Levin<\/span>,<span><\/span><span>V.Sinelnikov<\/span>,<span>\u00a0<\/span><span>R.Goot<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/143.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">New Architecture for Sequential Machines with Self-Error-Detection<\/a>&#8220;,<span>\u00a0<\/span><em>Proc.<span>\u00a0<\/span><span>Int.Conf.on<\/span><span>\u00a0<\/span>New<\/em><span>\u00a0<\/span><em>Information Technologies<\/em>,<span>\u00a0<\/span><span>NITe&#8217;s<\/span><span>\u00a0<\/span>2000, pp.111-117<\/li>\n<li style=\"font-weight: 400;\"><span><\/span><span>M.G.Karpovsky,R.S.Stankovic<\/span>,<span><\/span><span>C.Moraga<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/144.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Spectral Techniques in Binary and Multiple-Valued Switching Theory<\/a>&#8220;<span>\u00a0<\/span><em>Proc.<\/em><span>\u00a0<\/span><span><em>Int.Symp.on<\/em><\/span><em><span>\u00a0<\/span>Multivalued Logic<\/em>, May 2001, pp41-46<\/li>\n<li style=\"font-weight: 400;\"><span><\/span><span>U.Blass<\/span>,<span><\/span><span>I.Honkala<\/span>,<span>\u00a0<\/span><span>M.G.Karpovsky<\/span>, S.<span>\u00a0<\/span><span>Litsyn<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/145.pdf\">Short Dominating Paths and Cycles in<span>\u00a0<\/span><span>Hypercubes<\/span><\/a>&#8220;,<span>\u00a0<\/span><em>Annals of Combinatorics 5<\/em>, 2001, pp. 51-59.<\/li>\n<li style=\"font-weight: 400;\"><span><\/span><span>M.G.Karpovsky<\/span>,<span><\/span><span>R.S.Stankovic<\/span>,<span>\u00a0<\/span><span>J.T.Astola<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/146.pdf\">Spectral Techniques for Design and Testing of Computer Hardware<\/a>&#8220;,<span>\u00a0<\/span><strong><em>Keynote Pape<\/em><\/strong><em>r, Proc. First Int. Workshop on\u00a0Spectral Techniques and Logical Design for Future<\/em><span>\u00a0<\/span><em>Digital Systems<\/em>, Tampere, Finland, June, 2000, pp.9-43.<\/li>\n<li style=\"font-weight: 400;\"><span><\/span><span>P.K.Lala<\/span>,<span><\/span><span>M.G.Karpovsky<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/147.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">An Approach for Designing On-line Testable State Machines<\/a>&#8220;,<span>\u00a0<\/span><em>Proc. International Workshop on On-line Testing<\/em>, 2001.<\/li>\n<li style=\"font-weight: 400;\">I. Levin, V.<span><\/span><span>Sinelnikov<\/span>, M. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/1481.pdf\">Synthesis of ASM-based Self-Checking Controllers&#8221;,<span><\/span><\/a><em>Proceedings of International Conference on Digital Systems Design<\/em>, DSD&#8217;2001.<\/li>\n<li style=\"font-weight: 400;\">I. Levin, M. Karpovsky, V.<span><\/span><span>Sinelnikov<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/1491.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Architecture of FPGA-based Concurrent Checking FSM&#8221;,<span><\/span><\/a><em>Proceedings of the Third International Electronic Circuits and Systems Conference,<span>\u00a0<\/span><\/em>Bratislava, Slovakia, September 5-7, 2000.<\/li>\n<li style=\"font-weight: 400;\">M. Karpovsky, R. Stankovic, J. Astola, &#8220;<a href=\"\/mark\/files\/2018\/02\/150.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Construction of Linearly Transformed Binary Decision Diagrams by Autocorrelation Functions<\/a>&#8220;,<span><\/span><em>Proceedings of International TICSP Workshop on Spectral Methods and<span><\/span><span>Multirate<\/span><span>\u00a0<\/span>Signal Processing, SMMSP&#8217;2001<\/em>, Pula, Croatia, 2001.<\/li>\n<li style=\"font-weight: 400;\">M. Karpovsky, L.<span><\/span><span>Zakrevski<\/span>, M. Mustafa, A. Agarwal, &#8220;<a href=\"\/mark\/files\/2018\/02\/151.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">The Generalized Turn Prohibition Model for Multicast Routing in Irregular Networks<\/a>,&#8221;<span><\/span><em>Proc. of Thirteenth IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS 2001)<\/em>,Anaheim, California, USA, August 21-24, 2001.<\/li>\n<li style=\"font-weight: 400;\">A. Trachtenberg, M. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/152.pdf\">Space-Time Turn Prohibitions for Low Density Parity-Check Codes<\/a>&#8220;,<span><\/span><em>Proc. of 39th Annual Allerton Conference on Communication, Control<\/em>,<span><\/span><em>and Computing<\/em>, 2001.<\/li>\n<li style=\"font-weight: 400;\">M. Karpovsky, L. Levitin, A. Trachtenberg, &#8220;<a href=\"\/mark\/files\/2018\/02\/153.pdf\">Data Verification and Reconciliation with Generalized Error Control Codes<\/a>&#8220;,<span><\/span><em>Proc. of 39th Annual Allerton Conference on Communication, Control, and Computing<\/em>, 2001.<\/li>\n<li style=\"font-weight: 400;\">D. Starobinski,<span><\/span><span>M.G.Karpovsky<\/span>, L.<span><\/span><span>Zakrevski<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/154.pdf\">Application of Network Calculus to General Topologies Using Turn Prohibitions&#8221;<\/a>,<span>\u00a0<\/span><em>Proc. INFOCOM<\/em><span>\u00a0<\/span>2002.<\/li>\n<li style=\"font-weight: 400;\"><strong><\/strong><span><\/span>M. Karpovsky, R. Stankovic,<span><\/span><span>C.Moraga<\/span>,<span>\u00a0<\/span><a href=\"\/mark\/files\/2018\/02\/114.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">&#8220;Spectral Techniques in Binary and Multiple-Valued Switching Theory<\/a>&#8220;,<span>\u00a0<\/span><em>International Journal on Multiple-Valued Logic,<span>\u00a0<\/span><\/em>Vol. 10, No3, 2004.<\/li>\n<li style=\"font-weight: 400;\"><span><\/span><span>D.Starobinski<\/span>,<span><\/span><span>M.G.Karpovsky<\/span>,<span>\u00a0<\/span><span>L.Zakrevsky<\/span><span>\u00a0<\/span>&#8220;<a href=\"\/mark\/files\/2018\/02\/156.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Applications of Network Calculus to General Topologies<\/a>&#8220;<span>\u00a0\u00a0<em>IEEE<\/em><\/span><em>\/ACM Transactions on Networking<\/em>, June 2003, vol. 11, No.\u00a03, pp 411-422<\/li>\n<li style=\"font-weight: 400;\"><span><\/span><span>I.Honkala<\/span>,<span><\/span><span>M.G.Karpovsky<\/span>,<span>\u00a0<\/span><span>S.Litsyn<\/span><span>\u00a0<\/span>&#8220;<a href=\"\/mark\/files\/2018\/02\/157.pdf\">Cycles Identifying Vertices and Edges in Binary<span>\u00a0<\/span><span>Hypercubes<\/span><span>\u00a0<\/span>and Two-Dimensional Tori&#8221;<\/a>,<span>\u00a0\u00a0<em>Discrete<\/em><\/span><em><span>\u00a0<\/span>Applied Mathematics<\/em>, vol129, No 2-3, 2003, pp.409-418<\/li>\n<li style=\"font-weight: 400;\"><span><\/span><span>I.Levin<\/span>, M. G. Karpovsky, S.<span><\/span><span>Ostanin<\/span>, &#8220;<a href=\"http:\/\/muse.tau.ac.il\/ktl\/Team_Web\/Papers\/ioltw02.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Sequential Circuits applicable for Detection of Faults&#8221;<\/a>,<span>\u00a0<\/span><em>Proc. of 8th<span>\u00a0<\/span><span>Int.Workshop<\/span><span>\u00a0<\/span>on On-Line Testing, 2002.<\/em><\/li>\n<li style=\"font-weight: 400;\"><span><\/span><span>I.Honkala<\/span>,<span><\/span><span>M.G.Karpovsky<\/span>,<span>\u00a0<\/span><span>S.Litsyn<\/span>, &#8220;On Identification of Vertices and Edges Using Cycles&#8221;,<span>\u00a0<\/span><em>Proc. AAECC-14, 2001, pp. 308-314<\/em><\/li>\n<li style=\"font-weight: 400;\"><span><\/span><span>M.G.Karpovsky<\/span>,<span><\/span><span>R.Stankovic<\/span>,<span>\u00a0<\/span><span>C.Moraga<\/span>,<span>\u00a0<\/span><a href=\"\/mark\/files\/2018\/02\/160.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">&#8220;Recent Results in Applications of Spectral Techniques in Binary and Multiple-Valued Switching Theory&#8221;<\/a><em>,<span>\u00a0<\/span><span>Proc<\/span><span>\u00a0<\/span>of Int.<span>\u00a0<\/span><span>Conf<\/span><span>\u00a0<\/span>on Computer Intelligence and Information Technologies, pp.51-57, 2001<\/em><\/li>\n<li style=\"font-weight: 400;\"><span><\/span><span>M.G.Karpovsky<\/span>,<span><\/span><span>R.Stancovic<\/span>, J.<span>\u00a0<\/span><span>Aastola<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/161.pdf\">Reduction of Sizes of Decision Diagrams by Autocorrelation<span>\u00a0<\/span><span>Fuctions<\/span><\/a>&#8220;,<span>\u00a0<\/span><em>IEEE Trans on Computers, May, 2003, pp.592-607 \u00a0<\/em><\/li>\n<li style=\"font-weight: 400;\">I. Levin, V.<span><\/span><span>Ostrovsky<\/span>, S.<span><\/span><span>Ostanin<\/span>, M.G. Karpovsky,<span>\u00a0<\/span><a href=\"http:\/\/muse.tau.ac.il\/ktl\/Team_Web\/Papers\/GLSVLSI'02(CR).pdf\" target=\"_blank\" rel=\"noopener noreferrer\">&#8220;Self-Checking Sequential Circuits with Self-Healing&#8221;<\/a>,<span>\u00a0<\/span><span><em>Proc<\/em><\/span><em><span>\u00a0<\/span>of VLSI Symposium GLSVLSI-2002, 2002<\/em><\/li>\n<li style=\"font-weight: 400;\"><em>163<\/em>. R.<span><\/span><span>Stancovic<\/span>, M.G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/163.pdf\">Remarks on the Number of Logical Networks with the Same Complexity Derived from Spectral Decision Diagrams&#8221;,<span><\/span><\/a><em><em> Int. TICS Workshop on Spectral Methods and<span>\u00a0<\/span><span>Multirate<\/span><span>\u00a0<\/span>Signal Processing, SMMSP&#8217;02, Toulouse, France, September 7-8, 2002, pp163-170.<\/em><\/em>164. L.B. Levitin, M.G. Karpovsky, &#8220;Deadlock Prevention in Networks Modeled as Weighted Graphs&#8221;,<span>\u00a0<\/span><em>Proc. ICINSAT-2002<span>\u00a0<\/span><span>Conf<\/span>, 2002, pp. 42-47.\u00a0<\/em><\/li>\n<li style=\"font-weight: 400;\"><span><\/span><span>M.G.Karpovsky<\/span>,<span><\/span><span>M.Mustafa<\/span>,<span>\u00a0<\/span><span>R.Mathur<\/span>,<span>\u00a0<\/span><a href=\"\/mark\/files\/2018\/02\/165.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">&#8220;Fault-tolerant Unicast Wormhole Routing in Irregular Computer Networks&#8221;,<\/a><span>\u00a0<\/span><em>Proc. of the Conference on Parallel and Distributed Computing and Systems, PDCS 2002\u00a0<\/em><\/li>\n<li style=\"font-weight: 400;\"><em><span><\/span><\/em><span>A.Taubin<\/span>,<span><\/span><span>M.G.Karpovsky<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/166.doc\">Devices Resistant to Attacks. Design methodology&#8221;,<\/a><span>\u00a0<\/span><span><em>Proc<\/em><\/span><em><span>\u00a0<\/span>of IEEE<span>\u00a0<\/span><span>Conf<\/span><span>\u00a0<\/span>on Technologies for Homeland Security, 2002<\/em><\/li>\n<li style=\"font-weight: 400;\"><em><span><\/span><\/em><span>M.G.Karpovsky<\/span>,<span><\/span><span>L.B.Levitin<\/span>,<span>\u00a0<\/span><span>A.Trachtenberg<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/167.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Data Verification and Reconciliation with Generalized Error Correcting Codes<\/a>&#8220;,<span>\u00a0<\/span><em>IEEE Trans. on Information Theory<\/em>, Vol. 49, No.7, July 2003, pp.1788-1794.<\/li>\n<li style=\"font-weight: 400;\"><span>De<\/span><span><\/span><span>Pelegrini<\/span>,<span>\u00a0<\/span><span>D.Starobinski<\/span>,<span>\u00a0<\/span><span>M.G.Karpovsky<\/span>,<span>\u00a0<\/span><span>L.B.Levitin<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/168.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Scalable Cycle Breaking Algorithms<span>\u00a0<\/span><span>For<\/span><span>\u00a0<\/span>Gigabit Ethernet Backbones&#8221;<\/a>,<span>\u00a0<\/span><em>Proc.<span>\u00a0<\/span><span>Infocom<\/span><span>\u00a0<\/span>2004\u00a0<\/em><\/li>\n<\/ol>\n<ol start=\"170\">\n<li style=\"font-weight: 400;\"><span>G.Karpovsky<\/span>,<span><\/span><span>R.Stancovic<\/span><span>\u00a0<\/span>and<span>\u00a0<\/span><span>J.Aastola<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/170.doc\">Construction of Linearly Transformed Planar BDDs by Walsh Coefficients<\/a>&#8220;,<span>\u00a0<\/span><em>Proc. ISCAS,<\/em><span>\u00a0<\/span>2004<\/li>\n<li style=\"font-weight: 400;\"><strong><\/strong><span><\/span><span>M.G.Karpovsky\u00a0<\/span><span><\/span>and A. Taubin, &#8220;<a href=\"\/mark\/files\/2018\/02\/171.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A New Class of Nonlinear Systematic Error Detecting Codes<\/a>&#8220;<span>,\u00a0<em>\u00a0IEEE<\/em><\/span><em><span>\u00a0<\/span>Trans Info Theory,<span>\u00a0<\/span><\/em><span>Vol<\/span><span>\u00a0<\/span>50, No.8, 2004, pp.1818-1820<\/li>\n<li style=\"font-weight: 400;\"><span>Kolotov<\/span><span><\/span>, Levin, I.,<span>\u00a0<\/span><span>Ostrovsky<\/span><span>\u00a0<\/span>V., Karpovsky M.G, &#8220;Software Tool for BDD Optimizing by Using Autocorrelation Functions&#8221;.<span>\u00a0<\/span><em>Proc. of the 23-th IEEE Convention of EEEI, 2004, pp129-132.<\/em><\/li>\n<li style=\"font-weight: 400;\"><span>Levin<\/span>,<span><\/span><span>M.G.Karpovsky<\/span>,<span>\u00a0<\/span><span>S.Ostanin<\/span>,<span>\u00a0<\/span><span>V.Sinelnikov<\/span>, &#8220;Designing Circuits Detecting Different Types of Faults&#8221;,<span>\u00a0<\/span><em>WSEN Transactions on Electronics, Issue 2, Vol. 1, Apr 2004, pp.396-404<\/em>. Karpovsky, M.G., K. Kulikowski, and A. Taubin, &#8220;<a href=\"\/mark\/files\/2018\/02\/174.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Robust Protection Against Fault-Injection Attacks on Smart Cards Implementing the Advanced Encryption Standard&#8221;<\/a>,<span><\/span><em> Int. Conference on Dependable Systems and Networks (DNS 2004)<\/em>, July, 2004<\/li>\n<li style=\"font-weight: 400;\">\u00a0Karpovsky, M.G., K. Kulikowski, and<span><\/span><span>Taubin<\/span>,<span><\/span>&#8220;<a href=\"\/mark\/files\/2018\/02\/175.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Differential Fault Analysis Attack Resistant Architectures for the Advanced Encryption Standard&#8221;<\/a>,<span>\u00a0<\/span><em>Proc. IFIP World Computing Congress,<span>\u00a0<\/span><span>Cardis<\/span>,<\/em><span>\u00a0<\/span>Aug., 2004, pp 177-193<\/li>\n<li style=\"font-weight: 400;\"><strong><\/strong><span><\/span>Stankovic, R.S.,<span><\/span>Karpovsky,<span>\u00a0<\/span>M.G., and J.T.<span>\u00a0<\/span><span>Aastola<\/span>,<span>\u00a0<\/span>&#8220;<a href=\"\/mark\/files\/2018\/02\/176.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Reduction of the Number of Coefficients in Arithmetic Expressions by Autocorrelation Functions<\/a><em>&#8220;,<span>\u00a0<\/span><\/em><em>Proc. 2004 International Workshop on Spectral Methods and<span>\u00a0<\/span><span>Multirate<\/span><span>\u00a0<\/span>Signal Processing, SMMSP2004<\/em><\/li>\n<li style=\"font-weight: 400;\"><span>Smirnov<\/span>,<span><\/span><span>A.Taubin<\/span>,<span>\u00a0<\/span><span>M.Karpovsky<\/span><span>\u00a0<\/span>and<span>\u00a0<\/span><span>L.Rozenblum<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/177.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Gate Transfer Level Synthesis as an Automated Approach to Fine-Grain Pipelining&#8221;<\/a>,<span>\u00a0<\/span><span><em>Proc<\/em><\/span><em><span>\u00a0<\/span>25th Int. Conference on Application and Theory of Petri Nets,<span>\u00a0<\/span><\/em>2004, pp.67-79.<\/li>\n<li style=\"font-weight: 400;\">Smirnov A., Taubin A., and Karpovsky M.<span><\/span><em>&#8220;<\/em><a href=\"\/mark\/files\/2018\/02\/177.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Automated Pipelining in ASIC Synthesis Methodology: Gate Transfer Level&#8221;<\/em><\/a><em>,<\/em><em><span><\/span> Thirteenth Int. Workshop on Logic and Synthesis,<span>\u00a0<\/span><\/em>2004.<\/li>\n<li style=\"font-weight: 400;\"><span>Stanckovic<\/span>, and<span><\/span><span>M.G.Karpovsky<\/span>,<span>\u00a0<\/span><a href=\"\/mark\/files\/2018\/02\/179.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Remarks on Calculation of Autocorrelation on Finite Dyadic Groups by Local Transformations of Decision Diagrams&#8221;,<span>\u00a0<\/span><\/a>\u00a0<em>Lecture Notes Springer and<span>\u00a0<\/span><span>Verlag<\/span><\/em>, 2005<\/li>\n<li style=\"font-weight: 400;\"><span>Kulikowski<\/span>,<span><\/span><span>M.Su<\/span>,<span>\u00a0<\/span><span>A.Smirnov<\/span>,<span>\u00a0<\/span><span>A.Taubin<\/span>, and<span>\u00a0<\/span><span>M.G.Karpovsky<\/span>,<span>\u00a0<\/span><span>D.MacDonald<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/180.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Delay Insensitive Encoding and Power Analysis: A Balancing Act&#8221;,<\/a><span>\u00a0<\/span><em>Proc. 11th Int.<span>\u00a0<\/span><span>Symp<\/span>.<span>\u00a0<\/span><span>on<\/span><span>\u00a0<\/span>Asynchronous Circuits and Systems<\/em>, 2005<\/li>\n<li style=\"font-weight: 400;\">.<span><\/span><span>Smirnov<\/span>, A. Taubin,<span><\/span><span>M.Su<\/span><span>\u00a0<\/span>and M.G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/181.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">An Automated Fine-Grained Pipelining Using Domino Style Asynchronous Library&#8221;<\/a>,<span>\u00a0<\/span><em>Proc. of ACSD Workshop<\/em>, June 2005<\/li>\n<li style=\"font-weight: 400;\"><span>S.Stankovic<\/span>,<span><\/span><span>J.T.Aastola<\/span><span>\u00a0<\/span>and<span>\u00a0<\/span><span>M.G.Karpovsky<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/182.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Remarks on History of Abstract Harmonic Analysis<\/a>&#8220;,<span>\u00a0<\/span><em>Proc. Fifth Int. Workshop on Spectral Methods and Signal Processing, 2005<\/em><\/li>\n<li style=\"font-weight: 400;\"><em><\/em><strong><\/strong><span><\/span><span>M.Mustafa<\/span>,<span>\u00a0<\/span><span>M.G.Karpovsky<\/span><span>\u00a0<\/span>and<span>\u00a0<\/span><span>L.B.Levitin<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/184.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Cycle Breaking in Wormhole Routed<span>\u00a0 Computer<\/span><span>\u00a0<\/span>Communication Networks&#8221;,<span>\u00a0<\/span><em>Proc.<span>\u00a0<\/span><span>Opnetwork<\/span><span>\u00a0<\/span>, 2005<\/em><\/a><\/li>\n<li style=\"font-weight: 400;\"><strong><\/strong><em><span><\/span><\/em><span>K.J.Kulikowski<\/span>,<span><\/span><span>M.G.Karpovsky<\/span><span>\u00a0<\/span>and<span>\u00a0<\/span><span>A.Taubin<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/185.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Robust Codes for Fault Resistant Cryptographic Hardware&#8221;,<span>\u00a0<\/span><span><em>Proc<\/em><\/span><em><span>\u00a0<\/span>of Int. Workshop on Fault Detection and Tolerance in Cryptography<\/em><\/a><em>,<\/em><span>\u00a0<\/span>Aug 2005.<\/li>\n<li style=\"font-weight: 400;\"><strong><\/strong><span><\/span>Karpovsky, M.G., Stankovic, R.S., Moraga, C., \u201d<a href=\"\/mark\/files\/2018\/02\/MVSLC.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Spectral techniques in binary and multiple-valued switching theory, a review of results in the\u00a0decade 1991-2000<\/a>\u201d,<span><\/span><em>Multiple-Valued Logic and Soft Computing,<span>\u00a0<\/span><\/em>Vol. 10, N. 3, 2004, 261-286<span>\u00a0<\/span>\u00a0Levin I., Stankovic R., Karpovsky M., Astola J., (2005) &#8220;Construction of Planar BDDs by Using Linearization and Decomposition&#8221;,<span><\/span><em> of Fourteenth International Workshop on Logic and Synthesis<\/em>, Lake Arrowhead, California, pp. 132-139.<\/li>\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong><span>F.De<\/span><span>\u00a0<\/span><span>Pelegrini<\/span>,<span>\u00a0<\/span><span>D.Starobinski<\/span>,<span>\u00a0<\/span><span>M.G.Karpovsky<\/span>,<span>\u00a0<\/span><span>L.B.Levitin<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/188.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Scalable Cycle Breaking Algorithms For Gigabit Ethernet Backbones&#8221;<\/a>,<span>\u00a0<\/span><em>Journal of Optical Networking,<span>\u00a0<\/span><\/em>Vol.5, N.1 Jan. 2006, pp.1-23<\/li>\n<li style=\"font-weight: 400;\"><span>Honkala<\/span>,<span><\/span><span>M.G.Karpovsky<\/span>,<span>\u00a0<\/span><span>L.B.Levitin<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/169.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">On Robust and Dynamic Identifying Codes<\/a>&#8220;,<span>\u00a0<\/span><em>IEEE Trans Info Theory<\/em>, Feb 2006, pp599-613<\/li>\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong><span>K.J.Kulikowski<\/span><strong>,<span><\/span><\/strong><span>M.G.Karpovsky<\/span><span>\u00a0<\/span>and<span>\u00a0<\/span><span>A.R.Taubin<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/189.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Power Attacks on Secure Hardware, Based on Early Propagation of Data&#8221;,<span>\u00a0<\/span><em>Int. Workshop on On-Line Testing, pp.131-139<span>\u00a0<\/span><\/em>2006<\/a><\/li>\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong><span><em>L.B.L<\/em>evitin<\/span>,<span><\/span><span>M.G.Karpovsky<\/span>,<span>\u00a0<\/span><span>M.Mustafa<\/span><span>\u00a0<\/span>and<span>\u00a0<\/span><span>L.Zakrevski<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/183.doc\">New Algorithm for Finding Cycle-B<\/a><a href=\"\/mark\/files\/2018\/02\/183.doc\">reaking Sets of Turns in a Graph&#8221;,<span>\u00a0\u00a0<em>=<\/em><\/span><em>-98Journal of Graph Algorithms and Applications<\/em>,<span>\u00a0<\/span><\/a>Vol. 10, no. 2, 2006<\/li>\n<li style=\"font-weight: 400;\"><strong><\/strong><span><\/span>K. J. Kulikowski, M.G. Karpovsky,<span><\/span><span>A.Taubin<\/span>,<span>\u00a0<\/span><a href=\"\/mark\/files\/2018\/02\/191.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span>&#8221; DPA<\/span><span>\u00a0<\/span>on Faulty Cryptographic Hardware and Countermeasures&#8221;,<\/a><span>\u00a0<\/span><span><em>Proc<\/em><\/span><em><span>\u00a0<\/span>of Int. Workshop on Fault Detection and Tolerance in Cryptography,<span>\u00a0<\/span><\/em>2006<\/li>\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong><span>G.Gaubatz<\/span>,<span><\/span><span>B.Sunar<\/span>,<span>\u00a0<\/span><span>M.G.Karpovsky<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/192.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Robust Residue Codes for Fault-Tolerant Public-Key Arithmetic<\/a>&#8220;,<span>\u00a0<\/span><span><em>Proc<\/em><\/span><em><span>\u00a0<\/span>of Int. Workshop on Fault Detection and Tolerance in Cryptography,<span>\u00a0<\/span><\/em>2006<\/li>\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong>Smirnov A., Taubin A., and Karpovsky M., &#8220;On Automatic Synthesis of Data Dependent<span><\/span><span>Micropipelines<\/span>&#8220;<span>\u00a0<\/span><em>Proc. Int. Workshop on Logic and Synthesis,<span>\u00a0<\/span><\/em>2006<\/li>\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong>I. Levin,<span><\/span><em>T<\/em>.\u00a0Keren, G.<span>\u00a0<\/span><span>Kolotov<\/span>,<span>\u00a0 M.G<\/span>. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/195.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Piece-wise Linearization of Logical Functions<\/a>&#8220;<span>\u00a0<\/span><em>,<span>\u00a0<\/span><span>Proc<\/span><span>\u00a0<\/span><span>Int<\/span><span>\u00a0<\/span>Workshop on Spectral Techniques, 2006, pp 67-75<\/em><\/li>\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong>R. Stankovic,<span> Jaakko<\/span><span>\u00a0<\/span>Astola,\u00a0 Mark Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/196.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Some remarks on sampling theorem&#8221;<\/a>,<span>\u00a0<\/span><span><em>Proc<\/em><\/span><em><span>\u00a0<\/span><span>Int<\/span><span>\u00a0<\/span>Workshop on Spectral Techniques, 2006, pp. 163-171<\/em><\/li>\n<li style=\"font-weight: 400;\"><strong><\/strong><span><\/span>K. Kulikowski,<span><\/span><span>M.G.Karpovsky<\/span>,<span>\u00a0<\/span><span>A.Taubin<\/span>,&#8221;Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection&#8221;,<span>\u00a0<\/span><em>Lecture Notes in Computer Science<\/em>, Springer and<span>\u00a0<\/span><span>Verlag<\/span>, 2006<\/li>\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong>M<strong>.<span><\/span><\/strong>Mustafa,<span>\u00a0<\/span><span>L.B.Levitin<\/span>,<span>\u00a0<\/span><span>M.G.Karpovsky<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/198.doc\">Weighted Turn Prohibitions in Computer Networks&#8221;<\/a>,<span>\u00a0<\/span><em>Proc.<span>\u00a0<\/span><span>Opnetwork<\/span>,<span>\u00a0<\/span><\/em>2006<\/li>\n<li style=\"font-weight: 400;\"><strong><\/strong><span><\/span><span>G.Gaubatz<\/span>, B. Sunar,<span><\/span><span>M.G.Karpovsky<\/span>, &#8220;Non-linear Residue Codes for Robust Public-Key Arithmetic&#8221;,<span>\u00a0<\/span><em>Lecture Notes in Computer Science,<\/em><span>\u00a0<\/span>Vol. 4326\/2006, Fault Diagnosis in Cryptography, pp173-184, 2006<\/li>\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong>Stankovic, R.S. Astola, J., M.G. Karpovsky,<span><\/span><span>&#8221;\u00a0<\/span><a href=\"\/mark\/files\/2018\/02\/200.pdf.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Some Historical Remarks on Switching Theor<\/a>y&#8221;,<em><span>\u00a0<\/span><span>Proc.Int<\/span><span>\u00a0<\/span>Workshop on Spectral Techniques,<\/em><span>\u00a0<\/span>2007<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\">\u00a0200<strong>.\u00a0<\/strong>M.G.Karpovsky, K. Kulikowski, Z, Wang, &#8220;<a href=\"\/mark\/files\/2018\/02\/201.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Robust Error Detection in Communication and Computation Channels&#8221;<\/a>,<span>\u00a0<\/span><strong><em>Keynote paper<\/em><\/strong><em>, Int. Workshop on Spectral Techniques<\/em>, 2007<\/p>\n<ol start=\"201\">\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong>K. J. Kulikowski, M. G. Karpovsky,<span><\/span><span>A.Taubin<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/194.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Robust Codes and Robust, Fault Tolerant Architectures of the Advanced Encryption Standard&#8221;<\/a><span>,\u00a0<em>\u00a0Journal<\/em><\/span><em><span>\u00a0<\/span>of System Architecture,\u00a0vol. 53, pp138-149,<span>\u00a0<\/span><\/em>2007<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\">202.M.G.Karpovsky, K. Kulikowski, Z, Wang, &#8220;<a href=\"\/mark\/files\/2018\/02\/202.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">On-Line Self Error Detection with Equal Protection Against All Errors&#8221;<em>,<\/em><\/a><em><span>\u00a0<\/span>Int. Journal of Highly Reliable Electronic System Design<\/em>, June 2008<\/p>\n<ol start=\"203\">\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong>K. Kulikowski, V. Venkataraman, Z. Wang, A. Taubin, M.G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/203.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Asynchronous Balanced Gates Tolerant to Interconnect Variability&#8221;<\/a>,<span><\/span><em>Proceedings of ISCAS<\/em>, 2008<\/li>\n<li style=\"font-weight: 400;\"><strong><\/strong><span><\/span>K. Kulikowski, M. G. Karpovsky, A. Taubin, Z. Wang, A.<span><\/span><span>Kulikovski<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/204.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Fault Detection for Secure QDI Asynchronous Circuits<\/a>&#8220;,<span>\u00a0<\/span><em>Proceedings of Workshop on Dependable and Secure<span>\u00a0<\/span><span>Nanocomputing<\/span><\/em>, DSN-08, 2008<\/li>\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong>K. Kulikowski, Z. Wang, M.G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/205.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Comparative Analysis of Fault Attack Resistant Architectures for Private and Public Key Cryptosystems<\/a>&#8220;,<span><\/span><span><em>Proc<\/em><\/span><em><span>\u00a0<\/span>of Int. Workshop on Fault-tolerant Cryptographic Devices<\/em>, 2008<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\">206.Z.E.Jamous, L. B. Levitin, M. Mustafa, M. G. Karpovsky, &#8220;Performance of Cycle-Breaking Algorithms for Deadlock and<span>\u00a0<\/span><span>Livelock<\/span><span>\u00a0<\/span>Prevention in Communication Networks&#8221;,<span>\u00a0<\/span><em>Proceedings of<span>\u00a0<\/span><span>Opnetwork<\/span><\/em>, 2008<\/p>\n<ol start=\"207\">\n<li style=\"list-style-type: none;\">\n<ol start=\"207\">\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong>K. Kulikowski, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/209.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Robust Correction of Repeating Errors by Nonlinear Codes&#8221;,<span><\/span><\/a>\u00a0<em><span>\u00a0<\/span>Communications<\/em>,<span>\u00a0<\/span><em>IET,<span>\u00a0<\/span><span>Vol<\/span><span>\u00a0<\/span>5 pp2317-2327, 4,<span>\u00a0<\/span><\/em>2011<\/li>\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong><span>O.Keren<\/span>, I, Levin, M. G. Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/208.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Non-redundant Scheme for Arbitrary Error Detection in Combinational<span> Circuits<\/span>&#8220;,<\/a><span>\u00a0<\/span><em>Proceedings of 16th IFIP\/IEEE Conference on Very Large Scale Integration<\/em>, 2008<\/li>\n<li style=\"font-weight: 400;\"><strong><\/strong><span><\/span>L. Levitin, M. G. Karpovsky, M. Mustafa, &#8220;<a href=\"\/mark\/files\/2018\/02\/210.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Deadlock prevention by Turn Prohibitions in Interconnection Networks<span>&#8220;<\/span><\/a>,\u00a0<span>\u00a0<\/span><em>Proc. of Int. Workshop on Communication Architecture for Clusters<\/em>, CAC, Rome, May, 2009<\/li>\n<li style=\"font-weight: 400;\"><strong><em><span><\/span><\/em><\/strong>R. S. Stankovic, M. G. Karpovsky, and C. Moraga,<span><\/span><span>&#8221;\u00a0<\/span><a href=\"\/mark\/files\/2018\/02\/211.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Remarks on Codes, Spectral Transforms, and Decision Diagrams&#8221;<\/a>\u00a0 in\u00a0<span>\u00a0<\/span><span>Tabush<\/span>, I.,<span>\u00a0<\/span><span>Egiazarian<\/span>, K.,<span>\u00a0<\/span><span>Gabouj<\/span>, M., (eds.),\u00a0pp 226-246, July,<span>\u00a0<\/span>2009<\/li>\n<li style=\"font-weight: 400;\"><strong><em><\/em><\/strong><em><span><\/span><\/em>Z. Wang, M. G. Karpovsky, K. Kulikowski,<span><\/span><a href=\"\/mark\/files\/2018\/02\/207.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">&#8220;Replacing Linear Hamming Codes by Robust Nonlinear Codes Results in Reliability Improvement for Memories<\/a>&#8220;,<span>\u00a0<\/span><em>Proc. Int.<span>\u00a0<\/span><span>Symp<\/span>. Dependable Computing<\/em>, July 2009<\/li>\n<li style=\"font-weight: 400;\">\u00a0Z. Wang, M. G. Karpovsky, B Sunar, &#8220;<span><a href=\"\/mark\/files\/2018\/02\/213.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Multilinear Codes for Robust Error Detecrion&#8221;,<\/a><\/span><span><\/span><em> Int. On-Line Testing<span><\/span><span>Symp<\/span><span>.,<\/span><\/em><span>\u00a0<\/span>June, 2009<\/li>\n<li style=\"font-weight: 400;\">S. Baranov, I. Levin,<span><\/span><span>Keren<\/span>, M. G. Karpovsky, &#8220;Designing Fault Tolerant FSMs by<span><\/span><span>Nano<\/span>-PLAs&#8221;,<span>\u00a0<\/span><em>Proc. Int. On-Line Testi<\/em>ng<span>\u00a0<\/span><span>Symp<\/span>, June 2009<\/li>\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong>Z. Wang, M. G. Karpovsky, K. Kulikowski,<span><\/span><a href=\"\/mark\/files\/2018\/02\/214.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">&#8220;Design of Memories with Concurrent Error Detection and Correction by<span>\u00a0 Non<\/span>-Linear SEC-DED Codes&#8221;<\/a>,<span>\u00a0<\/span><em>Journal of Electronic Testing<\/em>, vol. 26, Oct 2010<\/li>\n<li style=\"font-weight: 400;\">B. Levitin, M. G. Karpovsky, M. Mustafa, &#8220;<a href=\"\/mark\/files\/2018\/02\/206.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Minimal Sets of Turns for Breaking Cycles in Graphs Modeling Networks&#8221;<\/a><span><\/span>,<span>\u00a0<\/span><em>\u00a0IEEE Trans. Parallel and Distributed Systems.<\/em>, vol. 21, No. 9, Sept 2010 , pp. 1342-1353<\/li>\n<li style=\"font-weight: 400;\"><strong><em><\/em><\/strong><strong><span><\/span>Z.<span><\/span><\/strong>Wang, M.G. Karpovsky,<span>\u00a0<\/span><span>B.Sunar<\/span>,<span>\u00a0<\/span><span>A.Joshi<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/217.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Design of Reliable and Secure Multipliers by<span>\u00a0<\/span><span>Multilinear<\/span><span>\u00a0<\/span>Arithmetic Codes&#8221;<\/a>,<span>\u00a0<\/span><em>Proc. Int. Conf. on Information, Communications Security<\/em>, Dec. 2009<\/li>\n<li style=\"font-weight: 400;\"><em>.<\/em><span><\/span> Wang, M. G. Karpovsky and A. Joshi, &#8220;<span><\/span><a href=\"\/mark\/files\/2018\/02\/218.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Reliable MLC\u00a0 NAND Flash Memories Based on Non-Linear t-error Correcting Codes&#8221;<em><span>\u00a0<\/span><\/em><\/a><em>Proc. Int. Conf. on Dependable Systems and Networks,<span>\u00a0<\/span><\/em>June 2010<em><span>\u00a0<\/span><\/em><a href=\"\/mark\/files\/2018\/02\/218.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><em>\u00a0<\/em><\/a><\/li>\n<li style=\"font-weight: 400;\">\u00a0Z. Wang, M. Karpovsky,<span><\/span><a href=\"\/mark\/files\/2018\/02\/219.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">&#8220;Robust FSMs for Cryptographic Devices Resilient to Strong Fault Injection Attacks&#8221;<\/a><span><\/span>,<span>\u00a0<\/span><span><em>Proc<\/em><\/span><em><span>\u00a0<\/span><span>Int<\/span><span>\u00a0<\/span><span>Symp<\/span>.<span>\u00a0<\/span><span>on<\/span><span>\u00a0<\/span>On-line Testing,<\/em><span>\u00a0<\/span>July 2010<\/li>\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong>O. Keren, I. Levin, M. G. Karpovsky,<span><\/span><a href=\"\/mark\/files\/2018\/02\/220.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">&#8220;<span>Duplication Based One-to-many Coding for Trojan HW Detection<\/span><\/a>&#8220;,<span>\u00a0<\/span>I<em>nt.<span>\u00a0<\/span><span>Symp.on<\/span><span>\u00a0<\/span>Defect and Fault Tolerance in VLSI Systems<\/em>, 2010<\/li>\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong><span>K.D.Akdemir<\/span>, Z. Wang, M. G. Karpovsky, and B. Sunar,\u00a0 &#8220;<a href=\"\/mark\/files\/2018\/02\/221.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Design of Cryptographic Devices Resilient to Fault Injection Attacks Using Nonlinear Robust Codes<\/a>&#8220;,<span>\u00a0<\/span><em>Fault Analysis in Cryptography,<span>\u00a0<\/span><\/em>M.\u00a0 Joye Editor, 2011<span>\u00a0<\/span><em>\u00a0<\/em><\/li>\n<li style=\"font-weight: 400;\">221.\u00a0<span><\/span><span>Wang<\/span>,<span><\/span><span>M.G.Karpovsky<\/span><span>\u00a0<\/span>and<span>\u00a0<\/span><span>A.Joshi<\/span>,<span>\u00a0 &#8220;<\/span><a href=\"\/mark\/files\/2018\/02\/222.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Nonlinear Multi-Error Correcting Codes for Reliable MLC NAND Flash Memories\u00a0<span>\u00a0<\/span><\/a>&#8220;,\u00a0\u00a0<span>\u00a0<\/span><em>IEEE Trans on VLSI<\/em>,<span>\u00a0<\/span><span>Vol<\/span><span>\u00a0<\/span>20, No 7, July, 2012, pp. 1221-1235<\/li>\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong>M. Karpovsky,<span><\/span><span>&#8221; Design<\/span><span>\u00a0<\/span>of Secure Hardware Resistant to Attacks&#8221;,<span>\u00a0<\/span><em>Proc. EW Design and Test<span>\u00a0<\/span><span>Symp<\/span>,<\/em><span>\u00a0<\/span>Sept 2010<\/li>\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong>Z. Wang and<span><\/span><span>M.G.Karpovsky<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/223.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Algebraic Manipulation Detection Codes and Their Application for Design of Secure Cryptographic Devices<\/a>&#8220;,<span>\u00a0\u00a0<em>Proc<\/em><\/span><em><span>\u00a0<\/span>of Int.<span>\u00a0<\/span><span>Symp<\/span>.<span>\u00a0<\/span><span>on<\/span><span>\u00a0<\/span>On-Line Testing<\/em>, 2011<\/li>\n<li style=\"font-weight: 400;\">\u00a0Wang,<span><\/span><span>A.Joshi<\/span><span>\u00a0<\/span>and<span>\u00a0<\/span><span>M.G.Karpovsky<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/224.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Influence of Metallic Tubes on the Reliability of CNTFET SRAMs: Error Mechanisms and Countermeasures&#8221;<\/a>,<span>\u00a0<\/span><em>Proc. GLSVLSI Conference<\/em>,<span>\u00a0 2011<\/span><\/li>\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong><span>Z.Wang<\/span>,<span><\/span><span>M.G.Karpovsky<\/span><span>\u00a0<\/span>and<span>\u00a0<\/span><span>A.Joshi<\/span>,\u00a0\u00a0<span>&#8221;\u00a0<\/span><a href=\"\/mark\/files\/2018\/02\/225.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Secure Multipliers Resilient to Strong Fault-Injection Attacks Using<span>\u00a0<\/span><span>Multilinear<\/span><span>\u00a0<\/span>Arithmetic Codes<\/a><span>\u00a0<\/span>&#8220;,<span>\u00a0<\/span><em>IEEE Trans on VLSI,<span>\u00a0<\/span><\/em><span>Vol<\/span><span>\u00a0<\/span>20, No 6 , 2012, pp 1036-1049<\/li>\n<li style=\"font-weight: 400;\"><strong><span><\/span><\/strong>M.G. Karpovsky and Z. Wang,<span><\/span><a href=\"\/mark\/files\/2018\/02\/226.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">&#8220;Design of Strongly Secure Communication and Computation Channels by Nonlinear Error Detecting Codes&#8221;,\u00a0<span>\u00a0<\/span><em>IEEE Trans Computer<\/em>s\u00a0<span>\u00a0<\/span><\/a><span>\u00a0<\/span><span>Vol<\/span><span>\u00a0<\/span>63, No 11, Nov. 2014, pp 2716-2728<\/li>\n<li style=\"font-weight: 400;\"><span><\/span>L. Levitin,<span><\/span><span>M.G.Karpovsky<\/span><span>\u00a0<\/span>and M. Mustafa, &#8220;<a href=\"\/mark\/files\/2018\/02\/227.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Deadlock Prevention in Networks of Workstations with Wormhole Routing<\/a>&#8220;,<span>\u00a0<\/span><em>Distributed Innovations for Business, Engineering and Science,<span>\u00a0\u00a0Edited<\/span><\/em><span>\u00a0<\/span>by A. Loo<strong><em>,<span>\u00a0<\/span><\/em><\/strong>\u00a02013.<\/li>\n<li style=\"font-weight: 400;\"><span><\/span>M.G Karpovsky,<span><\/span><span>L.B.Levitin<\/span>, M Mustafa, &#8220;<a href=\"\/mark\/files\/2018\/02\/228.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Deadlock Prevention in Multiprocessor Systems with Wormhole Routing&#8221;<\/a>,<span>\u00a0<\/span><em>Distributed Innovations for Business, Engineering and Science,<span>\u00a0\u00a0Edited<\/span><\/em><span>\u00a0<\/span>by A. Loo<strong><em>,<span>\u00a0<\/span><\/em><\/strong>\u00a02013.<\/li>\n<li style=\"font-weight: 400;\">229.<span><\/span><span>Wang<\/span><span><\/span>and<span>\u00a0<\/span><span>M.G.Karpovsky<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/229.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Reliable and Secure Memories Based on Algebraic Manipulation Correction Codes&#8221;<\/a>,<span>\u00a0<\/span><span><em>Proc<\/em><\/span><em><span>\u00a0<\/span><span>Int<\/span><span>\u00a0<\/span><span>Symp<\/span>.<span>\u00a0<\/span><span>on<\/span><span>\u00a0<\/span>On-line Testing,<\/em><span>\u00a0<\/span>June 2012<\/li>\n<li style=\"font-weight: 400;\">230.<span><\/span><span>Wang<\/span><span><\/span>and<span>\u00a0<\/span><span>M.G.Karpovsky<\/span>,<span>\u00a0<\/span><a href=\"\/mark\/files\/2018\/02\/230.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">&#8220;New Error Detecting Codes for design of Hardware Resistant to Strong Fault Injection Attacks&#8221;<\/a>,<span>\u00a0<\/span><em>Proc. Int. Conference on Security and Management,<span>\u00a0<\/span><span>SAM\u00a0,<\/span><\/em><span>\u00a0<\/span>2012<\/li>\n<li style=\"font-weight: 400;\"><span><\/span><span>P.Luo<\/span>,<span><\/span><span>Z.Wang<\/span><span>\u00a0<\/span>and<span>\u00a0<\/span><span>M.G.Karpovsky<\/span>, &#8220;<a href=\"\/mark\/files\/2018\/02\/231.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Secure NAND Flash Memories Resilient to Strong Fault-Injection Attacks Using Algebraic Manipulation Detection Codes&#8221;<\/a>,<span>\u00a0<\/span><em>Proc. Int. Conference<span>\u00a0 on<\/span><span>\u00a0<\/span>Security and Management, SAM , 2013<\/em><\/li>\n<li style=\"font-weight: 400;\"><em><span><\/span><\/em>Shizun Ge, Zhen Wang, Pei Luo, Mark Karpovsky,<span><\/span><span>&#8221;\u00a0<\/span><a href=\"\/mark\/files\/2018\/02\/232.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Secure Memories Resistant to Both Random Errors and Fault Injection Attacks Using Nonlinear Error Correction Codes&#8221;,<\/a><span>\u00a0<\/span><em>Proc. Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2013, 2013<\/em><\/li>\n<li style=\"font-weight: 400;\"><em><span><\/span><\/em>Shizun Ge, Zhen Wang, Pei Luo, Mark Karpovsky, &#8220;<a href=\"\/mark\/files\/2018\/02\/233.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Reliable and Secure Memories Based on Algebraic Manipulation Detection Codes and Robust Error Correction<span>&#8221;\u00a0<\/span><\/a>,<span>\u00a0<\/span><em>Proc. Int. Depend<span>\u00a0<\/span><span>Symp<\/span>., 2013<\/em><\/li>\n<li style=\"font-weight: 400;\"><em><span><\/span><\/em>I.<span><\/span><span>Shumsky<\/span>,<span>\u00a0<\/span><span>O.Keren<\/span>,<span>\u00a0<\/span><span>M.Karpovsky<\/span>, &#8220;<span>\u00a0<\/span><a href=\"\/mark\/files\/2018\/02\/234.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Robustness of Security-Oriented Binary Codes Under Non-Uniform Distribution of<span>\u00a0<\/span><span>Codewords<\/span>&#8220;<\/a>,<span>\u00a0<\/span><em>Proc. Int. Depend<span>\u00a0<\/span><span>Symp<\/span><span>.,<\/span><span>\u00a0<\/span>2013<\/em><\/li>\n<li style=\"font-weight: 400;\">P. Luo,<span><\/span><span>A.Yu-Lun\u00a0<\/span><span><\/span>Lin, Z. Wang and M.G. Karpovsky, &#8220;Hardware Implementation of Reliable and Secure Shamir&#8217;s Secret Sharing Scheme&#8221;, \u00a0Proc. Int.<span>\u00a0<\/span><span>Symp<\/span>. On High Assurance Systems Engineering<span>,\u00a0\u00a02014<\/span>.<\/li>\n<li style=\"font-weight: 400;\"><span><\/span>M.G. Karpovsky, L. Levitin, M. Mustafa, \u201c<a href=\"\/mark\/files\/2018\/02\/236.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Optimal Turn Prohibition for Deadlock Prevention in Networks with Regular Topologies<\/a>\u201d,<span><\/span><em>IEEE Trans on Control of Networks,<\/em><span>\u00a0<\/span>Vol. 1, No 1, March 2014, pp 74-85<\/li>\n<li style=\"font-weight: 400;\"><span><\/span>O. Keren, M.G. Karpovsky,<span><\/span>&#8220;<a href=\"\/mark\/files\/2018\/02\/237.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Relations between the Entropy of a Source and the Error Masking Probability for Security Oriented Codes<\/a>\u201d,<span>\u00a0<\/span><em>IEEE Trans on Communications,<\/em><span>\u00a0<\/span>Vol. 63, No.1, pp206-214, 2015<\/li>\n<li style=\"font-weight: 400;\"><span><\/span>Z. Wang, M.G.<span><\/span>Karpovsky, L. Bu<span>\u00a0<\/span>&#8220;<a href=\"\/mark\/files\/2018\/02\/239.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Design of Reliable and Secure Devices Realizing Shamir\u2019s Secret Sharing<\/a>\u201d,<span>\u00a0<\/span><em>IEEE Trans on Computers,<\/em><span>\u00a0<\/span><span>Vol.PP<\/span><span>\u00a0<\/span>, Issue 99, Oct. 2015<\/li>\n<li style=\"font-weight: 400;\"><span><\/span>L. Bu, M.G.<span><\/span>Karpovsky, Z. Wang<span>\u00a0\u00a0<\/span>&#8220;<a href=\"\/mark\/files\/2018\/02\/239.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">New Byte Error Correcting Codes with Simple Decoding for Reliable Cache Design<\/a>\u201d,<span>\u00a0<\/span><em>Proc. 21st IEEE On-Line Testing Symposium (IOLTS)<\/em>, 2015<\/li>\n<li style=\"font-weight: 400;\"><span><\/span>L. Bu, M.G.<span><\/span>Karpovsky<span>\u00a0\u00a0<\/span>&#8220;<a href=\"\/mark\/files\/2018\/02\/240.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Protecting Flash Memories with a High Reliability and Low Cost ECC<\/a>&#8220;,<span>\u00a0<\/span><em>International Journal of New Technologies in Science and Engineering<\/em>, vol. 2, Issue. 2, 2015<\/li>\n<li style=\"font-weight: 400;\">Lake Bu, and M. Karpovsky &#8220;<a href=\"\/mark\/files\/2018\/02\/241-iolts-2016.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Hybrid Self-Diagnosis Mechanism with Defective Nodes Locating and Attack Detection for Parallel Computing Systems<\/a>&#8220;,<span><\/span><em>Proc. 22nd IEEE On-Line Testing Symposium (IOLTS)<\/em>, 2016<\/li>\n<li style=\"font-weight: 400;\">Lake Bu, and M. Karpovsky &#8220;<span><a href=\"\/mark\/files\/2018\/02\/242.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Design of Secure and Reliable Wireless Transmission Channel for Implantable Medical Devices<\/a><\/span>&#8220;,\u00a0<span><\/span><em>Proc. International Conference on Information Systems Security and Privacy (ICISSP), 2017\u00a0\u00a0<span><\/span><\/em>[Best Paper Award]<\/li>\n<li style=\"font-weight: 400;\">Lake Bu, and M. Karpovsky \u201c<a href=\"\/mark\/files\/2018\/12\/CDT-2018-5008-FINAL.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Design of reliable storage and compute systems with lightweight group testing based non-binary error correction codes\u201d<\/a>,\u00a0<em>IET\u00a0 Journal of\u00a0Computers &amp; Digital Techniques<\/em>, 2018.<\/li>\n<li style=\"font-weight: 400;\">\n<p class=\"p1\"><span class=\"s1\"><span>Lake Bu, M. Karpovsky and M. A. Kinsy\u00a0<\/span>&#8220;<a href=\"\/mark\/files\/2018\/12\/1-s2.0-S0167404818312525-main.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Bulwark: Securing Implantable Medical Devices Communication Channels<\/a>&#8220;,\u00a0<em>Computers and Security,<\/em>\u00a0Elsevier, 2018<\/span><\/p>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mark Karpovsky Professor Emeritus Boston University. Department of Electrical and Computer Engineering E-mail: markkar@bu.edu Education: Ph.D. Department\u00a0of Mathematics,\u00a0 Leningrad\u00a0Electrotechnical\u00a0Institute, Leningrad, USSR. M.S.\u00a0Department of Computer Science,\u00a0 Leningrad\u00a0Electrotechnical\u00a0Institute, Leningrad, USSR. B.S.\u00a0Department of Computer Science,\u00a0 Leningrad\u00a0Electrotechnical\u00a0Institute, Leningrad, USSR. Employment: June 2002- July. 2002, Visiting Professor, Tampere International Center for Signal Processing. Finland. June 2000- July,\u00a02000, Visiting Professor, Tampere [&hellip;]<\/p>\n","protected":false},"author":9358,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/sites.bu.edu\/mark\/wp-json\/wp\/v2\/pages\/56"}],"collection":[{"href":"https:\/\/sites.bu.edu\/mark\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.bu.edu\/mark\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.bu.edu\/mark\/wp-json\/wp\/v2\/users\/9358"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.bu.edu\/mark\/wp-json\/wp\/v2\/comments?post=56"}],"version-history":[{"count":50,"href":"https:\/\/sites.bu.edu\/mark\/wp-json\/wp\/v2\/pages\/56\/revisions"}],"predecessor-version":[{"id":1626,"href":"https:\/\/sites.bu.edu\/mark\/wp-json\/wp\/v2\/pages\/56\/revisions\/1626"}],"wp:attachment":[{"href":"https:\/\/sites.bu.edu\/mark\/wp-json\/wp\/v2\/media?parent=56"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}