From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Trojan-horse attacks on quantum key distribution with classical Bob., , и . Quantum Inf. Process., 14 (2): 681-686 (2015)Cost-sharing contract design between manufacturer and dealership considering the customer low-carbon preferences., , , , и . Expert Syst. Appl., 213 (Part): 118877 (2023)Storage availability of one-shot system under periodic inspection considering inspection error., и . Reliab. Eng. Syst. Saf., (2019)Determining the inspection intervals for one-shot systems with support equipment., и . Reliab. Eng. Syst. Saf., (2018)An automatic FPGA design and implementation framework., , , , и . FPL, стр. 1-4. IEEE, (2013)A logic cell architecture exploiting the shannon expansion for the reduction of configuration memory., , , , , и . FPL, стр. 1-6. IEEE, (2014)A Pre-Routing Net Wirelength Prediction Method Using an Optimized Convolutional Neural Network., , , и . CANDAR Workshops, стр. 115-120. IEEE, (2019)Implementation of FPGA Building Platform as a Cloud Service., , , и . HEART, стр. 6:1-6:6. ACM, (2019)Nearly Optimal Consensus Control of Discrete Time Multiagent Systems with Time Delays., , , и . SSCI, стр. 72-77. IEEE, (2019)Robust subspace clustering via penalized mixture of Gaussians., , , , и . Neurocomputing, (2018)