Author of the publication

A Quantum CAD Accelerator Based on Grover's Algorithm for Finding the Minimum Fixed Polarity Reed-Muller Form.

, , and . ISMVL, page 33. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual Prototype of the Tunnel Boring Machine and Movement Simulation in DIVISION MOCKUP2000i2., , , , and . DET, volume 66 of Advances in Intelligent and Soft Computing, page 525-532. Springer, (2009)Toward conditionally anonymous Bitcoin transactions: A lightweight-script approach., , , , and . Inf. Sci., (2020)Indentifying Disease Genes Using Disease-Specific Amino Acid Usage., , and . ICIC (3), volume 6840 of Lecture Notes in Computer Science, page 478-485. Springer, (2011)Blind Transmission and Detection Designs With Unique Identification and Full Diversity for Noncoherent Two-Way Relay Networks., , and . IEEE Trans. Veh. Technol., 63 (7): 3137-3146 (2014)A Data-Driven Approach for GPS Trajectory Data Cleaning., , , and . DASFAA (1), volume 12112 of Lecture Notes in Computer Science, page 3-19. Springer, (2020)DETransMVSnet: Research on Terahertz 3D Reconstruction of Multi-View Stereo Network With Deep Equilibrium Transformers., , , and . IEEE Access, (2023)面向时间感知的微博传播模型研究 (Research on Temporal Perception-oriented Microblog Propagation Model)., , , and . 计算机科学, 44 (2): 275-278 (2017)Methodological frameworks for large-scale network analysis and design., , and . Comput. Commun. Rev., 34 (3): 7-20 (2004)CruParamer: Learning on Parameter-Augmented API Sequences for Malware Detection., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Collaborative filtering algorithm with social information and dynamic time windows., , , and . Appl. Intell., 52 (5): 5261-5272 (2022)