Author of the publication

A 1.8-V 128-Mb mobile DRAM with double boosting pump, hybrid current sense amplifier, and dual-referenced adjustment scheme for temperature sensor.

, , , , , , , , and . IEEE J. Solid State Circuits, 38 (4): 631-640 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing the epistasis variance of large-scale traveling salesman problems., and . GECCO, page 1169-1176. ACM, (2005)A Hybrid Genetic Algorithm Based on Complete Graph Representation for the Sequential Ordering Problem., and . GECCO, volume 2723 of Lecture Notes in Computer Science, page 669-680. Springer, (2003)A Hybrid Genetic Algorithm For Optimal Hexagonal Tortoise Problem., , and . GECCO, page 689. Morgan Kaufmann, (2002)Voronoi Quantizied Crossover For Traveling Salesman Problem., and . GECCO, page 544-552. Morgan Kaufmann, (2002)A Study on Security Middleware Framework for the Ubiquitous Platform., , , and . VTC Fall, page 1-5. IEEE, (2006)New Epistasis Measures for Detecting Independently Optimizable Partitions of Variables., , and . GECCO (2), volume 3103 of Lecture Notes in Computer Science, page 150-161. Springer, (2004)A 1.8-V 128-Mb mobile DRAM with double boosting pump, hybrid current sense amplifier, and dual-referenced adjustment scheme for temperature sensor., , , , , , , , and . IEEE J. Solid State Circuits, 38 (4): 631-640 (2003)Return on Security Investment Against Cyber Attacks on Availability., , , and . ICCSA (2), volume 3981 of Lecture Notes in Computer Science, page 270-278. Springer, (2006)An Information-Theoretic Analysis on the Interactions of Variables in Combinatorial Optimization Problems., and . Evol. Comput., 15 (2): 169-198 (2007)The Methods of IPsec Applying Between MN and HA in Mobile IPv6., , and . Security and Management, page 475-478. CSREA Press, (2003)